The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to Access to the system of integrated information technology in order to continue growth and , And for compet this there is a need to study in the Iraqi organizations. The reseach aim to findout Level of performance (ITS) in two colleges from the University of Diyala, ( college of Science, and asmaay college of Education) and whether performance is consistent with the requirements of (ITS) integrated.
Selected sample of the Teams career in Tow colleges and at different levels The questionnaire form used to collect data , it was recovered from (67) For both colleges, and after research found the analysis to non-arrival of the colleges to the requirements of Integrated Information System technology , as well as the existence of significant differences between the colleges In the level of responses and the current performance level of the colleges
The current research dealt with "the role of green management of human resources in strengthening the environmental management system" where the topics of the organization's environmental management system and green management of human resources receive increased attention at the global level، because they are among the important and relatively recent issues، and for those who have a significant impact on the future of organizations، and this study aims To reveal the extent of the researched organization's application of the dimensions of green management of human resources، and whether it was sufficient in strengthening the organization's environmental management system، and for this purpose two main assumptions were formul
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More