Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
Lower neck pain is one of the problems facing all ages, especially the elderly, as it revolves around the causes of this pain from many diverse factors. The aim of the research is to use special intense exercise accompanied by intermittent electrical stimulation to get rid of lower neck pain among professors of the College of Science - University of Baghdad for ages. (40-60) years and to identify the extent of the effect. The research assumed the presence of statistically significant differences. The research sample represented professors at the University of Baghdad - College of Science who suffer from continuous pain for the period between (10/15/2023) and (1/15/) 2024) and their number is (5), The researchers used the experimenta
... Show MoreObjective: The study aim to evaluate of women's knowledge and personal preference about the place
of delivery in Baghdad City
Methodology:
descriptive study conducted in baghdad city on the mothers for the period from the 14th of December,
2015 to the 14th of April 2016. The sample of study included 500 mothers who were attending to
primary health care centers have been chosen sample of 26 primary health care center by a multi-stage
Simple random sampling Data was collected through a constructed questionnaire, validity Data was
analyzed by using of descriptive and inferential data analysis methods .
Results: The results indicated that approximately (29.4%) of the mothers in the age group (20-24) and
the average
Objective: evaluation of Acute Flaccid Paralysis Surveillance (AFP) System's Structure at Al-Russafa Health directorate in Baghdad City. Methodology: descriptive study using evaluation approach conducted to measure the efficiency of AFP Surveillance System structure for period from November 27th 2014 to June 30th 2015. The study adopted the non-probability multi-stage sampling approach. As nineteen health facilities under surveillance are chosen and interview is conducted with a total of 50 health worker how are involved in the AFP Surveillance System. The data are gathered from sample by using question
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The study included the determination of pollen grains features for 8 genera and 13 taxa of Mimosoideae subfamily grown in Baghdad/ Iraq by using each of light and scanning electron microscope. The samples of taxa were collected from various sites in Baghdad province in central Iraq located on 32 45° 0-33 45 0 N and 44 0 0- 44° 45 0 E. the results from this study revealed different pollen types as monad in each of Leucaena, Prosopis, and Neltuma, tetrad in Mimosa and polyads in Acacia, Albizia, Calliandra, Pithecellobium and Vachellia. Each taxa of these genera characterized by special palynological features as shape, size, number of polyads grain and conplateuration as well as other parameters included other dimensions, and these
... Show MoreAbstract
The study aimed: To assess the level of trainers' knowledge about the application of strategies and to find out the relationship between Trainer's knowledge and their socio-demographic characteristics.
Methodology: Using the pre-experimental design of the current study, for one group of 47 trainers working at the private Autism Centers in Baghdad, data was collected from 8/January / 2022 to 13 /February /2022. Using non-probability samples (convenient samples), self-management technology in which trainers fill out the questionnaire form themselves was used in the data collection process; it was analyzed through descriptive and inference statistics.
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreThe research aimed to identify the level of reality of administrative values of sports activities in the Faculties of the university of Baghdad from the point of view of the leaders and those related to the divisions and units of student's activities and the case study method was adopted from the descriptive approach.
Abstract
Personality is one of the most important elements that should be developed in university student. Thus, we have to develop the positive traits and neutralize the negative traits of students as well as we have to pay attention to the level of student achievement at the same time, the researcher designed a scale to measure the traits of study sample. The research come out with a number of recommendations and proposals, the most important of which Enhancing the positive characteristics of university students in order to reach them to the level of mature personality with mental health. Enhancing the positive role of the high level of achievement by motivating the stude
... Show MoreThe research aims to detect the problems of educational reality faced by university professors and identify statistically significant differences in the academic problems of university instructors. It has adopted an analytical descriptive research approach to achieve research objectives and identifies the study community with professors of public and private universities. A random sample of 250 instructors was selected for the purpose of applying the questionnaire to them, knowing the academic problems encountered in the course of their work at universities, and adopting appropriate statistical means to process and analyze the data. The research concluded with a set of results, including that all fields (infrastructure, admission of
... Show More