Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreMeasuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese
... Show MoreThe international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
The operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.
In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of drought, normal flow, and during floods. Moreover, the cases of hypothetical op
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP
... Show MoreIn the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational
... Show MoreIn this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
In the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational
... Show MoreThe investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .
&nb
... Show More