Preferred Language
Articles
/
9BYPe4cBVTCNdQwCgFMX
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving the Performance of Construction Project Information and Communication Management Using Web-Based Project Management Systems (WPMSs)
...Show More Authors

This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
Application of WDR Technique with different Wavelet Codecs for Image Compression
...Show More Authors

FG Mohammed, HM Al-Dabbas, Iraqi journal of science, 2018 - Cited by 6

View Publication
Scopus (10)
Scopus
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Design of L-Band Multiwavelength Laser for TDM/WDM PON Application
...Show More Authors

This paper presents on the design of L-Band Multiwavelength laser for Hybrid Time Division Multiplexing/ Wavelength Division Multiplexing (TDM/WDM) Passive Optical Network (PON) application. In this design, an L-band Mulltiwavelength Laser is designed as the downstream signals for TDM/WDM PON. The downstream signals ranging from 1569.865 nm to 1581.973 nm with 100GHz spacing. The multiwavelength laser is designed using OptiSystem software and it is integrated into a TDM/WDM PON that is also designed using OptiSystem simulation software. By adapting multiwavelength fiber laser into a TDM/WDM network, a simple and low-cost downstream signal is proposed. From the simulation design, it is found that the proposed design is suitable to be used

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Evaluation of FEMM software for magnetic analysis of the magnetorheological application
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Requirements for the Application of IFRS 17 in the Iraqi Environment
...Show More Authors

This research aims to address the most recent international standard in the field of insurance contracts, the International Financial Reporting Standard (IFRS17) and the theoretical framework of the standard in addition to the most important characteristics of the standard (IFRS17), as well as to identify the paragraphs of the modern standard, with the challenges its application in general and the use of the approach (inputs - operations - outputs) to present the challenges of its application in the Iraqi environment and specifically in the environment of Iraqi insurance sector companies (government), the research is based on the main premise that the identification of the requirements for the application of the International Fin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Enhancement of vanadium oxide doped Eu+3 for gas sensor application
...Show More Authors

Thin films of vanadium oxide nanoparticles doped with different concentrations of europium oxide (2, 4, 6, and 8) wt % are deposited on glass and Si substrates with orientation (111) utilizing by pulsed laser deposition technique using Nd:YAG laser that has a wavelength of 1064 nm, average frequency of 6 Hz and pulse duration of 10 ns. The films were annealed in air at 300 °C for two hours, then the structural, morphological and optical properties are characterized using x-ray diffraction (XRD), Field emission scanning electron microscopy (FESEM) and UV-Vis spectroscopy respectively. The X-ray diffraction results of V2O5:Eu2O3 exhibit that the film has apolycrystalline monoclinic V2O5 and triclinic V4O7 phases. The FESEM image shows a h

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Apr 09 2022
Journal Name
Engineering, Technology & Applied Science Research
A Semi-Empirical Equation based on the Strut-and-Tie Model for the Shear Strength Prediction of Deep Beams with Multiple Large Web Openings
...Show More Authors

The behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u

... Show More
View Publication
Scopus (6)
Crossref (8)
Scopus Crossref