This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreIf the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i
... Show MoreThe purpose of this research shed light on the analysis of the relationship between the knowledge gap and the strategic performance gap and diagnose the level of impact this relationship in building a learning organization, and sought search to achieve a number of goals, cognitive and Applied been tested nature of the relationship and effect between variables in a sample size (62) of the managers of banks civil in Baghdad (Baghdad, Gulf, Assyria, Union, Elaf) and focused research problem in question is bold is whether the analysis of the relationship between the knowledge gap and the performance gap strategic leads to recognize organizations need to shift to organizations educated, either in the side of the field was the pr
... Show MoreBackground: Chronic cigarette smoking is one of the major risk factors for coronary artery disease. However, it has additional cardiac adverse effects independent of coronary atherosclerosis. Patient and Methods: After informed consent and perm- ission from the review board of the hospital, 80 healthy subjects who were classified as smokers or non-smokers were included in the study. They were examined by standard echocardiography protocol which was followed by two-dimensional speckle tracking to assess the functions of the right ventricle. Results: The tricuspid annular plane systolic excursion (TAPSE) was significantly reduced in smokers as compared to non-smokers (P < 0.05). The tricuspid flow peak late diastolic velocity (A wave) was sig
... Show More|
The speech delivered by political blocs and parties and broadcasted by satellite channels, social and communication media has different ideologies and orientations: moderate speech calling for calm or one raising crises.The latter is considered very challenging due to its local and international reference., this paper aims at uncovering these challenges especially during the political crisis witnessed in Iraq. This paper sheds light on the most important crisis that spread in public opinion, broadcasted by satellite, and raised by politicians who are competing to gain authority leading to a lack of peoples, confidence in them.This matter should not be neglected at all; e |
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Abstract
This research deals will the declared production planning operation in the general company of planting oils, which have great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm application on non-linear model which been more difficulty than possible solution when imposed restric
... Show More