Preferred Language
Articles
/
bsj-2156
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Study the Application of Ultrasonic Technology for Phenol Removal in Petroleum Industry
...Show More Authors

In this study, the sonochemical degradation of phenol in water was investigated using two types of ultrasonic wave generators; 20 kHz ultrasonic processor and 40 kHz ultrasonic cleaner bath. Mineralization rates were determined as a function of phenol concentration, contact time, pH, power density, and type of ultrasonic generator. Results revealed that sonochemical degradation of the phenol conversion was enhanced at increased applied power densities and acidic conditions. At 10 mg/L initial concentration of phenol, pH 7, and applied power density of 3000 W/L, the maximum removal efficiency of phenol was 93% using ultrasonic processor at 2h contact time. Whereby, it was 87% using and ultrasonic cleaner bath at 16h contact time and 150 W

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
The Surgical outcomes of fundus-first technique in lowering the rate of bile duct injuries and bleeding during open cholecystectomy that facing intraoperative difficulties: A single-center prospective study: The surgical outcomes of open fundus-first cholecystectomy technique.
...Show More Authors

Background: The problem of difficult gallbladder is not clearly defined and associated with real missing of therapeutic approaches that decreased morbidity. Moreover, the difficult gallbladder was reported as a contributing risk factor for biliary injury due to raised difficulty in surgical dissection within Calot’s triangle. The aim of this study is to determine the surgical outcomes of the open fundus-first cholecystectomy in lowering the rate of lethal intraoperative risks.

Subjects and Methods: Our prospective study conducted during the period of January 2019 to December 2022 at Ibn Sina specialized hospital, Khartoum, Sudan, for two hundred and fifty-three patients underw

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
The impact of advancing age on total serum IgE in asthmatic patient
...Show More Authors
 

Abstract

The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 05 2024
Journal Name
International Journal Of Engineering Pedagogy (ijep)
The Impact of Artificial Intelligence on Computational Thinking in Education at University
...Show More Authors

This study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Hydrogen Energy
Optimisation of operating parameters on the performance characteristics of a free piston engine linear generator fuelled by CNG–H2 blends using the response surface methodology (RSM)
...Show More Authors

The free piston engine linear generator (FPELG) is a simple engine structure with few components, making it a promising power generation system. However, because the engine works without a crankshaft, the handling of the piston motion control (PMC) is the main challenge influencing the stability and performance of FPELGs. In this article, the optimal operating parameters of FPELG for maximising engine performance and reducing exhaust gas emissions were studied. Moreover, the influence of adding hydrogen (H2) to compressed natural gas (CNG) fuel on FPELG performance was investigated. The influence of operating parameters on in-cylinder pressure was also analysed. The single-piston FPELG fuelled by CNG blended with H2 was used to run the expe

... Show More
View Publication
Scopus (23)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Strategic Cohesion on Administrative Excellence
...Show More Authors

This research aims to test the effect of strategic cohesion with its dimensions (organizational excitement, organizational casting, organizational synergy) as an independent variable on administrative excellence as a dependent variable in the Ministry of Planning, and through surveying several employees (general managers, heads of departments,  and units managers). As a research community, and based on the importance of the research topic in the aforementioned research community. The researchers have adopted the descriptive-analytical using the questionnaire as the main data collection. 155 questionnaires were distributed, yet,114 of them were retrieved and 110 were used for final statistical analysis. The researchers used the relev

... Show More
View Publication
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The Impact of Home Economics on High Performance
...Show More Authors

يسعى هذا البحث الى تقديم اطار عملي ونظري حول موضوع "تأثير الاقتصاد المنزلي في تعزيز الاداء العالي" وتم اختبار مخطط الدراسة الفرضي في القطاع التعليمي الحكومي في محافظة البصرة ,ويتضمن عدد من تشكيلات الجامعة التقنية الجنوبية. واستخدمت الاستبانة والمقابلة الشخصية كأسلوب لجمع البيانات للدراسة وكان حجم العينة114 موظف. وقد استخدمت عدد من الاساليب الاحصائية لاختبار فرضيات الدراسة. واظهرت النتائج بأن هناك تأثير ايج

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The Impact of Political Thought on Human Rights
...Show More Authors

 Receipt date:11/19/2020 acceptance date:10/1/2021 Publishing date:12/31/2021

   Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

Human rights are one of the basic concepts of modern and contemporary times, and political thought as the origin of political science and its source of knowledge have impact  in this science and its branches

... Show More
View Publication Preview PDF
Crossref