Preferred Language
Articles
/
alkej-100
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP address among several different systems. In order to accomplish a secure channel to exchange data between two network devices, the Secure Shell (SSH) protocol was added.

The first test shows that the data transfer rate at different time intervals of the day found to be an average of 10.95 Kbps for uploading and 13.7 Kbps for downloading and the second test shows that the network performance improved when squid proxy cache was used. The data rate found to be 143.3 Kbps average for uploading rate and 376.6 Kbps average for downloading rate.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Clinical And Experimental Dentistry
Bond strength of a new Kevlar fiber-reinforced composite post with semi-interpenetrating polymer network (IPN) matrix
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Lactic Acid Bacteria (LAB) with Probiotic Potential from Dengke Naniura
...Show More Authors

Dengke Naniura is a traditional food from Sumatera Utara, Indonesia, that is produced through fermenting process, and this food is believed to contain high probiotics. The objective of the current research is to determine the potential of LAB as a probiotic that has been obtained from Dengke Naniura. Dengke Naniura was traditionally prepared from Cyprinus carpio. Four LABs have been successfully isolated from Dengke Naniura, such as D7DA3, D7B3, D7DBF and D7DN3. Those four LAB isolates were identified as Lactobacillus sp. This result has been confirmed by the non-spore forming bacterium, non-motile, and Gram-positive. Also, it has been supported by biochemical test, for the example Voges Proskauer, catalase test, Methyl

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Computer And Information Science 2009
The Stochastic Network Calculus Methodology
...Show More Authors

Home Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Mon Jul 18 2022
Journal Name
Ieee Access
Moderately Multispike Return Neural Network for SDN Accurate Traffic Awareness in Effective 5G Network Slicing
...Show More Authors

Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi

... Show More
Scopus (15)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Public sector in Iraq Transition and partnership with the private sector
...Show More Authors

  The role of the public sector- Investment customizations-  economic embargo -  The role of the private sector - Coexistence between the public and private sectors -   Ratio of growth

View Publication
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 02 2024
Journal Name
المجلة السياسية والدولية
Strategies for international negotiation with uncooperative countries: North Korea as an example
...Show More Authors

Notwithstanding the importance of international cooperation as the other facet of international interactions, a strategy of conflict resolution, a maintainer of international peace and security, its provision in the United Nations conventions, as an objective of the United Nations after the international peace and security, however, the recognition of international cooperation has not been underlined by global, intellectual think tanks. While realism emphasized on the state's role in achieving international cooperation to ensure mutual and multilateral interests, liberalism focused on the role of international organizations in building such cooperation. Additionally, constructivist approaches developed other sub-variables to contribute to t

... Show More
View Publication
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
Integrated Marketing Communication and Its Effect on the revitalization of The Marketing Performance Field Research
...Show More Authors

The research topic was chosen because of the importance of communication in organizations in general and the marketing  process in particular. Without communication, the organization can not live and continue ,The problem of study diagnosis the reduction in sales in the company of plant oils in some its classes and weakness in differentiation and its reputation at market in spit if having good products with standardized features And lack of customer communication channels, also the company does not have any whole view about the concept of marketing communication, Therefore, This sudy aimed ro define to know the type of relationship between the extent of the impact of the integrated marketing

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 18 2020
Journal Name
Journal Of Petroleum Exploration And Production Technology
Integrated reservoir characterization and quality analysis of the carbonate rock types, case study, southern Iraq
...Show More Authors
Abstract<p>The reservoir characterization and rock typing is a significant tool in performance and prediction of the reservoirs and understanding reservoir architecture, the present work is reservoir characterization and quality Analysis of Carbonate Rock-Types, Yamama carbonate reservoir within southern Iraq has been chosen. Yamama Formation has been affected by different digenesis processes, which impacted on the reservoir quality, where high positively affected were: dissolution and fractures have been improving porosity and permeability, and destructive affected were cementation and compaction, destroyed the porosity and permeability. Depositional reservoir rock types characterization has been identified de</p> ... Show More
View Publication
Scopus (21)
Crossref (19)
Scopus Clarivate Crossref