Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Level of Academic Achievement and its Relationship with Some Characteristics of Female Students at College of Education for Girls in Baghdad University: The Level of Academic Achievement and its Relationship with Some Characteristics of Female Students at College of Education for Girls in Baghdad University
...Show More Authors

 

Abstract

Personality is one of the most important elements that should be developed in university student. Thus, we have to develop the positive traits and neutralize the negative traits of students as well as we have to pay attention to the level of student achievement at the same time, the researcher designed a scale to measure the traits of study sample. The research come out with a number of recommendations and proposals, the most important of which Enhancing the positive characteristics of university students in order to reach them to the level of mature personality with mental health. Enhancing the positive role of the high level of achievement by motivating the stude

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Learning for Scientific Culture by Using Interactive Whiteboard According to the Faculty of the University of Baghdad Viewpoint
...Show More Authors

The progress of science in all its branches and levels made great civilized changes of
our societies in the present day, it's a result of the huge amount of knowledge, the increase of
number of students, and the increase of community awareness proportion of the importance of
education in schools and universities, it became necessary for us as educators to look at
science from another point of view based on the idea of scientific development of curricula
and teaching methods and means of education, and for the studying class environment as a
whole, by computer and internet use in education to the emergence of the term education
technology, which relies on the use of modern technology to provide educational content to<

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
M.M. SJLA’A FA’AQ HASHAM College of Education for women - Baghdad University: M.M. SJLA’A FA’AQ HASHAM College of Education for women - Baghdad University
...Show More Authors

Abstract:
The problem of the research is that the person face in the starting of his
profession life is to go to the right profession that he or she fits in when the
person enter the works sea many problems appear to him on of them is his
non-accordance with his job ,the research targeted to know the levels of the
accordance of the kindergarten teachers and the relation between the
profession accordance and other like the kind of level and the time of service
and the research worked with (150) kindergarten teachers from the
introductory class and (150) kindergarten teachers from the kindergarten class
for the study year 2008-2009 .
The research been made a measure to get the goal of the research after
the

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological Security and Its Relation to Motivation for Achievement of Social Researchers Working in the Courts
...Show More Authors

The research aims to measure the psychological security of social working in the courts, to measure the motivation of achievement for social researchers working in the courts. In addition to, identify the Psychological security and its relation to the motivation of achievement for social researchers working in the courts. To achieve these aims, the researcher adopted two scales: Maslow scale for Psychological security, which was translated to Arabic by Dwany and Dirany 1983 consisted of (75) items. The second scale is Othman scale for achievement motivation 2014 consisted of (24) items. The two scales had been applied to a sample consisted of (100) social researchers working in the courts of Baghdad with its two branches Al-karkh and Al-

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
Neuroquantology
Measuring the Pollution Level with Uranium and Radon in the Soil of Some Areas Inside Baghdad University Campus-AL-Jadiriyah
...Show More Authors

In present study, the technique was used, including nuclear track detector type (CR-39), for appreciative concentrations uranium and radon in soil samples from Baghdad University Campus-AL-Jadiriyah utilizing a prolonged -term with a solid-state nuclear path sensor, a technique for charged particles has been developed., the radon concentrations, effective dose rate and uranium concentrations have measured in soil samples. Eight various venues from soil Baghdad University Campus have appointed. The results indicated variant values about uranium and radon concentrations, the average value for radon gas, effective dose rate and uranium concentrations was found to be 281.59 Bq/cm3, 7.09 mSv/y and 0.01 Bq/mm-2 respectively. All results a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication