The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreWith the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreThe aim of the research is to present and discuss the subject of the budgeting estimates and how to activate the role of the Federal board of supreme audit in examining these estimates through reference to Articles 6 and 10 of the Federal board of supreme Law, which did not restrict Federal board of supreme in Preventive control on examination process for planning which is prepared from the government units, as the result of a large amount of government units Provisions and the weakness of estimates in most of its items, which rely on personal assessment and not based on scientific and logical basis of the estimate, which leads to the emergence of a deficit is not true in the general budget and this seems clear in most Iraq
... Show MoreDue to the increasing interest in the quality of auditing by writers, researchers and regulators of the auditing profession. The matter necessitated a statement of the extent to which the auditor practices professional skepticism, because of its significant impact in discovering errors and material misrepresentations contained in the financial statements in order to give the financial community confidence in them and the success of the audit process. The research aims to clarify the concept and importance of the practice of professional skepticism and its effect on the quality of the auditor's performance in Iraq. To achieve the research objectives, the two re
... Show MoreThis experiment was carried out at the Grdarash field belongs to the Agricultural researches directorate/general Agriculture directorate-Erbil in September (2007)، 27 Arabic lambs aged (5-6 months) With average initial weight (39.178 Kg/lamb) were used. Lambs were divided in to (3) groups (9 lambs/group). Control group was fed on (85% barely، 10% bran and 5% straw)، and second and third groups were fed on various by-product in replacement with barely in loss and block shape respectively.
The total gain of three groups were (392708.32، 634826.52 & 445613.72 ID resp
... Show MoreThis research aims to identify the nutritional status of the individual's relationship to malnutrition using anthropometric measurements such as weight, height and impact on the values ??of the blood study sample included 200 male and 200 female of the inhabitants of the cities of Baghdad and Baquba reviewers Central Mahtbrat
The study aimed to identify the reality of the application of cost accounting system in the contracting institutions in Saudi Arabia, and the extent of the reflection of the application of this system on the effectiveness and efficiency of the general performance of these institutions. Where the research community consists of the contracting institutions operating in the Saudi Arabia, and then a suitable random sample was selected from seventy one institutions. The researchers used the historical method to track the previous studies as well as the descriptive approach to conducting the field study. The study data were analyzed by SPSS statistical program.
The results of this study conclude that there is a
... Show More