Preferred Language
Articles
/
joe-1872
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data  set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Statistical Model for Predicting the Optimum Gypsum Content in Concrete
...Show More Authors

The problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Modern Sport
تأثير منهج تعليمي وفق أنموذج بايبي على تعلم بعض مهارات الكرة الطائرة للطالبات بكلية التربية البدنية وعلوم الرياضة
...Show More Authors

أن أهمية البحث تكمن في أعداد منهج تعليمي مقترح وفق أنموذج بايبي وتعلم مهارتي الاعداد وأستقبال الارسال بالكرة الطائرة للطالبات وتكمن أهمية أنموذج بايبي بالمساعدة على توظيف المعلومات في المواقف المختلفة،وان مشكلة البحث جاءت بعد أطلاع الباحثات على الدراسات والمصادر السابقة لاحظت بأن هناك ضعف في الاداء المهاري في مهارتي الاعداد وأستقبال الارسال بالكرة الطائرة من قبل الطالبات لذلك أرتأت الباحثات الى التع

... Show More
Crossref
Publication Date
Tue Jan 20 2026
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Modified LASS Method Suggestion as an additional Penalty on Principal Components Estimation – with Application-
...Show More Authors

This research deals with a shrinking method concernes with the principal components similar to that one which used in the multiple regression “Least Absolute Shrinkage and Selection: LASS”. The goal here is to make an uncorrelated linear combinations from only a subset of explanatory variables that may have a multicollinearity problem instead taking the whole number say, (K) of them. This shrinkage will force some coefficients to equal zero, after making some restriction on them by some "tuning parameter" say, (t) which balances the bias and variance amount from side, and doesn't exceed the acceptable percent explained variance of these components. This had been shown by MSE criterion in the regression case and the percent explained v

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 04 2010
Journal Name
Journal Of Educational And Psychological Researches
بناء مقياس معنى الحياة كما تدركه طالبة الجامعة على وفق Multidimensional Item Response Model
...Show More Authors

The undimensionality hypothesis which is item response theory depend it is unable in some of measurement situations because there are many dimensions which are affect of the response, so as the researches reached to expand this hypothesis to construct a new one which is multidimensional, and many of theories are pointed to the concept of meaning of life is multidimensionality, so this research aimed to construct the scale of meaning of life as the student's perception according with Multidimensional Item Response Model and this research adopt Wong's theory 1998 which point to the meaning of life consist of (7) dimensions. The research tool contains (49) items distributed at dimensions of meaning of life. Sample of statistical ana

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Statistical testing mediation in structural equations models variables with practical application
...Show More Authors

In this research was the study of a single method of estimation and testing parameters mediating variables (Mediation) in a specimen structural equations SEM a bootstrap method, for the purpose of application of the integrated survey of the situation Marital data and health mirror Iraqi (I-WISH) for the year 2011 from the Ministry of Planning - device Central Bureau of Statistics, and applied to the appropriate data from the terms of the data to a form of structural equation SEM using factor analysis affirmative (Confirmatory Factor analysis) CFA As a way to see the match variables that make up the model, and after confirming the model matching or suitability are having the effect of variables mediation in the model tested by the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 04 2024
Journal Name
International Journal Of Operational Research
Pascal's triangle graded mean defuzzification approach for solving fuzzy assignment models by using pentagonal fuzzy numbers
...Show More Authors

The fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal's triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely develo

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
استعمال انحدار الاسقاطات المتلاحقة و الشبكات العصبية في تجاوز مشكلة البعدية
...Show More Authors

المستخلص يهدف هذا البحث الى تجاوز مشكلة البعدية من خلال طرائق الانحدار اللامعلمي والتي تعمل على تقليل جذر متوسط الخطأ التربيعي (RMSE) , أذ تم  استعمال طريقة انحدار الاسقاطات المتلاحقة  (PPR)    ,والتي تعتبر احدى طرائق اختزال الابعاد التي تعمل على تجاوز مشكلة البعدية (curse of dimensionality) , وان طريقة (PPR) من التقنيات الاحصائية التي تهتم بأيجاد الاسقاطات الاكثر أهمية في البيانات المتعددة الابعاد , ومع ايجاد كل اسقاط

... Show More
View Publication Preview PDF
Crossref (1)
Crossref