Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreThis paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi
... Show MoreAim: To find any association between specific ABO blood groups and FUT2 secretory status and COVID-19 in a sample of Iraqi dentists. Materials and Methods: For each participant, a questionnaire including demography, COVID-19 status, blood grouping, and RH factor, with chemo-sensitive symptoms was recorded. The saliva samples were collected and DNA was extracted from leukocytes. Sequencing of molecular detection of the FUT2 gene by real-time PCR and the data was done, whilst drawing the phylogenetic tree. Results: Out of 133, most of the dentists were female 61%, most were just under 35 years of age. The most participants in this study were predominantly with blood group O (40%), followed by B, A, and AB, with (90%) of them were RH+.
... Show MoreImplementing smart community engagement should consider careful planning and collaboration with numerous stakeholders, including the community. The technology and program must be designed to frame its purpose and should link back to specific goals of implementing smart community engagement. Digital services do not guarantee a smart engagement between the community and the local government. This is the case for the Kubang Pasu local government where several online services have been provided in their attempt to implement the smart community concept. However, understanding on the preferences of features and requirements of existing web-based systems and the impact of these systems is lacking. Therefore, a perception study needs to be condu
... Show MoreThis paper studies the combination of fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. This optimizes the accuracy of the dynamic response and by providing higher level of damping, basically minimizes the wanted stiffness of the structure while at the same time optimizing the achievement.
The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximu
... Show MoreThe goals of endodontic preparation were to shape and clean the space of the root canal and remove microorganisms, affected dentin and pulp, the apical foramen and the canal curve should be protected from being transported during endodontic canal preparation. The aim of this study was to evaluate the curve straightening of curved root canals and apical transportation after preparation with four rotary systems. Forty mesial roots of the lower 1st molars teeth only the mesiobuccal canals were used, these roots were immersed into cold clear acrylic , the teeth roots divided into four groups according to rotary system used for preparation of the canals (ten roots for each group):. group I: ProTaper Next rotary system, group II: IRaCe Plus rotar
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreDigital Models of Elevations (DEMs) Using Surfer 16, which are interpolated to create three-dimensional controls for the entire terrain, are typically used in visualization of geospatial entities. The interpolation method used determines how accurate the resulting terrain model will be, hence it is necessary to compare the effectiveness of various approaches in this situation. Numerous generic interpolation techniques, using inverse distance to a power, triangulation as with linear interpolation, the nearest neighbor, and kriging, have been studied. These interpolation techniques produced DEMs. With the aid of SURFER software 16, the primary goal of this effort was to introduce the DEM using a spatial interpolation method and to pre
... Show MoreManagement is considered as most important resource of the society ones in modern era and an exchange
point in societies’ lives in order to achieve its goals and wishes. So far, management behinds the new
electronic society has become different in shape and nature due to the force of the nature of information
technology that shapes the relationships between the world’s individuals at the national level but it goes
beyond the international ones. The study aims at identifying the impact of the electronic management’s
components upon the improvement of the quality of nursing care in Baghdad’s hospitals. The descriptive
design, with a sample-survey approach, is used as appropriate ones for the field study of social