This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to 92.19%, availability 92.375%, and reliability 100%. The proposed system managed five devices. The NSFM implemented using Java and C# languages.
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThis work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreBackground: A major difference between the treatment of the skin lesions and the odontogenic and non-odontogenic sinuses. We aimed to analyze a substantial number of consecutive causes in order to clinical suspicion in the differential diagnoses may be correctly weighted. Materials and methods: The material of this research consisted of 40 patients. A complete history is collected from the patients with the duration and the site of the sinus present, the patient was examined for factors of the fistulas and sinuses and its associations, and patient having any concomitant lesions, a medical consultation done for opinion and management. Clinical examination with facial fistulas and sinuses was mandatory to avoid any mistakes that may occur. A
... Show MoreE-learning seeks to create an interactive learning environment between the teacher and the learner through electronic media conveying in more than one direction, regardless of how the environment and its variables are identified. It also develops skills necessary to deal with technology in order to be able to take into account the individual differences between them and helps e-learning teacher and learner to achieve the goals set in advance and identify educational objectives in a clear manner. The research aims to identify e-learning in its benefits and management systems. It has three sections dealt with in the current research. Chapter II concentrates on the research Methodology, which consisted of three sections: The first s
... Show MoreBackground: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.
Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.
Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.
... Show MoreThis study aims to find out the effectiveness of a cognitive-behavioral counseling program in enhancing self-management in reducing the academic procrastination of tenth-grade male students. The sample consisted of (26) male students divided into an experimental group of (13) students and a control group of (13) students. Two scales of self-management and academic procrastination were used, prepared by the researcher. The counseling program was prepared by the researcher. The results showed the program's effectiveness in enhancing self-management and reducing academic procrastination in the posttest, as it showed the continuation of this enhancement in self-management and the increase in the reduction of procrastination in the follow-up
... Show More