Preferred Language
Articles
/
joe-1330
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Oct 20 2010
Journal Name
The International Journal Of Advanced Manufacturing Technology
Finite element modeling and simulation of proposed design magneto-rheological valve
...Show More Authors

Magneto-rheological (MR) valve is one of the devices generally used to control the speed of Hydraulic actuator of MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. A mathematical model for the MR valve is developed and the simulation is carried out to evaluate the newly developed MR valve. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMMR). The model dimensions of MR valve, material properties are taken into account. The results of analysis are presented in terms of magnetic strength H and magnetic flux density B. The simulation results based on the proposed model indicate that the ef

... Show More
View Publication
Scopus (37)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Thesis
Design and Implementation proposed Encoding and Hiding Text in an Image
...Show More Authors

NAA Mustafa, University of Sulaimani, Ms. c Thesis, 2010 - Cited by 4

View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Computers & Electrical Engineering
A new proposed statistical feature extraction method in speech emotion recognition
...Show More Authors

View Publication
Scopus (42)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sat Jan 19 2019
Journal Name
Iraqi Journal Of Agricultural Sciences
EVALUATION MANAGEMENT BROILER PRODUCTION PROJECTS AT BAGHDAD PROVINCE USING MANAGEMENT CRITERIA
...Show More Authors

This research aims were to evaluate management of broiler production projects in Baghdad province via using the criteria of management, included production index and economic figure (PI and EF) that specified to those projects. in addition to criteria of economic efficiency also applied (INME) index number of management efficiency, in order to the research requirements, data were obtained based on a questionnaire prepared for this purpose, which was collected by personal interview of (60) projects of the broiler production projects from (516) projects representing 11.6% of the research community in Baghdad province  in 2016. The results show that mean of PI and EF was (338). The increase in these two criteria is generally due to co

... Show More
View Publication
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Trends of University Professors towards the Role of Social Networking Websites in Shaping Public Opinion about the Security Crises
...Show More Authors

Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Role of the Arab oil to the achievement of Economic security in the Arab: The Role of the Arab oil to the achievement of Economic security in the Arab
...Show More Authors

Abstract:
This research aims to the importance of oil in achieving economic
security in the Arab. Oil is not an ordinary subject and returns it significance to
the followings:
1. The importance of skipping a source of energy.
2. The importance of oil as raw material for petrochemical industry.
3. The importance of the oil sector as an area of foreign investment
4. The importance of oil in the marketing activities, transport, insurance
and various services
In addition to the importance of oil in general and the Arab oil has
additional strategic advantages such as geographic location, And the
magnitude of reserves and production of heavy investment costs are relatively
simple, And the ability to meet the

... Show More
View Publication Preview PDF