Preferred Language
Articles
/
9BYPe4cBVTCNdQwCgFMX
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 31 2025
Journal Name
Iraqi Journal For Computers And Informatics
Discussion on techniques of data cleaning, user identification, and session identification phases of web usage mining from 2000 to 2022
...Show More Authors

The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Three Dimensional MHD Simulationof Comet Hale-Bopp Tail
...Show More Authors

The interaction between comet Hale-Bopp tail with the solar wind is investigated in the present paper using magneto-hydrodynamic (MHD) numerical simulation, which accounts for the presence of the interplanetary magnetic field (IMF). The simulation is based on three-dimensional Lax-Wendroff explicit scheme, providing second-order accuracy in space and time. The ions produced from the nucleus of the comet will add considerable effects on the microstructure of the solar wind, thus severely altering its physical properties. The present simulation focuses on careful analysis of these properties by means of simulating the behavior of the comet Hale-Bopp’s tail at 1 AU from the sun. These properties include the changes of the plasma density,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 17 2020
Journal Name
College Of Islamic Sciences
Human values and principles in the three religions
...Show More Authors

The laws of the three religions tend to extend the rules and foundations of coexistence, and this is achieved in achieving the values and principles that these laws have nourished in all societies.

Our research deals with a major problem that has broken out in our societies, namely (disturbing the balance of values and behavioral standard between people), and perhaps one of the greatest causes of the problem is to move away from the correct divine discourse and sound approach, as well as corruption of common sense and the violation of its rules and found principles in the hearts of people.

 

 

 

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The dropping of three zeroes from Iraqi dinar
...Show More Authors

           The purpose of this research is to explain the effect of the dropping of three zeroes from Iraqi dinar on the basic role of the dinar and derivative and dynamic in transaction of Iraqi economic. the importance of this research comes from the effect of this operation on the evaluation of the exchange between the individuals of Iraqi society and the other between the Iraqi individuals and the foreign whom use the Iraqi dinar as a tool for exchange also the effect of the operation on the reserves of the Iraqi dinar the results of this research are as the following:-

1-the operation of dropping of zeroes must be associated with increase of the sharing of economic sectors wi

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Web Camera Enet to Measure Statistical Characteristic of Homogenous Target Illuminated by Different Tungsten Light
...Show More Authors

The effect of White Place Image ( Test Image )  A4   has been studied as a function of luminous intensity using the  t tu un ng gs st te en n    l la am mpp and web camera enet. It was found that the tungsten lamp gives almost even intensities for the three color band and  lighting composite at low voltage .while at high voltage causes a fare from each other .  The statistical characteristic(mean and stander deviation ) results for three colors composites RGB and lighting  composites L showed that the mean and stander deviation increases with the increase of voltage possibly owing to the increase image  resolution, which reflects the value of  stander deviation for the blue band

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Journal Of Engineering
Effect of Web Stiffeners on The Flexural Behavior of Composite GFRP- Concrete ‎Beam Under Impact Load
...Show More Authors

In this paper, numerical and experimental studies on the elastic behavior of glass fiber reinforced ‎polymer (GFRP) with stiffeners in the GFRP section's web (to prevent local buckling) are presented. ‎The GFRP profiles‎ were connected to the concrete deck slab by shear connectors. Two full-scale simply supported ‎composite beams (with and without stiffeners) were tested under impact load (three-point load) to ‎assess its structural response. The results ‎proved that the maximum impact force, maximum ‎deflection, damping time, and ‎damping ratio of the composite beam were affected by the GFRP ‎stiffeners‎. The experimental results indicated that the damping ratio and deflection were diminished compare

... Show More
View Publication Preview PDF
Crossref (13)
Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Civil Engineering Journal
Strength and Serviceability of Reinforced Concrete Deep Beams with Large Web Openings Created in Shear Spans
...Show More Authors

Deep beams are used in wide construction fields such as water tanks, foundations, and girders in multi-story buildings to provide certain areas free of columns. In practice it is quite often occurring to create web opening in deep beams to supply convenient passage of ventilation ducts, cable channels, gas and water pipes. Experimental studies of ten 10 deep beams were carried out, where two of them are control specimens without openings and eight with large web openings in the shear spans. The variables that have been adopted are the ratio of the shear span to the overall depth of the member cross-section, location and dimensions of the opening. Test results showed that there was a decrease in the load carrying capacity of deep bea

... Show More
Crossref (7)
Clarivate Crossref