It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreA field study aimed at identifying the reality of the application of strategic management in the colleges of education/ University of Baghdad. The research adopted the descriptive analytical approach. The research community, consisting of 801 faculty teachers, has been identified. The research sample was selected in a simple random way and represented 15% of the research community, totalling 124 teaching members. A questionnaire was constructed that included (46) items divided between areas (strategic objectives, strategy planning and formulation, implementation of the strategy, and evaluation of the strategy). The honesty and consistency of the tool was verified. The researcher analyzed the research data using SPSS. The most important resu
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
YouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair
... Show MoreDuring the last two decades at least, increased interest in Social attraction variable by scientists in psychology and sociology, to multi-dimensional and its association with psychological and emotional variables , and what are of importance in the process of human communication , leadership, and social relations.
Social psychologists interested in social attraction also so its relation with social influence , political and occupational .
"Social attraction defined as "individual ability functioned his skills in at
Abstract
This research was to provide a definition of quality, dimensions and concepts, whether traditional or modern concept, as well as review the dimensions of quality in higher education and vision and mission with the overall objectives of the Statistics Department.
After reviewing quality goals and purposes achieved as well as the mechanisms used to achieve them. and use standard Six-Sigma as one of the methodologies used in quality with the historical roots of using this methodology and methods applied and their definitions t
... Show MoreHot-wire cutting is one of the important, non-traditional thermomechanical way to cut polymer, usually expanded foam and extruded foam, in low volume manufacturing. The study and analysis of Hot-Wire cutting parameters play an important role to enhance the quality and accuracy of the process and products. The effects on the surface have been investigated by using experimental tests designed according to the Taguchi orthogonal array (OA). In this study, four parameters with five levels for each parameter have been used: [temperature of wire (A) (100, 120, 130, 150, 160) °C], [diameter of wire (B) (0.3,0.4,0.5,0.7,0.8) mm], [velocity of cutting (C) (200, 300,400,500,600) mm/min], [and density of foam (D) (0.01,0.0
... Show More