Preferred Language
Articles
/
bsj-998
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering And Applied Sciences
Design and Implementation of Electronic Infrastructure for Academic Establishment
...Show More Authors

View Publication
Crossref
Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Simple Method for Studying Crushability and Grindability of Rocks and Minerals
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Sep 22 2016
Journal Name
Applied Sciences
Analysis and Evaluation of Performance Gains and Tradeoffs for Massive MIMO Systems
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
The Saudi Dental Journal
Development of patient information leaflets for fixed, removable, and functional appliances for Arabic-speaking orthodontic patients
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
Istanbul Bridge Conference.- Turkey
Strengthening and Load Testing for Short Span Steel Bridge for Abnormal Loads
...Show More Authors

The steel jetty selected for strengthening is in Baghdad city, over Tigris River, consists of 55 short spans, each of approximately 4 meters and one naviga-tional opening of 12 m. The bridge is 224 meters length and 8 meters in width. The strengthening system was designed to remove overstresses that occurred when the bridge was subjected to abnormal loads of 380 tons. A strengthening system which installed in spring 2008 was used where the main concept is to depend on added side supporting elements which impose reversal forces on the bridge to counteract most of the loads expected from the abnormal heavy loads. The bridge was load tested before and after the strengthening system was activated. The load test results indicate that the strengt

... Show More
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Isthmus life and prepare for it
...Show More Authors

Isthmus life and prepare for it

View Publication Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Al–bahith Al–a'alami
Cultural and educational values for children
...Show More Authors

Programs directed to children through the media in general and in television in particular are among the main factors that help in forming the cultural and educational values of this important segment of society, and in light of this the study problem was identified in answering a major question: What are the cultural and educational values that Ajyal channel seeks Space planted in children through my program, Iftah Ya Simsim (in its new season) and Friends of Ajyal? , While the objectives of the study were evident in identifying the most prominent cultural and educational values that the Ajyal satellite channel worked to instill in children, and identifying the nature of the techniques used by Ajyal channel in providing the value conten

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Sports Culture
Designing and rationing of test to measure the motor compatibility for the eye and the leg for students of the Faculty of Physical Education and Sports Sciences, Samarra University
...Show More Authors

The research aims to identify: 1-Designing a test to measure the movement compatibility of the eye and the leg for the students of the Faculty of Physical Education and Sports Sciences, Samarra University. 2-Codification (setting scores and standard levels) for the results of the motor compatibility test for the eye and the leg for students of the Faculty of Physical Education and Sports Sciences, Samarra University. The researchers reached the some following conclusions: 1-A test to measure the movement compatibility of the eye and the leg for the students of the Faculty of Physical Education and Sports Sciences. 2-There is a discrepancy in the standard levels of the research sample.

View Publication Preview PDF
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref