The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic direction Which is expressed by its vision, mission, and realistic strategic objectives. The researcher adopted the case study method for its objectivity and being the closest and best method to prove the research problem and provide objective and realistic treatments for it. As for the field of application of the present study, it is represented by the Communications Directorate due to its great importance and its close relationship to the communications system in Iraq and national Cybersecurity, in addition to the fact that it has not been subjected to testing the extent to which Cybersecurity measures are applied and documented before. The checklist was used according to the Global Cybersecurity Index (GCI.v42019). In order to measure the extent of the application and documentation of cybersecurity measures in the Directorate, personal observation and interviews were used as tools for data collection. The SWOT matrix was adopted to analyze the internal and external environment factors.
The deliberation and exchanged of power is a matter of political importance For the Iraqi political system after 2003, The deliberation of power and its democratic transition and electoral integrity Is a good indicator of political stability and progress In the Iraqi parliamentary political system , The transfer of authority in terms of adopting the deliberative approach represents a structural and institutional dimension of the political process , it led the power to become Authority of the Foundation Exercised in accordance with the Constitution and the law not real power , And lead to the recognition of the existence of an official parliamentary opposition and its right to take political power later through the ballot box Makes the pr
... Show MoreThe aim of this study is to survey and make to revision the genera and species of Chloropidae fauna of Iraq. The investigation showed four species belonging four genera, which belongs to two subfamilies, and one unidentified species belonging to the genus Elachiptera Maquart, The specimens were compared with stored insects at Department of Entomology and invertebrates, Iraq Natural History Research Center and Museum.
The research entitled "the Iraqi Topics in International Arab Press" is an analytical study of two newspapers: Al-Arab and Al-Hayat published in London from September 1-30, 2013.
The Arab press is one of the cultural monuments Home stretches for culture and media of Arabs outside the Arab Homeland which made them international press targeting public Arab audience's not civil audiences in a particular country and formulating their contents on this basis taking into account intake affairs and issues that have been national or international.
Because of this international presence of the Arab press, these newspa
... Show MoreThe subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More