Preferred Language
Articles
/
alkej-4
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthorized Internet users from accessing private computers and networks connected to the Internet).

This paper concerned with the design and implementation of a proposal firewall system which is used to protect both individual computers and corporate networks from hostile intrusion coming through Internet. The Dual-homed host architecture has been used to implement the proposed firewall system. The designed system is constructed using Visual Basic 6.0 Language.

Finally, This proposed system is built depending on the packet filtering mechanism to regulate all the packets entering and leaving the protected site using IP address and port number of the TCP packet. Also this system deals with application level and monitors all packet data (content) and maintains the firewall activity with Internet connection.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
Journal Of Biological Chemistry
Functional and phylogenetic evidence of a bacterial origin for the first enzyme in sphingolipid biosynthesis in a phylum of eukaryotic protozoan parasites
...Show More Authors

View Publication
Scopus (17)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Effects of rotation and MHD on the Nonlinear Peristaltic Flow of a Jeffery Fluid in an Asymmetric Channel through a Porous Medium
...Show More Authors

In this paper, the effect of both rotation and magnetic field on peristaltic transport of Jeffery fluid through a porous medium in a channel are studied analytically and computed numerically. Mathematical modeling is carried out by utilizing long wavelength and low Reynolds number assumptions. Closed form expressions for the pressure gradient, pressure rise, stream function, velocity and shear stress on the channel walls have been computed numerically. Effects of Hartman number, time mean flow, wave amplitude, porosity and rotation on the pressure gradient, pressure rise, stream function, velocity and shear stress are discussed in detail and shown graphically. The results indicate that the effect of Hartman number, time mean flow, wave a

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Screening and optimization of a novel gallic acid and tannase production under semi quantitative and quantitative methods
...Show More Authors
Abstract<p>Tannin acyl hydrolase as the common name of tannase is an inducible extracellular enzyme that causes the hydrolysis of galloyl ester and depside bonds in tannins, yielding gallic acid and glucose. The main objective of this study is to find a novel gallic acid and tannase produced by <italic>Acinetobacter Baumannii</italic>. A number of optimization steps were followed in order to improve the highest production of gallic acid and tannase. In present study, <italic>A. baumannii</italic> were isolated from ICU burn. <italic>A. baumannii</italic> was examined by microscopic examination, morphological and biochemical assay including oxidase and catalase. The </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The Linguistic and Conceptual Equivalence of Conner’s Revised Scales When Applied on a Sudanese Sample
...Show More Authors

This study investigates the Linguistic and Conceptual equivalence of Conner’s Revised Scales when applied on a Sudanese sample. Sudanese parents and teachers completed behavior-rating scales on a stratified sample of 200 children. These instruments were based on Conner’s parent -48 and teacher-28 questionnaires. Following a reliable translation into Sudanese Arabic the test-retest reliability of the items and the internal consistency of the original Conner’s' revised scales were explored. The associations between scale scores and between parents and teachers scores were also examined. Both instruments displayed good reliability and the original Conners scales had satisfactory internal consistency. The inter-correlation sugg

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 18 2020
Journal Name
Rimak International Journal Of Humanities And Social Sciences
STRESS IN ENGLISH AND ARABIC: A CONTRASTIVE STUDY
...Show More Authors

DBN Rashid, Rimak International Journal of Humanities and Social Sciences, 2020

View Publication
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Thu Jan 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Graphic Novels : A Privilege For Teachers and Students
...Show More Authors

There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Colonization and Civilization in Aimé Cesaire’s A Tempest
...Show More Authors

This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.

A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review
...Show More Authors

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref