Preferred Language
Articles
/
joe-1872
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data  set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
The problem and its manifestations with the modernists through the Iberissian systems in modern terminology (applied study): (Applied study)
...Show More Authors

Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
     It is known that the Sunnah commanded to follow is the

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al-mustansiriyah Journal Of Science
Relationship of Obesity to Serum Ferritin, Lipid Profile, uric acid and urea at Obesity Medical Center in Iraq
...Show More Authors

Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Practices of marketing deception and its impact on organizational reputation / applied research in the relics of Baghdad
...Show More Authors

     The research aims to enrich the subject of marketing deception, which is still in the concept stage at the level of the research sample and to allow future researchers to contribute to addressing the concept of marketing deception and linking it with other variables. The research problem is that is there a correlation between marketing deception and organizational reputation in Baghdad assets. What is the reflection of marketing deception on the organizational reputation in the assets of Baghdad? The research is concerned with shedding light on the reputation of the organization in terms of frequency of purchase, place of purchase, brand loyalty, and knowing the impact of marketing deception on these fact

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 12 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Gender Differences in Adverse Drug Reactions Among Adult Patients Reported to the Iraqi Pharmacovigilance Center
...Show More Authors

For many years it was argued that there may be a gender differences in adverse drug reactions (ADRs). This assumption was based on many possible factors such as hormonal or behavior differences, and it was not clearly identified since the female gender was not preferred to be enrolled in many clinical trials. The primary aim of this study was to assess the extent of possibly relevant gender differences in drug–ADRs regarding causality, severity, preventability, seriousness, expectedness and outcome. While the secondary aim was to assess for which group of drugs and for which ADRs gender differences are identified most often. The study was a retrospective one that depends on processing a specially selected group of data obtained from th

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Crises Management at University of Basra An Analytical& descriptive Study
...Show More Authors

It is an analytical study carried out at university of Basra  using a sample included the dean ,assistants and managers of scientific dept. in the university for about(63)managers .The study aimed at discovering  a model of  crises management in the university.The researcher adopted the descriptive survey methodology.To achieve the objective of the study ,a questionnaire of (41)statements was developed covering five main  variables like ,signal detection, prevention and preparedness, response, recovery and learning .The validity of the questionnaire was done by a group of referees .Its stability was determined by Cronbach,s  Alfa  .The questionnair,s stability coefficient was(0.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
A proposed Mathematical Expression for Computer Design of Electrostatic Mirror
...Show More Authors

A computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Scientific Journal Of Silesian University Of Technology. Series Transport
THE IMPACT OF SHIFTING TOWARDS ECO-FRIENDLY TRANSPORTATION AT THE UNIVERSITY OF BAGHDAD, AL-JADRIYA CAMPUS (UBAC)
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Towards Promoting Political Participation of Female - University Students - Field Study on Al-Quds Open University Female - Students - Rafah
...Show More Authors

نحو تعزيز المشاركة السياسية للطالبات الجامعيات الفلسطينيات

View Publication Preview PDF
Crossref