Preferred Language
Articles
/
Wxe0UJEBVTCNdQwCFpQo
Efficient Private Cloud Resources Platform
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
New Spectrophotometric Estimation and Cloud Point Extraction of Cefdinir
...Show More Authors

A sensitive spectrophotometric method was developed for the estimation of cefdinir (CFD), a cephalosporin species. This study involves two methods, and the first method includes the preparing of azo dye by the reaction of CFD diazonium salt with 4-Tert-Butylphenol (4-TBP) and 2-Naphthol (2-NPT) in alkaline medium, which shows colored dyes measured at λmax 490 and 535 nm, respectively. Beer's law was obeyed along the concentration range of (3-100) μg.ml-1. The limits of detection were 0.246, 0.447 μg.ml-1 and molar absorptivities were 0.6129×104, 0.3361×104 L.mol-1cm-1 for (CFD-4-TBP) and (CFD-2-NPT), respectively. The second method includes preconcentration for cefdinir dyes by using cloud point extraction in the presence of Triton

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Cloud Manufacturing framework for controlling and monitoring of machines
...Show More Authors

Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.

In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: Oil production, Depletion resources, Generations rights, Norway experience, Sustainable development.
...Show More Authors

 

Abstract

      Oil is the most important natural resources in Iraq and represents the goal to others as well as Iraqi people. It is gift from God to all Iraqi people now and future. So we must maintain it and invest its revenue that achieve development in country and ensure the next generations' rights in it without external costs or negative externalities from extracted and invested it.

    The most problems that we attempt to solve by this research are the exhausted, environmental degradation and theft from next generation that produced with oil contracts between Iraq and foreign companies. From here was th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Employ the Knowledge Accumulation of Human Resources in Strategic Performance
...Show More Authors

The main purpose of this research is to diagnose the role of the Knowledge Accumulation of Human Resources KAHR in Strategic Performance SP, and for that, the research was applied to the represented sample by the administrative leaders consisting of (108) individuals distributed according to their positions and the organizational structure of the ministry. Correlations, effects, and benefits from generalizing the results in the field of research. The research involved a mixed-methods approach through two stages. During the first stage, the researcher gathered quantitative data from a questionnaire. The second stage gathered qualitative data to explore the survey results more deeply by conducting individual interviews with a sub-sample of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Merger strategy on human resources management practices
...Show More Authors

The current research aims to test the impact of the strategy of merger (as an explanatory variable) in human resources management practices (as a response variable), and the importance of the subject being an important topic that mimics the Iraqi environment, where has seen many mergers that have not been addressed by former researchers in the field. In addition, the future prospects carry many mergers, and the problem of research was the lack of understanding among departments in how to manage the integration and deal with it, on the basis of scientific which reflected negatively on the practices of human resources management, and the research was based on two main hypotheses Six sub-hypotheses emerge to explore the correlation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Role of ERP Systems in Improving Human Resources Management Processes
...Show More Authors

This study investigates the role of Enterprise Resources Planning (ERP) systems in improving human resources management (HRM) processes. The rapid environmental changes led to increased demand on the ERP systems, which have changed the manual effort to technology-based processes, providing solutions focusing on the integration of all departments to achieve goals for the entire organization. HRM processes are mainly made up of two classes: strategic and operational HRM. An ERP system works to integrate both of them, making HRM processes more efficient, effective and feasible to provide support to the organization as a whole (inside and outside). In this article, a modest framework is proposed to describe HRM process integrity in relation to

... Show More
Scopus (7)
Scopus