Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
The Makhoul Dam project proposed to be established is considered one of the strategic projects in Iraq as it works to insurance large quantity of water spare in flood seasons, increase the storage capacity of the dams in Iraq, as well as increase food security. The Makhool Dam is located on Tigris River in Salah al-Din Governorate, and 8 km south of the meeting point of the Tigris River with the Lower Zab River. The lake area is about 256 km2. In this research, a mathematical model was prepared by using HEC-RAS Two Dimension Software to analyze the velocity patterns and water depths inside makhool dam reservoir at the highest operational water elevation, based on the designs prepared
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreIn this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreSocial networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques
... Show MoreThe issue of peace, renunciation of violence, and acceptance of the other is one of the vital issues that rose to the top of the list of priorities at the end of the last century and the beginning of the new millennium of the conscience of the Iraqi people by spreading the culture of peace. In this context, we seek during this research to identify the concept of the culture of peace and its impact on sustainable development, and to draw a set of results and suggestions to consolidate this culture in our Iraqi society as an obligation of sustainable development.
The Albian Carbonate-clastic succession in the present study is represented by the Mauddud and Nahr Umr formations were deposited during the Albian stage within the Wasia Group More than 200 thin sections of cores and cuttings in addition to well logs data for Nahr Umr and Mauddud formations from 4 boreholes within two oil fields (Ba-4, Ba-8, Ns-2 and Ns-4) were used to interpret the different associations facies as well as the facies architectures to describe the sedimentary framework of the basin and development the petrophysical properties. Seven major microfacies were diagnosed in the carbonate succession of the Mauddud Formation, while the Nar Umr Formation includes five lithofacies; their grain types characteristic and deposit
... Show MoreBackground Parkinson’s disease (PD) is currently the fastest-growing neurological disorder in the world. Patients with PD face numerous challenges in managing their chronic condition, particularly in countries with scarce healthcare infrastructure. Objective This qualitative study aimed to delve into neurologists’ perspectives on challenges and gaps in the Iraqi healthcare system that influence the management of PD, as well as strategies to mitigate these obstacles. Method Semi-structured interviews were conducted with neurologists from five different Iraqi provinces, working in both hospitals and private neurology clinics, between November 2024 and January 2025. A thematic analysis approach was employed to identify the main challenge
... Show More