The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management information system decision on sensitive data in cloud.
Most of the literature on the management and application terkzat waved the last period on large organizations was the negligence of knowledge management in small organizations where research aims to find out knowleddge management, small projects In oxygen Ahli plant in Iraq, and the fact the role of knowledge management in small projects from the standpoint of employees in order to achieve this used production method results. The results showed that knowledge management has a role in the high level of productivity during the years 2010-2013. The results showed that knowledge management has a role in the high level of productivity during the years 2
... Show MoreThe Paleocene-Eocene Thermal Maximum (PETM) event, which represented a sudden and abnormal rise in temperature during the early Cenozoic Era, is regarded as one of the most important global geologic phenomena. Two important index microfossils (nannoplankton and Ostracoda) were utilised to understand and predict the paleoenvironment and describe the changes during this period. The basis of the study was 12 cutting samples taken from Aaliji and the lower part of Jaddala formations of a subsurface section of (Ba-8) borehole in central Iraq. Some geophysical data were used to determine the upper and lower contacts of the Aaliji Formation and define the shale rate in the studied formations. The micropaleontologic investigation reveals
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show MoreIn this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.
The current study aims at the extent of determining the interest of the Ministry of Higher Education and Scientific Research and its various departments in the process of strategic foresight, and whether this interest is reflected in its strategic decisions if the study relies on an exploratory and analytical approach and has targeted managers in the higher management within this ministry, and the questionnaire has also been used as a basic tool for collecting For data, the study population was (94), (89) questionnaires were distributed, (86) questionnaires were retrieved, and usable questionnaires amounted to (83). The sub-variable had the highest impact on strategic decision-making (intuition), as this research demonstrated the
... Show MoreIn this research the change in the distance of the two stars in two binary star systems (13.6+8)M8and (13+10)M8 was studied, through the calculations the value (rate of mass transfer) of the two phases of dynamical stages of mass which are mass loss and mass transfer has been extracted in its own way ,by extracting the value of the value of (the distance variation between the two stars) has been found only in the mass transfer stage by using mathematical model ,in mass loss stage and were calculated from the change and the difference between the values of each at different times of binary star system evolution ,it was found that the maximum values of and are in ma
... Show More
Where the accounting system in Iraq is still using many of these accounting practices according to the legal requirements to measure assets and liabilities away from the measurement that results in information representing the economic essence and represent honestly the financial situation and financial performance and future cash flows, and the needs of users of financial reports to useful accounting information adopted The International Accounting Standards Board (IASB) represents the true representation of accounting information in accordance with the concept of economic substance, which is the basis for the preparation and development of international accounting standards, and because accounting is part of the
... Show MoreThe increase in cloud computing services and the large-scale construction of data centers led to excessive power consumption. Datacenters contain a large number of servers where the major power consumption takes place. An efficient virtual machine placement algorithm is substantial to attain energy consumption minimization and improve resource utilization through reducing the number of operating servers. In this paper, an enhanced discrete particle swarm optimization (EDPSO) is proposed. The enhancement of the discrete PSO algorithm is achieved through modifying the velocity update equation to bound the resultant particles and ensuring feasibility. Furthermore, EDPSO is assisted by two heuristic algorithms random first fit (RFF) a
... Show More