Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
Traction force and power requirement when performing primary tillage occupy the minds of almost farmers, this field research had aim to determine and calculate the pulling force of the most commonly used moldboard and chisel plows, the research conducted in silt clay loam for chisel and moldboard plows as the main factor, two depths of tillage 18 and 25 cm as a second factor and three speeds of tractor 2.55, 4.30 and 6.15 km.h-1 as a third factor. Moldboard plow recorded least traction force 7.550 kN, drawbar power 11.583 hp, power losses due to slippage 1.088 hp, power on the rear axle of the tractor 15.770 hp and brake horse power 17.495 hp. Chisel plow recorded best traction efficiency 76.217 % and total traction efficiency 68.659 %. Dep
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreNations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and
... Show MoreThe study aimed to identify the relationship between the speed and direction of the ball's rotation in the accuracy of the front and rear side longitudinal blow in wheelchair tennis players. The descriptive approach wasused in the manner of correlations to suit the nature of the problem to be studied. The research community identified the 32 players aged18 and over, and the search sample was selected from players with a local classification registered with the 2020 Wheelchair Ground Tennis Federation (2020) in the intentional manner of 8 players, using Smart Tennis Sensor technology to measure the speed and direction of the ball and test the accuracy of the front and rear side longitudinalstraightstrike. She conducted the reconnaissance exp
... Show MoreThe electrospun nanofibers membranes have gained considerable interest in water filtration applications. In this work, the fabrication and characterization of the electrospun polyacrylonitrile-based nonwoven nanofibers membrane are reported. Then, the membrane's performance and antifouling properties were evaluated in removing emulsified oil using a cross flow filtration system. The membranes were fabricated with different polyacrylonitrile (PAN) concentrations (8, 11, and 14 wt. %) in N, N-Dimethylformamide (DMF) solvent resulted in various average fiber sizes, porosity, contact angle, permeability, oil rejection, and antifouling properties. Analyses of surface morphology of the fabricated membranes before and after oil removal revealed
... Show MoreInternal conversion coefficients (ICC) and electron–positron pair conversion coefficients (PCC) for multipole transition of the core nucleus 88Sr have been calculated theoretically. The calculation is based on the relativistic Dirac–Fock (DF) solutions using the so called ‘‘Frozen Orbital’’ approximation, takes into account the effect of atomic vacancies created in the conversion process, covering a transition energies of 1–5000 keV. A large number of points were used to minimize any errors due to mesh-size effects. The internal conversion coefficients display a smooth monotonic dependence on transition energy, multipolarity and atomic shell. Comparing the values of PCC to ICC, it is interesting to note, that the energy dep
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThis study investigates the Linguistic and Conceptual equivalence of Conner’s Revised Scales when applied on a Sudanese sample. Sudanese parents and teachers completed behavior-rating scales on a stratified sample of 200 children. These instruments were based on Conner’s parent -48 and teacher-28 questionnaires. Following a reliable translation into Sudanese Arabic the test-retest reliability of the items and the internal consistency of the original Conner’s' revised scales were explored. The associations between scale scores and between parents and teachers scores were also examined. Both instruments displayed good reliability and the original Conners scales had satisfactory internal consistency. The inter-correlation sugg
... Show MoreAbstract
The purpose of the present paper is to light on the relationship between jobs design, analysis and its reflections on reinforcing workers' vocational adjustment. The present paper aims to accomplish cognitive and applied goals, top of which, test of functional analysis ability to have effect upon workers' vocational adjustment via job design directly and indirectly owning to the virtual factor practiced by these practices on the sought organization. The problem of the present paper comes with many, the most important is the of how to bolster and back up worker's technical adjustment through good and accurate design for the job.
Based on this problem and goals as to expla
... Show More