Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
As the prices of the fuel and power had fluctuated many times in the last decade and new policies appeared and signed by most of the world countries to eliminate global warming and environmental impact on the earth surface and humanity exciting, an urgent need appeared to develop the renewable energy harnessing technologies on the short-term and long-term and one of these promising technologies are the vertical axis wind turbines, and mostly the combined types. The purpose of the present work is to combine a cavity type Savonius with straight bladed Darrieus to eliminate the poor self-starting ability for Darrieus type and low performance for Savonius type and for this purpose, a three-bladed Darrieus type with symmetric
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreIn this study, silica-graphene oxide nano–composites were prepared by sol-gel technique and deposited by spray pyrolysis method on glass substrate. The effect of changing the graphene/silica ratio on the optical properties and wetting of these nano–structures has been investigated. The structural and morphological properties of the thin films have been studied by x-ray diffraction spectroscopy (XRD), field emission scanning electron microscope (FESEM), energy dispersive x-ray spectroscopy (EDS) and atomic force microscope (AFM). XRD results show that silica structures present in the synthesized films exhibit amorphous character and there is a poor arrangement in graphene plates al
The structure, optical, and electrical properties of SnSe and its application as photovoltaic device has been reported widely. The reasons for interest in SnSe due to the magnificent optoelectronic properties with other encouraging properties. The most applications that in this area are PV devices and batteries. In this study tin selenide structure, optical properties and surface morphology were investigated and studies. Thin-film of SnSe were deposit on p-Si substrates to establish a junction as solar cells. Different annealing temperatures (as prepared, 125,200, 275) °C effects on SnSe thin films were investigated. The structure properties of SnSe was studied through X-ray diffraction, and the results appears the increasing of the peaks
... Show MoreIn this work, a deep computational study has been conducted to assign several qualities for the graph . Furthermore, determine the amount of the dihedral subgroups in the Held simple group He through utilizing the attributes of gamma.
This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV
... Show MoreBackground. “Polyetheretherketone (PEEK)” is a biocompatible, high-strength polymer that is well-suited for use in dental applications due to its unique properties. However, achieving good adhesion between PEEK and hydrophilic materials such as dental adhesives or cement can be challenging. Also, this hydrophobicity may affect the use of PEEK as an implant material. Surface treatment or conditioning is often necessary to improve surface properties. The piranha solution is the treatment of choice to be explored for this purpose. Methods. PEEK disks of 10 mm diameter and 2 mm thickness were used in this study. Those samples were divided into five groups (each group has five samples). The first is the control group, in which no
... Show MoreDue to the great evolution in digital commercial cameras, several studies have addressed the using of such cameras in different civil and close-range applications such as 3D models generation. However, previous studies have not discussed a precise relationship between a camera resolution and the accuracy of the models generated based on images of this camera. Therefore the current study aims to evaluate the accuracy of the derived 3D buildings models captured by different resolution cameras. The digital photogrammetric methods were devoted to derive 3D models using the data of various resolution cameras and analyze their accuracies. This investigation involves selecting three different resolution cameras (low, medium and
... Show MoreWildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob
... Show MoreComputer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the bes
... Show More