The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management information system decision on sensitive data in cloud.
Studied the environment and fish life Qattan in the Euphrates River in central Iraq for the period from September 2002 until 2003 recorded the lowest temperature of the water during the month of January during the month of August ranged salinity ranges between 068
In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreBackground:The document on hypertension in the elderly promoted by the American college of cardiology and the American heart association (ACCF/AHA) was written with the intent to be a complete reference at the time of publication on the topic of managing hypertension in the elderly. More recently, the European society of hypertension (ESH) and the European society of cardiology (ESC) issued the 2013 ESH/ESC Guidelines for the management of arterial hypertension, followed by The 2014 Canadian Hypertension Education Program (CHPE), and the Eighth Report of the Joint National Committee (JNC8), all of which has endorsed specific recommendations for the management of elderly hypertensive patients.
Where the accounting system in Iraq is still using many of these accounting practices according to the legal requirements to measure assets and liabilities away from the measurement that results in information representing the economic essence and represent honestly the financial situation and financial performance and future cash flows, and the needs of users of financial reports to useful accounting information adopted The International Accounting Standards Board (IASB) represents the true representation of accounting information in accordance with the concept of economic substance, which is the basis for the preparation and development of international accounting standards, and because accounting is part of the
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreFaced economic units face the option of restoring the capital budget annually, and the information provided for the preparation of these budgets, including financial and non-financial aspects have an important impact in the numbers of these budgets, and these units differ in the ability of their own accounting systems to maintain this information. The aim of this research is to investigate the volume of accounting information that is relied on and the reasons for the differences between one unit and another in the various economic sectors in the Iraqi environment.
The most important results of the research is the weakness of the adoption of decision makers in the Iraqi environment and lack of sufficient attention in the decision-
... Show More