Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MoreIn this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreThe value of time out as a time not count of official time form the game like four periods and extra time also it considered a great interest if used well thru the game , the importance of this problem is not using well the time out and when the coach ask for time out and how to invest this time legally to make good results also there is no observing system as the researcher see gives the reality image that the coach is successful lead the game when he takes time out . The goals of research that knowing on numbers of time out for excellent teams in Iraq (first &second) stages and putting special inventory reverse reality of asking time out (positive &negative) on playing basketball , the hypothesis of research that tell the time out effect
... Show MoreOne of the most prevalent phenolic compounds found in olive leaves is oleuropein. Numerous studies have demonstrated the biologically significant effects of this compound, including anti-inflammatory, anti-atherogenic, anticancer, antimicrobial, and antiviral effects, which has led to its increased attention in the scientific community. Oleuropein can be recovered and purified (mostly by chromatographic techniques) from a variety of sources using both conventional and non-conventional methods. It can then be applied in a number of contexts. Because of its numerous pharmacological properties, oleuropein is commercially obtainable as a food enhancement in Mediterranean countries. Numerous scientific and clinical investigations have d
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreThe aim of this research is to identify the guarantees of collecting evidence in the administrative investigation in both the Federal Decree-Law No. (11) of 2008 regarding human resources in the federal government and its amendments, and Ministerial Resolution No.(1) of 2018 regarding the executive regulations of the Human Resources Law in the Federal Government, Compared to the Jordanian Civil Service System No.(9) for the year 2020. In order to find out the guarantees obtained by the employee to whom the job violation is attributed in order to confront the authority of the administration in the event that he is referred to the administrative investigation in the stage of collecting evidence. And to search for the balance between the le
... Show MoreBackground: The prevalence of thyroid nodules rise with age and different data available about the risks of thyroid surgery in old age people. In general, old age could be a predictor of perioperative mortality and morbidity. The aim of this study is to prove if there is increased risk accompanying thyroidectomy in elderly patients.
Subjects and Methods: Prospective study of one surgeon of study sample undergoing thyroid surgery at Al-Kindy teaching hospital and Saint Raphael hospital .This study was including two groups; group (A) involved patients 65 years and older, group (B) involved patients below 65 years old who were subjected to thyroidectomy. Taking in consideration hist
... Show MoreWith the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show More