Preferred Language
Articles
/
jeasiq-883
Evaluation of Integrated Information Technology System in Organizations “Exploratory Comparative Search for opinions of sample of Workers in the Faculties of Science & Education AL- Asma'I at the University of Diyala
...Show More Authors

       The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to Access to the system of integrated information technology in order to continue growth and , And for compet this there is a need to study in the Iraqi organizations. The reseach aim to findout Level of performance (ITS) in two colleges  from the University of  Diyala,  ( college of Science, and asmaay college of Education) and whether performance is consistent with the requirements of (ITS) integrated.                         
      Selected sample of the Teams career in Tow colleges and at different levels  The questionnaire form used  to collect data , it was recovered from (67) For both colleges, and after research found the analysis to non-arrival of the colleges to the requirements of Integrated  Information  System technology , as well as the existence of significant differences between the  colleges In the level of  responses and the current  performance level of the colleges

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
نظام الادارة البيئية على وفق الادارة الخضراء للموارد البشرية بحث ميداني في الشركة العامة للصناعات الكهربائية – معمل المحولات
...Show More Authors

The current research dealt with "the role of green management of human resources in strengthening the environmental management system" where the topics of the organization's environmental management system and green management of human resources receive increased attention at the global level، because they are among the important and relatively recent issues، and for those who have a significant impact on the future of organizations، and this study aims To reveal the extent of the researched organization's application of the dimensions of green management of human resources، and whether it was sufficient in strengthening the organization's environmental management system، and for this purpose two main assumptions were formul

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref