Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
Abstract Objective: The aim of this study is to evaluate the level of the anatomical knowledge of undergraduate students in Nursing collage/Baghdad university.Methodology:The sample was collected by symmetrical probability. Research sample includes (197)students represent four classes which is distributed as following: fifty students represent first class, fifty students represent the second class, forty nine students represent the third class,&fourty eight students represent the fourth class. Results:The study concludes that the anatomical knowledge level for collage students is intermediate .The m
Praise be to God alone, and prayers and peace be upon the one after whom there is no prophet, and after:
This is a regular judicial search for the issuance, validity, and cancellation of regulations in the Saudi system. It came in an introduction and four demands and a conclusion of the most important results, then a list of the most important sources and references, in which I presented: A brief study on the issuance of regulations in the Kingdom of Saudi Arabia and the stages that they pass through, their validity and application, and the rules that govern this system in terms of people, places and times, then canceling and amending regulations And its rulings, I referred to it to the original sources approved in this section,
... Show MoreIt has been shown in ionospheric research that calculation of the total electron content (TEC) is an important factor in global navigation system. In this study, TEC calculation was performed over Baghdad city, Iraq, using a combination of two numerical methods called composite Simpson and composite Trapezoidal methods. TEC was calculated using the line integral of the electron density derived from the International reference ionosphere IRI2012 and NeQuick2 models from 70 to 2000 km above the earth surface. The hour of the day and the day number of the year, R12, were chosen as inputs for the calculation techniques to take into account latitudinal, diurnal and seasonal variation of TEC. The results of latitudinal variation of TE
... Show MoreAl-Huweizah Marsh is considered as the largest in Iraq. This research aims to maintain thesustainability of Al-Huweizah Marsh under all circumstances and within the limits of the
available natural resources from the Iraqi side and the absence of feeding from the Iranian sidedue to the recent Iranian separation dike along the international boundaries within the marsh.
Twelve scenarios have been suggested as a first step to restore the whole marsh. But the
uncontrolled Iranian feeders and exiguity of their discharges recently, it was necessary to studyonly the northern part of the marsh as an alternative case to ensure reasonable amounts of waterfor the purpose of maintaining and restore the marsh. Hydrological routing model was
In this paper, a microcontroller-based electronic circuit have been designed and implemented for dental curing system using 8-bit MCS-51 microcontroller. Also a new control card is designed while considering advantages of microcontroller systems the time of curing was controlled automatically by preset values which were input from a push-button switch. An ignition based on PWM technique was used to reduce the high starting current needed for the halogen lamp. This paper and through the test result will show a good performance of the proposed system.
Interpreting is a process adopted by a skillful and well qualified interpreter to convey orally the meaning from a source language into a target language simultaneously .In this process the interpreter has no time to think or check the exact meaning of the words, phrases and sentences. The main technique used by the interpreter is based on his/her competence .This type of translation is used in press conferences and political speeches of high rank figures.
This paper deals with analyzing the interpretation of Obama's farewell speech adopted by two authentic TV Channels(Sky News and AL- Jazeera).The aim of this paper is to investigate the quality of each interpreting by adopting Nida's (1996:164
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreA3D geological model was constructed for Al-Sadi reservoir/ Halfaya Oil Field which is discovered in 1976 and located 35 km from Amara city, southern of Iraq towards the Iraqi/ Iranian borders.
Petrel 2014 was used to build the geological model. This model was created depending on the available information about the reservoir under study such as 2D seismic map, top and bottom of wells, geological data & well log analysis (CPI). However, the reservoir was sub-divided into 132x117x80 grid cells in the X, Y&Z directions respectively, in order to well represent the entire Al-Sadi reservoir.
Well log interpretation (CPI) and core data for the existing 6 wells were the basis of the petrophysical model (
... Show MoreBackground: The treatment of an ovarian cyst relies on its nature, the discrimination of benign and malignant cysts is, therefore of crucial importance, and in spite of the continuous improvement of diagnostic means, it remains sometimes impossible to differentiate functional from organic (malignant or not) ovarian cysts. The therapeutic decision will search for the main midway between cancer’s negligence and the fear of performing an unnecessary surgical operation for an ovarian cyst.Objective: To review of 116 cases of ovarian cystic diseases aiming in identify proper management and reducing unnecessary surgical intervention.Methods: A retrospective study was conducted at Al-Elwiya maternity teaching hospital/ Baghdad/ Iraq. One hund
... Show MoreObjectives: the aim of the study to assess the most common risk factors of pneumonia at adult and find the
socio-demographic characteristics of sample.
Methodology: the study performed at Ibn-Sina teaching hospital (intensive care unit) and out patient in the same
hospital period of (15 ) November (2006) till (1ا٤) February (2007).The sample of the study includes (65)
patients with pneumonia for different underlying causes who were attending Ibn-Sina teaching hospital age
range (59-68) years is the highest level and is the most common risk factor for pneumonia.
Results: the results of the study most patients' hospital acquired-pneumonia from contamination during
administration to hospital but community acquired-pne