Preferred Language
Articles
/
FhaeuYcBVTCNdQwCOF-J
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.

Scopus Crossref
View Publication
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Seismic Effects and Static Analysis for the Artificial Damped Outrigger Systems in Tall R.C Buildings
...Show More Authors

This paper studies the combination fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. It works by connecting the central core, comprising either shear walls or braced frames, to the outer perimeter columns.

     The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model, and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximum lateral load at the top of the building is calculated, and  this load  w

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Heuristic and Meta-Heuristic Optimization Models for Task Scheduling in Cloud-Fog Systems: A Review
...Show More Authors

Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
CATHODIC PROTECTION OF CARBON STEEL IN 0.1N NaCl SOLUTION UNDER FLOW CONDITIONS USING ROTATING CYLINDER ELECTRODE
...Show More Authors

The effect of applied current on protection of carbon steel in 0.1N NaCl solution (pH=7) was investigated under flow conditions (0-0.262 m/s) for a range of temperatures (35-55°C) using rotating cylinder electrode. Various values of currents were applied to protect steel from corrosion, these were Iapp.=Icorr., Iapp.=2Icorr. and Iapp.=2.4Icorr. under stationary and flow conditions. Corrosion current was measured by weight loss method. The variation of protection potential with time and rotation velocity at various applied currents was assessed. It is found that the corrosion rate of carbon steel increases with rotation velocity and
has unstable trend with temperature. The protection current required varies with temperature and it inc

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jul 08 2025
Journal Name
Journal Of Physical Education
Change Management Reality In Some Sport Clubs' Administrative Institutions Bureaus In Baghdad From The Players Point of View
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Oct 28 2013
Journal Name
Desalination And Water Treatment
Groundwater protection from cadmium contamination by zeolite permeable reactive barrier
...Show More Authors

This work studies the performance of zeolite permeable reactive barrier in removing cadmium from a contaminated shallow aquifer. Batch tests have been performed to characterize the equilibrium sorption properties of the zeolite in cadmium-containing aqueous solutions. A 1D numerical finite difference model has been developed to describe pollutant transport within groundwater taking pollutant sorption on the permeable reactive barrier (PRB), which is performed by Langmuir equation, into account. Numerical results show that the PRB starts to saturate after a period of time (~120 h) due to reduction of the retardation factor, indicating a decrease in the percentage of zeolite functionality. However, a reasonable agreement between model predict

... Show More
Scopus (38)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Journal Of The College Of Education For Women
Kinds of unknowns and government linkages -empirical study of the application
...Show More Authors

It is no secret that the prophets speech is of great importance, as the second source of Islamic legislation after the Holy Quran, and as such we must reserve and verify the authenticity of the novel and the narrators seizure, and all the conditions laid down by the scholars.

The subject of our research here concerns part of this verification, which is the unknown, the subject of the unknown hadith is considered a matter of great interest by the modernists because it relates to the validity of the novel and the narrators, and the methods of the modernists varied in terms of the reasons for this weakness, the fool never entertained them by the reckless narrative.

I chose the subject of my research the types of Mahjail and

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 08 2025
Journal Name
Journal Of Physical Education
The impact of proposed approach for flexibility and agility in learning some basic skills on the table land movements in the artistic gymnastics
...Show More Authors

View Publication Preview PDF