Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreImpact of buildings in Iraq and other countries on the environment is obvious; this problem began to take scientific and humanitarian dimensions in order to reduce and eliminate this problem. This impact can be seen through the energy, water and raw materials consumed for the establishment, operation and maintenance of these buildings, as well as the emissions of hazardous gases and generations of solid wastes.
This work was conducted to assess the current maintenance managerial practice for the governmental buildings to stand on the main obstacle and extrapolation of measures by means of interviews with experts to determine the effective factors and closed questionnaire to state the features and the need for new
... Show MoreInfrastructure projects take a long time, are complex, multidisciplinary, use different materials and products, and have high risk. These characteristics affect the process of supplying materials. The current paper studies the ability to improve the supply chain process and decrease its cost by identifying the factors that affect it. These factors are used as variables in the mathematical model, which is working under uncertain conditions when the consumption rate of materials is not constant. The information used in this model is obtained from Building Information Modeling (BIM) and Geographical Information System (GIS) techniques and the genetic algorithm is utilized to determine the optimal supplier and the quantities of supplies
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More