Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
The research aims to design an electronic program that allows users to assess the possibility of different practices for projects management professional according to the PMBOK methodology)) and using the requirements Data mentioned in the "knowledge and experience in project management Evaluation guide" issued by the professional Institute of project management According to the results of this program will be electronic The possible classification of project management in terms of both (proficiency_ perform tasks) as less than the desired level or within or above average in terms of best practices, and finally a number of recommendations to overcome the possible shortcomings. The most important is the need to enrich the service
... Show MoreSoil water use and water storage vary by vegetative management practices, and these practices affect land productivity and hydrologic processes. This study investigated the effects of agroforestry buffers (AB), grass buffers (GB), and biofuel crops (BC), relative to row crops (RC) on soil water use for a claypan soil in northern Missouri, USA. The experiment located at the Greenley Memorial Research Center included RC, AB, GB, and BC established in 1991, 1997, 1997, and 2012, respectively. Soil water reflectometer sensors installed at 5‐, 10‐, 20‐, and 40‐cm depths monitored soil water from April to November in 2017 and 2018. Results showed significant differences in weekly volumetric water content (VWC) among treatments for all fou
... Show MoreRandom matrix theory is used to study the chaotic properties in nuclear energy spectrum of the 24Mg nucleus. The excitation energies (which are the main object of this study) are obtained via performing shell model calculations using the OXBASH computer code together with an effective interaction of Wildenthal (W) in the isospin formalism. The 24Mg nucleus is assumed to have an inert 16O core with 8 nucleons (4protons and 4neutrons) move in the 1d5/2, 2s1/2 and 1d3/2 orbitals. The spectral fluctuations are studied by two statistical measures: the nearest neighb
AHA Al-Hilali, AAH Hamid, The Journal of Law Research, 2022
Abstract
The labeled research deal with (Entrepreneurship Organizations In the framework of strategic leadership practices: Field research in the Ministry of Oil), Search over the possibility of the influence of the practices of strategic leadership Which include
(Determine the strategic direction, The discovery of the fundamental estimators and maintain it, The development of the human capital, and Maintaining of an organizational culture influential, and Find a balanced regulatory Control) In a Entrepreneurship in its dimensions and its (innovation, risk, pre-emptive and independence) On group of heads of departments and authorities
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More