Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
This paper aims to validate a proposed finite element model to be adopted in predicting displacement and soil stresses of a piled-raft foundation. The proposed model adopts the solid element to simulate the raft, piles, and soil mass. An explicit integration scheme has been used to simulate nonlinear static aspects of the piled-raft foundation and to avoid the computational difficulties associated with the implicit finite element analysis.
The validation process is based on comparing the results of the proposed finite element model with those of a scaled-down experimental work achieved by other researchers. Centrifuge apparatus has been used in the experimental work to generate the required stresses to simulate t
... Show MoreIn the current study, three types of algae namely Tetradesmus nygaardi (MZ801740), Scenedesmus quadricauda (MZ801741) and Coelastrella sp (MZ801742) were extracted by 95% ethanol and hexane against two types of gram positive and two types of gram negative bacteria by wells diffusion methods. Eleven concentrations from the extract of algae (2, 5, 10, 15, 20, 25, 30, 35, 40, 45 and 50 mg/ml) were utilized. It was noticed that ethanolic extraction was more effective than hexane in Scenedesmus quadricauda than the two other mentioned algal species against all pathogenic bacteria, Acintobacter baumanii (ATCC: 19606), Klebsiella pneumonia (ATCC: 13883) Enterococcus faecalis (ATCC: 29212) and Staphylococc
... Show MoreCNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
This study was conducted in a lath house, Dept of Hort. and Landscape, College of Agricultural Engineering Sciences, Univ. During the 2021 growing season, Baghdad will investigate the influence of organic and Biological fertilizers on three Citrus rootstocks' growth and leaf mineral content. The first factor is the addition of liquid organic fertilizers Vit-Org (O) at three levels without addition (O0), soil addition at 10 ml.L-1 (O10) and soil addition at 20 ml.L-1 (O20). The second factor is the addition of nitrogen-fixing bacteria without addition (N1), add 30 ml.Transplant-1 of Azotobacter chroococcum (N2) and add 30 ml.Transplant-1 of Azospirillum brasilemse (N3). The third factor is three citrus rootstocks: sour orange (R1), R
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the
... Show More