It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
This study aims to explore the impact of the interaction of the university leadership and the university organizational environment on the performance level of the staff at Al-Maaqal university. This university was chosen as a field of study because it is a new university and needs studies that develops and contributes to improve its overall performance. The problem defined by the following question: to what extent does the interaction of the university leadership and the university organizational environment affect the performance level of the teaching staff at AlMaaqal University?). The method of this study adopted a major hypothesis in which there is a statistically significant effect of university leadership and university environment o
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThe aimed of the research was recognize the Big five personality factors and Academic procrastination among Baghdad university students, recognized differences between the gender according to Big five personality factors and Academic procrastination , to recognized differences between specialization (scientific, human), and to recognize the relationship Between the variables of the research, and the extend of contribution Big five personality factors in Academic procrastination , to achieve these aims , Adopt scale to measure the Big five personality factors for (John Danahue & Kentle) , As we as the preparation of scale Based on An amber of previous scales to measure Academic procrastination, After processing the data st
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreBACKGROUND: COVID-19 is resulted from severe acute respiratory syndrome coronavirus 2, which initiated in China in December 2019. Parasites are efficient immune modulators because their ability to stimulate an immune response in infected persons. AIM: This study aims to detect if there is a probable relationship between intestinal parasitic infections and COVID-19. METHODS: Ninety patients consulted at Al-Kindy Teaching Hospital (Al-Shifa center) from October 2020 till April 2021, confirmed infection with COVID-19 by PCR. Stool examination was done for detecting intestinal parasites. RESULTS: From 90 patients, males were 63 (70%), with median age 32 years, while females were 27 (30%), with age 24–44 years. Asymptomatic pati
... Show MoreReservoir permeability plays a crucial role in characterizing reservoirs and predicting the present and future production of hydrocarbon reservoirs. Data logging is a good tool for assessing the entire oil well section's continuous permeability curve. Nuclear magnetic resonance logging measurements are minimally influenced by lithology and offer significant benefits in interpreting permeability. The Schlumberger-Doll-Research model utilizes nuclear magnetic resonance logging, which accurately estimates permeability values. The approach of this investigation is to apply artificial neural networks and core data to predict permeability in wells without a nuclear magnetic resonance log. The Schlumberger-Doll-Research permeability is use
... Show MoreThe cement industry is considered one of the strategic industries, because it is directly related to construction work and cement is used as a hydraulic binder. However, it is a simple industry compared to major industries and depends on the availability of the necessary raw materials. This study focuses on optimizing and coordinating the location of raw materials needed for the cement manufacturing in Wasit Governorate in Iraq. Field works include detailed reconnaissance, topographic work, and description and sampling of 24 lithological sections that represent the carbonate deposits, which crop out in the area. The investigated area has the following specifications: The weighted aver