Preferred Language
Articles
/
MRc0vpIBVTCNdQwCUb8p
Law and its influential role for strategic leadership in managing security crises in Iraq
...Show More Authors

Scopus
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Mon Dec 22 2025
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Non-newtonian Fluid Mechanics
On the stability of the BEK family of rotating boundary-layer flows for power-law fluids
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
The Iraqi Journal For Information And Documentation Studies
The role and importance of scientific research in creating new knowledge and its impact on developing the cognitive capabilities of information and librarians and their Employees
...Show More Authors

The research aims at identifying the importance of scientific research for researchers and in creating new knowledge، development and utilization of mental and cognitive energies and developed them with the ability to research، extrapolation، meditation and then conclusion. The information was collected by interviewing the Secretary-General of the Central Library and by distributing questionnaire forms to the (33) teaching staff of the College of Higher Education. The responses of the society were analyzed the result and the recommendations were the most important 1. Information specialist and all employees of the administrators and technicians in the centers of information sources (libraries) and in the field are considered scientific r

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Polymorphism study of MTHFR 677C?T and its correlation with oxidative stress and their influence on female infertility in Erbil – Iraq
...Show More Authors

This research includes a study of Methylenetetrahydrofolate reductase gene’s allele 677C?T and its correlation with oxidative stress and their impact on female infertility. Fifty infertile women with the range age (23-42) years and twenty five fertile women with the range age (22-39) years as control group living in Erbil city were selected. The serum level of Malondialdehyde (MDA), superoxide dismutase (SOD), prolactin hormone (PRL), Luteinizing hormone (LH), Thyroid stimulating hormone (TSH), Triiodothyronine hormone (T3), and Thyroxine hormone (T4) were measured, also a body mass index (BMI) was calculated. A restriction enzyme (Hinf1) was used to improve the mutation in DNA bands of infertile women. The results showed significant inc

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sat Feb 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
Insects Infestation for Plants of Fabaceae in Different Areas in Iraq
...Show More Authors
Abstract<p>In this study, 191 specimens of insects that infect species of the Fabaceae family, including: <italic>Pisum sativum</italic> L. (1753), <italic>Lens esculenta</italic> Moench (1794) and <italic>Vigna unguiculata</italic> subsp. <italic>sesquipedalis</italic> (L.) Verdc. (1763), <italic>Vicia faba</italic> L. (1753), <italic>Phaseolus vulgaris</italic> L. (1753), <italic>Medicago sativa</italic> L. (1753), <italic>Trifolium campestre</italic> Schreb. (1804), were collected from four governorates: Baghdad, Karbala, Wasit, and Anbar. Four orders, five families, 17 species belonging to 10 genera have been ide</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Sources of income subject to tax in the Iraqi Income Tax Law No.113 of 1982
...Show More Authors

The tax is a financial amount collected from the taxpayer for the account of the public treasury.. and is the cornerstone of the close bond between members of the community and the country in which they live , as income tax is imposed on the profits and revenues achieved by people and often the constitution of most contemporary countries stipulate that the legislator is obligated to determine the sources of revenues and profits subjected to tax. Because the tax has a serious impact on people’s money because it is exposed to that money through direct deduction . Therefore, we note that the applicable income Tax Law stipulated that in order income to be subject to tax , it must be derived from one or more of the income sources st

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref