Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
This present paper aim at knowing the process of evaluating the training program that could be applied in Maysan Health office for it significance and importance in field of management and vocational staff preparations of high scientific experience in different fields of Health. The society of research includes staffs working in Maysan Health Office , of specialists , dentists, pharmacists, laboratories, nursing and administrators. Their number is 100 employees, the researcher has designed questionnaire by depending on "Kirkpatrick" for assessing the training . The researcher has used thorough survey and has entailed 90 questionnaire,
... Show MoreCompression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreBackground: The protective roles of vitamin C and total proteins in gingival inflammation were reported by several studies. The aim of this study was to measure the concentration of salivary vitamin C, total protein and their relation to gingival health among dental students. Materials and methods: The sample consisted of 67 dental students (33 males and 34 females) from College of Dentistry, University of Baghdad. Sillness and Löe (1964) was used for recording of dental plaque, while the gingival index (GI) was measured according to Löe and Sillness criteria (1963). Stimulated salivary samples were collected and chemically analyzed in Poisoning Center/Surgical Specialty Hospital by using colorimetric method to measure the salivary v
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreLead remediation was achieved using simple cost, effective and eco-friendly way from industrial wastewater. Phragmitesaustralis (P.a) (Iraqi plant), was used as anovel biomaterial to remove lead ions from synthesized waste water. Different parameters which affected on adsorption processes were investigated like adsorbent dose, pH, contact time, and adsorbent particle size, to reach the optimized conditions (maximum adsorption). The adsorption of Pb (?) on (P.a) involved fast and slow process as a mechanism steps according to obey two theoretical adsorption isotherms; Langmuir and Freundlich. The thermos dynamic adsorption parameters were evaluated also. The (?H) obtained positive value that meanes adsorption of lead ions was an endothermic
... Show More