Preferred Language
Articles
/
FhaeuYcBVTCNdQwCOF-J
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.

Scopus Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
Simulation Model for the Assessment of Direct and Indirect Georeferencing Techniques in Analytical Photogrammetry
...Show More Authors

B Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2

View Publication
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
Corrosion Protection Study of Carbon Steel and 316 Stainless Steel Alloys Coated by Nanoparticles
...Show More Authors

The Corrosion protection effectiveness of Alimina(Al2O3,50nm)and Zinc oxide (ZnO,30nm) nanoparticales were studied on carbon steel and 316 stainless steel alloys in saline water (3.5%NaCl)at four temperatures: (20,30,40,50 OC)using three electrodes potentiostat. An average corrosion protection efficiencies of 65 %and 80% was achieved using Al2O3 NP's on carbon steel and stainless steel samples respectively, and it seems that no effect of rising temperature on the performances of the coated layers. While ZnO NP'S showed protection efficiency around 65% for the two alloys and little effected by temperature rising on the performanes of the coated layers. The morphology of the coated spesiemses was examined by Atomic force microscope.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Advanced Research In Dynamical And Control Systems
Reliable and valid questionnaire for organizational, system, and individual factors to utilize cloud health information system
...Show More Authors

Scopus
Publication Date
Thu Feb 04 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Study in the procedural provisions of the action consumption incidents A comparative study Under Iraqi Consumer Protection Act No. 1 of 2010.: Study in the procedural provisions of the action consumption incidents A comparative study Under Iraqi Consumer Protection Act No. 1 of 2010.
...Show More Authors

This research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to

... Show More
View Publication
Publication Date
Sat Jul 27 2024
Journal Name
International Journal Of Economic Perspectives
The impact of strategic leadership on the building of intelligent organizations: A field study of a group of economic institutions in Algeria
...Show More Authors

This study aims to highlight the role of strategic leadership in adopting the intelligent organization model. The study was conducted on 7 economic organizations in Algeria. The study population consisted of 354 leaders, of whom a random sample of 176 leaders (managers, department heads, division heads, engineers) was selected. The researcher used a questionnaire as the main tool of the study. Statistical analysis and hypothesis testing were conducted using SEM (Structural Equation Modeling) with the aid of SPSS.v26 and AMOS.v24 software. The study concluded with a set of results, most notably: there is a statistically significant direct positive effect between strategic leadership and building intelligent organizations at a significance le

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Performance evaluation of vocational and administrative institutions in the media using the bench-marking of new media: analytical study in the Journal of time
...Show More Authors

Provides the style of benchmarking the best possible use whenevaluating the performance and evaluation, as well as improved performance,due to its consistency with the principles of good evaluation of theperformance, an extension of the completion of several functions of the timeand cost less, thereby increasing the efficiency of the management of theinstitutions, especially institutions, the media, as it became public the future ofthe message sender to the same time Zaorosaúl new media is challenging thetraditional media of what distinguishes this new interactive media and mass ledto this transition . However, the media Aljdidhoosaúl traditional mediacontinue to coexist and reinforce each Menhmaalakhr, for his wealth offreedom of opin

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 15 2024
Journal Name
Al-academy
Aesthetic Composition Systems of Writings and Texts in Contemporary Arab Sculpture
...Show More Authors

ملخص البحث: تناول البحث الحالي:(أنظمة التكوين الجمالي للكتابات والنصوص في النحت العربي المعاصر)، عددا من الأفكار الأساسية التي تمثل المادة النظرية لتفسير ظاهرة الكتابة في الفن بشكل عام وفي فن النحت بشكل خاص، ولكشف أنظمة التكوين الجمالي وأنواعها المتعددة من خلال فحص بعض النصوص البصرية للفنانين العرب المعاصرين، فقد جاء هذا البحث في أربعة فصول. خصص الفصل الأول: الإطار المنهجي للبحث لبيان مشكلة البحث، وأهم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More