Preferred Language
Articles
/
jih-1680
New Proposed Method For Web Services Security

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose  a mechanism  for the client to provide authemication  data, based on the service definition , and  for the service  provider to retrieve those data . We also  show  how XMl.

Digital Signatures  and encryption can  be exploited to achieve a level

of  trust.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Suggested Model for auditing the performance of municipal institutions to verify the services provided

The services provided by the municipal institutions of the basic things needed by the man in his daily life and the evolution of cities basically depends on these services and therefore has paid most of the world's attention to this vital facility and give him the biggest concern for the welfare of the citizens, as is the research problem that there is no program scrutiny to evaluate the performance of municipal institutions contribute to measuring the efficiency and effectiveness of the services provided and was based on research on the premise that the preparation of the existence of audit program to evaluate the performance of municipal institutions contribute to measuring the efficiency and effectiveness of services provided has reac

... Show More
Crossref
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Link Analysis in Web Information Retrieval: a Survey

     The analysis of the hyperlink structure of the web has led to significant improvements in web information retrieval. This survey study evaluates and analyzes relevant research publications on link analysis in web information retrieval utilizing diverse methods. These factors include the research year, the aims of the research article, the algorithms utilized to complete their study, and the findings received after using the algorithms. The findings revealed that Page Rank, Weighted Page Rank, and Weighted Page Content Rank are extensively employed by academics to properly analyze hyperlinks in web information retrieval. Finally, this paper analyzes the previous studies.

Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 25 2022
Journal Name
Iraqi Journal Of Science
Application Voting System of Web based in Iraq

Currently voting process is paper based form, by using voting card or paper; thus the counting method is done manually, which exhausts a lot of time. Obsolete votes may be possibly occurring. This paper introduced a system in which voting and counting is done with the help of computer. The election process would be easier, it saves time, avoid errors while counting and obsolete votes are reduced. Electronic voting (E-voting) system is a voting system in which the election related data is stored and handled digitally, it would become the quickest, cheapest, and the most efficient way to administer election and count vote it is considered a means to further enhance and strengthen the democratic processes in modern information societies. Th

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Proceedings Of The 2020 2nd International Conference On Sustainable Manufacturing, Materials And Technologies
Crossref (5)
Crossref
View Publication
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A new Spectrophotometric Method For The Determination of La (III) With 3-Hydroxy -4-(2-hydroxyPhenyl azo) Naphthalene -1- Sulfonic Acid

A simple, rapid and sensitive spectrophotometric method has been proposed for the determination of La (III) using 3-hydroxy -4-(2-hydroxy-phenyl azo) naphthalene -1- sulfonic acid as a chromogenic reagent. This method is based on the formation of a red-pink colored complex, upon the reaction of La(III) with the reagent in an alkaline medium (pH= 9.50), having a maximum absorbance at 459 nm. Beer's law is valid in the concentration range 0.512 µg.ml-1 with a Sandell's sensitivity value of 0.0188 µg.cm-2 and molar absorptivity of 7376.12 L.mol-1.cm-1. The stoichiometric composition of the chelate is 1:3. The effect of the presence of different cations as interferants in the determination of La(III) under the given optimum conditions

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 14 2018
Journal Name
International Journal Of Engineering & Technology
Hybrid DWT-DCT compression algorithm & a new flipping block with an adaptive RLE method for high medical image compression ratio

Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig

... Show More
Crossref
View Publication
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Basin or Intrusion, a New Method to Resolve Non-Uniqueness in Gravity Interpretation

The aim of the current paper is to resolve the non-uniqueness in gravity interpretation through searching for singular points in the gravity field that are coincide with causative body vertices. The Absolute Second Horizontal Gradient (ASHG) method is used to locate the horizontal reference location of the body, while its amplitude could be used to define body corner depth. Intelligent use of the ASHG method could help in differentiating between basin and intrusion structures from their gravity effect and could facilitate the interpretation in forward modeling and constrain inversion modeling to maximum limit. The method is tested by using many synthetic examples with different types of shapes. A real data is used to examine the method a

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Solution of Riccati matrix differential equation using new approach of variational ‎iteration method

To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was ‎proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the ‎exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the ‎modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact ‎solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which ‎shows the reliability and applicability of the proposed approach. ‎