The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic direction Which is expressed by its vision, mission, and realistic strategic objectives. The researcher adopted the case study method for its objectivity and being the closest and best method to prove the research problem and provide objective and realistic treatments for it. As for the field of application of the present study, it is represented by the Communications Directorate due to its great importance and its close relationship to the communications system in Iraq and national Cybersecurity, in addition to the fact that it has not been subjected to testing the extent to which Cybersecurity measures are applied and documented before. The checklist was used according to the Global Cybersecurity Index (GCI.v42019). In order to measure the extent of the application and documentation of cybersecurity measures in the Directorate, personal observation and interviews were used as tools for data collection. The SWOT matrix was adopted to analyze the internal and external environment factors.
Autonomous systems are these systems which power themselves from the available ambient energies in addition to their duties. In the next few years, autonomous systems will pervade society and they will find their ways into different applications related to health, security, comfort and entertainment. Piezoelectric harvesters are possible energy converters which can be used to convert the available ambient vibration energy into electrical energy. In this contribution, an energy harvesting cantilever array with magnetic tuning including three piezoelectric bimorphs is investigated theoretically and experimentally. Other than harvester designs proposed before, this array is easy to manufacture and insensitive to manufacturi
... Show MoreThere are still areas around the world suffer from severe shortage of freshwater supplies. Desalination technologies are not widely used due to their high energy usage, cost, and environmental damaging effects. In this study, a mathematical model of single-bed adsorption desalination system using silica gel-water as working pair is developed and validated via earlier experiments. A very good match between the model predictions and the experimental results is recorded. The objective is to reveal the factors affecting the productivity of fresh water and cooling effect in the solar adsorption system. The proposed model is setup for solving within the commercially-available software (Engineering Equation Solver). It is implemented to so
... Show MoreNystatin is the drug of choice for treatment of cutaneous fungal infections with main disadvantage that is the need for multiple applications to achieve complete eradication which may reduce patient compliance. Microparticles offer a solution for such issue as they are one of sustained release preparations that achieve slow release of drug over an extended period of time. The objectives of this study were to fabricate nystatin-loaded chitosan microparticles with the ultimate goal of prolonging drug release and to analyze the influence of polymer concentration on various properties of microparticles. Microparticles were prepared by chemical cross-linking method using glutaraldehyde as cross-linking agent. Five formulas, namely N1C1, N1C2,
... Show MoreA load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The
... Show MoreThis study concerns the role of activated carbon (AC) from palm raceme as a support material for the enhancement of lipase-catalyzed reactions in an aqueous solution, with deep eutectic solvent (DES) as a co-solvent. The effects of carbonization temperature, impregnation ratio, and carbonization time on lipase activity were studied. The activities of Amano lipase from Burkholderia cepacia (AML) and lipase from the porcine pancreas (PPL) were used to investigate the optimum conditions for AC preparation. The results showed that AC has more interaction with PPL and effectively provides greater enzymatic activity compared with AML. The optimum treatment conditions of AC samples that yield the highest enzymatic activity were 0.5 (NaOH (
... Show MoreTeaching techniques are the vehicles, which are used by teachers to help pupils learn and gain experiences and create positive classroom activities, as much as these techniques are varied, they lead to successful and fruitful learning in the foreign language. They help teachers achieve their objectives (Asowrth, 1985: 124).
The English language teacher's work is an active and purposeful one when he can plan carefully and frequently make the necessary changes in the contents and methods of teaching programme to fit the interest and needs of pupils. It seems that the majority of primary English teachers' interests does not go far in planning their work, and do not understand which o
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More