Preferred Language
Articles
/
9BYPe4cBVTCNdQwCgFMX
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 29 2023
Journal Name
Iraqi Journal Of Agricultural Sciences
ROLE OF ORGANIC FERTILIZER AND BORON FOLIAR APPLICATION ON GROWTH AND PRODUCTIVITY OF POTATO FOR PROCESSING
...Show More Authors

This research was carried out at University of Baghdad - College of Agricultural Engineering Sciences during the fall season of 2020 and spring season of 2021 in order to evaluate the effect of organic fertilizer and the foliar application of boron on the growth and yield of industrial potatoes (Solanum tuberosum L.). Using factorial experiment (5*4) within Randomized Complete Block Design  with three replicates, the organic fertilizer (palm fronds peat) was applied at four levels (0, 12, 24, and 36 ton ha-1) in addition to the treatment of the recommended of chemical fertilizer. The foliar application of Boron was applied at four concentrations which were 0, 100, 150 and 200 mg (H3Bo3). L-1. The results Revealed a significant incr

... Show More
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Computer Model Application for Sorting and Grading Citrus Aurantium Using Image Processing and Artificial Neural Network
...Show More Authors
Abstract<p>This study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Construction of New Ion Selective Electrodes for Determination Fe(III) and Their Application in Pharmaceutical samples
...Show More Authors

Liquid membrane electrodes for the determination iron(III) were constructed based on chloramphenicol sodium succinate and iron(III) CPSS-Fe(III) as ion pair complex, with four plasticizers Di-butyl phosphate (DBP); Di-butyl phthalate (DBPH); Di-octyl phthalate (DOP); Tri-butyl phosphate (TBP); in PVC matrix . These electrodes give Nernstian and sub-Nernstian slopes (19.79, 24.60, 16.01 and 13.82mV/decade) and linear ranges from (1x10-5-1x10-2 M, 1x10-5-1x10-2 M, 1x10-6-1x10-2 M and 1x10-5-1x10-2 M) respectively. The best electrode was based on DBP plasticizer which gave a slope 19.79 mV/decade, correlation coefficient 0.9999, detection limit of 9×10-6 M, lifetime 37 day displayed good stability and reproducibility and used to determine

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 03 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
Application of the One-Step Second-Derivative Method for Solving the Transient Distribution in Markov Chain
...Show More Authors

Markov chains are an application of stochastic models in operation research, helping the analysis and optimization of processes with random events and transitions. The method that will be deployed to obtain the transient solution to a Markov chain problem is an important part of this process. The present paper introduces a novel Ordinary Differential Equation (ODE) approach to solve the Markov chain problem. The probability distribution of a continuous-time Markov chain with an infinitesimal generator at a given time is considered, which is a resulting solution of the Chapman-Kolmogorov differential equation. This study presents a one-step second-derivative method with better accuracy in solving the first-order Initial Value Problem

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 11 2016
Journal Name
Journal Of Materials Science: Materials In Electronics
Electrochemical deposition of CdSe-sensitized TiO2 nanotube arrays with enhanced photoelectrochemical performance for solar cell application
...Show More Authors

View Publication
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Sep 18 2025
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The Water Footprint and Virtual Water and Their Effect on Food Security in Iraq
...Show More Authors
Abstract<p>The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
PART 3 New Experiments Three Factors On The Box plot, Box notch & Outlier Values
...Show More Authors

New two experiments of the three factors, in this study were constructed to investigate the effects, of the fixed variations to the box plot on subjects' judgments of the box lengths. These two experiments were constructed as an extension to the group B experiments, the ratio experiments the experiments with two variables carried out previously by Hussin, M.M. (1989, 2006, 2007). The first experiment box notch experiment, and the second experiment outlier values experiment. Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box lengths and

... Show More
View Publication Preview PDF
Crossref