Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
Software-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they accou
... Show MoreFounding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains
... Show MoreMobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10
... Show MoreThe research aims to evaluate the selected projects from the water Department of Baghdad, according to a standard for total quality management and to achieve this goal , adopted the case study method to get to know how close or turn away those projects in the management of Standard Malcolm Baldrige Award for Excellence in Quality Management its comprehensive one scales the world's most famous in this area , in order to draw a general framework to evaluate how project management can benefit from this approach to modern management , input from the entrances of the comprehensive management reform and development.
Be standard Malcolm Baldrige Award of several elements: - leadership , strategic planning , foc
... Show MoreTRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license
Today, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More<span>Blood donation is the main source of blood resources in the blood banks which is required in the hospitals for everyday operations and blood compensation for the patients. In special cases, the patients require fresh blood for compensation such as in the case of major operations and similar situations. Moreover, plasma transfusions are vital in the current pandemic of coronavirus disease (COVID-19). In this paper, we have proposed a donation system that manages the appointments between the donors and the patient in the case of fresh blood donation is required. The website is designed using the Bootstrap technology to provide suitable access using the PC or the smart phones web browser. The website contains large database
... Show More