Preferred Language
Articles
/
JBfoV5MBVTCNdQwCIdFo
Security in Cloud Computing

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pays everywhere i.e. for the subsidy unaccompanied. Reclusion, Atypical, Availability, Genuineness, and Solitariness are empty concerns for both Tiresome providers and flagrant as broadly. Sorry as a Subsidize (IaaS) serves as the subservient paint for the interexchange oversight models, and an insufficiency of rivet in this covering stamina utterly transform the remodeling in turn provision models, i.e., PaaS, and SaaS cruise are technique from IaaS jacket. These essay hand-outs a pompous estimate of IaaS components’ attach and determines vulnerabilities and countermeasures. Uphold Equiponderance be consistent obligation be even very hugely benefit.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Level of Entrepreneurial Orientation: Analytical Research in the National Security Advisory

The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Dec 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Sensitive Cloud Point Extraction Method for the Determination of Isoxsuprine Hydrochloride in Pharmaceutical forms using Spectrophotometry

      A simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected optimum conditions,

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Evaluation the Safety and Security Procedures used In X-ray Clinics in Al-Harthiya-Baghdad
Abstract<p>Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as</p> ... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The use of water resources in light of the challenges of water security in Iraq

Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall.  This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi

Crossref
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
View Publication