Preferred Language
Articles
/
ijs-1686
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Study of starch, sugar blending effect on the biodegradability of (PVA) for packaging applications
...Show More Authors

PVA, Starch/PVA, and Starch/PVA/sugar samples of different
concentrations (10, 20, 30 and 40 % wt/wt) were prepared by casting
method. DSC analysis was carried; the results showed only one glass
transition temperature (Tg) for the samples involved, which suggest
that starch/PVA and starch/PVA/sugar blends are miscible. The
miscibility is attributed to the hydrogen bonds between PVA and
starch. This is in a good agreement with (FTIR) results. Tg and Tm
decrease with starch and sugar content compared with that for
(PVA). Systematic decrease in ultimate strength, due to starch and
sugar ratio increase, is attributed to (PVA), which has more hydroxyl
groups that made its ultimate strength higher than that for

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees21gr
Study and preparation of optoelectronic properties of AgAl1-xInxSe2/Si heterojunction solar cell applications
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Employing electronic supervision applications in developing the teaching performance of teachers in the Sultanate of Oman: a suggested vision
...Show More Authors

The study aimed to investigate the employment of electronic supervision applications in developing the teaching performance of teachers in Oman. Based on the qualitative method and the study population consisted of all the teachers of the first cycle in the Governorate of Muscat. The study sample amounted to 24 female teachers. The interview was used as a tool for data collection. The study reached several results, including: There are difficulties in employing electronic supervision applications, which are weak network, density of curricula, lack of experience in applying technology, and the large number of tasks assigned to the teacher. These difficulties can also be overcome by strengthening the network, training teachers, reducing th

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
Features of misleading thought in Quranic discourse and methods of confronting it
...Show More Authors

Research summary

The Quranic discourse focused on a lot of vocabularies that carry goals that help man to acquire good, according to a methodology relies on adopting lofty ideas and values. The individual towards society, and the responsibility of society towards the individual. In our present age, the Muslim individual lives in a state of confrontation with deviant ideas, which unfortunately possess the means that make their impact great on society. The study concluded that the Holy Quran contains indicators and determinants of misguided and deviant thought, Which must be avoided because of the seriousness of its effects. Religion, in its general sense, represents a culture that transcends the limits of human ins

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Cross Sections for 10 Li 10 Reaction From Cross Sections of Li a,n) Reaction Using the Reciprocity Theory for the Ground State
...Show More Authors

In this study, light elements Li ,10B for (a,n) and (n,a) reactions
as well as o-particle energy from threshold energy to 10 MeV are
used according to the available data of reaction cross sections. The
more recent cross sections data of (a,n) and (n,a) reactions are
reproduced in fine steps 42 Kev for 10B(n,o) Li in the specified
energy range, as well as cross section (o,n) Values were derived from
the published data of (n,a) as a function of a-energy in the same fine
energy steps by using the principle inverse reactions. This calculation
involves only the ground state of Li OB in the reactions 'Li(a,n) B
B (n,a) Li
Introduction
When two charged nuclei overcome their Coulomb repulsion, a
rearrangement

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Predicting Social Security Fund compensation in Iraq using ARMAX Model
...Show More Authors

Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The general budget and censorship on it in Iraqi legislation
...Show More Authors

The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Isthmus life and prepare for it
...Show More Authors

Isthmus life and prepare for it

View Publication Preview PDF