It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders
... Show MoreAbstract: The utility of DNA sequencing in diagnosing and prognosis of diseases is vital for assessing the risk of genetic disorders, particularly for asymptomatic individuals with a genetic predisposition. Such diagnostic approaches are integral in guiding health and lifestyle decisions and preparing families with the necessary foreknowledge to anticipate potential genetic abnormalities. The present study explores implementing a define-by-run deep learning (DL) model optimized using the Tree-structured Parzen estimator algorithm to enhance the precision of genetic diagnostic tools. Unlike conventional models, the define-by-run model bolsters accuracy through dynamic adaptation to data during the learning process and iterative optimization
... Show MoreArab Food's Security
This study focuses on the writing skill which is a social act .Students need to express
themselves in writing, but students of History and Geography departments are poor in
writing. This study aims at identifying and classifying the errors committed by the
students, and then giving remedies.
Writing can be considered as a channel or as a goal of language learning.
Students learn to write in a foreign language. Writing as a goal basically focuses on
the development of writing skills to fulfill such purposes as note-taking, summarizing,
narrating, reporting and replying required for various real-life situation
(Mechalakelli,2007)
Students at Departments of Geography and History study English as a part of
their
This research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with economic concentration. &n
... Show MoreThe moral aspect is an important one in the structure of personality , and the lack of moral aspect is responsible for what we suffering today from problems . there is no exaggeration to say that many of our current problems are moral problems , and reflects the lack of moral growth.
The goal of research is to build scale in order to detect the level of moral reasoning among junior high school students in Baghdad , The researcher followed the procedures in the construction of scientific standards in order to measur
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe research is exposed to an important issue, related to communication obstacles that prevent the media message contained in cultural topics published in local newspapers to reach the hands of the readers; or related to lack of awareness of aspects of that media message, Because it contains immersed vocabulary in elitism where, sometime, the average reader of the newspaper of medium-sized educated, and even the academic reader are unable to decode it and understand its significance.
After determining the problem of the study and the tools that the researcher wants to use to accomplish his research, a sample of students of college of Arts at the University of Baghdad was selected. As they are clo
... Show MoreThere are a lot of measures for Post Traumatic Stress Disorder (PTSD), but what distinguishes it from other measures is the number of short paragraphs and concise depending on the classification of American Psychiatric Association (APA), which can be applied by the researchers on a large number, Because the Iraqi society suffered from psychological trauma due to wars, conflicts and occupation and the resulting psychological disorders of the members of Iraqi society, especially post-traumatic stress disorder, as mentioned by many studies and researches.
Therefore, the aim of this study was to standardize the PTSD scale for students at Baghdad University. For the Psychologist Fua . E. which was applied in many foreign studies.