Preferred Language
Articles
/
PxaYuocBVTCNdQwCFF-3
Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment
...Show More Authors

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management information system decision on sensitive data in cloud.   

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
Optimizing Task Scheduling and Resource Allocation in Computing Environments using Metaheuristic Methods
...Show More Authors

Optimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue May 06 2025
Journal Name
Aip Conference Proceedings
Enhance the performance of the wind turbine blade based on the blade element momentum theory
...Show More Authors

In order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PATTERN OF INVESTMENT PROJECTS IN THE INVESTMENT ENVIRONMENT: PATTERN OF INVESTMENT PROJECTS IN THE INVESTMENT ENVIRONMENT
...Show More Authors

That the building of the national economy depends on the extent of the possibility of transition from the rent economy seeking to increase GDP (GDP1), and the tendency to manage projects with external sources of funding, or allow projects with foreign capital is a necessity. The strategic challenges faced by the economy in countries that have experience in investment projects have faced several factors internal and external for a period of time and not a few and the pressures and difficulties and failures have affected in one way or another on the development work in that country. On this basis, the stakeholders have a role to pay attention to the issue of the feasibility of the pattern of foreign investment in the investment environment

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Comparison study of Information Criteria to determine the order of Autoregressive models
...Show More Authors

بهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Iraqi Woman Political situation in Quota Framework after 2003
...Show More Authors

Abstract Since 2003. Iraq has begun a new phase in its modern history, which was after a long period of tyranny, repression of freedom of expression, and women were no better off than men; they suffered marginalization and exclusion, but after the fall of the former regime and the adoption of a parliamentary system of government, The level of participation in the government; where it approved the share of women in the legislative authority called "quota" which reflects the legislative level of a certain proportion of the seats in Parliament, amounting to 25%, and this is approved by the Iraqi constitution for 2005. But it is noticeable that women in parliament did not work within the quota; in other words they belonged to the pol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

The use of destructive weapons in wars without restrictions and controls, which eat green and dry land, pollute the environment and cause genocide, has become the problem of the times.

International conventions for the protection of the environment during armed conflicts are characterized by generality, ambiguity, and open to interpretation by the participating states in the agreement, and each state interprets these texts to serve its interests, but the Islamic Sharia stipulates the prohibition of the use of these comprehensive destructive weapons in an unambiguous manner, As stated in the Holy Quran:

                

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

Research summary

Islam protects the environment and civilians in peace and war, and in international humanitarian law protection of the environment and civilians in international conflicts only. As for wars and internal conflicts, it is not within the jurisdiction of international humanitarian law. In Islamic law, the principles of protecting the environment and civilians are fixed in all wars and conflicts, whether internal or external, local. or international.

Islam laid down moral principles in war, including:

- Preserving the environment and avoiding corruption in the land by burning trees and killing animals unnecessarily.

- Not to be exposed to non-combatants, including women, boys, the elderly, the disa

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
The Journal Of Law Research
Ensuring the right to private property within the framework of the imposition of the arraat tax
...Show More Authors

AHA Al-Hilali, AAH Hamid, The Journal of Law Research, 2022

Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Flexible handover solution for vehicular ad-hoc networks based on software defined networking and fog computing
...Show More Authors

<p>Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and

... Show More
View Publication
Scopus (14)
Crossref (8)
Scopus Crossref