It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Background: Saliva is a specific bio-fluid with important biomarkers. Analyzing any alternation in these markers could give valuable information, in relation to oral health status parameters. The aim of this study was to investigate the level of α -amylase in unstimulated whole saliva of healthy, primary school children in relation to some oral health parameters. Materials and Methods: A questionnaires consisted of demography and medical histories of participants were filled by children families. Saliva samples were collected for 5- minutes between 9:00 -11:00 AM from 114 healthy students aged 6-13 years, divided into four age groups. Flow- rate, Plaque and Gingival Index were assessed and dentition status was investigated by DMFT/dmft
... Show More
The current research aims to identify the perceptual speed of the university students as well as to identify the differences in the level of perceptual speed for the university students according to the variables of (male, female) specialization (scientific, human) university (Baghdad, Mustansiriya). Additionally, the research aims to identify the prevalence of emotional pattern and to identify the relationship between perceptual speed and the emotional patterns among university students. The researcher designed a questionnaire to measure the Emotional Patterns based on Jerome Freedman perspective. As for perceptual speed, the researcher adopted French, Extrom and Price scale (1963), which was tran
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreImage Fusion Using A Convolutional Neural Network
This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
New series of metal ions complexes have been prepared from the new ligand 1,5- Dimethyl-4- (5-oxohexan-2- ylideneamino) -2-phenyl- 1H-pyrazol-3 (2H)-one derived from 2,5-hexandione and 4-aminophenazone. Then, its V(IV), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) complexes prepared. The compounds have been characterized by FT-IR, UV-Vis, mass and 1H and 13C-NMR spectra, TGA curve, magnetic moment, elemental microanalyses (C.H.N.O.), chloride containing, Atomic absorption and molar conductance. Hyper Chem-8 program has been used to predict structural geometries of compounds in gas phase, the heat of formation, (binding, total and electronic energy) and dipole moment at 298 K.
A problem of solid waste became in the present day common global problem among all countries, whether developing or developed countries, and can say that no country in the world today is immuning from this dilemma which must find appropriate solutions. The problem has reached a stage that can not ignore or delay, but has became a daily problem occupies the minds of ecologists, economists and politicians took occupies center front in the lists of priorities for the countries in terms of finding solutions to the rapid scientific and radical them. and that transport costs constitute an important component of total costs borne by the municipal districts in the process of disposal of solid waste, so any improvement in the
... Show MoreThe increasing efficiency of the telecommunications network in the city contributes to the increase in spatial interaction between activities (to influence and mutual influence) This study is based on the idea that the upgrading of telephone services provided to citizens are done exclusively through the growth and development of all levels of the service using advanced technologies to know the problems and appropriate solutions in short time and less cost. Thus, crystallized the objectives of the study which was built for the importance of GIS in the planning of services in general, and infrastructure services, in particular, including telephone services, which is represent a point of contact between individuals on the one hand a
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show More