Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Review Of International Geographical Education
Application of strategic management in the colleges of Education / University of Baghdad
...Show More Authors

A field study aimed at identifying the reality of the application of strategic management in the colleges of education/ University of Baghdad. The research adopted the descriptive analytical approach. The research community, consisting of 801 faculty teachers, has been identified. The research sample was selected in a simple random way and represented 15% of the research community, totalling 124 teaching members. A questionnaire was constructed that included (46) items divided between areas (strategic objectives, strategy planning and formulation, implementation of the strategy, and evaluation of the strategy). The honesty and consistency of the tool was verified. The researcher analyzed the research data using SPSS. The most important resu

... Show More
Preview PDF
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Aug 20 2020
Journal Name
Arab World English Journal
Investigating the Effectiveness of YouTube as a Learning Tool among EFL Students at Baghdad University
...Show More Authors

YouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
Social attraction among Baghdad University Teaching Staff
...Show More Authors

During the last two decades at least, increased interest in Social attraction  variable by scientists  in psychology and sociology, to multi-dimensional and its association with psychological  and emotional variables , and what are of importance in the process of human communication , leadership, and social relations.

Social psychologists interested   in social attraction also  so its relation with  social influence , political and occupational  .
"Social attraction defined as "individual ability  functioned his skills in at

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using Six-Sigma to measure the quality performance of the Department of Statistics-University of Baghdad-Case Study
...Show More Authors

Abstract

            This research was to provide a definition of quality, dimensions and concepts, whether traditional or modern concept, as well as review the dimensions of quality in higher education and vision and mission with the overall objectives of the Statistics Department.

         After reviewing quality goals and purposes achieved as well as the mechanisms used to achieve them. and use standard Six-Sigma as one of the methodologies used in quality with the historical roots of using this methodology and methods applied and their definitions t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 22 2019
Journal Name
Al-khwarizmi Engineering Journal
Optimizing the Parameters of Hot-wire CNC Machine to Enhance the Cutting of Plastic Foam
...Show More Authors

     Hot-wire cutting is one of the important, non-traditional thermomechanical way to cut polymer, usually expanded foam and extruded foam, in low volume manufacturing. The study and analysis of Hot-Wire cutting parameters play an important role to enhance the quality and accuracy of the process and products. The effects on the surface have been investigated by using experimental tests designed according to the Taguchi orthogonal array (OA). In this study, four parameters with five levels for each parameter have been used: [temperature of wire (A) (100, 120, 130, 150, 160) °C], [diameter of wire (B) (0.3,0.4,0.5,0.7,0.8) mm], [velocity of cutting (C) (200, 300,400,500,600) mm/min], [and density of foam (D) (0.01,0.0

... Show More
View Publication Preview PDF