Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Role Of Information Technology In Enhancing Performance Evaluation And Responsibility Accounting (Empirical Study In Jordan Hotels )
...Show More Authors

   This paper suggesting a new modern method to evaluate the performance of hotel industry at Jordan instead of the classical method used by the industry and that is Bench Marking , this method can be done by comparing the performance of hotel industry at two serial years which helps in calculating a standard performance .

  The industry can use this standard to identify the variance, which make the evaluation of performance easier and support the efforts to develop the hotel industry at all levels and enable to give high quality services to customers.

    The study believed that this situation would not be achieved unless the hotel industry will app

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 23 2018
Journal Name
International Journal Of Quantum Information
Key rate estimation of measurement-device-independent quantum key distribution protocol in satellite-earth and intersatellite links
...Show More Authors

In this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Infotech Spectrum: Iraqi Journal Of Data Science
Evaluating AI Language Models in News Retrieval: A Comparative Study Of ChatGPT-Plus and DeepSeek (R1)
...Show More Authors

The increasing complexity of how humans interact with and process information has demonstrated significant advancements in Natural Language Processing (NLP), transitioning from task-specific architectures to generalized frameworks applicable across multiple tasks. Despite their success, challenges persist in specialized domains such as translation, where instruction tuning may prioritize fluency over accuracy. Against this backdrop, the present study conducts a comparative evaluation of ChatGPT-Plus and DeepSeek (R1) on a high-fidelity bilingual retrieval-and-translation task. A single standardize prompt directs each model to access the Arabic-language news section of the College of Medicine, University of Baghdad, retrieve the three most r

... Show More
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
THE MEDIATING ROLE OF PRODUCT INNOVATION ON THE RELATIONSHIP BETWEEN MARKETING INFORMATION SYSTEM AND CUSTOMER ORIENTATION
...Show More Authors

 Marketing information system (KMIS) is an essential factor of developing business’ performance and getting sustainable success. The main goal of the research is to measure effect of MIS on customer orientation and product innovation. Also, another goal is to analyze the mediation role of product innovation in relationship MIS and customer orientation. This study sought to analyze the marketing information system and measure its effect on the customer orientation and product innovation. The data of the study were collected using questionnaire. The data were analyzed using statistical tools and SPSS programming. The results of the study showed that the KMIS can positively and significantly effect product innovation. Also, t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Information and communication technology and its impact on the quality of service of the tourism sector and hotel: An analytical study in selected hotels in the Iraqi capital Baghdad
...Show More Authors

   The research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Crisis management effective of business organizations in the era of managerial technique: a philosophical study
...Show More Authors

At a time of increasing human potential in the face of crises and risks through the use of technology on a large scale and steadily in various fields of life, and the vulnerability of business organizations as a result of mistakes. The failure of a sudden these errors or omissions or symptoms. Also, some crises occur outside the control of management, others caused by leakage of important information and sometimes secret may be a strategy or a new plan or new project occurs outside the organization to the opposite of what is planned. Therefore, the crisis management are critical to all organizations, because the active management of the crisis helps to ensure the continued prosperity of the organization. Here comes from the resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 19 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
The use of still and animated comics in providing user services in university information institutions: a field study
...Show More Authors

Comics is a visual art (Still and motion pictures) it seeks to provide a Training courses are a series of intensive important educational and complementary programs, based on previous foundation experiences. Create to development the participants in aspects of specialization according to the requirements of the educational system to continue developing the previous scienti􀂡c and practical experiences. Personally, or adopted by the trainee institution, where the trainee gets a professional skill certi􀂡cate that contributes to the development his work.Development and Continuous Education Center (DCEC) at the University of Baghdad (UoBaghdad) is a center dedicated to continuing education courses in which the participant is awarded a cert

... Show More
Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus