Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 09 2021
Journal Name
Review Of International Geographical Education
E-Learning Applications According To The Levels Of STEM Literacy For Teachers Of Physics At The Secondary Stage
...Show More Authors

E-learning applications according to the levels of enlightenment (STEM Literacy) for physics teachers in the secondary stage. The sample consists of (400) teachers, at a rate of (200) males (50%), and (200)females (50%), distributed over (6) directorates of education in Baghdad governorate on both sides of Rusafa and Karkh. To verify the research goals, the researcher built a scale of e-learning applications according to the levels of STEM Literacy, which consists of (50) items distributed over (5) levels. The face validity of the scale and its stability were verified by extracting the stability coefficient through the internal consistency method “Alf-Cronbach”. The following statistical means were used: Pearson correlation coefficient,

... Show More
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 07 2021
Design and numerical verification of a polarization-independent grating coupler using a double-layer approach for visible wavelengths applications
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Parametric design tools and how to take advantage of it in 3D sculptural design
...Show More Authors

The design was distinguished in Late Twenty-First Century With new and new methods Through which the ability to adapt all technical media in the formation of two-dimensional and three-dimensional figures and shapes was achieved .
Which led to the emergence of endless sets of design ideas characterized by the heterogeneity of design forms and design solutions that preceded it. The designer could not access these creations in various architectural and artistic fields only through computer programs, especially those related to the activation of mathematical logic and what is known as algorithms in the formation and construction of the form, which led to the emergence of the "parametric direction" and the problem of research is summarized

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
...Show More Authors

View Publication
Scopus (50)
Crossref (9)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of applying assurance engagements according to the international standard IASE (3402) in enhancing the auditing action
...Show More Authors

Abstract:
                The research seeks to explain the role of the international auditing standard (3402) in the auditor's procedures, where the importance of the research stems from the adoption of international auditing standards in the Iraqi environment, including the standard (3402) of assurance engagements that the external auditor performs by submitting reports on the design of control tools and their operational effectiveness in a service facility that provides the beneficiaries with a service. To provide useful information for service organizations The control tools are of great benefit in rationalizing decisions, and many recommen

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Compliance auditing according to the INTOSAI standards and its effect on the quality of audit reports: applied research
...Show More Authors

                The main objective of the audit process is to enable the auditor to express his neutral technical opinion as to whether the financial statements have been prepared in accordance with the financial reporting framework and fairly express the financial position, the result of the activity and the cash flows. A wrong opinion works to burden the beneficiary parties with great damages, and then the presence of any error or bias from the auditor when applying the rules of professional ethics (such as violating professional confidentiality and conflict of interest and moving away from impartiality and objectivity) negatively affects the performance of his

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Single-Bit Architecture for Low Power IoT Applications
...Show More Authors

View Publication
Scopus Clarivate Crossref