Preferred Language
Articles
/
FhaeuYcBVTCNdQwCOF-J
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.

Scopus Crossref
View Publication
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using the Financial Analysis of Financial Information Published in the financial Statements for Predicting Stocks returns of Services and Insurance Sectors
...Show More Authors

The aim of this study was to identify the rate of return of the stock through the financial information disclosed by the financial statements of companies both services and insurance included in Iraqi market for securities . The study used a descriptive statistical methods and the correlation matrix for the independent factors , in addition to a regression model for data  analysis and hypothesis . Model included a number of independent variables , which was measured in the size of company (sales or revenue) , and the leverage , in addition to the structure of assets and the book value of owners'  equity in the company , as well as the general price index .Based on the data of (11)companies and for three years, showed the result

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Quality and Accreditation standard in performance improvement of education institutions: بحث تطبيقي في كلية الهندسة جامعة بغداد
...Show More Authors

enjoyed the process of the development of higher education institutions attention of most countries of the world and to reconsider its objectives and programs and administrative and organizational structures, and it was the most important development of the application of Quality Assurance and Accreditation Standards (QAAS) tools, as the aim of these tools to the application of advanced with a far-reaching impact on all of the disciplines in the organization methods education that contribute, and plays a performance audit an important role in verifying the extent to which carried out these institutions activities or programs effectively and efficiently, economic, There are a number of objectives for the search of the most important attem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Modifications to Accelerate the Iterative Algorithm for the Single Diode Model of PV Model
...Show More Authors

This paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Reflections informational monitoring in Creative marketing systems
...Show More Authors

Abstract:                                                                                                      

         The research aims to measure the impact of infor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 31 2023
Journal Name
Iraqi Geological Journal
Building of a Static Model for Jeribe Formation in Jambour Oil Field
...Show More Authors

The Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Investment Trends for Iraqi Industries in Terms of Clean Production (selected model)
...Show More Authors

   Industrial Investment according to Clean Productive methods is an important element in the process of rational use of Economic Resources, and the Iraqi industrial sector relied on traditional production methods; the productive activities in this sector did not take into consideration the environmental dimension, which leads to achieving the optimal use of economic resources, so it was necessary to have new investment trends heading with Clean Production. Therefore, the research is based on the hypothesis that "Clean Production contributes to improving the environment and rational use of Natural Resources." Based on the descriptive - inductive analysis methodology that study of Iraqi industries with Clean Production,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Proposed methods of image recognition depend on the PCA
...Show More Authors

This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Al-khwarizmi Engineering Journal
Performance of Turbo-Codes with Some Proposed Interleaver Schemes
...Show More Authors

This paper describes a number of new interleaving strategies based on the golden section. The new interleavers are called golden relative prime interleavers, golden interleavers, and dithered golden interleavers. The latter two approaches involve sorting a real-valued vector derived from the golden section. Random and so-called “spread” interleavers are also considered. Turbo-code performance results are presented and compared for the various interleaving strategies. Of the interleavers considered, the dithered golden interleaver typically provides the best performance, especially for low code rates and large block sizes. The golden relative prime interleaver is shown to work surprisingly well for high puncture rates. These interleav

... Show More
View Publication Preview PDF