Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
Agricultural loans play an important role in the growth and stimulation of agricultural investment opportunities in Iraq, as well as the sustainability and development of existing agricultural projects. The agricultural sector is characterized by the specific conditions of seasonal production and fluctuations in production conditions, which makes the situation of uncertainty more acute in this sector, the need for any agricultural project for financing is urgent and continuous if it wants to continue production and development at all stages. The study proved the impact of agricultural loans in increasing investment and agricultural production at specific times, However, the fluctuation of funding
... Show MoreThe research tagged (Perceived Organizational Support in High Performance) deals with identifying the extent of the impact of perceived organizational support as an explanatory variable on high performance as a response variable for the purpose of reaching appropriate mechanisms that enable colleges of the University of Baghdad to exploit the perceived organizational support in achieving the required high performance and pursuit of its goals. The researcher relied on the descriptive and analytical approach in carrying out the research. An intentional sample was selected and reached (70) persons from the higher leadership of the colleges represented by (deans, assistants deans, heads of departments) that r
... Show MoreObjectives: To identify the effectiveness of instructional program concerning premarital screening of sexual transmitted disease on student's knowledge at Baghdad University and examine the relationship between students' knowledge and certain studied variables. And hypothesis for this study; There is a difference in university student’s knowledge toward premarital screening between pre and posttests of instructional program. Methodology: A quasi-experimental design (pretest-posttest approach) was conducted at six colleges and its college of education ibn rushd, college of political science, college of law, college of literatur
God Almighty set out to build mosques, and he commanded to seek their architecture, and the competition for them, and allocate them with types of worship that are not valid in others, and to preserve their sanctity and not to be degraded and taken for mundane purposes and special benefits, because they are considered one of the most prominent features of Islam and the rituals of Islamic society, so this research came to show the rule Sharia in various and contemporary issues that are needed by the imams of the mosques, their rulers, and those responsible for them. Among the issues in which they have examined comparative juristic research and reached the most correct opinion are:
Building mosques over or under buildings and factories i
The purpose of this study is testing the effect of orgnizational learning in orgnizational Effectivness an applied study in Al-hiqma Jordinan Medecine Company . study sosiety 88 manegers sleect 80 of them .study used SPSS to test the hypothesis.study reachs to significant conculctions
Childhood is characterized by ahigh privacy in the life of the child overall educational institutions in the world. Based on this specificity, modern education begins with a holistic vision of the child through all developmental aspects (moral, religious, emotional, social, linguistic, physical, health, and mental). This integration could be achieved through taking into consideration the needs and rights of children and developing curricula that consider these needs and capacities to provide opportunities for developing and supporting the developmental aspects of the child. The contemporary technological developments in the field of computer and the Internet have brought with it new forms, ideas, and problems for children in recent years
... Show MoreBACKGROUND: Febrile neutropenia occurs in more than 80% of patients with hematological malignances specially after chemotherapy cycles and an infectious source is identified in approximately 20–30%. Various bacterial, viral, and fungal pathogen contribute to the development of neutropenic fever and without prompt antibiotic therapy mortality rate can be as high as 70%. AIM: The objective of the study was to document the current sites of infection in patients with febrile neutropenia in hematological ward in Baghdad Teaching Hospital, the microorganisms and antibiotic susceptibly in culture positive cases and mortality rate in 1 week and 4 weeks after episode of fever. PATIENTS AND METHODS: One hundred cases of febrile neutrop
... Show MoreCoronavirus: (COVID-19) is a recently discovered viral disease caused by a new strain of coronavirus.
The majority of patients with corona-virus infections will have a mild-moderate respiratory disease that recovers without special care. Most often, the elderly, and others with chronic medical conditions such as asthma, coronary disease, respiratory illness, and malignancy are seriously ill.
COVID-19 is spread mostly by salivary droplets or nasal secretions when an infected person coughs or sneezes.
COVID-19 causes severe acute respiratory illness (SARS-COV-2). The first incidence was recorded in Wuhan, China, in 2019. Since then it spreads leading to a pandemic.
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More