Preferred Language
Articles
/
jeasiq-764
The Evaluation of Information Security Management System in the Iraqi Commission for Computers and Informatics according to the International Standard (ISO 27001: 2013)
...Show More Authors

    The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations  dependence on computers and information technology in work and communication  with others. The international legitimacy (represented by the  International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System according to the international standard  (ISO / IEC 27001: 2013) is manifested in protecting the assets of the organizations especially information and databases systematically and continuously.

   The aim of the research was evaluating between the Information Security Management System that currently exists in the Iraqi Commission for Computers and Informatics (site of conducting the research) and the Information Security Management System  according to the International Standard (ISO / IEC 27001: 2013) by using  examining checklists  in order to diagnose nonconformity gaps with the international standard.

   The research has come to an important  conclusion, i.e. (the administrative system for information security followed by the Iraqi Commission for Computers and Informatics, despite its dependence on modern technology and the efficient staff  , it lacks good documentation and application of many of  the requirements International Standard (ISO / IEC 27001: 2013) came with  needs  to rebuild  an organizational structure and functions consistent with the supporting International Standard (ISO / IEC 27003: 2010).

  The research concluded with the most important recommendation (forming a work team that adopts preparing  the prerequisites of Appling the standard (ISO / IEC 27001: 2013) works at meeting its requirements and the requirements of other management systems (quality management system and so on), and associated with the top management to facilitate the support with resources and powers.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2006
Journal Name
Diala Journal For Application Research
Study and calculation of the effects of excessive stress temperatures on the buoyant convection of clouds.
...Show More Authors

Recent developments in two main phases of cumulus cloud studies are discussed; first the relations between the clouds and their energy sources in the subcloud layer and second, the interaction between the clouds and their environment in the cloud layer. Under the first heading, the various originating impulses for cumulus formation are mentionitd. and how the character of this impulse affects the spacing, scale and temperature structure of the clouds. The possible origins of trade cumuli are considered.

View Publication
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Agitation Negative Social Behaviours in the Talk Shows of the (NRT) Satellite Channel: Research extracted from a master's thesis
...Show More Authors

This research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
The MR affect on optical properties for poly (Vinyl alcohol) films
...Show More Authors

optical properties of pure poly(vinyl Alcohol) films and poly(vinyl Alcohol) doped with methyl red were study, different percentage prepared with constant thickness using casting technique. Absorption, Transmission spectra have been recorded in order to study the optical parameters such as absorption coefficient, energy gap, refractive index, Extinction coefficient and dispersion parameters were measured in the wavelength range (200-800)nm. This study reveals that the optical properties of PVA affect by increasing the impurity concentration.

View Publication Preview PDF
Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Galerkin-Implicit Methods for Solving Nonlinear Hyperbolic Boundary Value Problem
...Show More Authors

This paper is concerned with finding the approximation solution (APPS) of a certain type of nonlinear hyperbolic boundary value problem (NOLHYBVP).  The given BVP is written in its discrete (DI) weak form (WEF), and is proved that  it has a unique APPS, which is obtained via the mixed Galerkin finite element method (GFE) with implicit method (MGFEIM) that reduces the problem to solve the Galerkin nonlinear algebraic system  (GNAS).  In this part, the predictor and the corrector technique (PT and CT) are proved convergent and are used to transform the obtained GNAS to  linear (GLAS ), then the GLAS is solved using the Cholesky method (ChMe). The stability and the convergence of the method are studied. The results

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design for Two Electrodes Electrostatic Mirror by using the Bimurzaev Technique
...Show More Authors

This paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic  mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The  beam path  by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta  method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the op

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study the Electromechanical Strength Properties for Epoxy Dispersed Silica Powder Composite
...Show More Authors

  Powder Silica (SiO2) was added to epoxy polymer with different weight percentages  (3.75,7.5,11.25 and 15 wt%) for particle size ï‚£ 63 µm. Hand lay-up method it is used to prepared (Epoxy-Silica) composite, and cutting appropriate specimens for testing. Electrical strength varies nonlinearly with specimens thickness, also decreasing with average time for the rise of voltage decreases due to electro thermal effects. Clearly, electrical strength decreases with the increase of the proportion of added silica. The hardness, tensile strength and young modulus increased with the added silica increases due to changing in material characteristics from ductility to brittle. Microscopic cracks and irregularity deformation were a

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation
...Show More Authors

   A common problem facing many Application models is to extract and combine information from multiple, heterogeneous sources and to derive information of a new quality or abstraction level. New approaches for managing consistency, uncertainty or quality of Arabic data and enabling e-client analysis of distributed, heterogeneous sources are still required. This paper presents a new method by combining two algorithms (the partitioning and Grouping) that will be used to transform information in a real time heterogeneous Arabic database environment

View Publication Preview PDF