Preferred Language
Articles
/
jeasiq-1841
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via information systems celebrating safety, which is missed by many organizations, despite its importance, and providing the means for the protection and safety of the information transmitted from the center to the branches and back again to the center.

In order to achieve the goals of the study, we build the suggested model, by using the  Virtual Private Network through Cisco and Microsoft suggested models, The study concludes a set of conclusions, the most important, adopt a proposed model to use Virtual Private Network, whether the model presented by Cisco or through the application form provided by Microsoft.

In light of the findings, the study concluded a set of including, adopting the model of Microsoft Virtual Private Network due to the easy to apply using the infrastructure of the bank as tubeless to special equipment.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The "actor network theory" approach in dealing with landscapes in historical centers
...Show More Authors

The historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of technical indicators on the movement of bank stock prices : Applied research in a sample of Iraqi private commercial banks
...Show More Authors

This study aimed at indicators of technical analysis and their impact on a group of trading stock indices related to it, by standing on the methods used in technical analysis and its various models, diagnosing the obstacles and difficulties that the participants face in predicting stock prices, and proposing solutions and recommendations to overcome and overcome them. From a scientific and practical perspective.

Where the research community consisted of (25) Iraqi private commercial banks, while the research sample consisted of (3) banks with a percentage of (12%) of the research community. The study used the analytical approach to the financial statements during the period between (1/2/ 2022-30/4/2022),

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protec

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Directorial Vision and its Relation to Scenographic Proposal in the Iraqi Theater Show- The Play of Darkness -A Model: رامي سامح زكي
...Show More Authors

The increase of the scenographic designer role on account of the character of the director in the Iraqi theater constituted a clear phenomenon that has been manifested in many shows, which necessitated a stance on the nature of this relation and delimiting the work space for each one of them inside the theater show. The research focuses on determining the work relation between the directorial vision and the scenographic proposal in the Iraq theater show. The research is divided into four chapters, the first one addressed the methodological framework, where the research problem was stated in the following question (has the scenographic designer been able through his scenographic proposal to remove the director from his position being the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Water security in Basra Study economic reality and prospects for future water
...Show More Authors

It  can be said that the Security of water  in  Basra from the visual task vital strategic issues of concern to the attention of researchers in various attributions and those interested in water, environmental, economic, social, cultural and political affairs ... etc. This view of the great importance of the issue of water in the occupied Basra, which is characterized by parochialism and scarcity, When looking at the sources of our daily lives and in our reality today. We find that millions of people living on the two main exporters Tabaaan oil and water. And depleted oil wealth However Manfred him the most attention because we entered it surpasses all other sources of income, but is not it a littl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref