Preferred Language
Articles
/
jih-225
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Investigations of High Power Yb3+: YAG Thin-Disk Laser
...Show More Authors

     The present study includes a theoretical treatment to derive the general equations of pumping threshold power ( ), laser output power (Pout), and laser device efficiency (ƞ) of the element-doped thin-disk laser (Yb3+) with a quasi-three-level pumping scheme in the continuous wave mode at a temperature of (299K°). In this study, the host crystals (YAG) were selected as typical examples of this laser design in a Gaussian transverse mode. The numerical solution of these equations was made using Matlab software by selecting the basic parameters from the recently published scientific articles for the laser design of these crystal hosts. According to this simulation, this article studied the effect o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Using Multiattribute Analysis to Predicting Effective Porosity of Yamama Formation in Nasriya Oilfield Southern Iraq
...Show More Authors

Emerge application was used in Hampsson-Russell programs and that uses a combination of multiple 3D or 2D seismic attributes to predict some reservoir parameter of interest. In this research used the seismic inversion technique was performed on post-stack three dimensions (3D) seismic data in Nasriya oilfield with five wells  and then used this results in  Emerge analysis (training and application) were used to estimate reservoir properties (effective porosity) with multiattribute analysis derive relations  between them at well locations. The horizon time slice of reservoir units of (Yb1, Yb3 and Yc) of Yamama Formation was made for property (effective porosity) to confirm match results and enhancement trends within these

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
the impact of knowledge management on organizational innovation in aviation companies operating in sudan
...Show More Authors

Abstract

The aim of this study was to identify the impact of the Knowledge Management Processes on organizational creativity in the Airlines  Companies working in Sudan. The hypotheses formulated as:, there is a positive relationship statistically significant differences between knowledge management processes (diagnosis, the acquisition, storage, distribution and application) and organizational creativity. the measurement of the variables had been adopted from previous studies. The study used a Descriptive approach and and the analytical statistical method to construct the model and SPSS Program for data analysis .Purposive sample procedure had been chosen and structured questionnaire had been developed. Out of 215 q

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 24 2023
Journal Name
College Of Islamic Sciences
Analyzing the likeness of fundamentalists and examples of its jurisprudential applications
...Show More Authors

The new events in every era are endless, and it is not required of the legal texts to pursue each event by itself and attach to it its ruling.
At the same time, every event or action must have a Shari’a ruling according to the wise Lawgiver, and our scholars have noted this in every event presented to them. ...etc.
It is well known that reaching the legal ruling on a matter, by examining the detailed evidence, is subject to following the path of the rules and regulations specific to the overall evidence, which we organize on the basis of the principles of jurisprudence.
Therefore, any disagreement about the manner or content of these rules will have an impact on the difference of jurists in partial issues, when examining the d

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Evaluation the Western Canal of Al- Ishaqi Irrigation Project
...Show More Authors

The water scarcity that Iraq suffers from and the low irrigation efficiency in irrigation projects, therefore, it was necessary to evaluate the performance of the irrigation system of the western canal for the Ishaqi irrigation project in Salah al-Din Governorate to determine the water management strategies that can be used to improve the irrigation efficiency in the project. The performance of the field irrigation system was evaluated on two fields of different crops and irrigation methods according to the agricultural reality of the study area in the Western canal for the Al-Ishaqi Irrigation Project in Salah Al-Din Governorate. The fieldwork included measurements of the moisture content before and after irrigation, fi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Hybrid Solar Air Conditioning System using a New Control Strategy
...Show More Authors

Enhancement of the performance for hybrid solar air conditioning system was presented in this paper. The refrigerant temperature leaving the condenser was controlled using three-way valve, this valve was installed after the compressor to regulate refrigerant flow rate towards the solar system. A control system using data logger, sensors and computer was proposed to set the opening valve ratio. The function of control program using LabVIEW software is to obtain a minimum refrigerant temperature from the condenser outlet to enhance the overall COP of the unit by increasing the degree of subcooled refrigerant. A variable load electrical heater with coiled pipe was used instead of the solar collector and the storage tank to simulate the sola

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 17 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Prediction Using Artificial Neural Network of Bed Porosity and Solid Holdup in Viscous 3-Phase Inverse Fluidization
...Show More Authors

In the present investigation, bed porosity and solid holdup in viscous three-phase inverse fluidized bed (TPIFB) are determined for aqueous solutions of carboxy methyl cellulose (CMC) system using polyethylene and polypropylene as  a particles with low-density and diameter (5 mm) in a (9.2 cm) inner diameter with height (200 cm) of vertical perspex column. The effectiveness of gas velocity Ug , liquid velocity UL, liquid viscosity μL, and particle density ρs on bed porosity BP and solid holdups εg were determined. The bed porosity increases with "increasing gas velocity", "liquid velocity", and "liquid viscosity". Solid holdup decreases with increasing gas, liquid

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Secure Location Privacy Transmitting Information on Cellular Networks
...Show More Authors

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF