Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
The present work aimed to investigate the neuraminidase (nan1) gene expression in 32 different clinical isolates of Pseudomonas aeruginosa to explore the role of the enzyme in different types of infection and might give a better understanding of host cell-pathogens interaction. In addition, the effect of monosaccharide D-mannose on neuraminidase gene expression in eight isolates was studied by utilizing a reverse transcription-quantitative polymerase chain reaction (RT-qPCR). The results demonstrated that the highest expression of nan1 gene was in otitis samples (208,913.81) which were significantly higher than that from other infections (P < 0.01). While, the concentrations of gene copies obtained from urin
... Show MoreThe result showed that hot water and ethanol extracts of Nigella sativa contain alkaloids ,saponins, flavonoids,tannins,glycosides,terpins and steroids. Albino mice were administered orally with 0.1 of the extract at dose of 100 mg/kg, body weight the results showed high level of white blood cell ,total and differential count of WBC,phagocytosis index, mitotic index, Arthus and delayed type hypersensitivity. The result, also showed high level of hemoglobin (Hb) and the packed cell volume (PCV) the alcoholic extract has been found more efficient than hot water extract on mice.
The nuclear size radii, density distributions and elastic electron scattering charge form factors for Fluorine isotopes (17,19,20,24,26F) were studied using the radial wave functions (WF) of harmonic-oscillator (HO) potential and free mean field described by spherical Hankel functions (SHF) for the core and the valence parts, respectively for all aforementioned isotopes. The parameters for HO potential (size parameter ) and SHF were chosen to regenerate the available experimental size radii. It was found that using spherical Hankel functions in our work improved the calculated results quantities in comparison with empirical data.
The researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data. &
... Show MoreThe current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o
... Show MoreThis research aims to:
1 – Make a proposed module for (aesthetics) for the second stage - Department of Art Education under education theories.
2 - Verification from the effect of the proposed module on student achievement and motivation towards learning aesthetics material.
To verification the second goal we wording these two hypotheses:
1- There are no individual differences with statistically significant at level (0.05) between the student's scores average. (Experimental group ) who studied according to the proposed module and the average student's scores (control group) who studied in the usual way for the achievement test for the Aesthetics material.
2- There are no individual differences with statistically signifi
Removal of Congo red, Rhodamine B, and Dispers Blue dyes from water solution have been achieved using Flint Clay as an adsorbent. The adsorption was studied as a function of contact time, adsorbent dose, pH, and temperature under batch adsorption technique. The equilibrium data fit with Langmuir, Freundlich and Toth models of adsorption and the linear regression coefficient R2 was used to elucidate the best fitting isotherm model. Different thermodynamic parameters, namely Gibb’s free energy, enthalpy and entropy of the on-going adsorption process have also been evaluated. Batch technique has been employed for the kinetic measurements and the adsorption of the three dyes follows a second order rate kinetics. The kinetic investigations al
... Show MoreIn this study, nickel cobaltite (NC) nanoparticles were created using the sol-gel process and used as an adsorbent to adsorb methyl green dye (MG) from aqueous solutions. The adequate preparation of nickel cobaltite nanoparticles was verified using FT-IR, SEM, and X-ray diffraction (XRD) studies. The crystalline particle size of NC nanoparticles was 10.53 nm. The effects of a number of experimental variables, such as temperature, adsorbent dosage, and contact time, were examined. The optimal contact time and adsorbent dosage were 120 minutes and 4.5 mg/L, respectively. Four kinetic models—an intraparticle diffusion, a pseudo-first-order equation, a pseudo-second-order equation, and the Boyd equation—were employed to monitor the adsorpti
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More