Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
Computer science has evolved to become the basis for evolution and entered into all areas of life where the use of computer has been developed in all scientific, military, commercial and health institutions. In addition, it has been applied in residential and industrial projects due to the high capacity and ability to achieve goals in a shorter time and less effort. In this research, the computer, its branches, and algorithms will be invested in the psychological field. In general, in psychological fields, a questionnaire model is created according to the requirements of the research topic. The model contains many questions that are answered by the individuals of the sample space chosen by the researcher. Often,
... Show More
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show MoreIn this work ,medical zinc oxide was produced from zinc scraps instead of traditional method which used for medical applications such as skin diseases, Iraq is importing around 50 ton/year for samarra plant the producted powder has apartical size less than 5 micron and the purity was more than 99.98%,also apilot plant of yield capacitiy 15 kg/8hours wsa designed and manufactured .
In this article, we propose a Bayesian Adaptive bridge regression for ordinal model. We developed a new hierarchical model for ordinal regression in the Bayesian adaptive bridge. We consider a fully Bayesian approach that yields a new algorithm with tractable full conditional posteriors. All of the results in real data and simulation application indicate that our method is effective and performs very good compared to other methods. We can also observe that the estimator parameters in our proposed method, compared with other methods, are very close to the true parameter values.
Porous Silicon (PS) layer has been prepared from p-type silicon by electrochemical etching method. The morphology properties of PS samples that prepared with different current density has been study using atom force measurement (AFM) and it show that the Layer of pore has sponge like stricture and the average pore diameter of PS layer increase with etching current density increase .The x-ray diffraction (XRD) pattern indicated the nanocrystaline of the sample. Reflectivity of the sample surface is decrease when etching current density increases because of porosity increase on surface of sample. The photolumenses (PL) intensity increase with increase etching current density. The PL is affected by relative humidity (RH) level so we can use
... Show MoreIn the present work studies were carried out to extract a cationic dye (Methylene Blue MB) from an aqueous solution using emulsion liquid membrane process (ELM). The organic phase (membrane phase) consists of Span 80 as emulsifier, sulfuric acid solution as stripping agent and hexane as diluent.
In this study, important factors influencing the extraction of methylene blue dye were studied. These factors include H2SO4 concentration in the stripping phase, agitation speed in the dye permeation stage, Initial dye concentration and diluent type.
More than (98%) of Methylene blue dye was extracted at the following conditions: H2SO4 concentration (1.25) M, agitation
... Show MoreCopper with different concentrations doped with zinc oxide nanoparticles were prepared from a mixture of zinc acetate and copper acetate with sodium hydroxide in aqueous solution. The structure of the prepared samples was done by X-ray diffraction, atomic force microscopy (AFM) and UV-VIS absorption spectrophotometer. Debye-Scherer formula was used to calculate the size of the prepared samples. The band gap of the nanoparticle ZnO was determined by using UV-VIS optical spectroscopy.
The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions, Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.