Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
Amongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Abstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreThe research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th
... Show MoreIn this study, performance characteristics such as power take off (PTO) power consumption, fuel consumption, fuel consumption for the unit field-unit product were determined at different working speeds with two different PTO applications (540 and 540E) in a single row disc type silage machine. In particular, the 540E PTO application greatly reduces fuel consumption for unit work. The best results in terms of hourly fuel consumption were achieved in 540E PTO application and V1 working speed. When the field - product fuel consumption is evaluated, the best results were obtained with the 540E PTO application at the V3 working speed. When an evaluation is made considering all the parameters, it is concluded that the 540E PTO application will p
... Show MoreA new chelating phenolic Schiff base containing phthalate imide pendant group resin was synthesized by three steps. The first step includes synthesis of 2-(4-aminobiphenyl-4-ylcarbamoyl) benzoic acid (1), Via reaction of pthalic anhydride with benzidine. In the second lines, the compound that we obtained in the first step was reacted with o-hydroxybenzaldehyde to obtain phenolic Schiff base 2-(4'-(2-hydroxybenzylideneamino) bephenyl-4-yl carbamoyl) benzoic acid (2) The third step includes prepared resin during intensification Schiff base derived with formaldehyde inan alkaline middle. Thepthale amice acid, Schiff base and resin were characterized by various instrumental techniques like FT-IR, 1HNMR ,13CNMR an
... Show MorePraise be to God alone, and after:
This is a research entitled: “A fundamental study of judicial jurisprudence rules and their applications in the Hanbali school of thought,” in which the researcher studied eight legal jurisprudential rules considered by the Hanbalis and others.
At the conclusion of his research, the researcher reached a number of results, including: the importance of taking care of judicial rules, and the need for judges and their assistants to them, including: the need for students of science in Hanbali jurisprudence to study these rules according to the doctrine, and to highlight their applications to them, including: the importance of the rules under study, and their impact on rulings Jurisprudenc
... Show MoreResearch objective: This research aims to unveil how to use the method of referral in understanding the Holy Quran.
The reason for choosing the research: The one that invited me to write on this topic is the importance of the referral method, so I liked the research in it, and unveiled this wonderful Qur’anic method, so that it helps to understand the intention of God Almighty in his dear book.
The research plan: The research was divided into three topics and a conclusion.
As for the first topic, it is divided into two requirements. The first requirement deals with the definition of referral language.
In the second re
The contemporary development applications on scientific areas of acyclic and cyclic Schiff bases and their complexes.
Nanoparticles of Pb1-xCdxS within the composition of 0≤x≤1 were prepared from the reaction of aqueous solution of cadmium acetate, lead acetate, thiourea, and NaOH by chemical co-precipitation. The prepared samples were characterized by UV-Vis spectroscopy(in the range 300-1100nm) to study the optical properties, AFM and SEM to check the surface morphology(Roughness average and shape) and the particle size. XRD technique was used to determine the crystalline structure, XRD technique was used to determine the purity of the phase and the crystalline structure, The crystalline size average of the nanoparticles have been found to be 20.7, 15.48, 11.9, 11.8, and 13.65 nm for PbS, Pb0.75Cd0.25S,
... Show More