Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
CFD Simulation of Velocity Distribution in a River with a Bend Cross Section and a Cubic Bed Roughness Shape
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
(General corruption is an approach to tyrants and unjust in the perspective of the Holy Quran)
...Show More Authors

      That corruption with all its forms,  has prevailed over the whole world, but  with  different degrees relaying on the one who leads these countries of rulers, followers and officials who have been deemed  the main reason for that corruption, but if these  rulers  were righteous, These countries would have blessed and elevated and were corrupt unjust tyrants who were the disaster that befell the chiefs of those countries  with ruin, misery, and backwardness. This is what we sought to prove and clarify by considering the verses of the Holy Qur’an in respect with this topic. The research includes an introduction, two topics, and a conclusion.

   &nbsp

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 23 2024
Journal Name
Medical Journal Of The Islamic Republic Of Iran
The Association of Neutrophil to Lymphocyte Ratio and Other Complete Blood Count Parameters with Global Registry of Acute Coronary Events Risk Score in Patients with Non-ST Segment Elevation – Acute Coronary Syndrome: A Single-Center Study
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
A Dubbed Turkish Drama and their Effects of the Behavior of Algerian Women: A Survey Study of a Sample of Women – The City of Mesila is a Model
...Show More Authors

The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In order to achieve these goals, the researcher relies on the descriptive approach in addition to the questionnaire and interviews to collect data. It ends with a number of results such as: The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In ord

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
information and communication technologies and their impact on changed the financial reporting system In a Sample in Iraqi banks
...Show More Authors

paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
European Journal Of Biology And Medical Science Research
Impact of an educational intervention of training of breast feeding promoting on the knowledge and attitude of a sample of mothers: a study of a pre and post evaluation.
...Show More Authors

Background: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.

Publication Date
Wed Aug 08 2018
Journal Name
Journal Of Al-nahrain University
CALCULATION OF THE PARAMETERS FOR ATMOSPHERICMODEL FOR THE EARTH
...Show More Authors

Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
VISUAL CONTAMINATION WITH RANDOM ADVERTISEMENTS AND THE POSSIBILITY OF APPLYING FINES TO THEIR OWNERS: VISUAL CONTAMINATION WITH RANDOM ADVERTISEMENTS AND THE POSSIBILITY OF APPLYING FINES TO THEIR OWNERS
...Show More Authors

Baghdad governorate has many areas of distinctive architectural and architectural character, which are heritage and valuable areas that we must preserve and take care of. But we see many manifestations of it, which have a negative impact on buildings, areas and roads, so that they distort the view and thus lead to visual pollution in general. The research examined the visual pollution from random advertising, which stretched buildings, walls, electricity poles and sidewalks. The study covered different areas of al-Karkh and al-Rassafa (Jadreya Bridge, Nation Square, Jordan Square, alkindy Street)Most of the distortions were the result of non-removable posters, Handwriting, election candidate adve

... Show More
View Publication Preview PDF