Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
This study aimed to identify the quality of the career path and its relation to organizational excellence at King Khalid University in the Faculty of Business from the point of view of the faculty members by identifying the dimensions quality of work-life including (participation of decision making, training and development opportunities, and the balance between personal and work life, and to identify the level of organizational excellence through dimensions ( Excellence of leadership, excellence of the strategy, and excellence of organizational culture). The descriptive approach was used. The questionnaire was a research tool. It consisted of (29) paragraphs, distributed to the entire study community and then received 127
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreAbstract
Lightweight materials is used in the sheet metal hydroforming process, because it can be adapted to the manufacturing of complex structural components into a single body with high structural stiffness. Sheet hydroforming has been successfully developed in industry such as in the manufacturing of the components of automotive.The aim of this study is to simulate the experimental results ( such as the amount of pressure required to hydroforming process, stresses, and strains distribution) with results of finite element analyses (FEA) (ANSYS 11) for aluminum alloy (AA5652) sheets with thickness (1.2mm) before heat treatm
... Show MoreA numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw
... Show MoreThe author addresses the issue of the linguoculturological component in the process of teaching Russian to Arabic students, focuses on the peculiarities of the national character of students. The author also refers to the long-standing ties of Russian and Arab cultures, thus emphasizing the relevance of this aspect for the current state and situation of the Russian language in Arab countries.
Автор статьи обращается к вопросу лингвокультурологической составляющей в процессе преподавания русского языка арабским студентам, останавливается на особенностях национального хара
... Show MoreThe significance of the research lies in the fact that electronic technologies represent an important step in evaluating legal situations, and the research problem centered on the lack of attention to visual requirements and the absence of a clear image of legal situations that may be difficult for the referee to apply correctly in addition to the lack of focus on visual requirements and the unclear depiction of some legal cases which make it difficult for the referee to interpret them correctly This is because the referee's main tool is visual perception, which interprets live situations such as violations, fouls, and other cases that arise during a game Moreover, there are numerous responses and challenges in evaluating legal situ
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreThis paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
Human beings have an innate and natural aim to achieve their self-interests and to show their ability to overcome challenges in a better way, therefore the move towards self determination is expressed by intrinsic motivation. The desire of absorbing in this task is to enjoy the task in it self and benefitting from it such a motivation is the desire rooted in human nature to judge and choose in which individual is conscious in his self, abilities and adequacy that help him in control the different situations of life passed by him. His choices and actions are voluntary and non-restricted to intervention or external control because control is inner and subjective, while his behavior is self-regulated with the feeling of
... Show MoreTransit agencies constantly need information about system operations and passengers to support their regular scheduling and operation planning processes. The lack of these processes and cultural motivations to use public transportations contributes enormously to the reliance on the private cars rather than public transportation, resulting in traffic congestions. The traffic congestions occur mainly during peak hours and the accidents happening as a result of road accidents and construction works. This study investigates the effects of weekday and weekend travel variability on peak hours of the passenger flow distribution on bus lines, which can effectively reflect the degree of traffic congestion. A study of passen
... Show More