Preferred Language
Articles
/
joe-1330
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Res Militaris
Deterritorialized States Within the Framework of Public International Law
...Show More Authors

one of the most important consequences of climate change is the rise in sea levels, which leads to the drowning of some low-lying island states, which leads to them losing the elements of statehood and thus affecting their status as a state, this resulted in several proposals made by the jurisprudence of international law to solve this issue, perhaps the most important of which is the idea of the government in exile, and the proposal to continue recognition of submerged countries, in a way that makes it possible to talk about a new concept of states represented by deterritorialized states, all of which are ultimately proposals that contain great difficulties that hinder their implementation in reality.

Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Iraqi Woman Political situation in Quota Framework after 2003
...Show More Authors

Abstract Since 2003. Iraq has begun a new phase in its modern history, which was after a long period of tyranny, repression of freedom of expression, and women were no better off than men; they suffered marginalization and exclusion, but after the fall of the former regime and the adoption of a parliamentary system of government, The level of participation in the government; where it approved the share of women in the legislative authority called "quota" which reflects the legislative level of a certain proportion of the seats in Parliament, amounting to 25%, and this is approved by the Iraqi constitution for 2005. But it is noticeable that women in parliament did not work within the quota; in other words they belonged to the pol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Philosophical Framework To Intellectual Capital Readiness in Iraqi Organizations
...Show More Authors

           This research aim to present theoretical and philosophical framework regards topic of intellectual capital readiness in Iraqi universities. That is, by using strategic map in balanced score card of Norton and Kaplan (2004). This research discusses theoretical content for three main aspects reflect in its nature elements of intellectual capital readiness in organizations. This includes human capital readiness, information capital readiness and organizational capital readiness. To clear each element, the authors relay on mechanism to determine gape per element of intellectual capital elements.

View Publication Preview PDF
Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 09 2016
Journal Name
Éditions Universitaires EuropÉennes Est Gestionée Par Omniscriptum Management Gmbh
Adaptive Modeling of Urban Dynamics With Mobile Phone Database
...Show More Authors

The communication networks (mobile phone networks, social media platforms) produce digital traces from their usages. This type of information help to understand and analyze the human mobility in very accurate way. By these analyzes over cities, it can give powerful data on daily citizen activities, urban planners have in that way, relevant indications for decision making on design and development. As well as, the Call detail Records (CDRs) provides valuable spatiotemporal data at the level of citywide or even nationwide. The CDRs could be analyzed to extract the life patterns and individuals mobility in an observed urban area and during ephemeral events. Whereas, their analysis gives conceptual views about human density and mobility pattern

... Show More
Publication Date
Thu Jun 20 2024
Journal Name
Frontiers In Microbiology
Removal of mobile genetic elements from the genome of Clostridioides difficile and the implications for the organism’s biology
...Show More Authors

Clostridioides difficile is an emerging pathogen of One Health significance. Its highly variable genome contains mobile genetic elements (MGEs) such as transposons and prophages that influence its biology. Systematic deletion of each genetic element is required to determine their precise role in C. difficile biology and contribution to the wider mobilome. Here, Tn5397 (21 kb) and ϕ027 (56 kb) were deleted from C. difficile 630 and R20291, respectively, using allele replacement facilitated by CRISPR-Cas9. The 630 Tn5397 deletant transferred PaLoc at the same frequency (1 × 10−7

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Network And Computer Applications
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
...Show More Authors

View Publication
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
proposed rules in the eastern musical theories.
...Show More Authors

This paper deals with one of important topics that serve the art movement music, which is looking at the stairs of Arab music in the process of reaching to the directory musical on the subject of so-called (Photo by stairs music) and that by comparing the method used previously and the proposed rules reached by the researcher and received the patent invention, the method is easier for the musician and the author in a directory of peace Arab music when used on grades and half grades voice, and to achieve its objectives researcher dealt with the problem that is determined by the multitude of stairs leading Arab and the difficulty of keeping its catalog of music, and for being an anchor and pillar of the music was taken up and put her impor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Geological Journal
Subsurface Investigation Using Electrical Resistivity Imaging for Proposed Industrial Site near Erbil-Kirkuk Borders, Northern Iraq
...Show More Authors

The friendly-environment geophysical methods are commonly used in various engineering and near-surface environmental investigations. Electrical Resistivity Imaging technique was used to investigate the subsurface rocks, sediments properties of a proposed industrial site to characterize the lateral and vertical lithological changes. via the electrical resistivity, to give an overview about the karst, weak and robust subsoil zones. Nineteen 2D ERI profiles using Wenner array with 2 m electrode spacing have been applied to investigate the specific industry area. One of these profiles has been conducted with one-meter electrode spacing. The surveyed profiles are divided into a number of blocks, each block consists of several parallel pr

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Crossref