Preferred Language
Articles
/
joe-1330
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Impact of empowerment and functional flexibility in evaluating worker performance :an empirical study
...Show More Authors

This study was conducted in the Department of Employment and Loans at the Ministry of Labor and Social Affairs to indicate the importance and impact of both the empowerment and the functional flexibility in evaluating the performance of the employees. To achieve the objectives of the study, the data was collected through a questionnaire form designed for this purpose based on previous studies. Data obtained for a significant evaluation of the relationship between the components of both the empowerment and the functional flexibility with the components of the evaluation and determining the degree of importance of each component of both the empowerment and functional flexibility for the components of the evaluation by the extractio

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Measuring Positive and Negative Association of Apriori Algorithm with Cosine Correlation Analysis
...Show More Authors

This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reservoir permeability prediction based artificial intelligence techniques
...Show More Authors

   Predicting permeability is a cornerstone of petroleum reservoir engineering, playing a vital role in optimizing hydrocarbon recovery strategies. This paper explores the application of neural networks to predict permeability in oil reservoirs, underscoring their growing importance in addressing traditional prediction challenges. Conventional techniques often struggle with the complexities of subsurface conditions, making innovative approaches essential. Neural networks, with their ability to uncover complicated patterns within large datasets, emerge as a powerful alternative. The Quanti-Elan model was used in this study to combine several well logs for mineral volumes, porosity and water saturation estimation. This model goes be

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Communications In Computer And Information Science
Automatically Recognizing Emotions in Text Using Prediction by Partial Matching (PPM) Text Compression Method
...Show More Authors

In this paper, we investigate the automatic recognition of emotion in text. We perform experiments with a new method of classification based on the PPM character-based text compression scheme. These experiments involve both coarse-grained classification (whether a text is emotional or not) and also fine-grained classification such as recognising Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method significantly outperforms the traditional word-based text classification methods. The results show that the PPM compression based classification method is able to distinguish between emotional and nonemotional text with high accuracy, between texts invo

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Aug 28 2023
Journal Name
Journal Of Planner And Development
Emergency of Edge city between Regeneration and Acclimatization Urban
...Show More Authors

           In the nineteenth century, a new type of cities appeared, known as new cities located on the edges of major cities, and these cities began to  decentralization, urban studies turned to this type of cities to find out the most important reasons for the emergence of new cities and find out what those cities will become . Therefore, we will discuss in this research how the urban emergence of these cities (edge cities) occurs, so the research formulates its problem : The need to know the stages that edge cities go through, ending with their emergence, and the mechanisms that cities take within their context  ( regeneration or adaptation ), Assuming that edge cities are a

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 08 2023
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Role of Banking Compliance to Reduce Risks to Run
...Show More Authors

The importance of operational risks increases with the increase in technological development, the development of banking operations, the extent of banking compliance, and the attempt of many banks to achieve quality in banking services. And the extent of the position occupied by Iraqi banks for banking compliance and reducing operational risks. The Basel Committee (2) paid its attention to operational risks and the interest of international banks to follow policies that work to ensure banking compliance and cover operational risks, because of its role in reducing losses due to increased costs and achieving an increase in profits. Realizing and working to confront the best possible and traditional methods, that some risks Operational problem

... Show More
View Publication
Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Natural Volatiles And Essential Oils
Relationship between Toxoplasma gondii Antibodies and Blood Group in University Students
...Show More Authors

Background: Toxoplasma gondiiis an obligate intracellular protozoan that may infect nearly all warm-blooded animals, including humans. T gondiiis thought to infect one-third of the human population.The symptoms depending on the adequacy of the immune antiparasitic response. In humans, the main source of infection is through contact with the feces of infected cats, the final host in which the T. gondii completes its life cycle. Other source of infection occurs when drinking raw milk, ingestion of contaminated meat. Aim: This descriptive study estimated the seroprevalence and risk variables for Toxoplasma gondii infection forundergraduate students of a college of Pharmacy who were studying at University of Baghdad. The frequency rate ofToxopl

... Show More
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Evaluation of Medication Errors in Hospitalized Patients
...Show More Authors

Objectives: Many medication errors occur in the hospital, and these can endanger patients. The purpose of this study was to evaluate the incidence of medication errors in hospitalized patients, and to categorize the most frequent types of errors, and to asses the possible measures that may prevent the occurrence of such errors.
Methods: A prospective, exploratory, and evaluative study, using direct observation method to detect medication errors in adult hospitalized patients in medical and surgical units in Baquba Teaching Hospital- Diyala-Iraq.. The files of 299 patients had been reviewed from July 2009 to September 2009, including medication orders and treatment sheets to detect existing errors. The detected errors were recorded and

... Show More
View Publication Preview PDF