The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic direction Which is expressed by its vision, mission, and realistic strategic objectives. The researcher adopted the case study method for its objectivity and being the closest and best method to prove the research problem and provide objective and realistic treatments for it. As for the field of application of the present study, it is represented by the Communications Directorate due to its great importance and its close relationship to the communications system in Iraq and national Cybersecurity, in addition to the fact that it has not been subjected to testing the extent to which Cybersecurity measures are applied and documented before. The checklist was used according to the Global Cybersecurity Index (GCI.v42019). In order to measure the extent of the application and documentation of cybersecurity measures in the Directorate, personal observation and interviews were used as tools for data collection. The SWOT matrix was adopted to analyze the internal and external environment factors.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreIrrigation scheduling techniques is one of the suggested solutions for water scarcity problem. The study aims to show the possibility of using practical and applicable irrigation scheduling program which was designed by Water Resources Department at the University of Baghdad by using Spreadsheet Formulas for Microsoft Excel program, version 2007, with some modification to generalize it and made it applicable to various climatic zone and different soil types, as a salvation for the shortage of irrigation water inside the irrigation projects. Irrigation projects which incidence of Tigris River basin will be taken as an applicable example. This program was based on water budgeting and programmed depending on scientific concepts which facili
... Show MoreBanking institutions are considered one of development foundations,and they also performe active role in supporting national economey and itsinstitutions. Banks became diversed in their activities that specialized Banksbecame one of the constituents of developing work in any activity, especiallyin investiment sector .In view of the importance of insurance sector and thenecessity of developing its divices and its working instituments, studyinginsurance Banking reality became a necessity, because insurance Companies inIraq are suffering of weakness in the level of insurance service, in addition tothe existence of a problem in the relationship between Banks network andinsurance industry.So this research aims to define insurance reality; the
... Show MoreNowadays, many new technologies developed in a lot of countries. These technologies are promising in many areas such as environmental monitoring, precision agriculture as well as in animal production. The purpose of this study was to define a better understanding of how new and advanced technologies affect the agriculture and livestock sector alike. Although agriculture and animal husbandry are among the most important sectors, advanced equipment and information technology cannot be used adequately. This situation leads to low production efficiency. It is also known that there can be a significant difference in temperature between the position of the climate control sensor (room temperature) and the area occupied by the animal. This study e
... Show MoreThe permeability estimates for the uncored wells and a porosity function adopting a modified flow zone index-permeability crossplot are given in this work. The issues with implementing that approach were mostly crossplots, due to the influence of geological heterogeneity, did not show a clear connection (scatter data). Carbonate reservoir flow units may now be identified and characterized using a new approach, which has been formally confirmed. Due to the comparable distribution and flow of clastic and carbonate rock fluids, this zoning method is most effective for reservoirs with significant primary and secondary porosity. The equations and correlations here are more generalizable since they connect these variables by combining cor
... Show MoreThis study is the first and new record to the spider Scytodes univittata Simon, 1882 (Araneae:Scytodidae)in Baghdad /Iraq , the spiders Scytodes univittata were collect from province Baghdad in Iraq , genus Scytodes belong to the family Scytodidae it is one of the most family are wide distribution around the world have 6 eyes and are slow moving , the genus Scytodes are known from the names spitting spiders ,.Female Scytodes univittata can be characteristic by :large round cephalothorax length:4.45 mm , abdomen length 3.50, total body length 7.95 mm and V-shaped of fovea, scutela triangle and large with long thin legs femur I have two row of spines then spineless are in IV femur , coloration is yello
... Show MoreThis study aims to discuss how English Language Textbook (ELT), used in Iraqi schools, can be developed. All Iraqi teachers in Iraq spend much time using ELT textbooks in classrooms, and most of the Iraqi students depend on these textbooks to learn and improve the English language, so choosing an appropriate ELT textbook is so essential. A suitable book must include critical components that fit teachers' and students' needs. The quality of ELT textbooks has been improved dramatically in recent years, even though these textbooks still do not meet students' needs, especially in language communication skills. This study seeks to investigate the most critical components that may make the ELT textbooks are more influential and interactive for Ir
... Show MoreTechnique was used to retail for analyzing atom beryllium ion cathode of an atom lithium to six pairs of functions wave which two ?????? and the rest of the casing moderation and to analyze atom lithium ion Mob atom beryllium to three pairs of functions wave pair of casing and the rest of the casing moderation using function wave Hartree Fock and each casing email wascalculate expected values ??....
The most important recommendations of this research are:-
1.The benefit of the other countries experiences about the transparency of the government performance, without depending on the transparency that imitating the other experiences; that may not fit with the Iraqi government units.
2.The Ministry of Finance has to prepare the citizen guidebook about the government performance which is considered an essential document, it should be simple and available for all the parties of relation; and for not specialized citizen for the purpose of simplifying the understanding of government performance details.
3.The benefit of the government units websites of inte
... Show MoreThis paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.