Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Materials Science: Materials In Electronics
Fabrication and characterization of CoxMn0.25−xMg0.75Fe2O4 nanoparticles for H2S sensing applications

Crossref (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Indoor/Outdoor Deep Learning Based Image Classification for Object Recognition Applications

With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications

In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including:  network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 25 2024
Journal Name
Modern Sport
Time out in basketball and it effect on playing for excellent degrees in Iraq

The value of time out as a time not count of official time form the game like four periods and extra time also it considered a great interest if used well thru the game , the importance of this problem is not using well the time out and when the coach ask for time out and how to invest this time legally to make good results also there is no observing system as the researcher see gives the reality image that the coach is successful lead the game when he takes time out . The goals of research that knowing on numbers of time out for excellent teams in Iraq (first &second) stages and putting special inventory reverse reality of asking time out (positive &negative) on playing basketball , the hypothesis of research that tell the time out effect

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
International Review Of Physics (e-journal) (irephy)
Red shift band enhancement of the nanostructure ZnO100-xAlx thin films as a function of Al concentration for optoelectronic applications

Preview PDF
Publication Date
Sun Oct 20 2024
Journal Name
International Journal Of Medical Science And Dental Health
Applications of Oleuropein

One of the most prevalent phenolic compounds found in olive leaves is oleuropein. Numerous studies have demonstrated the biologically significant effects of this compound, including anti-inflammatory, anti-atherogenic, anticancer, antimicrobial, and antiviral effects, which has led to its increased attention in the scientific community. Oleuropein can be recovered and purified (mostly by chromatographic techniques) from a variety of sources using both conventional and non-conventional methods. It can then be applied in a number of contexts. Because of its numerous pharmacological properties, oleuropein is commercially obtainable as a food enhancement in Mediterranean countries. Numerous scientific and clinical investigations have d

... Show More
Crossref
View Publication
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Evidence of Proof in the Administrative Investigation and Employee Guarantees Towards it : A Comparative Study

The aim of this research is to identify the guarantees of collecting evidence in the administrative investigation in both the Federal Decree-Law No. (11) of 2008 regarding human resources in the federal government and its amendments, and Ministerial Resolution No.(1) of 2018 regarding the executive regulations of the Human Resources Law in the Federal Government, Compared to the Jordanian Civil Service System No.(9) for the year 2020. In order to find out the guarantees obtained by the employee to whom the job violation is attributed in order to confront the authority of the administration in the event that he is referred to the administrative investigation in the stage of collecting evidence. And to search for the balance between the le

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Thyroidectomy in elderly ; is it safe?

Background: The prevalence of thyroid nodules rise with age and different data available about the risks of thyroid surgery in old age people. In general, old age could be a predictor of perioperative mortality and morbidity. The aim of this study is to prove if there is increased risk accompanying thyroidectomy in elderly patients.

Subjects and Methods: Prospective study of one surgeon of study sample undergoing thyroid surgery at Al-Kindy teaching hospital and Saint Raphael hospital .This study was including two groups; group (A) involved patients 65 years and older, group (B) involved patients below 65 years old who were subjected to thyroidectomy. Taking in consideration hist

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Very Large Scale Integration (vlsi) Systems
Low-Power, Highly Reliable Dynamic Thermal Management by Exploiting Approximate Computing

With the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw

... Show More
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
View Publication