Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2001
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A COMPARATIVE STUDY OF ECOLOGICAL AND GENETICAL ADAPTATION OF THREE IRAQI FRESH WATER SNAILS IN RESPECT TO HEAVY METAL POLLUTION
...Show More Authors

A comparative study was carried out on ecological and genetical adaptation of three Iraqi
freshwater snails, Physa acuta, Melanopsis buccinoidea and Melanoides tuberculata, in
respect to acute toxicity of heavy metals (Zn, Cd and Hg). Longevity are used as poisoning
tolerance criterion. LT 50 and LT 100 were determined for the studied snails at (0.5, 1, 5, and
10 ppm), for the three metals. Results indicated that Physa acuta had a higher tolerance than
Melanopsis buccinoidea and Melanoides tuberculata, which was the lower one. Previous
exposure to heavy metals in the original habitat was affecting on experimental tolerance and
no relationships of physical and chemical factors (total hardness, temperature, D. O. and

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ecology, Environment And Conservation
A qualitative study of Periphytic algae attached to thesurface of river boats in the Tigris River in AlAadhamiya, Baghdad, Iraq
...Show More Authors

A seasonal study of periphytic algae attached to the surface of river boats was conducted in Tigris river in Al Aadhamiya site for the period from October 2016 to May 2017. A total of 107 taxa of periphytic algae were identified belonging to the four classes of algae. The periphytic algae community dominated by Bacillariophyceae was (60.7%) followed by Chlorophyceae (20.5%) and Cyanophyceae (17.7%) Chrysophyceae was constituted (0.9%) of the total number. During the whole period of study filamentous taxa such as Oscillatoria amphibian, Phormidium spp., Spirulinagigantean, Cladophoreglomerata and Melosira roeseana remained the dominant colonizer which may be reflect the ability of this species to grow multiplies under different environmental

... Show More
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
OUTDATED VOCABULARY in A. I. HERZEN's NOVEL " who is to BLAME?": УСТАРЕВШАЯ ЛЕКСИКА В РОМАНЕ А. И. ГЕРЦЕНА «КТО ВИНОВАТ?»
...Show More Authors

The article considers the main reason for A. I. Herzen's address to obsolete words, which is their ability to acquire a stylistic coloring in the context of speech, as well as the possibility of combining, in some cases, with neutral lexemes of various functional styles. A certain stylistic effect of such characteristics of this type of vocabulary is represented, as a result of which their stylistic coloring in syntagmatic terms does not coincide with stylistic coloring in terms of paradigmatics, that is, in speech they have a completely stylistic meaning. Attention is focused on the role of outdated vocabulary, which consists in the fact that they serve to implement such features of the artistic style as imagery, emotionality, and their

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 11 2024
Journal Name
International Journal Of Civil Engineering
Strength Evaluation of CFRP-Strengthened RC Slab-Beams System by Load Test to Satisfy the Safety Requirements: A Case Study
...Show More Authors

The primary goal of in-situ load testing is to evaluate the safety and performance of a structural system under particular loading conditions. Advancements in building techniques, analytical tools, and monitoring instruments are prompting the evaluation of the appropriate loading value, loading process, and examination criteria. The procedure for testing reinforced concrete (RC) structures on-site, as outlined in the ACI Building Code, involves conducting a 24-h load test and applying specific evaluation criteria. This article detailed a retrofitting project for an RC slab-beams system by utilizing carbon fiber-reinforced polymer (CFRP) sheets to strengthen the structure following a fire incident. The RC structure showed indicators of deter

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 07 2022
Journal Name
International Journal Of Environmental Research And Public Health
Efficacy of MMP-8 Level in Gingival Crevicular Fluid to Predict the Outcome of Nonsurgical Periodontal Treatment: A Systematic Review
...Show More Authors

Purpose: To explore whether baseline matrix metalloproteinase (MMP)-8 level in gingival crevicular fluid (GCF) (exposure) can predict the outcome (reduction in probing pocket depth (PPD) (outcome)) of nonsurgical periodontal therapy (NSPT) (manual or ultrasonic or both) in patients with periodontitis (population/problem) after 3 months. Methods: Six databases (PubMed, Cochrane library, ProQuest, Ovid, Scopus, EBSCO) were searched for relevant articles published until 30 July 2021. Retrieved articles were passed through a three-phase filtration process on the basis of the eligibility criteria. The primary outcome was the change in PPD after 3 months. Quality of the selected articles was assessed using Cochrane Risk of Bias tool (RoB2

... Show More
View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Fri Aug 20 2021
Journal Name
Iop Conf. Series: Materials Science And Engineering
Synthesis, identification, antibacterial, and dyeing applications of complexes of hexadentate (N4O2 donor) Schiff base ligands derived from curcumin with some transition and non–transition metal cations
...Show More Authors

Schiff base ligand (H2CANPT) was prepared by two steps: first, by the condensation of curcumin with 4-amino antipyrin produces4,4'-(((1E,3Z,5Z,6E)-1,7-bis(4-hydroxy-3- methoxyphenyl)hepta-1,6-diene-3,5-diylidene)bis(azanylylidene))bis(1,5-dimethyl-2-phenyl- 1,2-dihydro-3H-pyrazol-3-one) (CANP). Second, by the condensation of (CANP) with L-tyrosine produces2,2'-(((3Z,3'Z)-(((1E,3Z,5Z,6E)-1,7-bis(4-hydroxy-3-methoxyphenyl)hepta 1,6-diene-3,5-diylidene)bis(azanylylidene))bis(1,5-dimethyl-2-phenyl-1,2-dihydro-3-H-pyrazole- 4-yl-3-ylidene))bis(azanylylidene))bis(3-(4-hydroxyphenyl)propanoic acid) (H2CANPT). The resulted Schiff comported as hexadentate coordinated with (N4O2) atoms, then it was treated with some transition and non-transaction met

... Show More
Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Analyzing the content of the chemistry textbook for the third intermediate grade according to the skills of knowledge economy
...Show More Authors

The current research aims to identify the extent to which cognitive economics skills are included in the content of the chemistry textbook for the third intermediate grade, and the research sample was represented in the chemistry textbook for the third intermediate grade. A list of knowledge economy skills was prepared (6) main skills (basic skills, communication skills, thinking skills, work skills Group, information-gathering skill, behavioral skills (and (20) sub-skills) (reading, writing, operations, computer skills and employability, oral expression and written communication, dialogue, persuasion, influence and arousal, analysis, problem-solving, decision-making, suggestions and hypotheses and employing them. Controlling, directing

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison of Complex Sadik and KAJ Transforms for Ordinary Differential Equations to the Response of an Uncompressed Forced Oscillator
...Show More Authors

In this paper we have presented a comparison between two novel integral transformations that are of great importance in the solution of differential equations. These two transformations are the complex Sadik transform and the KAJ transform. An uncompressed forced oscillator, which is an important application, served as the basis for comparison. The application was solved and exact solutions were obtained. Therefore, in this paper, the exact solution was found based on two different integral transforms: the first integral transform complex Sadik and the second integral transform KAJ. And these exact solutions obtained from these two integral transforms were new methods with simple algebraic calculations and applied to different problems.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
"Explanation of the Fundamentals for Al-Bazdawi" Study and Investigation (From the beginning of Prohibition Chapter to its End)
...Show More Authors

 

This research addresses: Sharh Usul Al-Bazdawi "Explanation of the Fundamentals for Al-Bazdawi", by studying and investigating, from the beginning of prohibition chapter to its end. The researcher conducted a study about this book stating its significance and introducing the compiler and the commentator. The researcher as well mentioned that the prohibition has a special formula and requires repetition, and he went on explaining that prohibition according to Hanafis does not require absolute corruption of the prohibited matter unless based on an evidence, and that what is condemned as wrong act for itself is considered void and what is condemned as wrong act for external reasons is considered corrupt accor

... Show More
View Publication Preview PDF
Crossref