Preferred Language
Articles
/
FhaeuYcBVTCNdQwCOF-J
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.

Scopus Crossref
View Publication
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Role of E-Learning in enhancing Total Quality Management in Educational Institutions: an exploratory study of the opinions of a sample of the staff of the Directorate of Education in the province of Nineveh
...Show More Authors

Purpose: The research aims to determine the relationship between E-Learning and Total Quality Management (TQM) in Educational institutions in Nineveh Governorates.

Methodology / Design: The researchers distributed (30) questionnaires to employees (teachers and administrators) of Nineveh Governorate education who represent the community of the research sample, as they were analyzed using the SPSS V.20

The importance of research: The importance of the research in the fact that it focuses on one of the educational methods represented in integrating the traditional method and relying on modern technologies using computers and the Internet in the field of education to improve the reali

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The possibility using of Accounting Information in Rationalizing the Decisions of Capital Expenditure (A case study: Companies Listed in Khartoum Stock Exchange)
...Show More Authors

The research aims at the identity of the accounting information and its characteristics, and then to study the possibility of using accounting information in rationalizing the decisions of capital expenditure. The study relied upon the descriptive analytical approach it is suitable to the nature of this study, the hypotheses of the study were tested by using a number of statistical methods by relying on statistical package program (SPSS), and the research concluded that the companies listed in Khartoum Stock Exchange using accounting information in the comparison between investment alternatives available and estimating the number of years required to recover of the investment cost, the challenges that cause weakness in using the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Liquid-Liquid Extraction of Metal Ions Using Aqueous Biphasic Systems
...Show More Authors

An investigation was conducted for the study of extraction of metal ions using aqueous biphasic systems. The extraction of iron, zinc and copper from aqueous sulphate media at different kinds of extractants SCN− , Cl- and I- , different values of pH of the feed solution, phase ratio, concentration of metals, concentration of extractant, concentration of polymer, and concentration of salt was investigated. Atomic absorption spectrophotometer was used to measure the concentration of iron, zinc and copper in the aqueous phase throughout the experiments. The results of the extraction experiments showed the use of SCN− as extractant, pH=2.5, phase ratio=1.5, concentration of metals 1g/l, concentration of extractant 0.06 %, concentration o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 04 2022
Journal Name
Trends In Sciences
Asymptotic Stability of 3D Stochastic Positive Linear Systems with Delays
...Show More Authors

The article emphasizes that 3D stochastic positive linear system with delays is asymptotically stable and depends on the sum of the system matrices and at the same time independent on the values and numbers of the delays. Moreover, the asymptotic stability test of this system with delays can be abridged to the check of its corresponding 2D stochastic positive linear systems without delays. Many theorems were applied to prove that asymptotic stability for 3D stochastic positive linear systems with delays are equivalent to 2D stochastic positive linear systems without delays. The efficiency of the given methods is illustrated on some numerical examples. HIGHLIGHTS Various theorems were applied to prove the asymptoti

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Political Sciences Journal
Arab political systems: the problems of politics and governance Entrance
...Show More Authors

Arabian Political Regimes: Problems of Policies and Rule; An Introduction to Interpreting (The Arabian Spring) The Arab Region witnessed, since 2011, critical changes overthrew a group of Arab regimes in some of its countries, and the reaction of these changes are still going on up to now. These changes were given lots of justifications and interpretations. The current study tries to concentrate on the most important problems which were due to what was known as (The Arab Spring). The study proposes that the crisis which the countries of the area are exposed to is not spontaneous in many of its aspects. It is totally a crisis of rule and policies. Because it is a reflection of the nature of authority in the Arabian regimes on the one hand

... Show More
View Publication
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Ieee Xplore
The Internet of Everything Based Smart Systems: Applications and Challenges
...Show More Authors

Smart systems are the trend for modern organizations and should meet the quality of services that expect to produce. Internet of Everything (IoE) helped smart systems to adopt microcontrollers for improving the performance. Analyzing and controlling data in such a system are critical issues. In this study, a survey of IoE systems conducted to show how to apply a suitable model that meets such system requirements. The analysis of some microcontroller boards is explored based on known features. Factors for applying IoE devices have been defined such as connectivity, power consumption, compatibility, and cost. Different methods have been explained as an overview of applying IoE systems. Further, different approaches for applying IoE technology

... Show More
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Flexible Genetic Algorithm Based Optimal Power Flow of Power Systems
...Show More Authors

Nowadays, the power plant is changing the power industry from a centralized and vertically integrated form into regional, competitive and functionally separate units. This is done with the future aims of increasing efficiency by better management and better employment of existing equipment and lower price of electricity to all types of customers while retaining a reliable system. This research is aimed to solve the optimal power flow (OPF) problem. The OPF is used to minimize the total generations fuel cost function. Optimal power flow may be single objective or multi objective function. In this thesis, an attempt is made to minimize the objective function with keeping the voltages magnitudes of all load buses, real outp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref