Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
The researcher wanted to make an attempt to identify the foundations of social solidarity, to strengthen the bonds of brotherhood among society, and spread the causes of compassion in the hearts of its members.
The researcher has taken a short course in the hearts of the beloved to hearts.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreIn this study, the sonochemical degradation of phenol in water was investigated using two types of ultrasonic wave generators; 20 kHz ultrasonic processor and 40 kHz ultrasonic cleaner bath. Mineralization rates were determined as a function of phenol concentration, contact time, pH, power density, and type of ultrasonic generator. Results revealed that sonochemical degradation of the phenol conversion was enhanced at increased applied power densities and acidic conditions. At 10 mg/L initial concentration of phenol, pH 7, and applied power density of 3000 W/L, the maximum removal efficiency of phenol was 93% using ultrasonic processor at 2h contact time. Whereby, it was 87% using and ultrasonic cleaner bath at 16h contact time and 150 W
... Show MoreThe field experiment was conducted with the aim of developing and testing an automatic sprayer for agricultural spray experiments and studying the effect of spray pressure, spray speed and spray height on the spraying process. The effects of the major spraying factors (pressure, speed, and height) on the spraying performance of the automatic sprayer were studied. This study included several traits: First - the drop sizes - Second - the penetration of the spray into the vegetation cover - Third, the spray wasted. The results showed: - First: - Increase in coverage percentage when using the first speed, 2 km / h, which amounted to 26.85%. An increment in the spraying penetration of the vegetation cover was observed at the second speed
... Show MoreA Pap test can identify the pre-cancerous and cancerous problem in the vagina and uterine cervix. Cervical tumour is the easiest gynecologic disease to be diagnosed, treated and prevented using regular screening tests and follow-up. This review aimed to explore the opinion of specialists about cytological changes and the precancerous lesions with Pap smear test and visual inspection of the cervices, also to determine the relationship of this malignancy with demographic characteristics of patients. Results showed that few cervical cancer and pre-cancer were with women in postmenopausal period, but more were with women in the premenopausal period. Visual inspection of the cervix can show erosion lesions by gross inspection. Upon cytology exam
... Show MoreThe Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreStructural, optical, and electrical properties of thin films of CdS : Zn prepared by the solution – growth technique are reported as a function of zinc concentration. CdS are window layers influencing the photovoltaic response of CIS solar cells. The zinc doping concentration was varied from 0.05 to 0.5 wt %, zinc doping apparently increase the band gap and lowers the resistivity. All beneficial optical properties of chemically deposited CdS thin films for application as window material in heterojunction optoelectronic devices are retained. Heat treatment in air at 400 °C for 1h modify crystalline structure, optical, and electrical properties of solution growth deposited CdS : Zn films.
Some cases of common fixed point theory for classes of generalized nonexpansive maps are studied. Also, we show that the Picard-Mann scheme can be employed to approximate the unique solution of a mixed-type Volterra-Fredholm functional nonlinear integral equation.