Preferred Language
Articles
/
alkej-4
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthorized Internet users from accessing private computers and networks connected to the Internet).

This paper concerned with the design and implementation of a proposal firewall system which is used to protect both individual computers and corporate networks from hostile intrusion coming through Internet. The Dual-homed host architecture has been used to implement the proposed firewall system. The designed system is constructed using Visual Basic 6.0 Language.

Finally, This proposed system is built depending on the packet filtering mechanism to regulate all the packets entering and leaving the protected site using IP address and port number of the TCP packet. Also this system deals with application level and monitors all packet data (content) and maintains the firewall activity with Internet connection.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Main Delay Factors of Implementation EPC Construction Projects in Iraq
...Show More Authors

This essay aims to highlight the most important issues and difficulties facing implementing large projects that follow the turn-key method, considered one of the types of contractual methods in Iraq, especially for large and complex projects requiring speedy completion. The projects implemented in this way face delays and delays in completion, which led to the lack of benefit from the projects for which they were implemented, especially those affecting the lives of citizens within the health sector. The case study dealt with the construction of hospitals with multi-bed capacities within multiple governorates in Iraq, With large financial allocations within the federal budget of the Government of Iraq over several years.

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Neural Control for Continuous Stirred Tank Reactor (CSTR)
...Show More Authors

In this paper a dynamic behavior and control of  a jacketed continuous stirred tank reactor (CSTR)  is developed using different control strategies, conventional feedback control (PI and PID), and neural network (NARMA-L2, and NN Predictive) control. The dynamic model for CSTR process is described by a first order lag system with dead time.

The optimum tuning of control parameters are found by two different methods; Frequency Analysis Curve method (Bode diagram) and Process Reaction Curve using the mean of Square Error (MSE) method. It is found that the Process Reaction Curve method is better than the Frequency Analysis Curve method and PID feedback controller is better than PI feedback controller.

The results s

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring the actual implementation of e-wallet application in Malaysia
...Show More Authors

E-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the th

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Administration And Economics
Proposal to use the style of the slides in the estimation and forecasting Fertility rates in Iraq for the period 2012-2031
...Show More Authors

It is often needed in demographic research to modern statistical tools are flexible and convenient to keep up with the type of data available in Iraq in terms of the passage of the country far from periods of war and economic sanctions and instability of the security for a period of time . So, This research aims to propose the use of style nonparametric splines as a substitute for some of the compounds of analysis within the model Lee-Carter your appreciation rate for fertility detailed variable response in Iraq than the period (1977 - 2011) , and then predict for the period (2012-2031). This goal was achieved using a style nonparametric decomposition of singular value vehicles using the main deltoid , and then estimate the effect of time-s

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Eastern-european Journal Of Enterprise Technologies
Improvement of noisy images filtered by bilateral process using a multi-scale context aggregation network
...Show More Authors

Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Oct 13 2022
Journal Name
Computation
A Pattern-Recognizer Artificial Neural Network for the Prediction of New Crescent Visibility in Iraq
...Show More Authors

Various theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Computational Intelligence And Neuroscience
A New Artificial Neural Network Approach in Solving Inverse Kinematics of Robotic Arm (Denso VP6242)
...Show More Authors

This paper presents a novel inverse kinematics solution for robotic arm based on artificial neural network (ANN) architecture. The motion of robotic arm is controlled by the kinematics of ANN. A new artificial neural network approach for inverse kinematics is proposed. The novelty of the proposed ANN is the inclusion of the feedback of current joint angles configuration of robotic arm as well as the desired position and orientation in the input pattern of neural network, while the traditional ANN has only the desired position and orientation of the end effector in the input pattern of neural network. In this paper, a six DOF Denso robotic arm with a gripper is controlled by ANN. The comprehensive experimental results proved the appl

... Show More
View Publication
Scopus (118)
Crossref (96)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Slot Design Procedure for a NACA 4412 at High Angle of Attack
...Show More Authors

The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial prog

... Show More
View Publication
Publication Date
Thu Oct 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Design of an adaptive state feedback controller for a magnetic levitation system
...Show More Authors

This paper presents designing an adaptive state feedback controller (ASFC) for a magnetic levitation system (MLS), which is an unstable system and has high nonlinearity and represents a challenging control problem. First, a nonadaptive state feedback controller (SFC) is designed by linearization about a selected equilibrium point and designing a SFC by pole-placement method to achieve maximum overshoot of 1.5% and settling time of 1s (5% criterion). When the operating point changes, the designed controller can no longer achieve the design specifications, since it is designed based on a linearization about a different operating point. This gives rise to utilizing the adaptive control scheme to parameterize the state feedback controll

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref