Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Secure Seaport Management System using Blockchain Technology
...Show More Authors

Worldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain p

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Anal Fissure: Is it becoming a medical disorder? Review Article
...Show More Authors

An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems
...Show More Authors

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

View Publication
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Engineering
Review of the Kriging Technique Applications to Groundwater Quality
...Show More Authors

Kriging, a geostatistical technique, has been used for many years to evaluate groundwater quality. The best estimation data for unsampled points were determined by using this method depending on measured variables for an area. The groundwater contaminants assessment worldwide was found through many kriging methods. The present paper shows a review of the most known methods of kriging that were used in estimating and mapping the groundwater quality. Indicator kriging, simple kriging, cokriging, ordinary kriging, disjunctive kriging and lognormal kriging are the most used techniques. In addition, the concept of the disjunctive kriging method was explained in this work to be easily understood.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of e-learning standards in auditing in auditing the performance of customer capita: applied research
...Show More Authors

                  In light of the corona pandemic, educational institutions have moved to learning and teaching via the Internet and e-learning ,and this is considered a turning  point in course of higher education in Iraq in particular and education in general, which generated a great challenge for educational institutions to achieve the highest possible levels in practices and processes to reach the highest quality of their outputs from graduate students to the labor market that auditing performance by adopting e-learning standards is one of the effective tools that help the management of educational institutions by providing information on the ex

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment
...Show More Authors
Abstract<p>The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme</p> ... Show More
View Publication
Scopus (15)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Etiologies of chronic cough in adult patients: Is it hard to be diagnosed?
...Show More Authors

Background: Chronic cough is often the key
symptom not only of chronic pulmonary diseases
but for other important extrapulmonary
pathologies, in particular upper airway and
gastrointestinal diseases.
Objective: This study was designed to
determine the etiology of chronic cough and the
usefulness of the available diagnostic tests in
reaching its causes.
Methods: One hundred patients presenting with
chronic cough at Baghdad Teaching Hospital
Outpatient Clinic were enrolled in this study. The
patients underwent a full clinical interview,
physical examination with indicated diagnostic
test(s) (such as chest x ray, bronchoscope, PFT,
GIT study, sinus X ray or CT).
Results: An etiology of chronic

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials &amp; Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
ZnO: MWCNT optical hybrid filter a promising nanomaterial for wastewater treatment and antimicrobial applications
...Show More Authors

View Publication
Scopus Crossref