Preferred Language
Articles
/
jeasiq-1841
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via information systems celebrating safety, which is missed by many organizations, despite its importance, and providing the means for the protection and safety of the information transmitted from the center to the branches and back again to the center.

In order to achieve the goals of the study, we build the suggested model, by using the  Virtual Private Network through Cisco and Microsoft suggested models, The study concludes a set of conclusions, the most important, adopt a proposed model to use Virtual Private Network, whether the model presented by Cisco or through the application form provided by Microsoft.

In light of the findings, the study concluded a set of including, adopting the model of Microsoft Virtual Private Network due to the easy to apply using the infrastructure of the bank as tubeless to special equipment.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The First Record of Three Monogenean Species of Gyrodactylus in Iraq from Gills of Some Fishes in Tigris River, Al-Shawwaka Region, Baghdad Province
...Show More Authors

    Three monogenean species of the genus Gyrodactylus viz. G. cotti Roman, 1956 on gills of Planiliza abu, G. mikailovi Ergens & Ibragimov, 1976 on gills of Chondrostoma regium and G. prostae Ergens, 1963 on gills of Alburnus caeruleus were recorded from Tigris river at Al-Shawwaka region, Baghdad. The description and measurements of these parasites as well as their illustrations where given. All these parasites are recorded here for the first time in Iraq.  
 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The Perceptible Speed and Its Relation to Metamemory among Students of College Of Education for Pure Sciences\ Ibn Al-Haytham
...Show More Authors

The study aims to identify the metamemory and perceptual speed among College students, the correlation between metamemory and perceptual speed among College students, and to which extend does metamemory contribute to perceptual speed among College students. The sample consisted of group of students were selected randomly by the researcher from five-different disciplines at the college of education for pure sciences. To collect study data, the researcher utilized two scales: perceptual speed scale that has translated to Arabic language by (Al-Shraqawi, Al- Shaikh, and Nadia Abed Al-Salam (1993). The second scale is metamemory scale (2002) which has translated to Arabic by Abu Ghazal (2007). The results revealed that college students have

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 27 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation the profitability of public commercial banks using liquidity indicators: A comparison of the Rafidain and Rasheed study
...Show More Authors

The issue of liquidity, profitability, and money employment, and capital fullness is one of the most important issues that gained high consideration by other authors and researchers in their attempts to find out the real relationship and how can balance be achieved, which is the main goal of each deposits.

For the sake of comprising the study variables, the research has formed the problem of the study which refers to the bank capability to enlarge profits without dissipation in liquidity   of the bank which will negatively reflect on the bank's fame as well as the customers' trust. For all these matters, the researcher has proposed a set of aims, the important of which is the estimation of the bank profitability; liquid

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 27 2020
Journal Name
Water
Groundwater Flow-Modeling and Sensitivity Analysis in a Hyper Arid Region
...Show More Authors

Groundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only abo

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamics and its Effects on Saturation Region in Semiconductor Optical Amplifiers
...Show More Authors

We focus on studying the dynamics of bulk semiconductor optical amplifiers and their effects on the saturation region for short pulse that differ, however there is the same unsaturated gain for both dynamics. Parameters like current injection, fast dynamics present by carrier heating (CH), and spectra hole burning (SHB) are studied for regions that occur a response to certain dynamics. The behavior of the saturation region is found to be responsible for phenomena such as recovery time and chirp for the pulse under study.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Diagnosing the reality of applying the operating requirement according to the international specification for the business continuity management system (ISO 22301:2019) : applied research in the General Tax Authority
...Show More Authors

Abstract

                 The research aims to diagnose the reality of applying the eighth requirement (operation) of the business continuity management system according to the international standard (ISO 22301: 2019), in the General Tax Authority, which is related to planning, implementing and controlling specific processes and procedures to address risks and opportunities, and the research adopted the checklist of the standard ( ISO 22301: 2019), in obtaining information, to measure the extent of application and documentation, the percentages and the weighted arithmetic mean were relied upon, and the research reached a set of result

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 19 2022
Journal Name
Ishraqat Tanmawia
The reality of the divorce problem in Iraqi society Reasons, solutions and results
...Show More Authors

Praise be to God, who created people from one soul, and made her husband, and prayers and peace be upon His Messenger, Mercy given and the grace given, and on a machine and companions pure. Divorce cases have increased in recent years in a worrying manner, especially since divorce has unforeseen consequences at the individual and social levels. The source of concern stems from the fact that the cohesion and integrity of society starts from a family as it is the cornerstone of the social structure, which is the foundation upon which the large society is based. Marital life may suffer from problems and obstacles that are difficult to solve, so the man presents the divorce of his wife and that the phenomenon of divorce is not a result of it, b

... Show More
Publication Date
Sat Feb 08 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of the oral findings, salivary oxidative status and IgA level among group of workers exposed to petroleum pollutants in Al-Daura oil refinery
...Show More Authors

Background: Oil refinery workers are continuously exposed to numerous hazardous materials. Petroleum contains the heavy metals as a natural constituent or as additives. These metals induce the production of ROS which associated with an oxidative damage to DNA, proteins, and lipids. This study was conducted to assess the salivary levels of heavy metals, salivary oxidative status, oral immunological activity (salivary sIgA) and assessment of the oral findings among the workers of Al-Daura oil refinery in Baghdad city. Subjects, Materials and Methods: This study was done in Al-Daura oil refinery; samples consist of 60 workers involved in refinery processes (study group) and 20 non-workers (control group). Oral examination and saliva collection

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF