Preferred Language
Articles
/
ijs-3909
Efficiently-managed Cloudly-Secured Mobile User Data Sharing Code Implementation
...Show More Authors

Increasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authentication, Data Owner (DO) Sending files to Cloud, Sending password, Send Mail and Send SMS. Suppose Data Users need to communicate and share information on Cloud with the help of Mobile Agent only. So, Data Users may be assured that whatever resource required in the cloud with the documents on their Mobile Agent in the office

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
Design and Implementation of EEG-Based Smart Structure
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Engineering
Software Implementation of Binary BCH Decoder Using Microcontroller
...Show More Authors

In this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.

 

 

View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Relationship between federal budget estimates And actual implementation
...Show More Authors

he public federal budget of the state includes estimated figures for state revenues and expenditures for the next fiscal year. The estimation process is one of the main parts of the preparation of the general budget of the state and the accuracy in the estimation of revenues and expenditures of the most important principles that should be based on the process of making estimates and should not overestimate the assessment process to ensure the availability of funds in the future in all cases, which lead to unfair distribution of allocations, so the research aims to study The case of preparing the budget in the Directorate and how to estimate the expenditure in, by the analysis of operating budgets and identify deviations in the implementa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 15 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Development of Measurement Scale for Hypothesized Conceptual Model of E-service Quality and User Satisfaction Relationship
...Show More Authors

Preview PDF
Publication Date
Thu Nov 17 2016
Journal Name
Plos One
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
...Show More Authors

Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Sharing knowledge on organizational innovation Field study in the arab company , for detergents and chemical
...Show More Authors

ABSTRACT

Impkact  of  Knowledge  sharing  on  organizational  innovation  Impriscal  study in Arabic company . 

of  Knowledge Management is  the  main  component  Knowledge  sharing  system, it mean the exchange if  Knowledge, ideas, and good  practice with  another  individual . Knowledge sharing between persons, then its values can growth .

It is vry important because it can provide us with the contention between virus peoples . the interaction among the people can pass all kind of Knowledge among them. the connection and interaction and interaction enabl

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 14 2018
Journal Name
Journal Of Legal Sciences
The Speedy of Criminal Trials between Theory and Practice A Study in the Jordanian Penal Code
...Show More Authors

The Standards on Speedy Trial and Timely Resolution of Criminal Cases have some main purposes such as effectuate the right of the accused to a speedy trial, to further the interests of the public, including victims and witnesses, in the fair, accurate, and timely resolution of criminal cases; and to ensure the effective utilization of resources. Despite the importance of these principals, the Penal Legislator needs to recognize such principals in order to avoid the problem of prolonging the criminal proceedings. This study highlights the issue of delaying in criminal trials, and prolong the criminal proceedings, and to speed the Criminal Procedure, and how to avoid the problem and the dilemma around the lack of speeding of Criminal Proce

... Show More
View Publication
Crossref