Preferred Language
Articles
/
jih-225
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
CONSTRACION SCALE FOR AUTISTIC CHILDREN
...Show More Authors

Autism is considered as one of the most developmental  problems  in the world that interfere with children growth and affect their social ,emotional and cognitive development child with autism used to be normal in his growth but in his development parents started to notice that their child characterize by loneliness and withdrawal himself from the surrounding world with some mannerism behaviors these characteristics used to be manifested children during the 1st  three year of their life .  It appears, one in every 500 birth (The American International Institution for child health 1997. and it would be less in females than makes at 1/4 percent .

    Aim is to b

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavior Therapy for Depression
...Show More Authors

The current research aimed to identify the cognitive-behavioral therapy on people with depression, through the following hypothesis (there are no statistically significant differences in the sample before and after cognitive-behavioral therapy). The importance of research is highlighted through the use of cognitive-behavioral therapy, to be used in treating depression, anxiety and fears by health institutions. It is also considered as a reference for psychological studies related to this topic to be added to our libraries that already suffer from a scarcity of this type of resources. The cognitive-behavioral therapy was used in the treatment of five male subjects.

The study revealed the existence of statistically significant diff

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Achieving Goals for Postgraduate Students
...Show More Authors

The current research aims to identify the achievement of goals and the significance of the differences in achieving goals according to the variable of gender (male-female), specialization (scientific-human), and the stage (Master-PhD) for postgraduate students. To achieve the goals of the current research, the researcher developed a scale of achieving goals that was built according to the theory of (Lock & Latham 1990), which was applied to a sample of (257) male and female students who were selected randomly with a proportional distribution for the academic year (2021-2022). The scale of achieving goals consists of (30) items. The current research found that the research sample of postgraduate students has achieved their goals in ge

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
Guidelines for covering online surveys
...Show More Authors

Media and communication's research are varied in accordance to research approaches' variety which seeks to reach convergent social, psychological, political, economic, and technical point of views. Its main aim is to assimilate all the new variables in the communicative method, especially, social media sites research; concerning their methodology, tools and theories. It is due to their diverse - developed applications and their increased rates of public use becoming irreplaceable in our daily life. It is well reflected by their consequent impact on the the public beside their role in changing its views.

This clarifies the notable increase of scientific research that concern them manifesting the dialectical relations and interfere

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Dielectric Waveguide for Composite Materials
...Show More Authors

The Maxwell equations have been formulated for a composite slab waveguide at x-band wave propagation. The eigenvalues of the system equations are obtained by using MATLAB program. These eigenvalues are used to obtain the wave propagation constant and a number of modes inside the slabs. A good correspondence was seen between the number of modes and the cut off thickness. The parameter that affects the performance of waveguide is the slab thickness. The propagation constant is usually adopted to characterize this type of waveguide and show how the cutoff frequency of the mode in the slab is increased dramatically by decreasing the frequency.
Our study focused on lower modes, the results for the transmission coefficient are then used to

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Test anxiety for intermediate level
...Show More Authors

Test anxiety for intermediate level The current study aims to measure the test anxiety of research’s sample and to identify the statistical differences of test anxiety, considering two variables gender and students classes level (first and third intermediate class). To do this, a stratified random sampling of (300) student from first and third intermediate classes had selected from both the karkh and Rusafa sides of Baghdad province for the academic year 2015-2016. The author tested the whole sample by using the test anxiety scale that had tested for its validity and reliability. The results revealed that the research’s sample as a whole was suffering from test anxiety, there were a statistical differences between male and female tha

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Master Sintering Curve for TiO2
...Show More Authors

The master sintering concept is introduced as a unifying sintering model for the initial, intermediate and final stage of sintering. The master sintering curve is independent on the time-temperature trajectory due to account for its integral. The master sintering curve is constructed on a material parameter, which is the activation energy for sintering and other curve shaping parameters, which depends on the initial state of the powder. Literature data of sintering of TiO2 compacts with two initial packing densities of 55% and 69% of theoretical is utilized for the construction of the master sintering curves. The higher initial packing density compact shows higher densification rate, which is reflected by different set of shaping paramet

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Watermarking for Mobile Device
...Show More Authors

The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore,  the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of  the mobile network and its wide usage through  different types  of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF
Publication Date
Fri Dec 24 2021
Journal Name
Iraqi Journal Of Science
Best Regression for Eye Recognition
...Show More Authors

     Human eye offers a number of opportunities for biometric recognition. The essential parts of the eye like cornea, iris, veins and retina can determine different characteristics. Systems using eyes’ features are widely deployed for identification in government requirement levels and laws; but also beginning to have more space in portable validation world.

The first image was prepared to be used and monitored using CLAHE which means (Contrast Limited Adaptive Histogram Equalization) to improve the contrast of the image, after that the 3D surfac

... Show More
View Publication Preview PDF
Scopus Crossref