The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
The researchers of the present study have conducted a genre analysis of two political debates between American presidential nominees in the 2016 and 2020 elections. The current study seeks to analyze the cognitive construction of political debates to evaluate the typical moves and strategies politicians use to express their communicative intentions and to reveal the language manifestations of those moves and strategies. To achieve the study’s aims, the researchers adopt Bhatia’s (1993) framework of cognitive construction supported by van Emeren’s (2010) pragma-dialectic framework. The study demonstrates that both presidents adhere to this genre structuring to further their political agendas. For a positive and promising image
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show MoreAbstract
Nowadays, the world adopts a philosophy that relates to environmental conservation. This philosophy can be achieved through providing environmentally friendly products while satisfying customers' needs as well. To attain that, a new systems and programs need to be applied in a scientific manner, and total quality environmental management (TQEM) is among these concepts. The research aimed to analyze the Relationship between (TQEM) Practices and its effect on Flexible Manufacturing in Badush factory. The research sample includes managers and head of divisions at top, middle and front line management levels which were (27) working in Badush factory. To achieve the objectives of the study, the descriptive anal
... Show MoreObjective: To measure the serum levels of Fetuin-A, ischemia-modified albumin (IMA), and ferritin in hospitalized patients with severe COVID-19in Baghdad, Iraq. Moreover, to determine these biomarkers' cut-off valuesthat differentiate between severely ill patients and control subjects. Methods: This case-control study was done from 15 September to the end of December 2021 and involved a review of the files and collectionof blood samples from patients (n=45, group1) hospitalized in COVID-19 treatment centersbecause of severe symptoms compared tohealthy subjects as controls (n=44, group2). Results: Fetuin-A serum levels were not statistically different between patients and controls. In contrast, IMA and ferritin levels were significan
... Show MoreRisk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has
... Show MoreRisk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has
... Show MoreThis paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreAnalysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien
... Show MoreWith the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored
... Show More