Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreSpot panchromatic satellite image had been employed to study and know the difference Between ground and satellite data( DN ,its values varies from 0-255) where it is necessary to convert these DN values to absolute radiance values through special equations ,later it converted to spectral reflectance values .In this study a monitoring of the environmental effect resulted from throwing the sewage drainages pollutants (industrial and home) into the Tigris river water in Mosul, was achieved, which have an effect mostly on physical characters specially color and turbidity which lead to the variation in Spectral Reflectance of the river water ,and it could be detected by using many remote sensing techniques. The contaminated areas within th
... Show MoreIn this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Abstract:
The current research included " Diagnosis of the reality of the gap for the requirements of Business Continuity Management System According to International Standard (ISO 22301: 2012) in Midland Refineries Company (Daura Refinery) " , for development of an administrative system for Business Continuity is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others . the international legitimacy (represented by the international organization for standardization (ISO)) remains the basis for matching and commitment , and the importance of the application of Business Continuity Management Syst
... Show MoreLongitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreThe research acquires its importance by motivating the behavioural side of the employees to apply modern technology in the work, because of its great importance in increasing the efficiency of employees’ performance and excellence. The research was based on two main hypotheses to show the relationship and impact between the variables through the adoption of a questionnaire to collect data and information related to the research, which consisted of (50) people from administrators working at different levels, based on personal interviews and field visits to collect research data. The data collection process was subjected to statistical analysis using the statistical program (SPSS) (Statistical package for social science) to reach
... Show MoreThe research aims to identify the risks faced by projects and work on the administration, such as those risks by using professional Project Management System (Project Management Professional) by identifying those risks and their impact on the objectives of the project, if they occur and to provide appropriate responses to Ha.autam search application on the draft Law Faculty port by the General Mansour Construction Contracting company has been using a method personal interview with the heads of departments and project managers in the Al-Mansour and tools descriptive and quantitative analysis as was used (likelihood and impact of risk analysis, Ai_kaoa scheme Sbb- effect, analysis of probability and impact, risk matrix (probability
... Show MoreDust and bird residue are problems impeding the operation of solar street lighting systems, especially in semi-desert areas, such as Iraq. The system in this paper was designed and developed locally using simple and inexpensive materials. The system runs automatically. It Connects to solar panels used in solar street lighting, and gets the required electricity from the same solar system. Solar panels are washed with dripping water in less than half a minute by this system. The cleaning period can also be controlled. It can also control, sensing the amount of dust the system operates. The impact of different types of falling dust on panels has also been studied. This was collected from different winds and studied their impact o
... Show More