Preferred Language
Articles
/
joe-1872
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data  set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 20 2020
Journal Name
Arab World English Journal
Investigating the Effectiveness of YouTube as a Learning Tool among EFL Students at Baghdad University
...Show More Authors

YouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Education And Health Promotion
Knowledge-related iron deficiency anemia among undergraduate nursing female students in the University of Baghdad
...Show More Authors
BACKGROUND:

Globally, iron deficiency anemia is a problematic nutritional deficiency health-related issue that impacts early-adulthood people such as university students. The aim was to asses female nursing students’ knowledge concerning iron deficiency anemia in the College of Nursing, University of Baghdad.

MATERIALS AND METHODS:

A cross-sectional survey was carried out from the period of June 18, 2023 to December 20, 2023. Nonprobability (purposive) samples of 100 female nursing students were selected from the second, third, and fourth stages in the College of N

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun May 26 2024
Journal Name
Arab World English Journal For Translation And Literary Studies
Google and Legal Translation: The Case Study of Contracts
...Show More Authors

In recent years, the need for Machine Translation (MT) has grown, especially for translating legal contracts between languages like Arabic and English. This study primarily investigates whether Google Translator can adequately replace human translation for legal documents. Utilizing a widely popular free web-based tool, Google Translate, the research method involved translating six segments from various legal contracts into Arabic and assessing the translations for lexical and syntactic accuracy. The findings show that although Google Translate can quickly produce English-Arabic translations, it falls short compared to professional translators, especially with complex legal terms and syntax. Errors can be categorized into: polysemy,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Financial Innovation as an Entrance to Sustainable Financing A Case Study of Islamic Banks in the State of Qatar (2014-2018)
...Show More Authors

While the impact of the fourth Industrial Revolution on the economy keeps accelerating, the signs of the fifth industrial revolution, whose key is innovation and creativity started to evolve. However, the challenge of achieving sustainable development and its goals remains faced by the global organizations; In this situation, Islamic banks are exposed to many challenges among which is the challenge of keeping themselves abreast of the latest developments in the modern technology which in turn is a tool for continuity and competition. On the flip side, to avoid the negative impact that these changes can have such as an increased gap between financial innovations and the requirements of sustainable development. Islamic banks in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Aggregation of Accounting information between differentiated accounting systems ( Case Study )
...Show More Authors

The purpose of the research is to present a proposed accounting system model for converting and aggregating accounting information within the framework of the differentiated accounting systems, and the research methodology consists of: The research problem is the existence of differentiated and dispersed accounting systems that operate within governmental economic units and at the same time seek to achieve a unified vision and goals for the organization, and the central research hypothesis is the possibility of conducting the process of conversion accounting information from the government accounting system to the unified accounting system, and then aggregate those systems. The research was conducted at the College of Administrat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Prosoical Behavior and Its Relationship to Openness to Experience among University Students
...Show More Authors

The aim of the present study is to identify the level of prosoical behavior of Baghdad University's students and to recognize the differences between male and female students. Moreover, it also aims to identify the level of openness to experience for these students. A random sample of (123) students has been selected; 77 males and 46 females. Two scales have been used in the study. The Prosocialness scale for adults by Caprara. Et al (2005) has been translated into the Arabic language and relies on four types of actions (Helping, Sharing, Taking care, and feeling Empathetic with others) and the other scale is the Openness to Experience Scale, which is one of the Big Five Inventory by John and Srivastava (1999). The main results showed a

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 27 2024
Journal Name
Journal Of Economics And Administrative Sciences
An Integrated Approach to Constraints Theory and Fuzzy Analytical Hierarchy Process (FAHP) in Construction Projects (Case Study)
...Show More Authors

The research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim

... Show More
Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 12th International Conference On Developments In Esystems Engineering (dese)
Structural Rehabilitation on Continuous Post-Tensioned Prestressed Concrete Box-Girder Bridge Exposed to Explosion: A Case Study
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref