It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is
... Show More1. Anti-social behavior Baghdad University students.
2. Know the differences in anti's social behavior according to gender, specialization.
3. Know-the need for love at Bagdad University students.
4. Know the relationship between anti-social behavior and the need to love.
The research sample consisted of (100) students, the researcher numbers tools to measure anti behavior and the need to love.
The results showed that college students have an anti-social behavior is weak and they need to love and there is no correlation between them Function relationship. Researcher has shown a number of recommendations and proposals.
The research aimed: 1. Definition of family climate for the university students. 2. Definition of statistical significance of differences in family climate variable depending on the sex (males - females) and specialization (Scientific - humanity). 3. Definition of academic adjustment for university students. 4. Definition of correlation between climate and academic adjustment. The research sample formed of (300) male and female students by (150) male of scientific and humanitarian specialization and (150) female of scientific and humanitarian specialization randomly selected from the research community. To achieve the objectives of the research the researcher prepared a tool to measure family climate. And adopted the measure (Azzam 2010)
... Show MoreThe goal of current research is marked "student services for the university student at the Faculty of Education for Girls at Baghdad University in light of the overall quality indicators)" to identify the relative importance of the availability of student services offered by the College of Education at the University of Baghdad, from the viewpoint of the students. The research was Aaguetdy followers researcher Find descriptive approach to suitability research topic and in order to achieve the purposes of research, the researcher designed questionnaire examined consisted of (18) items and has been questionnaire on arbitrators and experts to verify the validity and reliability that's been applied to the questionnaire on a group of students
... Show MoreQuantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreBackground: zirconium (Zr) implants are known for having an aesthetically pleasing tooth-like colour Unlike the grey cervical collar that develops over time when titanium (Ti) implants are used in thin gingival biotypes. However, the surface qualities of Zr implants can be further improved. This present study examined using thermal vapour deposition (TVD) to coat Zr implants with germanium (Ge) to improve its physical and chemical characteristics and enhance soft and hard tissue responses. Materials and methods: Zr discs were divided into two groups; the uncoated (control) group was only grit-blasted with alumina particles while the coated (experimental) group was grit-blasted then coated with Ge via TVD. Field emission scanning ele
... Show MoreBackground: Tooth wear is one of the most common problems in the older dentate population which results from the interaction of three processes (attrition, abrasion and erosion) and it affects all societies, different age groups, and all cultures. This study was achieved to evaluate the prevalence and distribution of tooth wear among institutionalized residents in Baghdad city\ Iraq. Subjects and Methods: This survey was accomplished on four private and one governmental institution in Baghdad city. One-hundred twenty three (61 males, 62 females) aged 50-89 years were participated in this study. The diagnosis and recording of tooth wear were according to criteria of Smith and Knight. Results: The prevalence of tooth wear was 100% with a mean
... Show MoreWell integrity is a vital feature that should be upheld into the lifespan of the well, and one constituent of which casing, necessity to be capable to endure all the interior and outside loads. The casing, through its two basic essentials: casing design and casing depth adjustment, are fundamental to a unique wellbore that plays an important role in well integrity. Casing set depths are determined based on fracturing pressure and pore pressure in the well and can usually be obtained from well-specific information. Based on the analyzes using the improved techniques in this study, the following special proposition can be projected: The selection of the first class and materials must be done correctly and accurately in accordance with
... Show MoreWell integrity is a vital feature that should be upheld into the lifespan of the well, and one constituent of which casing, necessity to be capable to endure all the interior and outside loads. The casing, through its two basic essentials: casing design and casing depth adjustment, are fundamental to a unique wellbore that plays an important role in well integrity. Casing set depths are determined based on fracturing pressure and pore pressure in the well and can usually be obtained from well-specific information. Based on the analyzes using the improved techniques in this study, the following special proposition can be projected: The selection of the first class and materials must be done correctly and accurately in accordance with the
... Show More