Preferred Language
Articles
/
joe-1872
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data  set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Sci.int.(lahore)
SOME NEW TYPES OF PERFECT MAPPINGS
...Show More Authors

In this work, we introduce a new kind of perfect mappings, namely j-perfect mappings and j-ω-perfect mappings. Furthermore we devoted to study the relationship between j-perfect mappings and j-ω-perfect mappings. Finally, certain theorems and characterization concerning these concepts are studied; j = , δ, α, pre, b, β

Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
preparation of some diamidophosphoric acid derivitives
...Show More Authors

Reacts compound C6H5PO2Cl2 with Secretary secondary R2NH at room temperature by Mulet 2:1 and using chloroform as a solvent in dry conditions to form composite 2HCl and the interaction of compound solution of sodium hydroxide and potassium by Mulet 3:1 salt was prepared

View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
The karyotype of Barbus grypus Hecle
...Show More Authors

the chormanal some complement of barbus grypius is found to be 98 consisting of 22 melaccntricsomes it is probably a tetraploid species and more advanced than other speice haveing the same ehromosome under and belonging yo the genus barbus

View Publication Preview PDF
Publication Date
Mon Oct 01 2012
Journal Name
2012 Ieee International Conference On Circuits And Systems (iccas)
A survey of on-chip monitors
...Show More Authors

Systems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Some Properties of Algebraically Paranormal Operator
...Show More Authors

Through this study, the following has been proven, if  is an algebraically paranormal operator acting on separable Hilbert space, then  satisfies the ( ) property and  is also satisfies the ( ) property for all . These results are also achieved for  ( ) property.    In addition, we prove that for a polaroid operator with finite ascent then after the property ( ) holds for  for all.

Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 01 2009
Journal Name
2009 Wri International Conference On Communications And Mobile Computing
Optimization of Cooperation Sensing Spectrum Performance
...Show More Authors

Cooperation spectrum sensing in cognitive radio networks has an analogy to a distributed decision in wireless sensor networks, where each sensor make local decision and those decision result are reported to a fusion center to give the final decision according to some fusion rules. In this paper the performance of cooperative spectrum sensing examines using new optimization strategy to find optimal weight and threshold curves that enables each secondary user senses the spectrum environment independently according to a floating threshold with respect to his local environment. Our proposed approach depends on proving the convexity of the famous optimization problem in cooperative spectrum sensing that stated maximizing the probability of detec

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The communicative implications of the uniforms
...Show More Authors

The costume is a language that has carved itself into a path that is transformed over time in line with the development of human thought. The child theater is a form of communication between the individual and his society. The costume in the child's theater is seen as a sign of personality and identity. It is a model of communication that uses many of the world systems to which it belongs. Directed to the child by invoking the creative and creative energies of the designer in the formation of the children's theater. The second topic was the communicative function of secondary signs of uniforms and patterns of their transformations. The theoretical framework of the indicators included the on the research community. And his tools in the an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 14 2007
Journal Name
Journal Of Education College Wasit University
On the deviation of literary language
...Show More Authors

DBN Rashid, Journal of Education College Wasit University 1(1):412-423, 2007

View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Place philosophy of dramatic show construction
...Show More Authors

0

View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Order Sum Graph of a Group
...Show More Authors

The concept of the order sum graph associated with a finite group based on the order of the group and order of group elements is introduced. Some of the properties and characteristics such as size, chromatic number, domination number, diameter, circumference, independence number, clique number, vertex connectivity, spectra, and Laplacian spectra of the order sum graph are determined. Characterizations of the order sum graph to be complete, perfect, etc. are also obtained.

View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Clarivate Crossref