Preferred Language
Articles
/
jih-225
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 26 2021
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Web Query Behaviour Concerning HEV (Blue) Light in Ophthalmology
...Show More Authors

Background: High-energy visible (HEV) possesses high-frequency in the violet-blue band of the visible light spectrum. Blue light has relevance to ophthalmology via photochemically-induced retinal injury.

Objectives: To explore the spatial-temporal mapping of online search behavior concerning HEV light.

Materials and Methods: We retrieved raw data of web search volume, via Microsoft Google Trends, using five search topics; "Biological effects of HEV light", "Vision impairment", "Macular degeneration", "Retinal tear", and "Retinal detachment", for the period 2004-2020.

Results: Web users, mainly from Far-East Asia and Australasia, were most interest

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of Antibacterial Activity of Ethanolic Extracts for Three Local Plants
...Show More Authors

There is an increasing interest in the use of plant extracts as therapeutic agents, particularly their capacity to inhibit the growth of pathogenic microorganisms. In this study antibacterial effect of Malva sylvestris, Anastatica hierochuntica and Vitis vinifera leaves extracts were evaluated against Escherichia coli, Pseudomonas aeruginosa, Bacillus subtilis, Staphylococcus aureus and Proteus mirabilis. The in vitro antibacterial activity was performed using agar well diffusion method and the minimum inhibitory concentration (MIC) was determined by microtitration technique. The result indicated that the extract of V. vinifera leaves inhibited with the growth of gram-positive bacteria, as well as gram-negative bacteria while the extract

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Weibull Parameters and Wind Power Assessment for Three Locations in Iraq
...Show More Authors

In this research, we built a program to assess Weibull parameters and wind power of three separate locations in Iraq: Baghdad, Basrah and Dhi-qar for two years 2009 and 2010, after collecting and setting the data available from the website "Weather Under Ground" for each of the stations Baghdad, Basrah and Dhi-qar. Weibull parameters (shape parameter and scale parameter) were estimated using maximum likelihood estimation method (MLE) and least squares method (LSM). Also, the annual wind speed frequencies were calculated noting speed most readily available through the above two years. Then, we plotted Weibull distribution function and calculate the most significant quantities represented by mean wind speed, standard deviation of the value

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Crawling and Mining the Dark Web: A Survey on Existing and New Approaches
...Show More Authors

    The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Journal Of Energy Storage
Nanofluid-assisted enhanced sealing security for efficient geological hydrogen storage in Saudi Arabian basalt
...Show More Authors

The modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensif

... Show More
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Bild Law Journal
Law and its influential role for strategic leadership in managing security crises in Iraq
...Show More Authors

Scopus
Publication Date
Sat Jan 15 2022
Journal Name
Mest Journal
SMARTPHONE APPLICATION FOR MANAGING MISSED AND FOUND BELONGINGS
...Show More Authors

Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the p

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Social Media Application for Recruitment Using Pythagorean Fuzzy
...Show More Authors

    The growth of social media is now utilized all over the world. In the past several years social media is used to communicate between person for information sharing and entertainment but now social media is also used for the hiring. This work collects data through questionnaire and online dataset on the recruitment process for three social media i.e. Facebook, Twitter, and LinkedIn. Pythagorean Fuzzy Relation (PFR) is an expansion of both Fuzzy Relationship and Fuzzy Intuitionist Relationship. The Pythagorean fuzzy set is a modern conceptual structure with greater capacity to deal with imprecision rooted in decision making. So we used this technique to identify a social media containing more number of positive respondents in recrui

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref