Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
Abstract A descriptive (retrospective) (a case-control) study was carried out at Al-Karama Teaching Hospital, Baghdad Teaching Hospital and Surgical Specialties Hospital, and Gastro-Intestinal Tract and Liver (GIT) Hospital for the period of December 1st, 2001 To March 15th 2002. To identify aspects of life-style that may contribute to the occurrence of peptic ulcer (P.U)as risk factors. And to find out the relationship between the demographic characteristic of the group. Non-probability (Purposive) sample of (100) cases who were admitted to the endoscopy department who were later on diagnosed as having
KE Sharquie, GA Ibrahim, AA Noaimi, HK Hamudy, J Saudi Soc Dermatol Dermatol Surg, 2010 - Cited by 2
This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreThis current research deals with the "The role of organizational change in the achievement of strategic success" Who are getting increased attention to being one of the important topics and relatively new, And which have a significant impact on the future of the organization So there is a need for this research, which aims to identify the role of organizational change across dimensions (technology, organizational structure, human resources, organizational culture) in the strategic success through its components (a specific strategy, effective implementation, innovation, customer satisfaction)، And that by two main hypotheses, branched about eight hypothes
... Show MoreObjectives: This Paper is an attempt to evaluate the services provided by the private hospitals
and to identify the strength and weakness in
their performance The results can be utilized in stating conclusion and recommendations to improve
and activate the role of private medical sector in society .
Methodology: A questionnaire has be designed for this purpose and distributed to ( 132 ) beneficiaries
mostly from Baghdad private hospitals .
Results: The paper has come out with many important results . Among These are the following :
* these who benefit from services provided by private hospitals believe that the good performance of
such hospital is not due to the medical services alone but also to scientific aspect
The parametric programming considered as type of sensitivity analysis. In this research concerning to study the effect of the variations on linear programming model (objective function coefficients and right hand side) on the optimal solution. To determine the parameter (θ) value (-5≤ θ ≤5).Whereas the result، the objective function equal zero and the decision variables are non basic، when the parameter (θ = -5).The objective function value increases when the parameter (θ= 5) and the decision variables are basic، with the except of X24, X34.Whenever the parameter value increase, the objectiv
... Show MoreThe concept of forming the living space in the American strategic thought has an
important position it is regarded as an strategic movement that it supports the American
United States with the huge capabilities in its own concern that enables it to approach of
American administration , we find that of different historical periods it works to establish that
the geopolitical dimension which is accompanied with the ability of American response for
the evens that in its own turn enables the American united states to seize the growing chances
in the global strategic environment This study includes five chapters :
- Chapter one: The idea of living space.
- Chapter two: Geopolitical dimension of living space theory.
-
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show More