Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.
The research aims to verify the Role of Internal Auditing in Assessing the Risks of Strategic Operations (Acquisition) and then reflect on management decisions. Since all corporations wish to expand, growth and domination of the market may expose them to multiple risks that lead to failure. The research assumes two main hypotheses. First, there is no role for internal audit in evaluating the strategic operations (acquisition). Second, there is no relationship between internal auditing in assessing the risks of strategic operations (Acquisition) and management decisions. The data was collected by using a questionnaire distributed to a group of private bank employees. The statistical analysis regarding research rejected the two hyp
... Show MoreSmall and Medium Enterprises (SMEs) in Iraq have experienced low performance due to the limited usage of accounting information systems (AIS) and the inability to exploit knowledge of management capabilities (KMC). These deficiencies have led to competitive pressures in the marketplace that have adversely affected their sales and production. This study investigates the role of AIS in terms of operation support, knowledge support, regulatory support, and the role of KMC, including knowledge acquisition, knowledge transfer, and knowledge utilized to enhance organizational performance in Iraqi SMEs. The target population was managers and owners in SMEs using AIS in Iraq’s cities. A non-probability purposive sampling technique was use
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreObjective(s): The aim of this study is to assess licensed indigenous midwives’ knowledge concerning prevention and
management of postpartum hemorrhage in Baghdad City.
Methodology: A descriptive analytic study is conducted on a purposive "non-probability" sample of one hundred
licensed indigenous midwives who were selected what represents 26% of the target population, during period from
March, 5
th to May, 10th,
2008. The study is conducted at the two settings of Ministry of Health (Baghdad health
directorate in Al-Karhk and Al-Risafa) sector during their annual renewed license for midwifery practice. The
questionnaire form is consisted of three parts which included demographic data, knowledge concerning prevent
The entrance process re-engineering one of the main entrances of administrative and technology appropriate to keep pace with scientific progress and the continuing changes in business environment and for the purpose of achieving the goal sought by the organizations in the pursuit of rapid developments and renewable energy in the market competition by changing its operations and activities of the radical change which contributes to an effective contribution to reducing the cost of product or service taking into account the quality improvement in the management of change to keep the increase value and speed of placing on the market to meet customer needs and desires to achieve a
... Show MoreThe press release plays an important role in understanding and recognizing the policy of governments by the public in managing the state, especially in times of crises, as it helps to clarify the position of the government and its decisions.In addition, it is considered as one of the most important tools of communication between the government and its public at the present time.
In light of the technical developments and adopting modern mechanisms in transferring of what is issued by the government, the press release has been edited and published electronically; and helps in the success of this transfer speed and knowledge of the reactions of the masses towards the implications,In a crisis like the Basrah crisis in particular, the Ira
The purpose of the research is to study the impact of knowledge management (personalization and coding strategy) in achieving strategic excellence in the environment of Iraqi private banks, and the descriptive and analytical research approach has been adopted, so the researcher adopted positive philosophy according to the deductive approach for the purpose of deriving the first research hypothesis from the theoretical side and the research reached a group of The most important results are that the personalization strategy has made great progress in its ability to influence strategic superiority as a responsive variable, as the civil bank departments were successful in employing the changes that occurred in the personalization str
... Show MoreIn view of the huge and speedy development of the information and communications technology sectores which cover all the life aspects. The traditional government started to adopt the Electronic Government Concept to deliver the information, services and product marketing to the beneficiaries through the Internet and Computer system. The E-government became inevitable necessity that should be applied in every country wishes to face the Modern technical development.
E-government is not on alternative of the traditional government but a supporter which can increase its efficiency by keeping away from the routine and Beaurucratic complexity, this will save the efforts, increase achievement and reduce costs, in addition to Provide Man
... Show MoreTwo decades after replacing the OAU, the AU’s record is best measured not by communiqués but by how fast it converts rules into results on the ground. In March 2022, the African Union’s Peace and Security Council (PSC) authorised the transition from AMISOM to ATMIS in Somalia — a reminder that, two decades after the African Union (AU) replaced the Organisation of African Unity (OAU), the Union’s rules are judged by execution, not intent. This article argues that the AU’s legal and institutional redesign shortened the warning‑to‑decision cycle and raised the credibility of enforcement, but performance still hinges on finance, logistics and political will. Where mandates are matched with money, enabling capabilities and enforc
... Show More