Preferred Language
Articles
/
FhaeuYcBVTCNdQwCOF-J
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.

Scopus Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Aug 06 2017
Journal Name
Journal Of Education College Wasit University
Cloud Computing Adoption by Higher Education Institutions of Iraq: An Empirical Study
...Show More Authors

In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.

Publication Date
Wed Sep 23 2020
Journal Name
Artificial Intelligence Research
Hybrid approaches to feature subset selection for data classification in high-dimensional feature space
...Show More Authors

This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe

... Show More
View Publication
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
Inverting Gravity Data to Density and Velocity Models for Selected Area in Southwestern Iraq
...Show More Authors

The gravity method is a measurement of relatively noticeable variations in the Earth’s gravitational field caused by lateral variations in rock's density. In the current research, a new technique is applied on the previous Bouguer map of gravity surveys (conducted from 1940–1950) of the last century, by selecting certain areas in the South-Western desert of Iraqi-territory within the provinces' administrative boundary of Najaf and Anbar. Depending on the theory of gravity inversion where gravity values could be reflected to density-contrast variations with the depths; so, gravity data inversion can be utilized to calculate the models of density and velocity from four selected depth-slices 9.63 Km, 1.1 Km, 0.682 Km and 0.407 Km.

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Robust Tests for the Mean Difference in Paired Data by Using Bootstrap Resampling Technique
...Show More Authors

The paired sample t-test for testing the difference between two means in paired data is not robust against the violation of the normality assumption. In this paper, some alternative robust tests have been suggested by using the bootstrap method in addition to combining the bootstrap method with the W.M test. Monte Carlo simulation experiments were employed to study the performance of the test statistics of each of these three tests depending on type one error rates and the power rates of the test statistics. The three tests have been applied on different sample sizes generated from three distributions represented by Bivariate normal distribution, Bivariate contaminated normal distribution, and the Bivariate Exponential distribution.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Role of Education in Enhancing the Value of Citizenship in Children through the Interactive Life Process in Educational Institutions
...Show More Authors

The aim of the research is to diagnose the methods of enhancing the value of citizenship in children through the interactive life process in educational institutions; the descriptive approach was used to achieve the objective by identifying social theories that corresponded to the national value or the theoretical principles of citizenship education. The study focused on educational activities and their role in establishing values, national educational philosophy in interactive activities, as well as the presentation of previous studies on the subject of citizenship, and maps of each of the strategies of active learning, skills in the process of interactive life in the field of education, Institutions that have the responsibility to prom

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of accounting information in making capital budget decisions
...Show More Authors

Faced economic units face the option of restoring the capital budget annually, and the information provided for the preparation of these budgets, including financial and non-financial aspects have an important impact in the numbers of these budgets, and these units differ in the ability of their own accounting systems to maintain this information. The aim of this research is to investigate the volume of accounting information that is relied on and the reasons for the differences between one unit and another in the various economic sectors in the Iraqi environment.

The most important results of the research is the weakness of the adoption of decision makers in the Iraqi environment and lack of sufficient attention in the decision-

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Materials Today Communications
Engineered Composition and Morphology: Unveiling 2D Bi₂(W₁₋ₓMox)O₆ Nanosheets for Enhanced Optical and Ionizing Protection Applications
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Sep 09 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Estimation of the Effect of the Government Expenditure Growth Rate on the Rate of Inflation in the Iraqi Economy for the Period (1991- 2015)
...Show More Authors

Government expenditure represents one of the controlling financial policies in the economic affairs and management of the economic cycle in order to achieve price stability, raise the rate of output growth and decrease the level of unemployment. The price stability represents one of the macroeconomic goals that all countries seek without exception, regardless of the economic philosophy adopted by each country; in addition to this is raising the productive capacity and reaching the actual output to the level of the expected output, that is, the level of output related to the natural unemployment rate or what is sometimes called the Non-inflationary unemployment rate. The restriction of government expenditure (G=T+∆B/iP+∆M/P) is

... Show More
Preview PDF