Preferred Language
Articles
/
IhfdV5MBVTCNdQwCTdG-
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 02 2018
Journal Name
Iraqi Journal Of Physics
Optical emission spectroscopy for studying the exploding copper wire plasma parameters in distilled water

This work aims to study the exploding copper wire plasma parameters by optical emission spectroscopy. The emission spectra of the copper plasma have been recorded and analyzed The plasma electron temperature (Te), was calculated by Boltzmann plot, and the electron density (ne) calculated by using Stark broadening method for different copper wire diameter (0.18, 0.24 and 0.3 mm) and current
of 75A in distilled water. The hydrogen (Hα line) 656.279 nm was used to calculate the electron density for different wire diameters by Stark broadening. It was found that the electron density ne decrease from 22.4×1016 cm-3 to 17×1016 cm-3 with increasing wire diameter from 0.18 mm to 0.3 mm while the electron temperatures increase from 0.741 to

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Producing Bone China with local and manufactured materials as substitutes for the traditional materials

This research studies the possibility of producing Bone China with available local and geological substitutes and other manufactured ones since it’s traditionally produced by Bone ash, Cornish stone, and China clay, while the substitutes are Kaolin instead of China clay and Feldspar potash instead of Cornish stone. Because of the unavailability of Feldspar in Iraq, it was substituted with the manufactured alternative Feldspar. Bone ash was prepared from cow bones with heating treatments, grinding and sifting. The alternative Feldspar was prepared by chemical analysis of the natural Feldspar potash with local materials that include Dwaikhla Kaolin, Urdhuma Silica sand, Potassium Carbonate, and Sodium Carbonate. The mixture was burned at

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Semiparametric Bayesian Method with Classical Method for Estimating Systems Reliability using Simulation Procedure

               In this research, the semiparametric Bayesian method is compared with the classical  method to  estimate reliability function of three  systems :  k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
The Minimum Cost for the Vascular Network Using Linear Programming Based Its Path Graph

As of late, humankind has experienced radiation issues either computerized tomography (CT) or X-rays. In this investigation, we endeavor to limit the effect of examination hardware. To do this the medical image is cropping (cut and zoom) then represented the vascular network as a graph such that each contraction as the vertices and the vessel represented as an edges, the area of the coagulation was processed already, in the current search the shortest distance to reach to the place of the blood vessel clot is computed

View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of green strategy formulation in green behavior for municipal corporations – Analytical study

The research shows the importance of orientation towards the formulation of the green strategy and its effect in determining the behavior of the green municipal institution in Babel governorate. The research highlighted the formulation of the green strategy as an important variable, especially today, the trend towards protecting the environment and minimizing the damage resulting from the delivery of services, and through it also the type of green behavior or performance adopted by the municipal institution and the emergence of the need for a strategy that is not harmful to the environment. The research took the sample intentionally comprehensive size of 222 personnel of municipal institutions and some formations concerned with t

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Determination of Skip Entry Trajectories for Space Vehicles at Circular and Super Circular Speeds

The study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The c

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Structural and contextual dimensions For the connection of static T feminization An analytical study

After looking at the books of the first two grammarians, may God have mercy on them and reward them for what they have provided us with the rules of service to the Book of God and service to Arabic, we must highlight some of the things that the grammarians wanted to clarify, which did not come out of what they proved, but we are working on the statement of the issuance of the passport Provisions from the syntactic industry, and whether it is intended to prove a rule is not very added to the statement of speech, and we know that language, any language was the function of understanding; therefore they said: (speech is a useful word that indicates the benefit improves silence on them), and this concept between Grammatical controls and conte

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Global Pharma Technology
New Record for Science Salvia margasurica Al-Musawi & Al- Hussaini, (Labiatae) in Iraq

Background The study covered thirty-three species which grown wildly in Iraq and a comparative study for all kinds of morphological characters were done. Principal Findings The most stable and important taxonomic characters were pointed out, diagrams, illustrations, scheduals, micrographs were also documented. Stamens, nutlets, basal leaves, bracts, bracteoles, calyces, corollas and their trichomes were very important taxanomic characters. The trichomes were variable in variable species therefore used as a diagnostic characters for the species. Conclusions New species Salvia margasurica Al-Musawi & Al-Hussaini was suggested to be new record for science. Keywords: Salvia, Morphology, Spec. Nov.

Scopus
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Deriving the Composite Simpson Rule by Using Bernstein Polynomials for Solving Volterra Integral Equations

In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.

Crossref (1)
Crossref
View Publication Preview PDF