Preferred Language
Articles
/
jih-225
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 02 2021
Journal Name
Review Of International Geographical Education
Energy Security and Energy Transition in Germany
...Show More Authors

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Conjugated Polymer (MEH-PPV:MWCNTs) Organic Nanocomposite for Photodetector Application
...Show More Authors

Fabrication of a photodetector consists of the conjugated polymer "MEH-PPV"- poly (2-methoxy-5-(2'-ethylhexyloxy)-1,4-phenlenevinylene) and MEH-PPV:MWCNT nanocomposite thin film. The volume ratio investigated was 0.75:0.25. MEH-PPV was dissolved in chloroform solvent and doped with MWCNTs. The spin coating method was used to achieve a facile and low cost photodetector. The absorption spectrum decreases by adding the CNTs. The PL spectrum detected recombination curve results by doping the polymer with CNTs, and AFM measurement showed an increase of roughness average from (0.168 to 2.43nm) of "MEH-PPV" and "MEH-PPV:CNTs", respectively. The doping ratio 0.25, which has a higher photoresponsivity, was evaluated at 1.70 A/W and 2.14 A/W of th

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Performance application of ultraviolet disinfection technique for raw water
...Show More Authors
Abstract<p>Microbial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Synthesis and characterization of Au nanoparticles for nanomedicine application
...Show More Authors

Gold nanoparticles AuNPs have proven to be powerful tools in various nanomedicine applications, because of their photo-optical distinctiveness and biocompatibility. Noble metal gold nanoparticles was prepared by pulsed laser ablation method (1064-Nd: YAG with various Laser power from 200 to 800 mJ and 1 Hz frequency) in distil water. The process was characterized using UV-VIS absorption spectroscopy. Morphology and average size of nanoparticles were estimated using AFM and X-ray diffraction (XRD) analysis which show the nature of gold nanoparticles (AuNPs). Antibacterial activity of gold nanoparticles as a function of particles concentration against gram negative bacterium Escherichia coli and gram positive bacterial Staphylococcus aureu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Factors Affecting Labor Productivity on Construction in Kurdistan of Iraq: Web Survey
...Show More Authors

This study was set out to investigate factors affecting labor productivity on construction in the north of Iraq (Kurdistan) and to rank all the factors based on engineers, contractors, and designer’s opinions. 76 factors were analyzed based on previous literature and a pilot study. Next, by using online Google Form, a questionnaire form was created and sent to people who have experience in the construction industry. Afterward, the questionnaire form was sent to targeted people by email and social media apps. Factors were divided into nine groups “Management, Technical and Technology, Human and Workforce, Leadership, Motivation, Safety, Time, Material and Equipment, and External”. However, 202 respondents participated in this study,

... Show More
View Publication Preview PDF
Crossref (3)
Crossref