Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications through the large database enterprise CRM application and achieving the desired level of security with design and implementation of IT auditing technique. We claim that with this our proposed methods for the CRM applications, we will providing the security, regulations, compliance of such cloud computing environments.
Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show Morestudied, and its important properties and relationship with both closed and open Nano sets were investigated. The new Nano sets were linked to the concept of Nano ideal, the development of nano ideal mildly closed set and it has been studied its properties. In addition to the applied aspect of the research, a sample was taken from patients infected with viral hepatitis, and by examining the infected people and using closed and open (nano mildly. and nano ideal mildly) sets, the important symptoms that constitute the core of this dangerous examining the infected people and using closed and open (nano mildly. and nano ideal mildly) sets, the important symptoms that constitute the core of this dangerous disease.
The present study deals with prepositions in the patterns of analytical unite of modern Russian language out of the functional -semantic aspects, which enhances the lexical semantics. The study, also, sheds light on the prepositions of semantic derivation that adds value to the meaning of the unites, promotes the appearance of new forms that match the more important diverse complex analytical unit.
В статье рассмотрены отыменные предлоги в системе литических единиц русского языка с позиций функционального и семантического аспектов. Репрезентирована специфика функциониров
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha
... Show MoreThe aim of this paper is to introduce and study the notion type of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j = {δ, θ, α, p, s, b, β}.
The Disi water samples were collected from different Disi aquifer wells in Jordan using a clean polyethylene container of 10-liter size. A hyper-pure germanium (HPGe) detector with high- resolution gamma-ray spectroscopy and a low background counting system was used for the identification of unknown gamma-rays emitting from radionuclides in the environmental samples. The ranges of specific activity concentrations of 226Ra and 228Ra in the Disi aquifer water were found to be from 0.302 ± 0.085 to 0.723 ± 0.207 and from 0.047 ± 0.010 to 0.525 ± 0.138 Bq L−1, with average values of 0.516 ± 0.090 and 0.287 ± 0.091 Bq L−1, respectively. The average combined radium (226Ra + 228Ra) activity and radium activity ratio (228Ra/226Ra) in Disi
... Show MoreMany tools and techniques have been recently adopted to develop construction materials that are less harmful and friendlier to the environment. New products can be achieved through the recycling of waste material. Thus, this study aims to use recycled glass bottles as sustainable materials.
Our challenge is to use nano glass powder by the addition or replacement of the weight of the cement for producing concrete with enhanced strength.
A nano recycled glass p
Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
The present study was conducted to investigate the relationship between critical thinking, epistemological beliefs, and learning strategies with the academic performance of high school first-grade male and female students in Yazd. For this purpose, from among all first-grade students, as many as 250 students (130 females and 120 males) were selected by using multistage cluster sampling. The data needed were then collected through using California Critical Thinking Skills Test, Schommer's Epistemological Beliefs Questionnaire, Biggs’ Revised Two Factor Study Process Questionnaire. The findings indicated that there is a positive significant relationship between critical thinking and academic performance and achievement. Moreover, four fa
... Show MoreThe current research aims to identify the problems and needs for both college of political science and college of engineering’s students. The sample was (100) male and female student. The results showed bunch of problems which could be organized descendingly, the scientific domain ranged between (2 - 2.42), the mean of the psychological domain was (2.85), the moral domain ranged between (2.2 – 2.28)m the problems of study earned (2.30), the material domain got (1.95), the medical and social domain obtained (1.925), and finally, the family domain received (1.887).