Preferred Language
Articles
/
BRgr0pcBVTCNdQwCYain
A business continuity-based framework for risk management in smart supply chains: a fuzzy multi-criteria decision-making approach
...Show More Authors

The aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disruptive events and the selection of appropriate risk treatment plans. Moreover, the framework leverages a fuzzy reasoning system in conjunction with a multi-criteria decision-making method to process ambiguous information, thereby enhancing decision accuracy and reliability. The findings demonstrate that this comprehensive approach not only prioritizes risks effectively but also supports companies in refining their response strategies, ensuring the efficient delivery of services under challenging conditions. Ultimately, the study redefines resilience as a dynamic process of navigating and adapting to chaos rather than merely resisting it.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Creative accounting practices for supply contracts and the role of internal audit in reducing them: An exploratory study on a sample of industrial companies in Iraq
...Show More Authors

Abstract:

                The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.

A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Construction Research Congress
Risk Perception of Construction Personnel: A Social Construct Outlook
...Show More Authors

Scopus (1)
Scopus
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
The Ecological Risk Assessment of Mercury Contamination in a Mangrove Ecosystem of the Segara Anakan Cilacap, Indonesia
...Show More Authors

Ecological risk assessment of mercury contaminant has a means to analyze the ecological risk aspect of ecosystem using the potential impact of mercury pollution in soil, water and organism. The ecological risk assessment in a coastal area can be shown by mangrove zonation, clustering and interpolation of mercury accumulation. This research aims to analyze ecological risk assessment of potential mercury (including bioaccumulation and translocation) using indicators of species distribution, clustering, zonation and interpolation of mercury accumulation. The results showed that the Segara Anakan had a high risk of mercury pollution, using indicators like as the potential of mercury contaminant in water body was 0137±0.0137 ppm, substrate a

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Value at risk simulation in a fixed return stock portfolio using the Monte Carlo simulation model The concept of a bond portfolio
...Show More Authors

This research aims to predict the value of the maximum daily loss that the fixed-return securities portfolio may suffer in Qatar National Bank - Syria, and for this purpose data were collected for risk factors that affect the value of the portfolio represented by the time structure of interest rates in the United States of America over the extended period Between 2017 and 2018, in addition to data related to the composition of the bonds portfolio of Qatar National Bank of Syria in 2017, And then employing Monte Carlo simulation models to predict the maximum loss that may be exposed to this portfolio in the future. The results of the Monte Carlo simulation showed the possibility of decreasing the value at risk in the future due to the dec

... Show More
View Publication Preview PDF