Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Since independence in 1956, several attempts have been made to reform educational practices in the Moroccan education system, while going through several stages:Evaluation of the state of the Moroccan education system, determination of failures and the establishment of an effective strategy to improve the quality of education and training in the Moroccan public school.We focus on monitoring the establishment of the pillars of the reform, against the various difficulties that hinder the development of the education sector, from 1999 until today and towards the horizon of 2030. We provide data on the situation of the reform, then we analyze its various stages from a critical point of view, based on the reports of the court of auditors, to
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
Given the importance of increasing economic openness transport companies’ face various issues arising at present time, this required importing different types of goods with different means of transport. Therefore, these companies pay great attention to reducing total costs of transporting commodities by using numbers means of transport methods from their sources to the destinations. The majority of private companies do not acquire the knowledge of using operations research methods, especially transport models, through which the total costs can be reduced, resulting in the importance and need to solve such a problem. This research presents a proposed method for the sum of Total Costs (Tc) of rows and columns, in order to arrive at the init
... Show MoreArabic language is a highly inflectional language where a single word can have different forms using a single root with different interpretations. Arabic does not have a standard way to find roots, the reasons for having inflectional language: suffix, prefix and infix Vowels, which built in complex processes. That is why, words require good processing for information retrieval solutions, until now, and there has been no standard approach to attaining the fully proper root. The applications on Arabic words show around 99% are derived from a combination of bilateral, Trilateral and quad lateral roots.
Processing word- stemming levels in order to extract a root is the process of removing all additional affixes. In case the process of mat
Granting rights, especially procedural, to victims before the International Criminal Court (ICC) is a fundamental departure from international criminal courts, whether (temporary or mixed military courts), and for the first time in the history of international criminal justice, victims can participate in reparations procedures before the Criminal Court. Where they can express their views and concerns at all stages of the proceedings, as the 1998 Rome Statute made the victim an active party in the court proceedings by recognizing a number of rights, such as the right to participate in the trial, the right to protection, and the right to legal representation, As well as the right to reparation or compensation.
In this research ,we will study the phenomenon of dust storms for all types
(Suspended dust , rising dust , dust storm) , and its relationship with some climate
variables (Temperature , rainfall ,wind speed , Relative humidity ) through
regression models to three different locations ( Kirkuk , Rutba , Diwaniya ) almost
covering Iraq area for the period (1981 – 2012) . Time series has been addressing the
phenomenon of storms and climate variables for the time period under study to
attain the best models for long range forcast to the dust storms.
A field experiment was conducted through 2010-2011 in the experimental field return to AlKut forest project near the Tigris river\ General Directorate of Horticultural and Forestry at Wasit governorate. The purpose of this research is to know the response of four cultivars of Sesame to Foliar nutrition with Boron. R.C.B.P. were used with split plot in four Replications including main plot cultivars, Ishtar, Babel, Al-Rafidain, local. While sub-plot included four concentrations of boron (0,50,100, 150) mgb/L-1. The result showed that Al-Rafidain was superior in the average of plant height and % of oil over all cultivars, while the local cultivars gave higher average of number of branches for plant and the highest first
... Show More