Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
A simplified parallel key was presented in this work for the Taxa of Stackys L. wildly grown in Iraq. Three records within this genus were newly recorded to our country in the present work and they are S. kermanshahansis Rech S. setifera C.A. Mey. subsp setifera, S. setifera ssp iranica (Reck.) The characteristics of these new records were also given with some representative specimens.
To evaluate the efficiency and effectiveness of three minimally invasive (MI) techniques in removing deep dentin carious lesions. Forty extracted carious molars were treated by conventional rotary excavation (control), chemomechanical caries removal agent (Brix 3000), ultrasonic abrasion (WOODPECKER, GUILIN, China); and Er, Cr: YSGG laser ablation (BIOLASE San Clemente, CA, USA). The assessments include; the excavation time, DIAGNOdent pen, Raman spectroscopy, Vickers microhardness, and scanning electron microscope combined with energy dispersive X-ray spectroscopy (SEM–EDX). The rotary method recorded the shortest excavation time (p < 0.001), Brix 3000 gel was the slowest. DIAGNOdent pen va
I n vitro rooting plantlets of three sugarcane genotypes(Co.j.64, Co.j.86 and Missan) were cultured in the field after exposed at different doses of gamma rays (1,2,3,4,) kr. Data of reduction percentage on vegetative growth, roots number, length per plant and their diameter were investigated. Results showed gradual reductions in number of shoots, length and diameter as according to increasing of gamma doses. The reduction percentage in shoot number, length were reached 57.86,70.36 % at 4 kr respectively which have mean number and length per plant reached (9.27 and 55.33 cm) as compared with the control treatment ,While 1 kr caused higher percent in diameter reached 9.69 % with mean of diameter per plant reached 2.57 cm. Mean time , Ge
... Show MoreOrganohalosilanes conslitute an important subject ١٦؛ the chemistry oforganosilicon compound؛. Being starting materials and intermediates in the synthesis of a large number of various compounds so it is very important to get such materials in its highest purity ,but the separation of rathylchlorosilanes was still a big^oblem, duet^the great similarity in their physical and chemical properties, making its analysing verydifficult, ^or this reason tteir must be a good method o^e^r^iondealing^ththe^compounds, gas- liquid chromatography proved that it was the best, specially when (m- nitrotoluene) was used as a stationary liquid phase, it gave a complete separation and a good statistical results
Background: Ruptured uterus is a catastrophic event to both
mother and her fetus. Apart from maternal and fetal mortality
rates, the incidence of rupture of uterus is often taken as an
index of the standard of obstetric care.
Objective: To determine the frequency, causes, management
outcome of ruptured uterus at Al Batool maternity hospital.
Method: The study was conducted in the department of
obstetrics and gynecology at Al Batool maternity hospital
Mosul-Iraq over a period of three years from October 1st 2002
to August 30th 2005. All the cases of uterine rupture presented
during the study period were recorded and managed in the
department. Data was recorded on designed forms.
Results: Thirty nine cas
A factorial experiment (2× 3) in randomized complete block design (RCBD) with three replications was conducted to examine the effect of honeycomb selection method using three interplant distances on yield and its components of two cultivars of bean, Bronco and Strike. Interplant distances used were 75× 65 cm, 90× 78 cm, and 105× 91 cm (row× plant) represent short (high plant density), intermediate (intermediate plant density), and wide (low plant density) distance, respectively. Parameters used for selection were number of days from planting to the initiation of first flower, number of nodes formed prior to first flower, and number of main branches. Results showed significant superiority of the Bronco cultivar represented in the number
... Show MoreThis study deals with the elimination of methyl orange (MO) from an aqueous solution by utilizing the 3D electroFenton process in a batch reactor with an anode of porous graphite and a cathode of copper foam in the presence of granular activated carbon (GAC) as a third pole, besides, employing response surface methodology (RSM) in combination with Box-Behnk Design (BBD) for studying the effects of operational conditions, such as current density (3–8 mA/cm2), electrolysis time (10–20 min), and the amount of GAC (1–3 g) on the removal efficiency beside to their interaction. The model was veiled since the value of R2 was high (>0.98) and the current density had the greatest influence on the response. The best removal efficiency (MO Re%)
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show More