The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic direction Which is expressed by its vision, mission, and realistic strategic objectives. The researcher adopted the case study method for its objectivity and being the closest and best method to prove the research problem and provide objective and realistic treatments for it. As for the field of application of the present study, it is represented by the Communications Directorate due to its great importance and its close relationship to the communications system in Iraq and national Cybersecurity, in addition to the fact that it has not been subjected to testing the extent to which Cybersecurity measures are applied and documented before. The checklist was used according to the Global Cybersecurity Index (GCI.v42019). In order to measure the extent of the application and documentation of cybersecurity measures in the Directorate, personal observation and interviews were used as tools for data collection. The SWOT matrix was adopted to analyze the internal and external environment factors.
In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and
... Show MoreThe Gullfaks field was discovered in 1978 in the Tampen area of the North Sea and it is one of the largest Norwegian oil fields located in Block 34/10 along the western flank of the Viking Graben in the northern North Sea. The Gullfaks field came on stream in 1986 and reached a peak of production in 2001. After some years, a decrease in production was noticed due to the decrease in pressure in the well. The goal of this paper is to improve the production of a well located in Gullfaks field by injecting CO2 through coiled tubing. The use of the CO2 injection method is due to the fact that it is a greenhouse gas, and its production in the atmosphere contributes to global warming. It is important to reduce its emission
... Show MoreIn most recent studies, long-term retention after orthodontic treatment has been hypothesized that may be necessary to maintain the stability of the dentition and avoid post-treatment changes. The bonded fixed retainer is characterized by its clinical effectiveness, patient acceptance, and lack of patient complaints as compared with a removable retainer. An electronic database (such as PubMed, PubMed Central, Web of Science, Science Direct, Cochrane Library, Scopus, and ResearchGate) has been collected using specific keywords. Of the 152 articles, only randomized clinical trials that investigated different types of fixed retainers or compared fixed with removable retainers were illustrated in tables and included in this review. The
... Show MoreEvery cultural achievement is a creative text, and every text is a group of signs. The Winged Bull sculpture is a sort of text that is not confined to some signs; indeed, its cultural signs go far beyond as they are open-ended, everlasting and it lends itself to various horizons of interpretation. The recipient has to combine the signs of this sculpture, which belong to different patterns, in the pursuit for perfection so that he can decode its media message.
I have tackled this sculpture by adopting a semiotic approach. The semiotic approach is a modern critical approach which is as wide as culture and as rich as knowledge. It has been linked to modernism, which in turn has been linked to modern critical approaches, because it can
A computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values
... Show MoreIn this paper, an Integral Backstepping Controller (IBC) is designed and optimized for full control, of rotational and translational dynamics, of an unmanned Quadcopter (QC). Before designing the controller, a mathematical model for the QC is developed in a form appropriate for the IBC design. Due to the underactuated property of the QC, it is possible to control the QC Cartesian positions (X, Y, and Z) and the yaw angle through ordering the desired values for them. As for the pitch and roll angles, they are generated by the position controllers. Backstepping Controller (BC) is a practical nonlinear control scheme based on Lyapunov design approach, which can, therefore, guarantee the convergence of the position tracking
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show MorePragmatics looked at literary discourse as an external subject that needed an actor and based on a communicative relationship, that is, it examines literary work by focusing on the author's intent, and attempting to monitor the pilgrim and logical dimension in the text. It focuses on the practical and communicative aspect of the language, which aims to convince the recipient and his or her emotional influence.And the novel (Yamrim) starting from the title (Sos) communication, and building dialogue and pilgrims based on two different logic completely, the logic of optimism and look at things with absolute objectivity, the logic of pessimism and closure and look at things with absolute passion. These two tendencies are embodied by the char
... Show More