Preferred Language
Articles
/
jih-225
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
Use The Wallpaper Three-Dimensional in Living Room in the House of Iraq (Future spaces)
...Show More Authors

يرغب المرء أن يعيش في منزل يعبر عن اصالة تصميمه ذا اهداف جمالية كحاجته الى تحقيق الأهداف العملية. وعليه فمن الأهمية بمكان ان يشارك أصحابه مع المعنيين[1] بشؤون التصميم... وهنا ارتأت الباحثة ان تقوم بدراسة علمية حديثة حول ورق الجدران ثلاثي الابعاد وتوظيفة في غرفة المعيشة, وباسلوب عصري حديث يجمع بين جمالية التصميم والحداثة , إضافة الى تناول الإضاءة لما لها من دور في ابراز معالم وتفاصيل الأثاث

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 22 2019
Journal Name
Baghdad Science Journal
New record of three species of Leeches (Annelida:Hirudinea) in Al-Hindyia River / Babil Province / Iraq
...Show More Authors

In this study, a total of 209 individuals of leeches were collected from Al-Hindyia River / Babil Province. 116 individuals were identified as Erpobdella octaculata (Linnaeus, 1758), 50 individuals as Erpobdella punctata (Leidy,1870) and  43 individuals as Hemiclepsis marginata (Müller, 1774).  Four samples were collected monthly during a period from February to June 2018. Some physical and chemical water properties were also examined, including air and water temperature, potential of hydrogen pH, Electrical Conductivity EC, Total Dissolved Solid TDS, Dissolved Oxygen DO, and the Biological Oxygen Demand BOD₅.  Air and water temperature were r

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
International Journal Of Multiphase Flow
Application of artificial neural network to predict slug liquid holdup
...Show More Authors

Publication Date
Fri Dec 27 2024
Journal Name
Journal Of Engineering
Application of Mathematical Drilling Model on Southern Iraqi Oil Fields
...Show More Authors

View Publication
Publication Date
Sat Jul 03 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Comparison between VG-levy and Kernel function estimation with application
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Properties and Application of the Suggested Exponentiated Lomax Distribution Family
...Show More Authors

     The Exponentiated Lomax Distribution is considered one of the most commonly used continuous distribution which has a major role in analysing and modelling life time data. Therefore, A family was formed for the Exponential Lomax Distribution by introducing two new distributions as special case of the Exponentiated Lomax Distribution: (Modified Exponentiated Lomax Distribution (MELD) and Restricted Exponentiated Lomax Distribution (RELD. Furthermore, to assess the usefulness and flexibility, the two distributions were applied upon simulation study besides real application with real data set. The simulation results clearly shown the flexible performance of the maximum likelihood estimators for the parameter. Also, the real applicat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 22 2017
Journal Name
Farm Machinery And Processes Management In Sustainable Agriculture, Ix International Scientific Symposium
TESTING THE UNIFORMITY OF SPRAY DISTRIBUTION UNDER DIFFERENT APPLICATION PARAMETERS
...Show More Authors

View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between some of linear classification models with practical application
...Show More Authors

Linear discriminant analysis and logistic regression are the most widely used in multivariate statistical methods for analysis of data with categorical outcome variables .Both of them are appropriate for the development of linear  classification models .linear discriminant analysis has been that the data of explanatory variables must be distributed multivariate normal distribution. While logistic regression no assumptions on the distribution of the explanatory data. Hence ,It is assumed that logistic regression is the more flexible and more robust method in case of violations of these assumptions.

In this paper we have been focus for the comparison between three forms for classification data belongs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Application of Weyl Module In The Case Of Two Rows
...Show More Authors

View Publication
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic
...Show More Authors

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a

... Show More
View Publication Preview PDF