Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
This study examines Agence France Presse’s (AFP) media treatment of the Great Return Marches in order to identify its contents, the issues it gave attention to, its sources, attitude, techniques, objectives, the journalistic forms used in covering events and the typographic elements used to highlight them.
This descriptive study employed the survey methodology through the use of content analysis method, and the methodology of mutual relations through the use of the case study method. The data was collected by means of a content analysis form. The study was based on the Agenda Setting Theory in the analysis of the study results.
The study sample included (116) news texts from AFP collected during the period from 20/3/2018 to
Introduction: An aneurysmal bone cyst are enigmatic lesionof unknown cause and presentation and are difficult todistinguish from other lesions, it is a benign, but expansibletumor like lesion that generally occurs in the long bones. Ananeurysmal bone cyst arising from the flat bone like clavicleis rare .Case presentation: We report a 12-year-old girl child with ananeurysmal bone cyst of the lateral third of left clavicletreated with enblock resection. The pathologic findingsconfirmed the diagnosis of aneurysmal bone cyst. Thepatient has been followed up for one year with no evidenceof recurrence .Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.
While providing important news information, News tickers ( also called sliders or crawlers ) have become one of the methods used daily by satellite channels, because it’s almost a continuous news coverage and as it seems, it has become today an addition to the news world. Hence, satellite channels need to look for a mechanism to build news tickers in order to develop them even though they are still today not recognisable and in need of being classified in a radio or television art, and that is not easy. This research sheds light on the construction of the slider of a news satellite channel, which is important according to our modest convictions, as it can be the beginning of a long scientific research in a new field of study. The probl
... Show MoreIntroduction: An aneurysmal bone cyst are enigmatic lesion of unknown cause and presentation and are difficult to distinguish from other lesions, it is a benign, but expansible tumor like lesion that generally occurs in the long bones. An aneurysmal bone cyst arising from the flat bone like clavicle is rare . Case presentation: We report a 12-year-old girl child with an aneurysmal bone cyst of the lateral third of left clavicle treated with enblock resection. The pathologic findings confirmed the diagnosis of aneurysmal bone cyst. The patient has been followed up for one year with no evidence of recurrence . Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.
Objective: The aim of this study is to find out the impact of life events upon onset of depression, to describe the
prevalence of life events among depressed patients.
Methodology: Retrospective a case-control study conducted in AL-Diwanyia Teaching Hospital, Psychiatric
Department on A non-probability (purposive sample) of (60) depressed patients and (60) of healthy person were matched
with them from general population. The data were collected through the use of semi-structured interview by
questionnaire, which consists of two parts (1) divide, section A. cover letter and B. Sociodemographic data which consists
of 9-items, (2) Life events questionnaire consists of 51-items distributed to six dimensions include, family
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8