Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col
... Show MoreErratum for Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage.
Biodiesel can be prepared from various types of vegetable oils or animal fats with the aid of a catalyst.
Calcium oxide (CaO) is one of the prospective heterogeneous catalysts for biodiesel synthesis. Modification
of CaO by impregnation on silica (SiO2) can improve the performance of CaO as catalyst. Egg shells and rice
husks as biomass waste can be used as raw materials for the preparation of the silica modified CaO catalyst.
The present study was directed to synthesize and characterize CaO impregnated SiO2 catalyst from biomass
waste and apply it as catalyst in biodiesel synthesis. The catalyst was synthesized by wet impregnation
method and characterized by x-ray diffraction, x-ray fluorescence, nitr
Introduction: This study was performed to compare the effect of Fractional CO2 laser or Q switched Nd:YAG laser of surface treatment on the shear bond strength of zirconia-porcelain interface. Methods: Fractional CO2 laser at 30 W, 2 ms, time interval 1 ms, distance between spots 0.3 mm, and number of scans is (4) or Q switched Nd:YAG laser at 30 J/mm2 and 10 Hz were used to assess the shear bond strength of zirconia to porcelain. Pre-sintered zirconia specimens were divided into three groups (n = 10) according to the surface treatment technique used: (a) untreated (Control) group; (b) CO2 group; (c) Nd:YAG group. All samples were then sintered and veneered with porcelain according to the manufacturer’s instructions. Surface morph
... Show MoreIn this paper, a microcontroller-based electronic circuit have been designed and implemented for dental curing system using 8-bit MCS-51 microcontroller. Also a new control card is designed while considering advantages of microcontroller systems the time of curing was controlled automatically by preset values which were input from a push-button switch. An ignition based on PWM technique was used to reduce the high starting current needed for the halogen lamp. This paper and through the test result will show a good performance of the proposed system.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023