Preferred Language
Articles
/
joe-1330
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
International Journal Of Hydrogen Energy
A comprehensive review of battery thermal management systems for electric vehicles: Enhancing performance, sustainability, and future trends
...Show More Authors

View Publication
Scopus (37)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
The dialectical relationship between the organization's growth and its value under the framework of the diversification strategy
...Show More Authors

The research is conducted on target of investigating the role of growth strategy via diversification in value maximization of a firm in terms of controversies literatures had witnessed. Using a descriptive approach for analyzing and verifying the harmony of variables of research and their conceptualized logic , it could be reached to many conclusions agreed in their essence upon that the related diversification has the major role in value maximization of a firm and the wealth of its owners .                       

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Journal Of Computational Innovation And Analytics (jcia)
PERFORMANCE MEASURE OF MULTIPLE-CHANNEL QUEUEING SYSTEMS WITH IMPRECISE DATA USING GRADED MEAN INTEGRATION FOR TRAPEZOIDAL AND HEXAGONAL FUZZY NUMBERS
...Show More Authors

In this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Bayesian methods to estimate the failure probability for electronic systems in case the life time data are not available
...Show More Authors

In this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company.  The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system.  This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system.  We calculate the range for each estimator by using the Maximum Likelihood estimator.  We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after  it checked by the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Evolution and set up the maps for solar radiation of Iraq using Data observation and Angstrom model during monthly July2017
...Show More Authors
Abstract<p>The development that solar energy will have in the next years needs a reliable estimation of available solar energy resources. Several empirical models have been developed to calculate global solar radiation using various parameters such as extraterrestrial radiation, sunshine hours, albedo, maximum temperature, mean temperature, soil temperature, relative humidity, cloudiness, evaporation, total perceptible water, number of rainy days, and altitude and latitude. In present work i) First part has been calculated solar radiation from the daily values of the hours of sun duration using Angstrom model over the Iraq for at July 2017. The second part has been mapping the distribution of so</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of big data analytics in measuring and analyzing the quality costs of economic units : applied research in the Iraqi company for seed production
...Show More Authors

                The research aims to explain the role of huge data analyzes in measuring quality costs in the Iraqi company for the production of seed, and the research problem was diagnosed with the weakness of the approved method to measure quality costs, and the weak traditional systems of data analyzes, the researcher in the theoretical aspect relied on collecting sources and previous studies, as well as Adoption of the applied analytical approach in the practical aspect, as a set of financial analyzes were applied within the measurement of quality costs and a statement of the role of data analyzes in the practical side, the research concluded to a set of conc

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
The Journal Of Contemporary Issues In Business And Government
The Role of Servant Leadership in Developing Management Information Systems
...Show More Authors

The research aims to test the impact of servant leadership in management information systems, as well as to identify the level of servant leadership practice and management information systems in the Directorate of Communications and Information Systems in the Iraqi Ministry of Interior, in terms of the importance of the research variables to the directorate and the sample community, as the research adopted the exploratory analytical descriptive approach In his achievement, through a survey of the opinions of an intended quota sample of (266) individuals, By adopting the questionnaire as a main tool for data collection that includes (44) items divided into the two research variables, As well as conducting open interviews to identify the pro

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
Transformation in International Polar System: Study of the future of the nonpolar system
...Show More Authors

The study of the future of the international system currently appears, according to scientific data and existing facts in light of the emergence of international actors from non-states and international informal institutions, to be heading towards a non-polarity system and this trend is fueled by many variables to reduce polarity, and it is expected in the future that the international system will turn into a non-polarity.

 

View Publication Preview PDF
Crossref