Preferred Language
Articles
/
jeasiq-1841
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via information systems celebrating safety, which is missed by many organizations, despite its importance, and providing the means for the protection and safety of the information transmitted from the center to the branches and back again to the center.

In order to achieve the goals of the study, we build the suggested model, by using the  Virtual Private Network through Cisco and Microsoft suggested models, The study concludes a set of conclusions, the most important, adopt a proposed model to use Virtual Private Network, whether the model presented by Cisco or through the application form provided by Microsoft.

In light of the findings, the study concluded a set of including, adopting the model of Microsoft Virtual Private Network due to the easy to apply using the infrastructure of the bank as tubeless to special equipment.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Tuning PID Controller by Neural Network for Robot Manipulator Trajectory Tracking
...Show More Authors

Ziegler and Nichols proposed the well-known Ziegler-Nichols method to tune the coefficients of PID controller. This tuning method is simple and gives fixed values for the coefficients which make PID controller have weak adaptabilities for the model parameters variation and changing in operating conditions. In order to achieve adaptive controller, the Neural Network (NN) self-tuning PID control is proposed in this paper which combines conventional PID controller and Neural Network learning capabilities. The proportional, integral and derivative (KP, KI, KD) gains are self tuned on-line by the NN output which is obtained due to the error value on the desired output of the system under control. The conventio

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
Iop Conference Series: Earth And Environmental Science
The Role of Sewage Irrigation Management in Water Productivity, Growth and Yield Parameters of Broccoli in Al-Sulaimani government/Kurdistan region
...Show More Authors
Abstract<p>The objective of the present work was to estimate water requirements and water use efficiency for Broccoli under normal irrigation conditions and sewage irrigation. Field experiment was carried out during the season 2018 at station/Sulaimni agricultural station/Bakrajo –College of Agricultural Sciences. The experiment included three treatments: River water irrigation in all season growth (I<sub>1</sub>), Sewage water irrigation in all season growth (I<sub>2</sub>), Alternate irrigation (one river irrigation followed by two sewage water irrigation) in all season growth (I<sub>3</sub>). The experimental Design was Randomized Complete Block Design (RCBD) w</p> ... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
Imam al - Karji replies to some Islamic groups In his book the jokes of the Koran
...Show More Authors

Imam al - Karji replies to some Islamic groups
In his book the jokes of the Koran

View Publication Preview PDF
Publication Date
Sat Sep 13 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhancing Routing Efficiency in VANETs by Leveraging 5G to Mitigate Congestion
...Show More Authors

Transportation networks impact millions of people daily. Their efficiency immediately affects travel time, safety, and environmental sustainability. Unfortunately, various issues hinder the expected performance and efficiency of these networks. Traffic congestion is an up-to-date issue in the urban environment. Fuel consumption is high because travel time has increased, which has a passive environmental impact. Extensive research has been conducted to progress the intelligent transportation systems installed on communication networks and information to treat this congestion. However, there is a significant amount of affront residue in combining real-time data, estimation analytics, and 5G abilities effectively. This paper offers a n

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 03 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
New adaptive satellite image classification technique for al Habbinya region west of Iraq
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Numerical solution to inverse coefficient problem for hyperbolic equation under overspecified condition of general integral type
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Application of “LIML_LVR” method practically according to the general formula K-CLASS on suggestion simultaneous equation
...Show More Authors

في هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The extent to which governmental secondary schools' managers in al-hial province have cognitive management requirements
...Show More Authors

The current study aims to examine the level of cognitive management requirement among the governmental secondary schools' managers in al-hial province in the kingdom of Saudi Arabia. To do this, the author designed a questionnaire comprised (20) item which was applied on (250) managers included (113) manager hold bachelor degree and (137) manager hold master degree. To carry out this study, the researcher utilized the descriptive approach. The findings revealed that a high level of cognitive management requirements among secondary schools' managers as well as there is a significant difference at the (0.05) level regarding degree type, but there is no a significant difference according to gender variable.  

View Publication Preview PDF
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Model Reference Adaptive Control based on a Self-Recurrent Wavelet Neural Network Utilizing Micro Artificial Immune Systems
...Show More Authors

Abstract 

This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per

... Show More
View Publication Preview PDF
Crossref (1)
Crossref