Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Dissertation/thesis
A Model To Evaluate the Online Training for Global Virtual Teams in Global Software Projects

Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Statistical Sciences
Use The Coiflets and Daubechies Wavelet Transform To Reduce Data Noise For a Simple Experiment

In this research, a simple experiment in the field of agriculture was studied, in terms of the effect of out-of-control noise as a result of several reasons, including the effect of environmental conditions on the observations of agricultural experiments, through the use of Discrete Wavelet transformation, specifically (The Coiflets transform of wavelength 1 to 2 and the Daubechies transform of wavelength 2 To 3) based on two levels of transform (J-4) and (J-5), and applying the hard threshold rules, soft and non-negative, and comparing the wavelet transformation methods using real data for an experiment with a size of 26 observations. The application was carried out through a program in the language of MATLAB. The researcher concluded that

... Show More
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Comparative Anatomical Study of Petioles to Thirteen Taxa for Scutellaria L. (Labiatae) in Iraq

   Petioles of nine species and four subspecies for Scutellaria L. which are growing wildly in Iraq were studied anatomically. Systmatic importance for the cross sections of those petioles were found. The winged petioles were seen in all taxa but they were different in their shapes , some of them U – shaped but they were semi ellipsoid in others , also they were different in their numbers of vascular bundles in the wings , and the shapes of central vascular bundles , so those  taxa were divided into groups .

View Publication Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ADSORPTION POTENTIAL FOR A MIXTURE OF CHEMICALLY AND THERMALLY TREATED CLAYS TO REMOVE ORANGE G DYE FROM WASTE-WATER: ADSORPTION POTENTIAL FOR A MIXTURE OF CHEMICALLY AND THERMALLY TREATED CLAYS TO REMOVE ORANGE G DYE FROM WASTE-WATER

This study examined the adsorption behavior of anionic dye (orange G) from aqueous solution onto the raw and activated a mixture of illite, kaolinite and chlorite clays from area of Zorbatiya (east of Iraq).The chemical treatment involved alkali and acid activation. The alkali activation obtained by treated the raw clay (RC) with 5M NaOH (ACSO) and the acid activation founded by treated it with 0.25M HCl (ACH) and 0.25M  (ACS). The thermal treatment carried out by calcination the produce activated clay at 750oC for acid activation and 105oC for alkali activation. Batch

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Environmental Nanotechnology, Monitoring & Management
A review study summarizes the main characterization techniques of nano-composite photocatalysts and their applications in photodegradation of organic pollutants

Scopus (43)
Crossref (14)
Scopus Crossref
Publication Date
Wed Mar 13 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Dispensing of Antimicrobial Agents Without a Prescription in Iraq: A Call for Upholding the Legislations to Change Long-Standing Practices

Background: Antimicrobial prescribing patterns have an important role in the emergence of resistance, and community pharmacists have a substantial influence on this issue. Objective: To assess community pharmacists' behaviors and attitudes toward antimicrobial dispensing, determine their proportions and categories, and examine the underlying rationales for this practice. Methods: A descriptive cross-sectional survey of community pharmacists in Iraq was conducted from June to August 2023, using a self-administered validated questionnaire. The attitudes, practices, and motivations driving the distribution of antimicrobials without a prescription (AWP) were explored in three areas. Results: A sizable proportion (61.6%) of respondents rejected

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Audit bank credit risk in accordance with international auditing standards: Applied research at Rafidain Bank, Public Administration - Baghdad

This research dealt with the subject of auditing bank credit risks in accordance with international auditing standards and aims to develop procedures and design a credit risk audit program in accordance with international auditing standards and demonstrate their impact on the truth, truthfulness and fairness of financial statements and on their overall performance and continuity in the banking sector Its importance lies in relying on international auditing standards to assess and measure bank credit risk and its impact on the financial situation as well as the ability to predict financial failure. A set of conclusions have been reached, the most important of which is that the bank faces difficulties in measuring credit risk in accordance

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technological Maturity and its role in reinforcing the quality of auditing: An analytical study in Iraqi audit offices

This paper discusses the role of Auditors' Technological Maturity in reinforcing the quality of auditing profession, through focusing on the concepts of Technological Maturity and quality of auditing profession, as well as designing a proposed model for Technological Maturity which includes five evolutionary and sequential stages, and this proposed model would contribute to reinforce the quality of auditing. This proposed model will be employed in the field of auditing profession because the importance of the development and investment in this profession and the importance of the need for specialized knowledge in Information Technology, and the result of a proposed model is development of technological knowledge for the auditor to reach

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 25 2023
Journal Name
Plos One
Organizational and behavioral attributes’ roles in adopting cloud services: An empirical study in the healthcare industry

The need for cloud services has been raised globally to provide a platform for healthcare providers to efficiently manage their citizens’ health records and thus provide treatment remotely. In Iraq, the healthcare records of public hospitals are increasing progressively with poor digital management. While recent works indicate cloud computing as a platform for all sectors globally, a lack of empirical evidence demands a comprehensive investigation to identify the significant factors that influence the utilization of cloud health computing. Here we provide a cost-effective, modular, and computationally efficient model of utilizing cloud computing based on the organization theory and the theory of reasoned action perspectives. A tot

... Show More
Crossref (1)
Scopus Clarivate Crossref
View Publication