Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe Costing Accounting is one the analytic tools which plays important role by support the management in planning& control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.
The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.
... Show MoreIn this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show MoreIn light of today's business world, who faces challenges and intense competition as a result of the rapid evolution of technical and informational, organizations had to respond to variables through the adoption of modern management techniques that reduce the effects of risks and activating the role of the internal control system in order to contribute to the early detection of risks and reduce the negative results expected .The research is to address the problem faced by organizations which still follow the traditional methods in the control activities, and the lack of knowledge of the management and their staff of the importance of the existence of risk management and internal control system takes into account these risks, and the limit
... Show MoreTopic management is the awareness of how speakers deal with initiating, developing, changing, and ending a topic and how they fix the relationship when a misunderstanding occurs. It is such an important unit of conversation as it includes the transition from one strategy to the other to be accomplished in a systematic and orderly manner. These strategies are impaired in dementia patients thus lead to communication breakdown. This study aims at detecting the dementia patients' topic management strategies in selected speeches and answering the questions of which of these strategies are fully or partially detected in these speeches. The researchers use a qualitative method to examine the speeches of those patients and they adopt an eclectic
... Show MoreThe effect of different cutting fluids on surface roughness of brass alloy workpiece during turning operation was carried out in this research. This was performed with different cutting speed, while other cutting parameters had been regarded as constants(feeding rate , and depth of cut). Surface roughness of machined parts that will be tested by electronic surface roughness tester .The results show that the standard coolant gives the best values of surface roughness for fixed cutting speed ,followed by sun flower oil that has approximately the same effect, while the air stream as a coolant gave unsatisfied results for the evaluation of surface roughness.
In the other hand the best values of surface roughness were recorded for max
... Show MoreBackground: The rapid evolution of Artificial Intelligence (AI) has significantly influenced Education, demonstrating substantial potential to transform traditional teaching and learning methods. AI reshapes teacher-student interactions and the relationship with knowledge. Objective: To analyze the potential benefits, ethical challenges, and limitations of AI in Education based on recent scientific literature, emphasizing the balance between technology and human interaction. Methods: A documentary research approach with a descriptive focus was employed, following the PRISMA protocol for systematic reviews. The search strategy involved analyzing evidence from 18 scientific articles published within the last six years. Results:AI o
... Show More