Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
Le présent travail aborde la question de l’enseignement de traduction en tant que matière faisant partie du programme élaboré dans des Départements de Français au sein de certaines universités irakiennes, en particulier celle de Bagdad. La méthode d’enseigner suivie constitue une véritable problématique qu’on a bien diagnostiquée à partir de quelques années d’expériences, à la lumière des observations faites dans des cours de traduction professionnelle, et dans la perspective des citations et témoignages établies par des traductologues et pédagogues et principalement par Marianne LEDERER qui a établi la Théorie Interprétative de la traduction. Mais pourquoi l’enseignement lui-même poserait une telle probl
... Show MoreThe present study deals with the story of Epidemic in two literary works issued in the same year (1947). One of them is a novel titled "Plague" written by the French writer Alber Kamo, the second is a poem of the Iraqi poetess Nazik Al-Malaekah. The research reflects a contrastive study of the war vision in the two works as both writers used science to serve literature by using Epidemic as a metaphor to refer to the dangers that the societies faced.
The problem of the present research lies in answering the question about the reason that makes the two writers use metaphor while narrating the issues of the society instead of mentioning them directly and illuminate what implications do the narrative style of Epidemic story have and
... Show MoreObjectives:
To evaluate mothers’ attitudes toward readiness for discharge care at home for a premature baby in Intensive Care Unit at teaching hospitals in Medical City Complex and to find out the relationship between mothers’ attitudes and their socio-demographic characteristics.
Methodology: A quasi-experimental study design was carried out through the period of 6th January 2020 to 2021 to 11th March 2021, to evaluate mother’s attitude toward discharge care plan for premature babies. The study carried out in Welfare Teaching Hospital, Nursing Home Hospital and Baghdad Teaching Hospital at Medical City Complex in Baghdad City on 30 mother of premature babies in neonatal intensive care units using the nonprobability sampling
A cost-effective and efficient detector was created to conduct thorough turbidimetric measurements by reaction of Co (II) ion with calcium ferro cyanide to form bright green particulate, using the method of continuous flow injection analysis, the use of NAG-5SX1-1D-SSP Analyzer in determining cobalt (II) ion in a test for the validity of the new design. The NAG-5SX1-1D-SSP Analyzer is composed of five irradiation sources of white snow leds having the diameter of 10 mm with one solar cell of 55 mm length, 13.5 mm width. Using a selector switch to select the optimum voltage to be used which was 2.7 VDC. Under conditions of optimization, cobalt (II) ion was determined at 0.005–20 mmol. L–1(n = 23) while linearity dynamic range 0.005–7 mm
... Show Moreconventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
Osteoarthritis (OA) is recognized as a main public health difficult. It is one of the major reasons of reduced function that diminishes quality of life worldwide. Osteoarthritis is a very common disorder affecting the joint cartilage. As there is no cure for osteoarthritis, treatments currently focus on management of symptoms. Pain relief, improved joint function, and joint stability are the main goals of therapy. The muscle weakness and muscle atrophy contribute to the disease process. So, rehabilitation and physiotherapy were often prescribed with the intention to alleviate pain and increase mobility. Medical therapy provides modest benefits in pain reduction and functional improvement; however, non-steroidal anti-inflammatory dru
... Show MoreTwo prevalent neurodevelopment disorders in children are attention deficit hyperactivity disorder (ADHD) and autism spectrum disorder (ASD). The fifth version of the Diagnostic and Statistical Manual of Mental Disorders describes autism as a condition marked by limitations in social communication as well as restricted, repetitive behavior patterns. While impulsivity, hyperactivity, and lack of concentration are signs of attention deficit hyperactivity disorder. Boys experience it more frequently than girls do. This study sought for possible factors that put children at risk for autism and attention deficit hyperactivity disorder, and it investigated the association between neurodevelopment disorders in children and parental risk factor i
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More