Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
In this paper a two dimensional numerical simulation have been applied using
MATLAB program for generating Fraunhofer diffraction pattern from different
apertures. This pattern is applied for three types of apertures, including, circular,
square, and rectangular functions, and it's could be generated any wavelength in the
visible light. The studying demonstrated the capability and the efficiency of optical
imaging systems to observe a point source at very long distance. The circular
aperture shows better results across the shape of Fraunhofer pattern and optical
transfer function (otf). Also, the minimum values of the normalized irradiance of
different diffracted apertures have been computed at different dimension
The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstractio
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
The research aims to present a proposed strategy for the North Oil Company, and the proposed strategy took into account the surrounding environmental conditions and adopted in its formulation on the basis and scientific steps that are comprehensive and realistic, as it covered the main activities of the company (production and exploration activities, refining and refining activities, export and transport of oil, research and development activity, financial activity, information technology, human resources) and the (David) model has been adopted in the environmental analysis of the factors that have been diagnosed according to a
... Show MoreWilla Cather (1873-1947) sought to capture the gradation of human emotion through carefully selected descriptive and narrative touches and firmly controlled management of dramatic scenes, situations, dialogue, and point of view. Cather’s novels and stories drew increasingly upon her personal experiences and memories.
The old settlement of Virginia and the new lands of Nebraska formed the bedding ground for Willa Cather’s talents; so did the layers of memory she found across the North American continent, from New Mexico to Canada. She saw the full-blooded European immigrants, Czechs and Swedes, plowing the unbroken land, on the way up from peasants to proprietors.
 
... Show MoreIn this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.
Cuneiform symbols recognition represents a complicated task in pattern recognition and image analysis as a result of problems that related to cuneiform symbols like distortion and unwanted objects that associated with applying Binrizetion process like spots and writing lines. This paper aims to present new proposed algorithms to solve these problems for reaching uniform results about cuneiform symbols recognition that related to (select appropriate Binerized method, erased writing lines and spots) based on statistical Skewness measure, image morphology and distance transform concepts. The experiment results show that our proposed algorithms have excellent result and can be adopted
... Show MoreIn this paper, we generalized the principle of Banach contractive to the relative formula and then used this formula to prove that the set valued mapping has a fixed point in a complete partial metric space. We also showed that the set-valued mapping can have a fixed point in a complete partial metric space without satisfying the contraction condition. Additionally, we justified an example for our proof.
The political situation experienced by Iraq before the events of 2003 that led to the collapse of infrastructure. rebuilding costs were estimated after 2003 by187(million USD) according to the estimates of the basic needs as stated in Five-Year Plan 2010-2014. The difficult in financing projects and the continuous demands for maintenance and operating cost, and working by contemporary styles in different countries, the strategic option is to adopt the government entering the private sector as a partner in the development process. Since public _private partnership (PPP's) is at a germinating stage of development in Iraq, it has been studied the critical success factors(CSF's) in the experiences of countries that have implemented the style
... Show MoreThe efficiency of internal combustion engines (ICE) is usually about thirty percent of the total energy of the fuel. The residual energy is lost in the exhaust gas, the lubrication, and the cooling water in the radiators. Recently much of the researcher’s efforts have focused on taking advantage of wasted energy of the exhaust gas. Using a thermoelectric generator (TEG) is one of the promising ways. However, TEG depends entirely on the temperature difference, which may be offered by the exhaust muffler. An experimental test has been conducted to study the thermal performance of a different muffler internal design. The researchers resort to the use of lost energy in an ICE using TEG, which is one of the ways to take adv
... Show More