Preferred Language
Articles
/
9RezM5IBVTCNdQwCaafH
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic direction Which is expressed by its vision, mission, and realistic strategic objectives. The researcher adopted the case study method for its objectivity and being the closest and best method to prove the research problem and provide objective and realistic treatments for it. As for the field of application of the present study, it is represented by the Communications Directorate due to its great importance and its close relationship to the communications system in Iraq and national Cybersecurity, in addition to the fact that it has not been subjected to testing the extent to which Cybersecurity measures are applied and documented before. The checklist was used according to the Global Cybersecurity Index (GCI.v42019). In order to measure the extent of the application and documentation of cybersecurity measures in the Directorate, personal observation and interviews were used as tools for data collection. The SWOT matrix was adopted to analyze the internal and external environment factors.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Optimum Condition for Asparginase Activity in Crude Extract of Capiscum annum
...Show More Authors

In this study asparaginase was extracted from fruit part of Capiscum annum then Asparaginase activity was detected and optimised. Optimum conditions for the activity of crude asparaginase were studied. Results showed maximum activity of asparaginase was achieved 140 u/ml when the enzyme was incubated with 200 mM of asparagines at 35 °C for 30 minutes in the presence of 0.05 M of potassium phosphate buffer solution at pH 8.

View Publication Preview PDF
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (15)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Classification of k-Sets in PG(1,25), for k=4,…,13
...Show More Authors

A -set in the projective line is a set of  projectively distinct points. From the fundamental theorem over the projective line, all -sets are projectively equivalent. In this research, the inequivalent -sets in have been computed and each -set classified to its -sets where  Also, the  has been splitting into two distinct -sets, equivalent and inequivalent.

View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Oct 08 2016
Journal Name
Methods In Molecular Biology
Production of Adjuvant-Loaded Biodegradable Particles for Use in Cancer Vaccines
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Assessment of Groundwater in Al-Hawija (Kirkuk Governorate) for Irrigation Purposes.
...Show More Authors

The study area is located in Kirkuk governorate - northern Iraq, It covers an area of 630 km2.Twenty eight groundwater samples were collected from the study area during October 2012. pH, electrical conductivity(EC) and total dissolved solids (TDS) and chemical analysis of major ions (Ca2+, Mg2+, Na+, K+, Cl, SO42 and HCO3) were determined. Sodium adsorption ratio (SAR), residual sodium carbonate (RSC), sodium percent (Na%) and electrical conductivity were used to evaluate the suitability of groundwater for irrigation purpose. The groundwater samples mostly have no harmful effects and no hazard in terms of SAR and RSC respectively, and permissible in terms ofNa%, but they are poor, very poor and marginal as irrigation water.

View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
content Analysis for Some Type of Pillows used in Iraqi houses
...Show More Authors

content Analysis for Some Type of Pillows used in Iraqi houses

View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Tropical Journal Of Pharmaceutical Research
Validation of UV-visible spectrophotometric method for niclosamide in different media
...Show More Authors

Purpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identit

... Show More
Scopus
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
Optimum Condition for Asparginase Activity in Crude Extract of Capiscum annum
...Show More Authors

In this study asparaginase was extracted from fruit part of Capiscum annum then Asparaginase activity was detected and optimised. Optimum conditions for the activity of crude asparaginase were studied. Results showed maximum activity of asparaginase was achieved 140 u/ml when the enzyme was incubated with 200 mM of asparagines at 35 °C for 30 minutes in the presence of 0.05 M of potassium phosphate buffer solution at pH 8.

View Publication Preview PDF