Preferred Language
Articles
/
9RezM5IBVTCNdQwCaafH
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic direction Which is expressed by its vision, mission, and realistic strategic objectives. The researcher adopted the case study method for its objectivity and being the closest and best method to prove the research problem and provide objective and realistic treatments for it. As for the field of application of the present study, it is represented by the Communications Directorate due to its great importance and its close relationship to the communications system in Iraq and national Cybersecurity, in addition to the fact that it has not been subjected to testing the extent to which Cybersecurity measures are applied and documented before. The checklist was used according to the Global Cybersecurity Index (GCI.v42019). In order to measure the extent of the application and documentation of cybersecurity measures in the Directorate, personal observation and interviews were used as tools for data collection. The SWOT matrix was adopted to analyze the internal and external environment factors.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Some Estimator Methods of Linear Regression Model With Auto-Correlated Errors With Application Data for the Wheat in Iraq
...Show More Authors

This research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
The Response of Bitter Orange Citrus Aurantium Trees to the Infestation of Oriental Yellow Scale Aonidiella Orientalis in Iraq
...Show More Authors
Abstract<p>Laboratory studies were carried out to investigate the differences between uninfested and infested bitter orange <italic>Citrus aurantium</italic> leaves with oriental yellow scale <italic>Aonidiella orientalis</italic> in Iraq. From this experiment, it is reasonable to determine that releases of volatile organic compounds from both uninfested and infested bitter orange <italic>C. aurantium</italic> as a response to the infestation of the oriental yellow scale <italic>A. orientalis</italic>. Some volatile organic compounds were found in uninfested leaves, while GC-MS did not detect others. Infested leaves by oriental yellow scale insects emitted</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SEASONAL POPULATION ABUNDANCE OF THE CHRYSANTHEMUM APHIDS (HOMOPTERA, APHIDIDAE) IN THE MIDDLE OF IRAQ WITH PICTORIAL KEY TO SPECIES
...Show More Authors

    This study was based on the determination of aphid species that infested Chrysanthemum sp. (Asterales, Asteraceae) in the middle of Iraq; five aphid species belong to subfamily Aphidinae were recorded: Aphis fabae Scopoli, 1763, Aphis gossypii Glover, 1877,  Coloradoa rufomaculata (Wilson, 1908), Macrosiphoniella sanborni (Gillette, 1908) and Myzus persicae (Sulzer, 1776). A. gossypii was the most dominant species throughout the study period while M. persicae  is the lesser species.

    A summary of  the main taxonomic characters is presented here and a pictorial key which was designed to separate aphi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 30 2021
Journal Name
Al-kindy College Medical Journal
Practice and Opinion of Doctors in Primary Health Care Centers Toward Referral System: Samples from Nine Governorates in Iraq
...Show More Authors

Background: Most primary Health Care Centers (PHCCs) in Iraq have a referral system records; however, this mechanism does not function well because of the lack of other requirements for an efficient referral system.

Objective: To assess the practice & opinion of doctors in PHCs toward the referral system, and to determine the doctors in PHC's commitment to referral system instructions and guidelines.

Subjects and methods: A cross-sectional study with analytic elements was conducted in nine health directorates in Iraq, from the 1st October 2018 – 30th June 2019.One PHC was selected randomly form each sector in every governorate, A questionnaire was used to collect the required information.

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sat Jul 29 2017
Journal Name
Inhalation Toxicology
The risk of occupational exposure to mercury vapor in some public dental clinics of Baghdad city, Iraq
...Show More Authors

View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Overlap food for fish in the Haditha Dam Reservoir (Qadisiyah) Iraq
...Show More Authors

Shehadt 683 fish of different fish present in the tank Haditha Dam during the period of February 1993 and the end Maes 1994 to identify the nutritional content of the digestive tract or the stomach for these fish and their impact on the environment of the tank and found that Fish fine linen and Alhalg animal feeding predators feed on small fish, mainly the fish brown plantnutrition

View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Controlling the Unbalanced Voltages of a Series-Connected Lead-Acid Batteries in a PV Power Storage System using Dynamic Capacitor Technique
...Show More Authors

Lead-acid batteries have been used increasingly in recent years in solar power systems, especially in homes and small businesses, due to their cheapness and advanced development in manufacturing them. However, these batteries have low voltages and low capacities, to increase voltage and capacities, they need to be connected in series and parallel. Whether they are connected in series or parallel, their voltages and capacities must be equal otherwise the quality of service will be degraded. The fact that these different voltages are inherent in their manufacturing, but these unbalanced voltages can be controlled. Using a switched capacitor is a method that was used in many methods for balancing voltages, but their respons

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 20 2011
Journal Name
المؤتمر الدولي الثالث للاحصائيين العرب
Use a form ARX(p,q) to estimate time series for the Iraqi Economy
...Show More Authors

Due to the lack of statistical researches in studying with existing (p) of Exogenous Input variables, and there contributed in time series phenomenon as a cause, yielding (q) of Output variables as a result in time series field, to form conceptual idea similar to the Classical Linear Regression that studies the relationship between dependent variable with explanatory variables. So highlight the importance of providing such research to a full analysis of this kind of phenomena important in consumer price inflation in Iraq. Were taken several variables influence and with a direct connection to the phenomenon and analyzed after treating the problem of outliers existence in the observations by (EM) approach, and expand the sample size (n=36) to

... Show More
Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
الأستاذ
Teaching-learning design according to constructivist theory models and its impact on the achievement of chemistry among second-year intermediate school female students
...Show More Authors

Preview PDF