Preferred Language
Articles
/
FhaeuYcBVTCNdQwCOF-J
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.

Scopus Crossref
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
(( Technology's role Time driver Activity-based costing at Provide of information for economic units for customer profitability analysis ))
...Show More Authors

  The economic units always sought to maintain its market position and Trchinh the technology management and modern methods that will support success factors .vdila about it has become a customer and one profitability analysis of the most practical way benefit of economic units as modern management focus their attention on achieving this satisfaction, as the customers make up the axis of the success of every organization and that there are many government units aiming to profit directs attention to customers and the number of these units increased continuously. The administration used the customer profitability analysis in order to obtain information to assist in making and decision-making process. How to use modern tec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare some wavelet estimators for parameters in the linear regression model with errors follows ARFIMA model.
...Show More Authors

The aim of this research is to estimate the parameters of the linear regression model with errors following ARFIMA model by using wavelet method depending on maximum likelihood and approaching general least square as well as ordinary least square. We use the estimators in practical application on real data, which were the monthly data of Inflation and Dollar exchange rate obtained from the (CSO) Central Statistical organization for the period from 1/2005 to 12/2015. The results proved that (WML) was the most reliable and efficient from the other estimators, also the results provide that the changing of fractional difference parameter (d) doesn’t effect on the results.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of government and private banks in the financing of small projects: An Applied Research
...Show More Authors

Abstract:

 Sought the search to find out what small businesses, the importance of funding, and the role of funders in supporting such projects, which have been addressed in the search through a sample of government banks (Rafidain and Rasheed) and private banks (the Middle East, the Gulf, North, Assyria) and a sample of Small projects borrowed from these banks, but in order to achieve that rely researchers on scientific methods discreet marked by the curriculum descriptive analytical method which is based on the compilation of facts and information then collated and analyzed to reach acceptable results, as well as data collection tool (checklist) was whereby examine questions of a sample of

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The contractual budget: the ideal technique in planning and implementing capital budgeting projects: a strategy of preparing the contractual budget for Baghdad local government
...Show More Authors

Public budget is the government's tool in achieving the objectives of economic and social development is the accounting curriculum to estimate state revenues and expenditures for years to come, as well as to have legal status as it is after the adoption of an official statement of government units to spend funds on items planned at the same time is a statement collect resources to finance these appropriations, if the primary objective of the budget initially limited to the achievement of financial and legislative control have evolved this function in the area of public administration turned attention from mere imposition of control over the money, which provides information to assist the Department to utilize available resources and prog

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
CATHODIC PROTECTION OF CARBON STEEL IN 0.1N NaCl SOLUTION UNDER FLOW CONDITIONS USING ROTATING CYLINDER ELECTRODE
...Show More Authors

The effect of applied current on protection of carbon steel in 0.1N NaCl solution (pH=7) was investigated under flow conditions (0-0.262 m/s) for a range of temperatures (35-55°C) using rotating cylinder electrode. Various values of currents were applied to protect steel from corrosion, these were Iapp.=Icorr., Iapp.=2Icorr. and Iapp.=2.4Icorr. under stationary and flow conditions. Corrosion current was measured by weight loss method. The variation of protection potential with time and rotation velocity at various applied currents was assessed. It is found that the corrosion rate of carbon steel increases with rotation velocity and
has unstable trend with temperature. The protection current required varies with temperature and it inc

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Apr 25 2025
Journal Name
Journal Of Physical Education
Change Management Reality In Some Sport Clubs' Administrative Institutions Bureaus In Baghdad From The Players Point of View
...Show More Authors

View Publication Preview PDF