Preferred Language
Articles
/
jeasiq-1841
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via information systems celebrating safety, which is missed by many organizations, despite its importance, and providing the means for the protection and safety of the information transmitted from the center to the branches and back again to the center.

In order to achieve the goals of the study, we build the suggested model, by using the  Virtual Private Network through Cisco and Microsoft suggested models, The study concludes a set of conclusions, the most important, adopt a proposed model to use Virtual Private Network, whether the model presented by Cisco or through the application form provided by Microsoft.

In light of the findings, the study concluded a set of including, adopting the model of Microsoft Virtual Private Network due to the easy to apply using the infrastructure of the bank as tubeless to special equipment.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Vocabulary Learning Strategies Employed by English as Foreign Language Students at NBU University
...Show More Authors

ABSTRACT

Learning vocabulary is a challenging task for female English as a foreign language (EFL) students. Thus, improving students’ knowledge of vocabulary is critical if they are to make progress in learning a new language. The current study aimed at exploring the vocabulary learning strategies used by EFL students at Northern Border University (NBU). It also aimed to identify the mechanisms applied by EFL students at NBU University to learn vocabulary. It also aimed at evaluating the approaches adopted by EFL female students at Northern Border University (NBU) to learn a language. The study adopted the descriptive-analytical method. Two research instruments were developed to collect data namely, a survey qu

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Early Diagnose Alzheimer's Disease by Convolution Neural Network-based Histogram Features Extracting and Canny Edge
...Show More Authors

Alzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Developing a Learning Organization According to Analysis of the Relationship between Knowledge Gap and Strategic Performance Gaps: Field Study in a Sample of Private Banks in Baghdad.
...Show More Authors

The purpose of this research shed light on the analysis of the relationship between the knowledge gap and the strategic performance  gap and diagnose the level of impact this relationship in building a learning organization, and sought search to achieve a number of goals, cognitive and Applied been tested nature of the relationship and effect between variables in a sample size (62) of the managers of banks civil in Baghdad (Baghdad, Gulf, Assyria, Union, Elaf) and focused research problem in question is bold is whether the analysis of the relationship between the knowledge gap and the performance gap strategic leads to recognize organizations need to shift to organizations educated, either in the side of the field was the pr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Approximate Numerical Solutions for Linear Volterra Integral Equations Using Touchard Polynomials
...Show More Authors

In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
The Digital Presence of Algerian Females via Virtual Satellite Channels: Analytical Study of Women Issues through Facebook
...Show More Authors

The platforms of social networking sites, with their distinctive communication and technological features, create a social movement that led to the establishment of a new pattern of communication in a modern context. This allows the users on the internet to carry out many social interactions based on the interests and commonalities among them. Algerian women have a share of this digital presence by representing their views and discussing their issues on several sites like Facebook, for example.
In this research, we have analyzed the pages of Algerian women on Facebook site to find out the most important issues addressed by Algerian women so that we can organize their concerns in the digital channels and discover their different orie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Attitudes of the Private Sector towards the Application of Operational Contracting in Private Education Schools in the Sultanate of Oman: A Qualitative Study
...Show More Authors

Abstract

The research aims to investigate the private sector attitudes toward operational contracting in special education schools. The research adopted the qualitative approach by using personal interviews with a sample of (45) private school owners and managers in Oman. The results of the research revealed that there is an agreement among the majority of respondents on the ability of the private sector to manage special education schools, the advantages of the partnership, as well as the need for guarantees to support this partnership. The government should fully assume it. The role of the private sector remains to raise the operational efficiency of schools. Opinions vary about the level of powers granted to t

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Level of Entrepreneurial Orientation: Analytical Research in the National Security Advisory
...Show More Authors

The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
A Proposal Algorithm to Solve Delay Constraint Least Cost Optimization Problem
...Show More Authors

Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
A Proposed Program from the Perspective of the General Practice of Social Work to Overcome Husbands' Violence Against Their Wives
...Show More Authors

Husbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb

... Show More
View Publication Preview PDF
Crossref