Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Engineering
Review of the Kriging Technique Applications to Groundwater Quality
...Show More Authors

Kriging, a geostatistical technique, has been used for many years to evaluate groundwater quality. The best estimation data for unsampled points were determined by using this method depending on measured variables for an area. The groundwater contaminants assessment worldwide was found through many kriging methods. The present paper shows a review of the most known methods of kriging that were used in estimating and mapping the groundwater quality. Indicator kriging, simple kriging, cokriging, ordinary kriging, disjunctive kriging and lognormal kriging are the most used techniques. In addition, the concept of the disjunctive kriging method was explained in this work to be easily understood.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems
...Show More Authors

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

View Publication
Crossref (1)
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Anal Fissure: Is it becoming a medical disorder? Review Article
...Show More Authors

An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A New Fractal Printed Dipole Antenna Based on Tent Transformations for Wireless Communication Applications
...Show More Authors

In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
ZnO: MWCNT optical hybrid filter a promising nanomaterial for wastewater treatment and antimicrobial applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Apr 28 2024
Journal Name
International Journal Of Sustainable Development And Planning
The Role of Environmental Auditing in Achieving Sustainable Development: Management Systems as a Mediator
...Show More Authors

The present study tackles the complex issue of the urgent need for Environmental Auditing (EA) in Iraq in the absence of laws that support environmental management and in the light of the high rates of cancerous diseases in Iraq, which coincided significantly with the increase in oil production, according to the numbers indicated in the Iraqi Ministry of Health. The study aimed to investigate the mediating role of Management Systems (MS) related to the role of EA supporting sustainability reports concerning the reduction of the negative effects of gas emissions from oil companies. We adopted the descriptive approach which relies on studying relationships through a questionnaire that was distributed to a group of workers at Doura Refinery in

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment
...Show More Authors
Abstract<p>The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme</p> ... Show More
View Publication
Scopus (14)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials &amp; Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Crossref
Publication Date
Wed Jan 24 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
FOOD APPLICATIONS FOR OIL AND CHIA SEEDS SALVIA HISPANICA: FOOD APPLICATIONS FOR OIL AND CHIA SEEDS SALVIA HISPANICA
...Show More Authors

The extracted oil from the Chia seeds white and black were used in the manufacture of certain foods such as mayonnaise. The results of the sensory evaluation showed that the product was acceptable except for the flavor of white chia seed oil. The seeds were fully used in the manufacture of the nutella. The results of the sensory evaluation were encouraging the use of the extracted oil from the black chia seeds in the production of the nutella except the spread property. Chia seeds were also used in the manufacture of pudding. The results of the sensory evaluation showed an excellent and acceptable product of black chia seeds oil can be obtained, while the white seeds did not receive the acceptance in terms of color and flavor.

View Publication Preview PDF
Publication Date
Sat Jun 12 2021
Journal Name
2021 International Conference On Electrical, Communication, And Computer Engineering (icecce)
Efficient Private Cloud Resources Platform
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Crossref