Preferred Language
Articles
/
9BYPe4cBVTCNdQwCgFMX
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Speaking Truth to Power: Core Principles for Advancing International Journalism Education
...Show More Authors

A confluence of forces has brought journalism and journalism education to a precipice. The rise of fascism, the advance of digital technology, and the erosion of the economic foundation of news media are disrupting journalism and mass communication (JMC) around the world. Combined with the increasingly globalized nature of journalism and media, these forces are posing extraordinary challenges to and opportunities for journalism and media education. This essay outlines 10 core principles to guide and reinvigorate international JMC education. We offer a concluding principle for JMC education as a foundation for the general education of college students.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 06 2019
Journal Name
College Of Physical Education And Sports Science
(M.H) electronic system for goalkeepers
...Show More Authors

Publication Date
Wed Nov 01 2023
Journal Name
College Of Physical Education And Sports Science
Electronic shorts for the disabled
...Show More Authors

Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Dielectric Waveguide for Composite Materials
...Show More Authors

The Maxwell equations have been formulated for a composite slab waveguide at x-band wave propagation. The eigenvalues of the system equations are obtained by using MATLAB program. These eigenvalues are used to obtain the wave propagation constant and a number of modes inside the slabs. A good correspondence was seen between the number of modes and the cut off thickness. The parameter that affects the performance of waveguide is the slab thickness. The propagation constant is usually adopted to characterize this type of waveguide and show how the cutoff frequency of the mode in the slab is increased dramatically by decreasing the frequency.
Our study focused on lower modes, the results for the transmission coefficient are then used to

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Test anxiety for intermediate level
...Show More Authors

Test anxiety for intermediate level The current study aims to measure the test anxiety of research’s sample and to identify the statistical differences of test anxiety, considering two variables gender and students classes level (first and third intermediate class). To do this, a stratified random sampling of (300) student from first and third intermediate classes had selected from both the karkh and Rusafa sides of Baghdad province for the academic year 2015-2016. The author tested the whole sample by using the test anxiety scale that had tested for its validity and reliability. The results revealed that the research’s sample as a whole was suffering from test anxiety, there were a statistical differences between male and female tha

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Image Segmentation for Skin Detection
...Show More Authors

Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon Jan 01 2007
Journal Name
Iraqi Journal Of Science
Adaptive methods for matching problem
...Show More Authors

In this paper, we deal with the problem of general matching of two images one of them has experienced geometrical transformations, to find the correspondence between two images. We develop the invariant moments for traditional techniques (moments of inertia) with new approach to enhance the performance for these methods. We test various projections directional moments, to extract the difference between Block Distance Moment (BDM) and evaluate their reliability. Three adaptive strategies are shown for projections directional moments, that are raster (vertical and horizontal) projection, Fan-Bean projection and new projection procedure that is the square projection method. Our paper started with the description of a new algorithm that is low

... Show More
Publication Date
Thu Feb 17 2022
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Periodical split for the groups
...Show More Authors

View Publication
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref