Preferred Language
Articles
/
alkej-634
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing Quality According To Artificial Intelligence: Applied Research on A Sample of Regulatory Bodies Working In The Federal Board of Supreme Audit
...Show More Authors

The Evolution Of Information Technology And The Use Of Computer Systems Led To Increase Attention To The Use Of Modern Techniques In The Auditing Process , As It Will Overcome Some Of The Human Shortcomings In The Exercise Of Professional Judgment, Then It Can Improve The Efficiency And Effectiveness Of The Audit Process, Where The New Audit Methodologies Espouse The Concept Of Risk Which Includes Strategic Dimension With Regard To The Capacity Of The Entity To Achieve Its Goals, Which Requires Auditors To Rely On Advanced Technology That Can Identify The Factors Which Prevent The Entity From Achieving Its Objectives. The Idea Of Research Is To Preparing An Electronic Program Fer All Audit Work From Planning Through Sampling And Document

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Al–bahith Al–a'alami
The Impact of Means of Communication on Electoral Behavior and its Relationship to the Political Disparity of the Family (A Field Study of an Audience of the University of Baghdad’s Students)
...Show More Authors

Iraq has seen many changes at the social, economic and political levels. This led to cause many shifts in the structure of its society and imposed great challenges reflected in the behavior and awareness of that society in general and youth in particular.

Those changes made the Iraqi society undergoing the transformation of value and culture aspects formed a political awareness that caused cultural and political diversity within the family and society. A greater openness to the outside world caused by the communication revolution, as the world has witnessed during the past two decades, has helped in making that change. Iraq had its share of media and political openness, which were included after the US occupation in 2003. As a re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
Euro-Mediterranean cooperation to partnership
...Show More Authors

تقدمت احداث النصف الاخير من القرن الماضي من تاريخ العالم الاقتصادي صور كثيرة من التكتلات والاليات التعاونية والتشاركية القائمة على مصادر مختلفة للتجمع الاقتصادي من اهمها شكل الشراكات التجارية والاقتصادية ولها امثلة كثيرة على المستوى الاقتصادي الدولي ومنها الشراكة الاورومتوسطية التي تمثل منطقة حيوية في حسابات التبادل الدولي تجاريا وراسماليا ولكن هذا التشكيل التكتلي يحتاج الى وقفه تخص

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Learning for Scientific Culture by Using Interactive Whiteboard According to the Faculty of the University of Baghdad Viewpoint
...Show More Authors

The progress of science in all its branches and levels made great civilized changes of
our societies in the present day, it's a result of the huge amount of knowledge, the increase of
number of students, and the increase of community awareness proportion of the importance of
education in schools and universities, it became necessary for us as educators to look at
science from another point of view based on the idea of scientific development of curricula
and teaching methods and means of education, and for the studying class environment as a
whole, by computer and internet use in education to the emergence of the term education
technology, which relies on the use of modern technology to provide educational content to<

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Role the media to limit from get games children instigator on the violence
...Show More Authors

Violence is a very serious phenomenon affecting the upbringing and culture kids, are playing the most violent forms of development of these Phenomenon, the research aims to determine the role of the media in reducing violence, and conducted a field study on parents Children by 200 form, the results revealed the importance of the media in raising awareness of the risks of violence on the child  Especially television, which hugely increased Show features, as well as the role of parents in guiding the child to buy Useful because the game to play negative impact of violence on children's health, and the media play an important role in raising awareness of these Risks through educational programs and television commercials, and o

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of technology review and evaluate programs PERT to improve the cost method on the basis of activity: بحث تطبيقي في الشركة العامة للصناعات النسيجية /واسط
...Show More Authors

Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products  The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of dev

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2023
Journal Name
Journal Of Physical Education
The effect of preventive exercises using the (isometric) method and aids to help develop the strength of the thigh muscles of the first-class referees of the Iraqi Premier League
...Show More Authors

The aim of the research is to identify the values of the level of muscular strength of the thighs, as well as to identify the significance of the differences between the pre-tests and the post-tests for the first-class football referees in the Iraqi Premier League. The researchers used the one-group experimental approach for its suitability to the nature of the study problem, and the research sample was from first-class referees in the Iraqi Premier League for the sports season (2022/2023), and their number was (15) referees. They took the comprehensive enumeration method, and special tests were conducted on them in the stadium and the private hall at the Ministry of Youth and Sports Center. After analyzing and discussing the result

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF