Preferred Language
Articles
/
bsj-998
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 07 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Assessment of Employees’ Knowledge Concerning Contributing Factors and Early Detection for Prostate Cancer in Baghdad University Colleges in bab-Almudam
...Show More Authors

View Publication
Scopus (10)
Scopus Crossref
Publication Date
Sun Aug 03 2025
Journal Name
Journal Of Molecular Structure
Synergistic design of carbazole-bearing (D–π)₂-D–π–A architectures for dye-sensitized solar cells: Experimental and theoretical evaluations
...Show More Authors

Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
The degree of the need for managers working in the directories of education to develop their skills for the exercise of administrative empowerment
...Show More Authors

A field study investigated the degree of need for managers working in the directories of education to develop their skills for the exercise of administrative empowerment, and it adopted the descriptive analytical approach. The research community, was determined which consisted of 126 principals, and the sample was selected with arte of randomly Statistics and by (100%) of the research community, as the number of respondents was (126) of managers working in the directories of education. A questionnaire was built which included 40 items distributed among the fields of study. Researchers verified its validity and reliability. The research data were analyzed using software (SPSS), the questionnaire was applied in the second semester of the a

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Modern Sport
The reality of sports nutritional culture and its contribution to some biochemical indicators among youth runners running distances (400, 800) and (400) meters hurdles for young
...Show More Authors

هدف البحث إلى التعرف على مستوى الثقافة الغذائية الرياضية لدى عدائي مسافات ركض (400 و800) و(400) متر حواجز الشباب، والتعرف على العلاقة وإسهام وأثر الثقافة الغذائية الرياضية ببعض المؤشرات البيوكيميائية لدى عدائي مسافات ركض (400 و800) و(400) متر حواجز الشباب، أعتمد المنهج الوصفي بأسلوب العلاقات الإرتباطية، و تمثلت حدود مجتمع البحث بالعدائين الشباب لفعاليات ركض (400 و800) و(400) متر حواجز، يمثلون لاعبي الأندية العراقية الب

... Show More
View Publication
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 04 2020
Journal Name
College Of Islamic Sciences
commiseration for lovers Study in Indication Synthetic Lamentation "Kuthaira Ouza" for instance
...Show More Authors

There  is no doubt  various of situations for performing  a duty , The diversity of stimuli in humans with sensory, unconscious and instinct sensitive systems. Which leads to a diversity of feelings, sensations, emotions and feelings, This therefore requires different types of function linguistic structures indication , Of that linguistic potential that God willing to be unique, In the function of discharging and venting those feelings and emotions that are raised by its various stimuli, which are only needs and psychological and biological purposes require verification and access and gain it. So the language became to embrace the feelings and feelings, needs and purposes. And mirror reflected and binoculars revealing what

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2014
Journal Name
Journal Of Physical Education
Limiting standards for some defending tests against shooting for basketball juniors players
...Show More Authors

The changes that happen in training progress especially in skill side demands tests researchers found poorness for patterns to special tests in defending skills against shooting although applying these tests on other samples without considering the age , so the problem of research came controlling the tests of defense against shooting that serve juniors players and match the original society to serve the basketball game . The research sample chosen for juniors players for Baghdad clubs in season (2011-2012) the sample numbered (82) players represented (7) clubs that their percentage (82%) , after gaining the data processed statically and we reached to conclusion that : defending tests against shooting applied first time in Iraq in Iraq envi

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Different Methods for Estimating Location Parameter & Scale Parameter for Extreme Value Distribution
...Show More Authors

      In this study, different methods were used for estimating location parameter  and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment  estimation (ME),and approximation  estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile  as estimation for distribution f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Production Function Analyze For Almansoor General Company For Engineering Industries In Iraq
...Show More Authors

The production function forms one of the techniques used in evaluation the  production the process for any establishment or company, and to explain the importance of contribution of element from the independent variable and it's affect on the dependent variable. Then knowing the elements which are significant or non-significant on the dependent variable.

    So the importance of this study come from estimating the Cobb-Douglas production function for Al- Mansoor General Company for Engineering industries in Iraq during the period (1989-2001)

     To explain the importance which effects the independent variable such as
(N

... Show More
View Publication
Crossref
Publication Date
Sun Mar 29 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Water Injection for Oil Recovery in Mishrif Formation for Amarah Oil Field
...Show More Authors

The water injection of the most important technologies to increase oil production from petroleum reservoirs. In this research, we developed a model for oil tank using the software RUBIS for reservoir simulation. This model was used to make comparison in the production of oil and the reservoir pressure for two case studies where the water was not injected in the first case study but adding new vertical wells while, later, it was injected in the second case study. It represents the results of this work that if the water is not injected, the reservoir model that has been upgraded can produce only 2.9% of the original oil in the tank. This case study also represents a drop in reservoir pressure, which was not enough to support oil production

... Show More
View Publication Preview PDF
Crossref (5)
Crossref