Preferred Language
Articles
/
alkej-4
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthorized Internet users from accessing private computers and networks connected to the Internet).

This paper concerned with the design and implementation of a proposal firewall system which is used to protect both individual computers and corporate networks from hostile intrusion coming through Internet. The Dual-homed host architecture has been used to implement the proposed firewall system. The designed system is constructed using Visual Basic 6.0 Language.

Finally, This proposed system is built depending on the packet filtering mechanism to regulate all the packets entering and leaving the protected site using IP address and port number of the TCP packet. Also this system deals with application level and monitors all packet data (content) and maintains the firewall activity with Internet connection.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 02 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
...Show More Authors

Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of Fractional Hold-Up in RDC Column Using Artificial Neural Network
...Show More Authors

In the literature, several correlations have been proposed for hold-up prediction in rotating disk contactor. However,
these correlations fail to predict hold-up over wide range of conditions. Based on a databank of around 611
measurements collected from the open literature, a correlation for hold up was derived using Artificial Neiral Network
(ANN) modeling. The dispersed phase hold up was found to be a function of six parameters: N, vc , vd , Dr , c d m / m ,
s . Statistical analysis showed that the proposed correlation has an Average Absolute Relative Error (AARE) of 6.52%
and Standard Deviation (SD) 9.21%. A comparison with selected correlations in the literature showed that the
developed ANN correlation noticeably

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Development of PVT Correlation for Iraqi Crude Oils Using Artificial Neural Network
...Show More Authors

Several correlations have been proposed for bubble point pressure, however, the correlations could not predict bubble point pressure accurately over the wide range of operating conditions. This study presents Artificial Neural Network (ANN) model for predicting the bubble point pressure especially for oil fields in Iraq. The most affecting parameters were used as the input layer to the network. Those were reservoir temperature, oil gravity, solution gas-oil ratio and gas relative density. The model was developed using 104 real data points collected from Iraqi reservoirs. The data was divided into two groups: the first was used to train the ANN model, and the second was used to test the model to evaluate their accuracy and trend stability

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Cutting Force in Turning Process by Using Artificial Neural Network
...Show More Authors

       

Cutting forces are important factors for determining machine serviceability and product quality. Factors such as speed feed, depth of cut and tool noise radius affect on surface roughness and cutting forces in turning operation. The artificial neural network model was used to predict cutting forces with related to inputs including cutting speed (m/min), feed rate (mm/rev), depth of cut (mm) and work piece hardness (Map). The outputs of the ANN model are the machined cutting force parameters, the neural network showed that all (outputs) of all components of the processing force cutting force FT (N), feed force FA (N) and radial force FR (N) perfect accordance with the experimental data. Twenty-five samp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
The reality of interior design of Sharjah mosques and the possibility of development - selected models
...Show More Authors

Observed mosques with the advent of Islam under the auspices of care being the houses of God Almighty, and I like parts of the ground to him, the center of radiation spiritual, intellectual and ideological in the lives of Muslims, was the most important cultural and architectural evidence built by Muslims voicing their deep faith and serenity Aqidthm.valmsadjad better reflecting the reality of communication between the person and his Lord, because he is the most important building of permanence and survival, making it imperative designed the best visual forms both externally and internally.Mosques have been characterized in the United Arab Emirates distinct characteristics in terms of building elements of construction in general, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Advanced Pharmaceutical Technology & Research
Use of factorial design in formulation and evaluation of intrarectal in situ gel of sumatriptan
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Asian Journal Of Pharmaceutical And Clinical Research
DESIGN, SYNTHESIS, DOCKING, ANTITUMOR SCREENING, AND ABSORPTION, DISTRIBUTION, METABOLISM, AND EXCRETION PREDICTION OF NEW HESPERDIN DERIVATIVE
...Show More Authors

Objective: Hesperidin (HSP) is a pharmacologically active organic compound found in citrus fruits and peppermint. We synthesized a new HSP derivative by reacting it with 5-Amino-1,3,4-thiadiazole-2-thiol in acetic acid. Methods: This compound was characterized by Fourier-transform infrared, proton nuclear magnetic resonance, and electron impact mass spectra. A molecular docking study explores the predicted binding of the compound and its possible mode of action. Bioavailability, site of absorption, drug mimic, and topological polar surface was predicted using absorption, distribution, metabolism, and excretion (ADME) studies. Results: The docking study predicts that the new compound binds to the active sites of Aurora-B

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technologyā€¸
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More