Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
This research presents results on the full energy peak efficiency of a high purity germanium (HPGe) detector from point source as a function of photon energy and source-detector distance. The directions of photons emitted from the source and the photon path lengths in the detector were determined by Monte Carlo technique. A major advantage of this technique is the short computation time compared to the experiments. Another advantage is the flexibility for inputting detector-related parameters (such as source–detector distance, detector radius, length and attenuation coefficient) into the algorithm developed, thus making it an easy and flexible method to apply to other detector systems and configurations. It has been designed and writte
... Show MoreIn this paper, the Decomposition method was used to find approximation solutions for a system of linear Fredholm integral equations of the second kind. In this method the solution of a functional equations is considered as the sum of an infinite series usually converging to the solution, and Adomian decomposition method for solving linear and nonlinear integral equations. Finally, numerical examples are prepared to illustrate these considerations.
An analytical approach based on field data was used to determine the strength capacity of large diameter bored type piles. Also the deformations and settlements were evaluated for both vertical and lateral loadings. The analytical predictions are compared to field data obtained from a proto-type test pile used at Tharthar –Tigris canal Bridge. They were found to be with acceptable agreement of 12% deviation.
Following ASTM standards D1143M-07e1,2010, a test schedule of five loading cycles were proposed for vertical loads and series of cyclic loads to simulate horizontal loading .The load test results and analytical data of 1.95
... Show MoreIn this work, the dynamic behavior of discrete models is analyzed with Beverton- Holt function growth . All equilibria are found . The existence and local stability are investigated of all its equilibria.. The optimal harvest strategy is done for the system by using Pontryagin’s maximum principle to solve the optimality problem. Finally numerical simulations are used to solve the optimality problem and to enhance the results of mathematical analysis
Training has an effect on employees’ performances. Accordingly, the person who is responsible for employees’ development must figure out the most effective way to train and develop employees. Central Michigan University (CMU) has recognized the importance of providing appropriate training for employees who have a duty in advising students. The reason is that these employees have a significant impact on students’ educational performances. Thus, special attention to this category of employees is needed to improve advising quality. This research attempted to explore the impact of training on academic advising at CMU. Face-to-face interviews and online surveys were used as data collection tools for this study. The study scope c
... Show MoreThe goal of this paper is to study dynamic behavior of a sporadic model (prey-predator). All fixed points of the model are found. We set the conditions that required to investigate the local stability of all fixed points. The model is extended to an optimal control model. The Pontryagin's maximum principle is used to achieve the optimal solutions. Finally, numerical simulations have been applied to confirm the theoretical results.
The paper comprise comparative palynological study of (11) species belong to the genus Echinops L. in Iraq i.e( E.armatus Boiss. & Hausskn ، E.bicolor Nabelek. ، E.cephalotes DC., E.haussknetchii Boiss. ، E.mosulensis ، Rech. ،
E.nitens Bornm. ، E.orientalis Trautv., E.parviflorous BOISS & BUHSE ،
E.spinossisms Turra . ، E.tenuisectus Rech. ، E.viscosus DC.، Pollen grain were found to be Tricolporate and with spherical shaped ,in polar view the grain found to be Interangular , while in equatorial view the grain found to be ellipsoid .
The cutting transport problem in the drilling operation is very complex because many parameters impact the process, which is nonlinearity interconnected. It is an important factor affecting time, cost and quality of the deviated and horizontal well. The main objective is to evaluate the influence of main drilling Parameters, rheological properties and cuttings that characterise lifting capacity through calculating the minimum flow rate required and cutting bed height and investigate these factors and how they influenced stuck pipe problems in deviated wells for Garraf oil field. The results obtained from simulations using Well Plan™ Software were showed that increasing viscosity depends on other conditions for an increase or dec
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreThe current search aims to identify First: To measure the level of authoritarian personality among the students of the sample as a whole. Second: Measurement of differences in the level of authoritarian personality among students in the middle school according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Third: the level of control site level among the students of the sample as a whole. Ra'aa: Measurement of differences in the level of the control site among junior students according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Fifth: Explain the relationship between the authoritarian personality and the locus of control among the students of the research sample.
... Show More