Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
The Iraqi Postgraduate Medical Journal
Is It Reasonable to Screen for Undiagnosed Diabetes and Prediabetes in Asymptomatic Individuals? A Sample from Baghdad

BACKGROUND: Diabetes Mellitus is a complex chronic illness that has increased significantly around the world and is expected to affect 628 million in 2045. Undiagnosed type 2 diabetes may affect 24% - 62% of the people with diabetes; while the prevalence of prediabetes is estimated to be 470 million cases by 2030. AIM OF STUDY: To find the percentage of undiagnosed diabetes and prediabetes in a slice of people aged ≥ 45years, and relate it with age, gender, central obesity, hypertension, and family history of diabetes. METHODS: A cross sectional study that included 712 healthy individuals living in Baghdad who accepted to take part in this study and fulfilling the inclusion and exclusion criteria.

... Show More
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
The comparative approach (stabilizer) and the need for Arabic to it

Linguistic research according to modern curricula:
   It is one of the important matters that occupy the ideas of those concerned with linguistic studies, whether Arabic or otherwise. Recent years have witnessed the advancement of this methodological approach, and books and studies in Arabic have been written on important, multifaceted issues, of grammatical and linguistic origins, and their balance with new developments and ideas attracted mostly from Western studies.
    The comparative approach - as they call it - is one of the modern approaches that is based on balancing a language with other sisters belonging to its family, to reach similarities and differences between them, and to know the c

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Suggested Model for auditing the performance of municipal institutions to verify the services provided

The services provided by the municipal institutions of the basic things needed by the man in his daily life and the evolution of cities basically depends on these services and therefore has paid most of the world's attention to this vital facility and give him the biggest concern for the welfare of the citizens, as is the research problem that there is no program scrutiny to evaluate the performance of municipal institutions contribute to measuring the efficiency and effectiveness of the services provided and was based on research on the premise that the preparation of the existence of audit program to evaluate the performance of municipal institutions contribute to measuring the efficiency and effectiveness of services provided has reac

... Show More
Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
To Shape a Silence While Breaking it: Toni Morrison’s the Bluest Eye

Toni Morrison (1931-), the first African-American winner of Noble Prize in literature (1993) and the winner of the 1988 Pulitzer Prize for fiction, regards herself as the historian of African-American people. She does not think of her writings as literature but as a sacred book dedicated to explore the interior lives of blacks. She creates history by disregarding European standards and the white man's view of African- Americans. She adopts her people's point of view, invests their heritage, voices their pains and uses their vernacular. She even writes to a black audience. She establishes the black novel  by depicting the blackness of American literature. In choos

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
International Journal Of Innovative Computing, Information And Control
ITTP: A new transport protocol for VoIP applications

Scopus (14)
Scopus
View Publication
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Secure Marketing Website

The  Internet  provides business  with  new methods of reaching  and interacting with ·customers as  well as  improving inter  and  intra  business communication.

In  this  research, a  soft.ware  marketing web  site  with  a security

tools   is  designed  and   implemented  to  protect   the  customer  pers.onal information  and   payment   information  when  a  customer   tries  to  pay  a software package.

A  new   protectior.t method   is suggested  to  protect &nbsp

... Show More
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Bio-inspired Computing – Theories And Applications
Image Segmentation Using Membrane Computing: A Literature Survey

Scopus (10)
Crossref (5)
Scopus Crossref
View Publication