Broadband satellite is playing a main role in provision global coverage and onboard processing ability over IP networks to assess user applications. In order to lower the cost, get better security, solve IPv4 addressing limitation, expand the expected advantages of modern routing and mobility characteristics; the next-generation satellite systems ought to support IPv6 and seamlessly incorporate with terrestrial networks including wireless local loops. Satellite communication links have a number of limitations compared to terrestrial communications networks such as large delay and high header overhead for IPv6 consumes the bandwidth and causes lower transmission effectiveness; however, the quality of service (QoS) (such as delay, jitter, and goodput) is adversely influenced by these demerits. Current paper proposes UDP/IPV6 header compression over Multi-Protocol Label Switch (MPLS) via satellite scheme called (MPLSHCompViaSat). The aim of the proposed scheme is to save the required bandwidth in order to provide better network utilization and consequently improves the efficiency and QoS. For the sake of performance evaluation, the proposed scheme has been tested using Network Simulator (NS2).
Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Till now, isatin derivatives have received a lot of interest in organic and medicinal chemistry due to their significant biological and pharmacological activities. Schiff’s and Mannich bases of isatins are an effective group of heterocyclic derivatives that play a significant role in medicinal chemistry as antimicrobial agents. In light of these facts, new Schiff bases and Mannich bases of isatin were synthesized. The monomer Mannich bases; 3(a-e) have been synthesized by reacting isatin with different secondary amines, piperidine, morpholine, and pyrrolidine, dimethylamine, diphenylamine, separately, and formaldehyde, while the dimer (5) formed by using piperazine and formaldehyde which then react separately with Phenylhydrazine
... Show MoreShatt Al-Diwaniya branches from Shatt Al-Hilla and extends for about 112 km until the Al-Rumaitha district within the study area located in Al-Diwaniya Governorate, Iraq. It is considered the main source for providing drinking water and supplying irrigation projects to the cities Al-Diwaniya and Al-Rumaitha. The study aims to evaluate, study, and develop Shatt Al-Diwaniya, as well as the new lined canal branching from Shatt Al-Diwaniya which. It is called Shatt Al-Diwaniya Diversion Canal. Field measurements of the discharge and water level were monitored, six sets for Shatt Al-Diwaniya and three sets for Diversion Canal. A one-dimensional model was developed by using HEC-RAS 5.0.7 so
This study was conducted to describe a protocol for the callus establishing culture of Lavandula angustifolia plant and estimating their content of volatile oil. The quantity of volatile oil callus tissues was compared with that of leaves production. Callus was induced from leaf explants on Murashige and Skoog medium (MS) supplemented with Naphthalene acetic acid (NAA) and Benzyl adenine (BA) in different concentrations. Maximum callus fresh weight was obtained in the combination of 10 mg/L BA and 3 mg/L NAA which reached 18 g after four weeks. The results of this work showed that the quantity of volatile oil from the highest fresh weight callus was 6 ml compared with quantity of 18g of leaves which gave 0.5 ml. Volatile o
... Show MoreThe relationship between chronic hepatitis B virus and Helicobacter pylori infection was evaluated to determine, seventy five patients with chronic hepatitis B infection (8-70 years) were investigated. The results were compared with the results of 50 healthy volunteers. Anti-H. pylori antibodies IgA and IgG were measured by Indirect fluorescent antibody test (IFAT) in sera of patients and healthy groups. The percentage of anti-H.pylori IgA antibodies (26.67%) were significantly (P<0.01) higher than healthy control group. While, no significant difference was found between the percentages of anti-H. pylori IgG antibodies (48 %) in patient sera and these kind of antibodies in sera of healthy control group (P > 0.05). The present results indica
... Show Morewe studied the effect of low level laser therapy (LLLT) using diode laser with wavelength of (790-805) nm in promotion and enhancement of wound healing of episiotomy and to evaluate the analgesic effect of LLLT in reducing the pain sensation caused by the episiotomy wounds. Nineteen women with episiotomy wound were selected and divided into three groups; 1st group (group No.1: control group) given antibiotics without laser therapy, in the 2nd group (group No.2) the wounds were exposed to laser therapy (4 sessions, each session with energy density of 19.90 J /cm2 every other day ) and systemic antibiotics were prescribed for 1 week. In the 3rd group (group No.3) the wounds were exposed to laser therapy (4 sessions, the same as in the 2nd
... Show MoreBackground: Many structural or functional abnormalities can impair the production of thyroid hormones and cause hypothyroidism.Objectives: to identify the main etiological causes of hypothyroidism among patients visiting Specialized Center for Diabetes and Endocrinology.Methods: This study was conducted in the Specialized Center for Diabetes and Endocrinology on 217 patients with proved hypothyroidism, from 2006 to 2008. Every patient was tested with thyroid function tests, Ultrasound examination, thyroid autoantibodies, fine needle aspiration, radiology of skull, isotopes scan, also checking adrenal and gonadal function. Results: Out of these 217 patients 120 patients have thyroiditis 33 patients had been undergone thyroidectomy. 39 pat
... Show MoreA group of amine derivatives [4-aminobenzenesulfonamide derivatives, 2-aminopyridine and 2-aminothiazole] incorporated to α-carbon of diclofenac a well known non-steroidal anti-inflammatory drug (NSAID) to increase bulkiness were designed and synthesized for evaluation as a potential anti-inflammatory agents with expected COX-2 selectivity. In vivo acute anti-inflammatory activity of the selected final compounds (9, 12 and 13) was evaluated in rats using egg-white induced edema model of inflammation in a dose equivalent to (3 mg/Kg) of diclofenac sodium. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50
... Show MoreThe importance of media coverage in the war remains dependent on many indicators for its success, the most important is to have qualified reporters who carry the war news professionally. The idea of this research is to determine the role played by war correspondents working on Iraqi satellite channels during the war against ISIS.
The researcher has chosen ( 40 ) reporters those who was able to contact them and prepared a questionnaire for them to study their situations. Also, he chose an intentional sample from Baghdad audience on condition they should be informed by the performance of the reporters in the satellite channels applying the hypotheses of the theory of depending upon media.
The most important results reached by the re
Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed