Preferred Language
Articles
/
alkej-4
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthorized Internet users from accessing private computers and networks connected to the Internet).

This paper concerned with the design and implementation of a proposal firewall system which is used to protect both individual computers and corporate networks from hostile intrusion coming through Internet. The Dual-homed host architecture has been used to implement the proposed firewall system. The designed system is constructed using Visual Basic 6.0 Language.

Finally, This proposed system is built depending on the packet filtering mechanism to regulate all the packets entering and leaving the protected site using IP address and port number of the TCP packet. Also this system deals with application level and monitors all packet data (content) and maintains the firewall activity with Internet connection.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 26 2017
Journal Name
Journal Of Engineering
Cathodic Protection Design Algorithms for Refineries Aboveground Storage Tanks
...Show More Authors

Storage tanks condition and integrity is maintained by joint application of coating and cathodic protection. Iraq southern region rich in oil and petroleum product refineries need and use plenty of aboveground storage tanks. Iraq went through conflicts over the past thirty five years resulting in holding the oil industry infrastructure behind regarding maintenance and modernization. The primary concern in this work is the design and implementation of cathodic protection systems for the aboveground storage tanks farm in the oil industry.

Storage tank external base area and tank internal surface area are to be protected against corrosion using impressed current and sacrificial anode cathodic protection systems. Int

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 25 2023
Journal Name
Journal Of Optical Communications
Design mode filtering interferometer using etched double clad fiber
...Show More Authors
Abstract<p>Mode filtering technique is one of the most desired techniques in optical fiber communication systems, especially for multiple input multiple output (MIMO) coherent optical communications that have mode-dependent losses in communication channels. In this work, a special type of optical fiber sensing head was used, where it utilizes DCF13 that is made by Thorlabs and has two numerical apertures (NA’s). One is for core and 1st cladding region, while the 2nd relates the 1st cladding to the 2nd cladding. Etching process using 40 % hydro-fluoric (HF) acid was performed on the DCF13 with variable time in minutes. Investigation of the correlation between the degree of etching and the re</p> ... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed May 18 2016
Journal Name
Al-academy
The reality of religious tourism publications design and ways of developing The upper threshold model: صادق هاشم حسن الموسوي
...Show More Authors

Tourism is one of the most important sources of income of economic key countries in the world so are imports of tourism for some countries a source of income is not significant of the total revenues of States. Making those countries, and those countries a destination for visitors, and here should be interest in the Wealth and cultural heritage that distinguishes Islamic countries in general, and Iraq in particular, must be placed specialist studies in all areas for the development of this area of tourism, especially religious tourism to achieve a desired and desired of such research.It is the most important ways to develop tourism in general and religious tourism is of particular publications, advertising, and is important for us in this

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Effect of Welded Joints Design on the Joint Strength During Statie and Dynamie Loading with Different Current and Type of Wire Welding
...Show More Authors

The aim of this research is to study the effect of welded joint design (Butt joint and lap joint) on thejoint strength during tension and fatigue loading with different current of welding (40,50,60,70,80) ^per, and different type of wire welding. The result of this research is showed that the effect of fatigue loading on the type of joint is more than the effect of tension loading on it. And the butt joint welding is better than the lap joint welding during the fatigue loaded.The experimental results of the effect of W'elding current showed that more increasing and more decreasing the value of the heat input, during the welding was found to produce mechanical brittleness on the buttjoint welding during the static and dynamic loading. Also i

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 28 2025
Journal Name
Moroccan Journal Of Chemistry
Design, Synthesis, and Biological Evaluation of new sulfonamides derived from 2-Aminopyridine: Molecular docking, POM analysis, and identification of the pharmacophore sites
...Show More Authors

New series of imidazole[1,2-a]pyridine-sulfonamides was designed and synthesized from 2-aminopyridine, which was reacted with p-bromo phenacyl bromide in the present of MgO to produce the corresponding imidazole[1,2-a]pyridine, which was then reacted with chlorosulfonic acid to produce 2-(4-bromophenyl)imidazole[1,2-a]pyridine-3-sulfonyl chloride [2]. Following that, treatment of (2) with different amines using the grand method to generate imidazole [1,2-a] pyridine sulfonamides. All the synthesized compounds have been characterized by FTIR, 1HNMR and 13CNMR and C.H.N analysis. The DFT, POM analysis and molecular docking were carried out on for all final compounds to investigate drug like attributes, and the results revealed showed that the

... Show More
Scopus (6)
Scopus
Publication Date
Fri Apr 01 2022
Journal Name
Chemical Methodologies
Design, Synthesis of Imidazolone and Oxazepine Derivatives Bearing Imidazo (2, 1-b) Thiazole along with its Antimicrobial Activity
...Show More Authors

A new methodology was applied to the synthesis of new imidazolones and oxyazepine derivatives containing imidazo thiazole fused rings. Starting with 5-(4-bromo phenyl) imidazo (2, 1-b) thiazole, which was synthesized using the standard procedure, the Carbaldehyed group was introduced at position 6 of 5-(4-bromo phenyl) imidazo (2, 1-b) thiazole. Then, this 6-carbaldehyed derivative was condensed with different substituted aromatic amines to afford new Schiff bases. The latter were cyclized into new oxazepine and imidazolone derivatives by using phthalic anhydride and glycine, respectively. These new derivatives were characterized by using FT-IR, 1HHNMR, and 13CNMR spectra, as well as examined (evaluated) for anti-bacterial and anti-fungal a

... Show More
View Publication Preview PDF
Scopus (12)
Scopus Clarivate
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Mon Jul 15 2024
Journal Name
2024 46th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Automatic COVID-19 Detection from Chest X-ray using Deep MobileNet Convolutional Neural Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Functionalized multi-walled carbon nanotubes network sensor for NO2 gas detection at room temperature
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Integrated Grasshopper Optimization Algorithm with Artificial Neural Network for Trusted Nodes Classification Problem
...Show More Authors

Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica

... Show More
View Publication
Scopus Clarivate Crossref