Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Cent
... Show Moreبهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته
... Show MoreThe different crises and financial collapses place in many companies, particularly in developed countries as a result of administrative and financial corruption return aspects of the task to the role of the company and the external auditor, both in their emphasis on honesty and fairness of financial statements and the Provisions of accounting information and on the contrary to the truth, you may have to the loss of the rights of stakeholders, particularly existing investors, and the loss of confidence of prospective investors in the accounting information contained in the financial statements of these companies, which led to a crisis of confidence and credibility in the profession of accounting and auditing where the wonder of ma
... Show MoreDiscussed the research variables are important, privatization options and strategic analysis of the external environment, and that the purpose of the research is the trade-off between privatization options and choose the most appropriate alternative in proportion to the external environment, the research aims to determine the privatization the most appropriate option for companies and public contracting, showing the importance of the study provide the privatization of public companies as a strategy can all its way public sector organizations from the transfer of work practices or private sector organizations and mechanisms to it as contributing to improving the level of skills Develop the current and future level of performance,
... Show MoreTechnical education in Iraq Composed of, a complex system of technical competence and scientific, technical and administrative, which extends to cover large areas of the country and constitute a vicious circle between economic development, social and cultural rights through middle-management on the one hand, and between academic knowledge and political decision-making, which aims to bring such development On the other hand, in the light of that education is the actual technical extension applied to create the idea of complementarily between them. In Iraq, have been distributed institutes and technical colleges to achieve those goals, in addition to realizing the idea of integration between them and community, and integration of t
... Show MoreResearchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als
... Show More