Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
This study deals with a prominent critical term - poetics - in critical studies as an area related to uncovering the laws of creative and aesthetic discourses (Preaching)، and the various functions that accompany it in literary texts. So، the study employs the pioneers' works of this theory specially the eastern theorists in making a parallel comparing study of the text book of " the Magic and Poetry” by Al-Lisan Al-Din bin Al-Khatib (776 AH). It displays the utility of the concept of poetics in the referred book pointing to the illumination of various functions that، in turn، reflected the
Abstract:Leukemia is a cancer of early blood forming cells. Most of them are cancers of white blood cells , however some leukemias start in other blood cell types.Electrolytes have modulatory effects on several biological mechanisms in the body namely as stabilizers,element of structures, essential element for hormonal function and also co-factors for a number of enzymes.In this study serum electrolytes levels were measured in patients with acute leukemia (AL) disorders before and after chemotherapy(anthracycline, doxorubicin, cytarabine ,prednisone, vincristine and doxorubicin) during one month and compared with that of control group. Blood samples were obtained from (43) patients (28 males and 15 females) aged (15-55)years;juset before an
... Show MoreThe Wheat husk is one of the common wastes abundantly available in the Middle East countries especially in Iraq. The present study aimed to evaluate the Wheat husk as low cost material, eco-friendly adsorbents for the removal of the carcinogenic dye (Congo red dye) from wastewater by investigate the effect of, at different conditions such as, pH(3-10), amount of adsorbents (1-2.3gm/L),and particle size (125-1000) μm, initial Congo red dye concentration(10, 25 , 50 and 75mg/l) by batch experiments. The results showed that the removal percentage of dye increased with increasing adsorbent dosage, and decreasing particle size. The maximum removal and uptake reached (91%) , 21.5mg/g, respectively for 25 initial concent
... Show MoreResearch aimed to explore the Application Effect of the Conflict Management Strategies by the managements to solve conflict between and inside the conflicted parties within (IGEC) to increase the productivity of the workers. To collect data, 110 questioners had been distributed among managers and heads of departments of all managerial levels, 102 answered questioners regained, 5 of them were disqualify for statistical analytic, only 97 were taking in consideration for statistical analysis presenting 93% of the retained number.
SPSS Program supported with a group of statistical tools, had been used for analysis purposes such as Kronbach Alpha test to assure the validity & stability of the t
... Show MoreGhrelin and leptin are hunger hormones related to type 2 diabetes mellitus (T2DM), and the pathogenesis of T2DM is the abnormality in insulin secretion and insulin resistance (IR). The aim of this study is to evaluate ghrelin and leptin concentrations in blood and to specify the relationship of these hormones as dependent variables with some biochemical and clinical measurements in T2DM patients. In this study, forty one T2DM and forty three non-diabetes mellitus (non-DM) subjects, aged between 40-60 years and with normal weight, were enrolled. Fasting serum ghrelin and leptin were estimated by enzyme-linked immunosorbent assay (ELISA). In our results ghrelin was significantly increased, and leptin was significantly decreased, in T2DM pa
... Show MoreAzo-Schiff base compounds (L1 and L2) have been synthesized from the reaction of m-hydroxy benzoic acid with 1,5-dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethylimino]-2-phenyl-2,3- dihydro-1H-pyrazol-4-ylamine and with 3-[2-(1H-indol-3-yl)-ethylimino]-1,5-dimethyl-2-phenyl- 2,3-dihydro-1H-pyrazol-4-ylamine. The free ligands and their complexes were characterized based on elemental analysis, determination of metal, molar conductivity, (1H, 13C) NMR, UV–vis, FT-IR, mass spectra and thermal analysis (TGA). The molar conductance data revealed that all the complexes are non-electrolytes. The study of complex formation via molar ratio in DMF solution has been investigated and results were consistent to those found in the solid complexes with a rat
... Show MoreAbstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show MoreCorruption has become the subject of great interest, and the subject of research and scrutiny in recent years, because of its penetration in all fields of life, whether these fields are political, economic, social, and administrative. It is one of the biggest challenges and problems that are facing communities. Therefore, this study is focused on the evaluation of measures implementing the national strategy to combat corruption in Iraq.
This study was launched, first because of its intellectual dimensions to ensure a conceptual presentation of the strategy and operational management in general with a special focus on the processes of implementation and control str
... Show MoreValues and ideals are two basic pillars in human life, and high societies have been keen throughout their ages to adhere to and establish them so that man can distinguish good and evil, right and wrong, as they are a balance of actions that give man a higher value. Many of the followers of Abbasid literature, poetry and prose – it is noted that many imams and writers have been keen to highlight these values and make them material for their poetry and literature, courage, generosity, chastity and....All meanings of human values and there is no doubt that one of the texts abounding in this field is what was reported from the people of the house of infallibility pure (peace be upon them), including we touch it in the visit of Imam Jaafar al-
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More