In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intended or anticipated by the application developer that attempts to subvert the relationship between a webpage and its supporting database, in order to trick the database into executing malicious code due to the poor design of the application. The proposed system is based on protection website at run time, before inclusion of user input with database by validating, encoding, filtering the content, escaping single quotes, limiting the input character length, and ï¬ltering the exception messages. The proposed solution is effectiveness and scalability in addition it is easily adopted by application programmers. For empirical analysis, we provide a case study of our solution and implement in Html, PHP, MySql , Apache Server and Jmeter application.
AW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 3
Background: Postoperative discitis is uncommon 4%, but it is the most disabling postoperative complication after lumbar discectomy.
Objective: To assess the effectiveness of intradiscal Gentamycin in prevention of lumbar discitis post operatively.
Patients and Methods: This is a prospective study involving 320 patients, who had lumbar discectomy. 140 patients (first group) from Jan. 2012 to Jan. 2013 were not had intradiscal gentamycin injection, while 180 patients (2nd group) From Jan 2013 to Jan 2014 (2nd group) had intradiscal injection of 80mg Gentamycin at the end of surgery and before closing up. Follow up was done 10 days to 6weeks after surgery by W.B.C count, ESR, C-reactive protein and clinical assessment.
Results: The
Objective: To compare the radiological and functional outcomes of patients of Comminuted intraarticular distal radius fractures treated with or without bone marrow injection along with external fixator ligamentotaxis. Methodology: This prospective comparative study on 41 patients with comminuted intra-articular lower end radius fractures distributed patients randomly into two groups depending on whether an aspirate of bone marrow was injected at the fracture site two weeks after fracture management with external fixation ligamentotaxis. Results: The mean age was 35.8 years, with male predominance. The radiological parameters (radial height, radial inclination, and volar tilt) at the 6th month follow up were lower in the group who did not re
... Show MoreThe research aims to highlight on the reasons of financial & managerial corruption phenomena and to suggest systems & methods that promote controlling and developing the mechanism to combat corruption it also highlights on the ways that should available to enable the three regulatory agencies to reduce this phenomenon. The research depends on the following hypothesis "the governance of state institutions and the application of electronic government with depending on a correct mechanism to crossing auditing and the equilibrium performance model well help to reduce corruption phenomenon in Iraq" the two researchers have been concluded some conclusions the main one is that so many reasons of corruption starting from the bad
... Show MoreThis paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreLoss of drilling fluid in the Nasiriyah oil field can be considered as a big,
serious, and expensive problem at the same time, therefore accurate and integrated
program must be prepared before start drilling in layers that are likely to get loss
circulation. From the available data of well Ns-13, the area of loss was detected in
five layers, which are Dammam, Um- radoma, Tayarat, Shiranish and Hartha since
these layers contain natural cracks and high porosity represented by vugs.
Methods of prevention have been identified by specifying the minimum values
of drilling parameters to reduce hydrostatic pressure, thus reducing equivalent
density of drilling mud during the circulation, depths of casing shoes is
deter
Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreBackground: Osteoporosis is a skeletal defect manifested by a reduction of bone strength as a result of reduced bone mass to the extent that there is a higher risk of fracture even on minor trauma. Hysterectomy in a premenopausal woman is a well known cause of ovarian failure resulting in an increased risk of osteoporosis.
Objective : To clarify bisphosphonate's preventive effect on osteopenia and osteoporosis in premenopausal women after hysterectomy.
Type of the study: Cross –sectional study.
Method: 84 premenopausal females post hysterectomy aged between 40 – 50 years, were enrolled in this randomized controlled double blinded trail a
... Show More