Preferred Language
Articles
/
jih-225
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Innovation, Creativity And Change
The importance of using the World Wide Web (the Internet) for professors of Arabic Language Department at the University of Baghdad‏
...Show More Authors

Preview PDF
Publication Date
Thu Nov 03 2022
Journal Name
Frontiers In Applied Mathematics And Statistics
Prey fear of a specialist predator in a tri-trophic food web can eliminate the superpredator
...Show More Authors

We propose an intraguild predation ecological system consisting of a tri-trophic food web with a fear response for the basal prey and a Lotka–Volterra functional response for predation by both a specialist predator (intraguild prey) and a generalist predator (intraguild predator), which we call the superpredator. We prove the positivity, existence, uniqueness, and boundedness of solutions, determine all equilibrium points, prove global stability, determine local bifurcations, and illustrate our results with numerical simulations. An unexpected outcome of the prey's fear of its specialist predator is the potential eradication of the superpredator.

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Advances In Science, Technology & Innovation
Producing a Three Dimensional Model for the University of Baghdad Campus Using GIS Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 19 2020
Journal Name
Applied Water Science
Spiral path three phase fluidized bed reactor for treating wastewater contaminated with engine oil
...Show More Authors
Abstract<p>In this study, a new type of circulating three-phase fluidized bed reactor was conducted by adding a spiral path and was named as spiral three-phase fluidized bed reactor (TPFB-S) to investigate the possibility for removing engine oil (virgin and waste form) from synthetic wastewater by using Ricinus communis (RC) leaves natural and activated by KOH. The biosorption process was conducted by changing particle diameter in the range 150–300 and 300–600 µm, liquid flow rate in the range 2.5–4.5 L/min and gas flow rate in range of 0–1 L/min, while other parameters initial oil emulsion concentration, pH, adsorbent concentration, agitation speed and contact time were kept constant at 2000 mg/L, 2,</p> ... Show More
View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Computational And Theoretical Nanoscience
Feasibility of Internet of Things Application for Real-Time Healthcare for Malaysian Pilgrims
...Show More Authors

Internet of Things (IoT) technology could be an effective solution to accomplish real-time retrieval of historical electronic health records (EHRs) to present better service of healthcare. In a pilgrimage environment such as the Hajj, IoT can be applied by identifying the non-local patients as electronic tags, and the tag data can be read by wireless sensors. The data that is collected using Radio-Frequency Identification (RFID) can be acquired from a Wireless Sensor Network (WSN) in order to accomplish many decisions, such as sending an ambulance to a patient’s location, sending an emergency alert to his immediate family circle, and retrieving his EHR from a database. The main contribution of this research is to propose a conceptual IoT

... Show More
View Publication
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Application of Emulsion Liquid Membrane Process for Cationic Dye Extraction
...Show More Authors

In the present work studies were carried out to extract a cationic dye (Methylene Blue MB) from an aqueous solution using emulsion liquid membrane process (ELM). The organic phase (membrane phase) consists of Span 80 as emulsifier, sulfuric acid solution as stripping agent and hexane as diluent. 

In this study, important factors influencing the extraction of methylene blue dye were studied. These factors include H2SO4 concentration in the stripping phase, agitation speed in the dye permeation stage, Initial dye concentration and diluent type.

   More than (98%) of Methylene blue dye was extracted at the following conditions: H2SO4 concentration (1.25) M, agitation

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation of PPSU Hollow Fiber Nanofiltration Membranes for Nanofiltration Application
...Show More Authors

PPSU hollow fiber nanofiltration membranes are prepared by applying two concentrations and various extrusion pressures according to the phase inversion method. Cross-sectional area and outer structures were characterized by using scanning electron microscope (SEM) and atomic force microscopy (AFM). In additional to the pore size distribution, either the mean roughness or the mean pore size of the PPSU hollow fiber surfaces was evaluated by AFM. It was found that the morphology of the PPSU fibers had both sponge-like and finger-like structures through different extrusion pressures and PPSU concentrations. The mean pore size and mean roughness for inner and outer surfaces were seen to be decreased with the increase of extrusion pressure at

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Production of Zinc oxide for medical application from Zinc scraps
...Show More Authors

In this work ,medical zinc oxide was produced from zinc scraps instead of traditional method which used for medical applications such as skin diseases, Iraq is importing around 50 ton/year for samarra plant the producted powder has apartical size less than 5 micron and the purity was more than 99.98%,also apilot plant of yield capacitiy 15 kg/8hours wsa designed and manufactured .

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Fabrication and characterization of porous silicon for humidity sensor application
...Show More Authors

Porous Silicon (PS) layer has been prepared from p-type silicon by electrochemical etching method. The morphology properties of PS samples that prepared with different current density has been study using atom force measurement (AFM) and it show that the Layer of pore has sponge like stricture and the average pore diameter of PS layer increase with etching current density increase .The x-ray diffraction (XRD) pattern indicated the nanocrystaline of the sample. Reflectivity of the sample surface is decrease when etching current density increases because of porosity increase on surface of sample. The photolumenses (PL) intensity increase with increase etching current density. The PL is affected by relative humidity (RH) level so we can use

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref