The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic direction Which is expressed by its vision, mission, and realistic strategic objectives. The researcher adopted the case study method for its objectivity and being the closest and best method to prove the research problem and provide objective and realistic treatments for it. As for the field of application of the present study, it is represented by the Communications Directorate due to its great importance and its close relationship to the communications system in Iraq and national Cybersecurity, in addition to the fact that it has not been subjected to testing the extent to which Cybersecurity measures are applied and documented before. The checklist was used according to the Global Cybersecurity Index (GCI.v42019). In order to measure the extent of the application and documentation of cybersecurity measures in the Directorate, personal observation and interviews were used as tools for data collection. The SWOT matrix was adopted to analyze the internal and external environment factors.
It is axiomatic that languages mirror the world view of their users. Manipulating honorific forms among people inevitably reflects this truth . Honorifics are conventionalized forms or expressions manifested in all the world's languages and are used to express the social status of the participants in the verbal interaction and to convey indications like politeness and respect . English is no exception. However the question is what exactly creates these forms and their meanings. Although honorifics have been extensively researched from a grammatical and semantic angle , yet they haven’t received that significant attention i
... Show MoreIn this research, we highlight the most important research related to the mixed ligand complexes of the drug trimethoprim (TMP), and for the past 7 years where this drug has been used as a chelating ligand and gives stability to the complexes with ions of metal elements where these complexes, prepared and diagnosed, and for some research the bacterial activity was studied against different types of bacteria.
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreDrilling well design optimization reduces total Authorization for Expenditures (AFE) by decreasing well constructing time and expense. Well design is not a constant pattern during the life cycle of the field. It should be optimized by continuous improvements for all aspects of redesigning the well depending on the actual field conditions and problems. The core objective of this study is to deliver a general review of the well design optimization processes and the available studies and applications to employ the well design optimization to solve problems encountered with well design so that cost effectiveness and perfect drilling well performance are achievable. Well design optimization processes include unconventional design(slimhole) co
... Show MoreThis study sought to determine malformation caused by Ochratoxin-A (OTA) on mouse embryos. Twenty adult female white Swiss mice (mus msculus) were divided into four groups, with five females per group, and with one male placed with two females in a cage. Avaginal plug was observed in the early morning and the day of mating was considered as day of pregnancy followed by the first day of pregnancy. Three sub lethal concentrations of OTA were applied to the respective groups (other than the control), 1mg/kg, 2mg/kg and 4mg/kg. The animals were given 0.1 ml per 10 gm body weight per concentration of OTA once a day during days 7-14 of pregnancy. The control group animals were given distilled water. The pregnant mice were dissected, and the embry
... Show MoreIn this paper a nonlinear adaptive control method is presented for a pH process, which is difficult to control due to the nonlinear and uncertainties. A theoretical and experimental investigation was conducted of the dynamic behavior of neutralization process in a continuous stirred tank reactor (CSTR). The process control was implemented using different control strategies, velocity form of PI control and nonlinear adaptive control. Through simulation studies it has been shown that the estimated parameters are in good agreement with the actual values and that the proposed adaptive controller has excellent tracking and regulation performance.
Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature) targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a
... Show MoreThe aim of this paper is to translate the basic properties of the classical complete normed algebra to the complete fuzzy normed algebra at this end a proof of multiplication fuzzy continuous is given. Also a proof of every fuzzy normed algebra without identity can be embedded into fuzzy normed algebra with identity and is an ideal in is given. Moreover the proof of the resolvent set of a non zero element in complete fuzzy normed space is equal to the set of complex numbers is given. Finally basic properties of the resolvent space of a complete fuzzy normed algebra is given.
The economic dimensions of environmental issues are complex and unclear in many cases, there is a kind of confusion in the real relationship between economic growth and environmental regulations. Many of the negative environmental impacts are accompanied by human activities and urban and industrial development in the city, and that many of the projects that did not take into account the environmental factors during the planning and implementation of them can be detrimental, as well as natural environments, archeological sites, historical or scientific value, aesthetic or educational. It also describes the Global Environment Outlook that if current trends continue, population growth, economic growth and consumption patterns, the p
... Show More