Preferred Language
Articles
/
9BYPe4cBVTCNdQwCgFMX
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Enhancing national security through foreseeing the economic intelligence system in Iraq
...Show More Authors

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Role of Tabuk University in Intellectual Education for Students in the Light of the Requirements of Enhancing the Intellectual Security
...Show More Authors

The study aims to identify the degree of Tabuk University practices to raise the intellectual awareness of students through scientific research, as well as to identify the degree of Tabuk University practicing to raise the intellectual awareness through the educational process (faculty member – activities). The study also seeks to identify the degree of Tabuk University practicing to raise the intellectual awareness of students through community service and university media. The study is descriptive in nature that employed the questionnaire as a tool in collecting data. Total of (540) students were chosen randomly from different colleges at universities of Tabuk to form the study sample. The results showed that faculty member has pract

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 19 2022
Journal Name
Mathematical Statistician And Engineering Applications (msea)
Application of TOPSIS method for Multi-Criteria Decision Making for poultry fields By using GIS in Hilla district
...Show More Authors

Statistical methods and statistical decisions making were used to arrange and analyze the primary data to get norms which are used with Geographic Information Systems (GIS) and spatial analysis programs to identify the animals production and poultry units in strategic nutrition channels, also the priorities of food insecurity through the local production and import when there is no capacity for production. The poultry production is one of the most important commodities that satisfy human body protein requirements, also the most important criteria to measure the development and prosperity of nations. The poultry fields of Babylon Governorate are located in Abi Ghareg and Al_Kifil centers according to many criteria or factors such as the popu

... Show More
Publication Date
Sun Dec 22 2024
Journal Name
Misan Journal For Physical Education Sciences
The impact of three models of training load on the development of the maximum strength for elite boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Apr 02 2019
Journal Name
Artificial Intelligence Research
A three-stage learning algorithm for deep multilayer perceptron with effective weight initialisation based on sparse auto-encoder
...Show More Authors

A three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Implication of Yield Lines Theory in Method Three of the ACI Code for Two-Way Reinforced Concrete Slabs
...Show More Authors
Abstract<p>Reinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o</p> ... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 24 2021
Journal Name
Iraqi Journal Of Science
Production of a Three-Dimensional Triangulated Irregular Network (3D TIN) for Al-Karkh University of Science, Baghdad- Iraq
...Show More Authors

Many satellite systems take cover images like QuickBird for terrain so that these images scan be used to construct 3D models likes Triangulated Irregular Network (TIN), and Digital Elevation Model (DEM). This paper presents a production of 3D TIN for Al-Karkh University of Science in Baghdad - Iraq using QuickBird image data with pixel resolution of 0.6 m. The recent generations of high-resolution satellite imaging systems open a new era of digital mapping and earth observation. It provides not only multi-spectral and high-resolution data but also the capability for stereo mapping. The result of this study is a production of 3D satellite images of the university by merging 1 m DEM with satellite image for ROI using ArcGIS package Version

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Three Locally Clays as A Surfaces for Adsorption of Cephalexin Monohydrate From Aqueous Solution: Thermodynamic and Desorption Equilibrium
...Show More Authors

    The  adsorption of cephalexin.H2O from aqueous solution on attapulgite, bentonite and kaolin has been studied at the human body temperature (37.5ËšC) and at 5, 27, 47ËšC in 0.1M hydrochloric acid (pH 1.2). The value of pH 1.2 has been chosen to simulate the pH of stomach fluid. The clays show the following order: Bentonite > attapulgite > kaolin, for their activity to adsorb cephalexin.H2O. The charged clay particles can attract molecules either by electrostatic forces, for the molecules of oppositely charged, or by inducing dipole formation in the neutral molecule. The L-shaped adsorption isotherm indicated that drug molecules arrangement in a flat geometry on the clay surface. The

... Show More
View Publication Preview PDF
Crossref (1)
Crossref