Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security
...Show More Authors

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Microscopic calculations of the electric Quadrupole transition strengths of Be isotopes (9, 10, 12, 14)
...Show More Authors

Electric Quadrupole transitions are calculated for beryllium isotopes (9, 10, 12 and 14). Calculations with configuration mixing shell model usually under estimate the measured E2 transition strength. Although the consideration of a large basis no core shell model with 2ℏtruncations for 9,10,12 and14 where all major shells s, p, sd are used, fail to describe the measured reduced transition strength without normalizing the matrix elements with effective charges to compensate for the discarded space. Instead of using constant effective charges, excitations out of major shell space are taken into account through a microscopic theory which allows particle–hole excitations from the core and model space orbits to all higher orbits

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 13 2023
Journal Name
World Academy Of Sciences Journal
Potential effects of miR‑146 expression in relation to malondialdehyde as a biomarker for oxidative damage in patients with breast cancer
...Show More Authors

View Publication
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Dec 27 2020
Journal Name
Journal Of The College Of Education For Women
Digital Citizenship and its Relationship to the Level of Health Awareness of Corona Virus (Covid-19) among a Sample of Palestinian University Students: محمود عبد المجيد عساف
...Show More Authors

The study aims to identify the degree of appreciation for the level of digital citizenship of a sample of Palestinian university students in the governorates of Gaza, and its relationship to the level of health awareness about the emerging coronavirus (covid-19). To achieve the objectives of the study, the researcher followed a descriptive approach by applying two questionnaires; the first, which consists of 30 items, was used  to measure the level of digital citizenship.  The second, which consists of 19 items, was used to measure the level of health awareness. Both questionnaires  were applied on a sample of 367 students who were electronically selected using the manner simple randomness. Results have shown that the degr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 18 2018
Journal Name
Al–bahith Al–a'alami
Public exposure to news satellite channels and its relationship to levels of preference and evaluation of programs: Survey study on a sample of the audience of Baghdad City Cente
...Show More Authors

The media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Bulletin Of Materials Science
Investigation of optical properties and glass transition temperature of nano-epoxy matrix
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF