Preferred Language
Articles
/
9BYPe4cBVTCNdQwCgFMX
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of King Saud University - Science
Three iterative methods for solving second order nonlinear ODEs arising in physics
...Show More Authors

View Publication
Crossref (17)
Crossref
Publication Date
Sat Jan 15 2022
Journal Name
Mest Journal
SMARTPHONE APPLICATION FOR MANAGING MISSED AND FOUND BELONGINGS
...Show More Authors

Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the p

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimating and Analyzing Food Security Indicators in Selected Arab Countries for the Period (1996 - 2012)
...Show More Authors

        The study hypothesize that the majority of Arab countries  show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The Bifurcation Analysis of Food Web Prey- Predator Model with Toxin
...Show More Authors
Abstract<p>Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point <italic>E</italic> <sub>0</sub>, and it revealed the existence of saddle-node bifurcation occurred at equilibrium points <italic>E</italic> <sub>1</sub>, <italic>E</italic> <sub>2</sub> and <italic>E</italic> <sub>3</sub>. At any point, the occurrence of bifurcation of the pitch for</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
An Electronic and Web-Based Authentication, Identification, and Logging Management System
...Show More Authors

The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Behavior of asymmetrical castellated composite girders by gap in steel web
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Finite Element Analysis of Reinforced Concrete T-Beams with Multiple Web Openings under Impact Loading
...Show More Authors

In this study, a three-dimensional finite element analysis using ANSYS 12.1 program had been employed to simulate simply supported reinforced concrete (RC) T-beams with multiple web circular openings subjected to an impact loading. Three design parameters were considered, including size, location and number of the web openings. Twelve models of simply supported RC T-beams were subjected to one point of transient (impact) loading at mid span. Beams were simulated and analysis results were obtained in terms of mid span deflection-time histories and compared with the results of the solid reference one. The maximum mid span deflection is an important index for evaluating damage levels of the RC beams subjected to impact loading. Three experi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Finite Element Investigation on Shear Lag in Composite Concrete-Steel Beams with Web Openings
...Show More Authors

In this paper, effective slab width for the composite beams is investigated with special emphasis on the effect of web openings. A three dimensional finite element analysis, by using finite element code ANSYS, is employed to investigate shear lag phenomenon and the resulting effective slab width adopted in the classical T-beam approach. According to case studies and comparison with limitations and rules stipulated by different standards and codes of practice it is found that web openings presence and panel proportion are the most critical factors affecting effective slab width, whereas concrete slab thickness and steel beam depth are less significant. The presence of web opening reduces effective slab width by about 21%.

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Optimum conditions for ascorbic acid determination in three Iraqi citrus using HPLC technique
...Show More Authors

A high-performance liquid chromatography method was employed for the quantitative determination of ascorbic acid (AA) which called vitamin C in three types of Iraqi citrus (orange mandarin and aurantium ) and to establish this goal , evaluation of ascorbic acid degradation is so important due to its significant criticality when exposure to ordinary atmospheric conditions. The chromatographic analysis of AA was carried out after their sequential elution with KH2PO4 ( as mobile phase) by reverse-phase HPLC technique with C8 column and UV detection at 214 nm. .Bad resolutions was appeared clearly for C8 column , so another alternative condition were carried out to improve the resolution by replacement of C8 by C18 column .Statistical treat

... Show More
View Publication Preview PDF
Crossref