Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreAbstract\
The developed financial infrastructure is one of the most important elements for achieving stable financial system in a country. The importance of developed financial infrastructure comes from its role in create economic and financial context attractive for foreign investments. Thus, this paper aims first to measure an index of financial infrastructure, and secondly, to gauge the nexus between the developed financial infrastructure and foreign investments inflow in Malaysia and Indonesia. We estimate the index of financial infrastructure by using different indicators such as (the institutional environment, access to finance, legal environment, and others).
By using the G
... Show MoreThe research aims to test the relationship and impact of High Involvement Management as an independent variable in negotiation strategies as a response variable, at the headquarters of the Iraqi Ministry of Industry and Minerals in Baghdad Governorate, and then trying to come up with a set of recommendations that contribute to strengthening the negotiations carried out by the ministry’s leaders and based on the importance of the topic of research in public organizations and the importance of the surveyed organizations to the society. The descriptive-analytical approach was adopted in the completion of this research, and the research included a sample of (180) leaders of the Iraqi Ministry of Industry and Minerals, and data was
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreCompetitive advantage is a substantial strategic objective for organizations. It requires high levels in the quality of products and services provided to customers, continuous improvement of costing , care for creativity and innovative employees, and speed unique to the marketing and financial engineering, and business re-engineering processes. The situation in this area, requires actors to attract and develop human resources, including help in proper implementation of the strategic tasks that targeted by those institutions. According to the opinions and viewpoints of management scholars, the competitive advantage resource is the most important issue for organizations in the third millennium, which can be a
... Show More