Preferred Language
Articles
/
joe-1330
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Parents’ Knowledge about Nutritional Management of children with Phenylketonuria
...Show More Authors

Abstract

Objective(s): to Evaluation of Parents’ Knowledge about Nutritional Management of kids with Phenylketonuria; to Identify the association between parents’ Knowledge about nutritional management then their demographic variables of fathers, mothers (parents age, residence then socioeconomic position).

Methodology: A non-experimental project; was accompanied on parents of phenylketonuria kid in Baghdad town since the period 3 June to 5 October 2022. A Non-probability sample (convenience) of 35 PKU children and their parents (father and mother) was selected Purposively from the hospitals that are select for the study. A survey is built for the purpose of the educa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 18 2014
Journal Name
Conference: First International Engineering Conference (iec2014)at: Ishik University, Erbil, Krg, Iraq
Visualization of People Attraction from Mobile Phone Trace Database: A Case study on Armada 2008 in French City of Rouen
...Show More Authors

The mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th

... Show More
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
A study of the safety and security conditions followed in the X-ray clinics in the Al-Amiriya-Baghdad
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Using Smart Control System to Enhancement the Split Air Conditioning System Performance
...Show More Authors

In IRAQ, the air conditioners are the principal cause of high electrical demand. In summer, the outer temperature sometimes exceeds 500C which significantly effects on the A/C system performance and power consumed. In the present work, the improvement in mechanical and electrical performance of split A/C system is investigated experimentally and analytically. In this paper, performance and energy saving enhancement of a split-A/C system was experimentally investigated to be efficiently compatible with elevated temperature weathers. This improvement is accomplished via Smart Control System integrate with Proportional-Integral- Differential PID algorithm. The PIC16F877A micro-controller has been programmed with the PID and PWM c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Proceedings Of The Aintec 2014 On Asian Internet Engineering Conference - Aintec '14
LTE Peak Data Rate Estimation Using Modified alpha-Shannon Capacity Formula
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 29 2023
Journal Name
Geomatics And Environmental Engineering
Challenges and Issues in Spatial Data Infrastructure (SDI) Development in Iraq
...Show More Authors

This paper addresses the nature of Spatial Data Infrastructure (SDI), considered as one of the most important concepts to ensure effective functioning in a modern society. It comprises a set of continually developing methods and procedures providing the geospatial base supporting a country’s governmental, environmental, economic, and social activities. In general, the SDI framework consists of the integration of various elements including standards, policies, networks, data, and end users and application areas. The transformation of previously paper-based map data into a digital format, the emergence of GIS, and the Internet and a host of online applications (e.g., environmental impact analysis, navigation, applications of VGI dat

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF