Preferred Language
Articles
/
alkej-4
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthorized Internet users from accessing private computers and networks connected to the Internet).

This paper concerned with the design and implementation of a proposal firewall system which is used to protect both individual computers and corporate networks from hostile intrusion coming through Internet. The Dual-homed host architecture has been used to implement the proposed firewall system. The designed system is constructed using Visual Basic 6.0 Language.

Finally, This proposed system is built depending on the packet filtering mechanism to regulate all the packets entering and leaving the protected site using IP address and port number of the TCP packet. Also this system deals with application level and monitors all packet data (content) and maintains the firewall activity with Internet connection.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Design, Construction, and Control Tracking of Solar Thermal Concentrator by Using PLC in Erbil
...Show More Authors

This paper demonstrates the construction designing analysis and control strategies for fully tracking concentrated solar thermal by using programmable logic control in the city of Erbil-Iraq. This work used the parabolic dish as a concentrated solar thermal. At the focal point, the collected form of energy is used for heating a (water) in the receiver, analyzing this prototype in real-time with two different shapes of the receiver and comparing the results. For tracking the parabolic dish, four light-dependent resistors are used to detect the sun's position in the sky so that the tracking system follows it to make the beam radiation perpendicular to the collector surface all of the time during the day for maximum solar p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Separation And Purification Technology
Application of central composite design approach for optimisation of zinc removal from aqueous solution using a Flow-by fixed bed bioelectrochemical reactor
...Show More Authors

View Publication
Scopus (18)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Separation And Purification Technology
Application of central composite design approach for optimisation of zinc removal from aqueous solution using a Flow-by fixed bed bioelectrochemical reactor
...Show More Authors

View Publication
Scopus (18)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design and Synthesis of Some Nitrate Derivatives of Mefenamic Acid with Expected Nitric Oxide Release
...Show More Authors

This study include design and synthesis of 2 derivatives of compounds consisting of mefenamic acid, glycine and organic nitrates (2-nitrooxy ethanol or 1,3-dinitrooxy-2-propanol). Nitric oxide NO has been reported to support many of the same mucosal protection mechanisms as prostaglandins and is sufficient for acute gastroprotection and ulcer healing. So we suppose these 2 compounds would reduce non-steroidal anti-inflammatory drugs NSAIDs gastrointestinal side effect.

Key words: Non-Steroidal anti-inflammatory dr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
the role of senior management commitment to total quality in the implementation of knowledge management processes_Asurvey of asample of civil colleges
...Show More Authors

Occupies total quality management applications play a key role in the development of institutions of higher education performance and achieve its strategic objectives through the commitment of senior management and their employees to continuous improvement of the quality of performance in the various areas of work, and can be integrated knowledge management processes, which means identifying information of value and how to take advantage. The data were collected using the style of the questionnaire for the purpose of analyzing their results on a sample composed of 83 member of the administrative leadership in colleges as representing the decision-making centers in those colleges . 

  &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Consumer Subjective Values and their Reflection on Fashion Design: وسن خليل إبراهيم
...Show More Authors

This paper deals with the subjective reflections of consumer values ​​on fashion design. The   consumer self is determined by the consumer's idea of ​​himself, according to the intellectual, spiritual and social values, and these values ​​take their intellectual reflection in the form of material values ​​that the consumer finds in fashion design. These values ​​are based on considerations between what is intellectual represented by the values ​​of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The   consumer self gets its material image represented in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Small Horizontal Wind Turbine Design and Aerodynamic Analysis Using Q-Blade Software
...Show More Authors

Wind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Identity Attributes and Strategies in Industrial Product Design: وليد محمد مهدي عيسى
...Show More Authors

The research discussed the role of interrelationships between the product attributes and the individual identity of the brand and the user, starting from reviewing the identity concepts in the general design propositions and the identity from the industrial design perspective, and highlighting the role of the attributes in identifying the individual identity of the product, which would enable the user to adopt them to be representative of his identity, starting from identifying the importance of the identity being characterized by three major elements: innovating products in the user's viewpoint, viewing the user's environment, the methodology of the design language, and identifying the identity attributes in the industrial product start

... Show More
View Publication Preview PDF
Crossref