Preferred Language
Articles
/
9BYPe4cBVTCNdQwCgFMX
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Application of Emulsion Liquid Membrane Process for Cationic Dye Extraction
...Show More Authors

In the present work studies were carried out to extract a cationic dye (Methylene Blue MB) from an aqueous solution using emulsion liquid membrane process (ELM). The organic phase (membrane phase) consists of Span 80 as emulsifier, sulfuric acid solution as stripping agent and hexane as diluent. 

In this study, important factors influencing the extraction of methylene blue dye were studied. These factors include H2SO4 concentration in the stripping phase, agitation speed in the dye permeation stage, Initial dye concentration and diluent type.

   More than (98%) of Methylene blue dye was extracted at the following conditions: H2SO4 concentration (1.25) M, agitation

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 04 2018
Journal Name
Baghdad Science Journal
Fabricated of Cu Doped ZnO Nanoparticles for Solar Cell Application
...Show More Authors

Copper with different concentrations doped with zinc oxide nanoparticles were prepared from a mixture of zinc acetate and copper acetate with sodium hydroxide in aqueous solution. The structure of the prepared samples was done by X-ray diffraction, atomic force microscopy (AFM) and UV-VIS absorption spectrophotometer. Debye-Scherer formula was used to calculate the size of the prepared samples. The band gap of the nanoparticle ZnO was determined by using UV-VIS optical spectroscopy.

View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The application target cost technique by using reverse engineering: An application study in the general company for vegetable oils industry
...Show More Authors

The Purpose of this study is mainly to improve the competitive position of products economic units using technique target cost and method reverse engineering and through the application of technique and style on one of the public sector companies (general company for vegetable oils) which are important in the detection of prices accepted in the market for items similar products and processing the problem of high cost which attract managerial and technical leadership to the weakness that need to be improved through the introduction of new innovative solutions which make appropriate change to satisfy the needs of consumers in a cheaper way to affect the decisions of private customer to buy , especially of purchase private economic units to

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
International Journal Of Computer Applications
Assessment of Annual Wind Energy Potential at Three Sites in Iraq for Wind Energy Applications
...Show More Authors

Assessment of annual wind energy potential for three selected sites in Iraq has been analyzed in the present work. The wind velocities data from August 2014 to July 2015 were collected from the website of Weather Underground Organization (WUO) at stations elevation (35m, 32m, and 17m) for Baghdad, Najaf, and Kut Al-Hai respectively. Extrapolation of stations elevation and wind velocities was used to estimate wind velocities at (60m, 90m, and 120m). The objectives are to analyze the wind speed data and assess the wind energy potential for wind energy applications. Computer code for MATLAB software has been developed to solve the mathematical model. The results are presented as a monthly and annual average for wind velocities, standard deviat

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Three-Dimensional Microfabrication With Conjugated Polymers
...Show More Authors

In this paper we reported the microfabrication of three-dimensional structures using two-photon polymerization (2PP) in a mixture of MEH-PPV and an acrylic resin. Femtosecond laser operating at 800nm was employed for the two-photon polymerization processes. As a first step in this project we obtained the better composition in order to fabricate microstructers of MEH-PPV in the resin via two-photon polymerzation. Acknowledgement:This research is support by Mazur Group, Harvrad Universirt.

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
A three-stage blumlein-circuit to generate transversely excited atmospheric nitrogen laser by using three spark gaps
...Show More Authors

In this research constructed N2 laser system by use developed method of electric discharge. In this method used four step of electric discharge by using four capacitors, three spark gaps, high tension power supply varying in range from 12kV to 24 kV and three resistors, this method called three stage blumlein circuit. The breakdown time delay of these parallel spark gaps cement strong ultraviolet preionization in the laser channel, thus the result of these amendments the laser output is many doubled and is more increasing than that obtained using the one and two stage blumlein circuits. This system has been designed and operated to give pulse laser with wavelength at 337.1 nm. This laser system can operate without mirrors and optical res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref