This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreThe present paper focuses on the study of some characteristics of
comets ions by photometry method which represent by CCD camera
which it provide seeing these images in a graded light. From 0-255
when Zero (low a light intensity) and 255 (highlight intensity). These
differences of photonic intensity can be giving us a curve which
appear from any line of this image.
From these equations the focus is concentrating on determine the
temperature distribution, velocity distribution, and intensity number
distribution which is give number of particles per unit volume.
The results explained the interaction near the cometary nucleus
which is mainly affected by the new ions added to the density of the
solar wind, th
Objectives: The study aims at identifying the nurses’ knowledge about peritoneal dialysis complications, to
construct an education program for nurses in peritoneal dialysis units, to determine the effectiveness of the
education program upon the nurses' knowledge about complications of peritoneal dialysis, and to identify the
relationship between the nurses’ knowledge and their demographic characteristics of level of education and
years of experience.
Methodology: A quasi-experimentai study was carried out at the peritoneal dialysis units of Baghdad teaching
hospitals, from April 2004 to April 2006.
٨ purposive sample of (50) nurse was selected from Baghdad teaching hospitals. These nurses working at the
perit
This study will develop and implement the International Identification Card (IIC) to multi users (M-1). The IIC can be used in several methods such as an IC card, Passport, driver’s license, Visa card, Security Information system, Business part, all information about individuals/persons. The Smart Identification Card Technology (SICT) system will be using several new technology categories/tools such as Information Technology, Management Information Technology, Database management, internet service, Bluetooth service, NFC and mobile calling service. The target of SICT is to increase the efficiency of IC card to know the details for all citizens and foreigners from any country regardless their nationalities. What this means is the c
... Show MoreThe risks are considered as a large challenge facing the human communities. This challenge creates an economic and social burden which obstruct the community progress and influences on its evaluation in a negative way. In the last years, these risks began to increase and now it is necessary to face these risks in a regular and instructive methods in order to control over these risks and to limit its effects and reducing the losses, if it happened. The loss reduction and prevention programs produced by risks management are considered as a successful solution which enable to control these risks. These programs would not finish the danger in the community in a final way but it produces a practical solution reduces the negative effects and c
... Show MoreThe study aimed to find out the relationship between the dimensions of internal control systems and the availability of an effective governance framework in the Sudanese banks. The study used descriptive and analytical method for collecting and analyzing the study data using SPSS program. The questionnaire was used as an analysis tool. The target sample of Sudanese bank employees, the study found several results, including that the bank avoids methods that lead to the rational use of available resources, and identifies and separation of tasks among employees, in addition to rapid response to reports The study found several recommendations, including the need for a list of banks that are sufficiently flexible and comp
... Show MoreABSTRACT: BACKGROUND: Breast reduction for mammary hypertrophy is a highly effective procedure with high degree of patient satisfaction. There are many methods of breast reduction which involve removal of excess tissue with reshaping of overlying skin while maintaining a viable nipple areolar complex. OBJECTIVE: The purpose of this study is to evaluate the use of the superomedial technique as an effective method for reduction mammoplasty. PATIENTS AND METHODS: A total of 30 patients underwent reduction mammoplasty by utilizing superomedial pedicle technique between 2010 and 2013. Those patients were evaluated postoperatively in terms of their aesthetic and functional satisfaction, viability of nipple – areolar complex and nipple sensory p
... Show MorePurpose – The main purpose of this research is to highlight the main role of strategic leadership skills for top managements in accessing to effective management in accordance with the (VUCA Prime) methodology in (VUCA) environment as Miniature virtual environment, which refers to (Volatility), (Uncertainty), (Complexity), and (Ambiguity).
methodology – To achieve the research objective, this study selected the quantitative approach in research design, Questionnaire was used as the main instrument for data collection, the sample comprised the opinion poll (106) individual who functions as a head department. (Structural equation modelling by (Smart Pls3)
... Show MoreThe problem of the high peak to average ratio (PAPR) in OFDM signals is investigated with a brief presentation of the various methods used to reduce the PAPR with special attention to the clipping method. An alternative approach of clipping is presented, where the clipping is performed right after the IFFT stage unlike the conventional clipping that is performed in the power amplifier stage, which causes undesirable out of signal band spectral growth. In the proposed method, there is clipping of samples not clipping of wave, therefore, the spectral distortion is avoided. Coding is required to correct the errors introduced by the clipping and the overall system is tested for two types of modulations, the QPSK as a constant amplitude modul
... Show More