Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
Spintronic offers a solution by exploiting spin instead of electron charge since spin current propagation can occur in principle without dissipation. One of the applications involve within this project for storage media is heat-assisted magnetic recording (HAMR). The objective of this study is to simulate the behavior of thermal gradient to generate a pure spin current using an ultrafast femtosecond (fs) laser in a nano-sized multilayered structure of (Al2O3/Ni81Fe19 (Py)/Cu/Y3Fe5O12 (YIG)/Gd3Ga5O12 (GGG)) at room temperature. A ferromagnetic/spacer/magnetic insulator nano-sized multilayered is the proposed structure f
... Show MoreThis work intends to develop an effective heavy metal-free modifier having properties comparable to traditional stabilizers and flame retardants, simultaneously being environmentally friendly and may be superior in many aspects. The important requirement focused on is: how to increase thermal stability and flame retardancy of flexible poly(vinyl chloride). Due to the typical materials now used with poly(vinyl chloride), which increases health and environmental concerns, utilizing a novel heavy metal-free additive will make poly(vinyl chloride) substantially safer. We have used an artificial silicate for this aim, which proved to be an efficient flame retardant and surprisingly showed excellent heat stabilizing effect. Thermal stabi
... Show MoreThe objective of this study is to attempt to provide a quantitative analysis to the causes of unemployment in Iraq and its mechanisms of generation, as well as a review of the most important types of both visible and invisible unemployment, and an attempt to measure the disguised unemployment and analyze the causes. The problem of the research lies in the fact that the Iraqi Economy has been suffered for a long time although its characterized by abundant physical and natural resources, from the existence of the phenomenon of unemployment in the previous two types. Causing a lot of economic problems, represented by the great waste of resources and
... Show MoreLearning the vocabulary of a language has great impact on acquiring that language. Many scholars in the field of language learning emphasize the importance of vocabulary as part of the learner's communicative competence, considering it the heart of language. One of the best methods of learning vocabulary is to focus on those words of high frequency. The present article is a corpus based approach to the study of vocabulary whereby the research data are analyzed quantitatively using the software program "AntWordprofiler". This program analyses new input research data in terms of already stored reliable corpora. The aim of this article is to find out whether the vocabularies used in the English textbook for Intermediate Schools in Iraq are con
... Show More
The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show MoreThe majority of constitutions stipulate and regulate public rights and freedoms in them, including the right to strike as one of the means of expressing an opinion, which public officials or workers resort to in the labor law in order to improve their working conditions and achieve legitimate professional demands while continuing the work of the public facility, However, his capacity as a public servant imposes some restrictions on him in his exercise of political freedoms, including the right to strike because it intersects with the principle of the continuation of the regular and steady functioning of public utilities, which governs the work of public utilities in satisfying the public needs of individuals. The Iraqi legislator permitt
... Show MoreSelf-Assertion is the individual ability to express any emotion well, except the anxiety. The decrease of the individuals asserting behavior makes them face many difficulties that prevent their social adjustment. Moreover it reflexes many negative behavioral and physical cases. The individual, who fails to express his or her negative feelings in required situations, feels with dissatisfaction, loneliness, depression, anxiety, social anxiety, conflict, and psychological disorder.
Accordingly, the importance of this study is represented in studying the self-assertion and studying the university students who reflect the strength of society.
The following are the two aims of the study:
1. Construct an asserting behavior scale.
2.