The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.
Aeration system in the cultivation of Chlorella Sp. Microalgae using dairy wastewater as culture media was addressed in the current study. This research aimed to study the effect of aeration in the bubble column bioreactor on the biological synergy between microalgae and bacteria if they are present in the same place. The results show that the sterilization stage is not the dominant step in the success of microalgae cultivation in water-rich organic waste. There is a clear convergence between the growth rate of Chlorella microalgae in the sterilized and non-sterilized culture media, which gives realism if the proposal is applied industrially. Through the information obtained the aerobic bacteria in the non-sterilized me
... Show MoreConstruction projects need methods and techniques to ensure the level of quality and commensurate with the level required and documented in the project contract. The quality of the project is affected by the quality of the inputs and accompanying procedures in the construction of the project.
Al-Rumaitha residential project found that the quality of the concrete for the ceilings in the research sample (the roof of the third floor of buildings A25 and A26) and (roof of the second floor of buildings A27, A28, A29, A30, A31, A32 and A33) and roof of buildings A15 and A16 A19)) is not the required quality level.
The idea of the research came after the need to improve the performance o
... Show MoreA characteristic study of a passively Q-switched diode pumped solid state laser system is presented in this work. For laser a comparison study for the theoretically calculated results with a simulation results using a software which calculates the Q-switched solid state laser parameters was such as energy, peak power and pulse width were performed. There was a good agreement between our theoretical calculations and the simulation values.
In this research, an experimental study was conducted to high light the impact of the exterior shape of a cylindrical body on the forced and free convection heat transfer coefficients when the body is hold in the entrance of an air duct. The impact of changing the body location within the air duct and the air speed are also demonstrated. The cylinders were manufactured with circular, triangular and square sections of copper for its high thermal conductivity with appropriate dimensions, while maintaining the surface area of all shapes to be the same. Each cylinder was heated to a certain temperature and put inside the duct at certain locations. The temperature of the cylinder was then monitored. The heat transfer coefficient were then cal
... Show MoreThe research aims to determine the impact of employees’ retention strategy on organizational memory. This research is historical, descriptive, and analytical. The sample consists of 158 faculty members in five private colleges in Baghdad. The technique used to analyze the data is SEM (Structural Equation Modeling), and SPSS (Statistical Package for the Social Sciences). The research concludes that the employees retaining strategy plays a vital role in retaining employees and hence maintains organizational memory. The findings and recommendations of this research assure the administrations of private colleges that employees retention strategy play a vital role in retaining its employee and hence maintains organizational memory. T
... Show MoreThat the possibility of imposing a tax on electronic commerce is increasing interest in it by governments in developed and developing countries alike, and there is interest in a logical by governments and bodies of taxation, in particular in developing countries erosion potential tax in the tax base resulting from the adoption of e-commerce if not mutation rules and tax legislation, local and international to take into account this important economic developments and how to keep up, said the combination of the taxation system is the only way to increase revenue needed to finance government spending on goods and services needed by society.
The most important conclusions reached by the rese
... Show MoreAbstract
The basic aim of this research is to study the interactional effect of investing information technology on the relationship between value added intellectual capital and financial performance as literature review suggested on the theoretical level, including previous studies, with the deduction of its trends strongly predicted by research hypotheses and their content associated with the investment in intellectual capital after information technology tools being employed in this direction to improve the financial performance of the studied companies at the levels of both industrial and service sectors, a non-random sample was chosen included (40) forty Iraqi Joint-Stoc
... Show MoreIn this study; a three-dimensional model was created to simulate groundwater in Al-Haydariyah area of the governorate of Al-Najaf. A solid model was created to utilize the cross sections of 25 boreholes in the research region, and it was made out of two layers: sand and clay. The steady-state calibration was employed in six observation wells to calibrate the model and establish the hydraulic conductivity, which was 17.49 m/d for sand and 1.042 m/d for clay, with a recharge rate of 0.00007 m/day. The wells in the research region were reallocated with a distance of 1500 m between each well, resulting in 140 wells evenly distributed throughout the study area and with a discharge of 5 l/s, and the scenarios were run for 1000
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show More