It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
This study examines patterns of exposure of Iraqi university students to selective daily Iraqi newspapers and the motives of this exposure, as well as its associated factors that affect the average exposure. It tries to answer several questions, including those related to the levels of exposure of Iraqi university students to daily Iraqi newspapers and classification of patterns of selective exposure to daily Iraqi newspapers and the most prominent Iraqi daily newspapers that are selectively exposed by Iraqi university students. It also examines the motives of this selective exposure and factors that increase the degree of exposure to the daily Iraqi newspapers, and the most prominent stages in which Iraqi university students find their
... Show MoreQuantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
Abstract
The current study aims to identify the resilience of university students, as well as identify the differences in resilience according to the variable of gender and specialization. The research sample consisted of (382) students studying at Baghdad University. To measure Resilience, a questionnaire of (48) items was designed to collect the needed data. The results showed that the students of the University of Baghdad possess resilience. There are no differences in resilience according to gender and specialization.
Background: zirconium (Zr) implants are known for having an aesthetically pleasing tooth-like colour Unlike the grey cervical collar that develops over time when titanium (Ti) implants are used in thin gingival biotypes. However, the surface qualities of Zr implants can be further improved. This present study examined using thermal vapour deposition (TVD) to coat Zr implants with germanium (Ge) to improve its physical and chemical characteristics and enhance soft and hard tissue responses. Materials and methods: Zr discs were divided into two groups; the uncoated (control) group was only grit-blasted with alumina particles while the coated (experimental) group was grit-blasted then coated with Ge via TVD. Field emission scanning ele
... Show MoreThis article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show MoreBackground: The therapeutic goal of orthodontic treatment is to establish ideal occlusion which includes both static and functional aspects. The objective of this study was to clarify functional occlusal treatment goals by analyzing functional occlusion in subjects with established normal occlusion and identify the differences between canine protected occlusion and group function occlusion. Materials and Methods: The sample consisted of 62 subjects with normal occlusion and with an age range of (18-25 years).Functional occlusal contacts during lateral excursion were identified on a fully adjustable articulator, and then the samples were classified according to: 1) Type of functional occlusion: A) Canine protected occlusion group (canine pr
... Show MoreCommunication is one of the main elements of culture, it is the source of its formation and a factor of its development and spread. Communication is a 'dynamic' cultural process and is an integral part of the political, social, economic and cultural aspects of people. Therefore, mass communication means help in the course and movement of individuals and cultural communities. The relationship between media and culture according to this perspective is one of many key factors and influential forces that make it coherent and sometimes intertwined. It is a problematic relationship that leads to research and study in order to lay the right foundations in the orientation towards the audience.
Mass communication has many basic functions.
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is
... Show More