In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intended or anticipated by the application developer that attempts to subvert the relationship between a webpage and its supporting database, in order to trick the database into executing malicious code due to the poor design of the application. The proposed system is based on protection website at run time, before inclusion of user input with database by validating, encoding, filtering the content, escaping single quotes, limiting the input character length, and ï¬ltering the exception messages. The proposed solution is effectiveness and scalability in addition it is easily adopted by application programmers. For empirical analysis, we provide a case study of our solution and implement in Html, PHP, MySql , Apache Server and Jmeter application.
AW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 3
Objective: To compare the radiological and functional outcomes of patients of Comminuted intraarticular distal radius fractures treated with or without bone marrow injection along with external fixator ligamentotaxis. Methodology: This prospective comparative study on 41 patients with comminuted intra-articular lower end radius fractures distributed patients randomly into two groups depending on whether an aspirate of bone marrow was injected at the fracture site two weeks after fracture management with external fixation ligamentotaxis. Results: The mean age was 35.8 years, with male predominance. The radiological parameters (radial height, radial inclination, and volar tilt) at the 6th month follow up were lower in the group who did not re
... Show MoreThe research aims to highlight on the reasons of financial & managerial corruption phenomena and to suggest systems & methods that promote controlling and developing the mechanism to combat corruption it also highlights on the ways that should available to enable the three regulatory agencies to reduce this phenomenon. The research depends on the following hypothesis "the governance of state institutions and the application of electronic government with depending on a correct mechanism to crossing auditing and the equilibrium performance model well help to reduce corruption phenomenon in Iraq" the two researchers have been concluded some conclusions the main one is that so many reasons of corruption starting from the bad
... Show MoreThis paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreLeaching scheduling techniques are one of the suggested solutions for water scarcity problems .The aim of the study is to show the possibility of using leaching scheduling, when applying the irrigation scheduling program for a certain irrigation project, which was prepare by Water Resources Engineering –University of Baghdad with some modifications to generalized it and it make applicable to various climatic zone and different soil types.
The objectives of this research is to build a system that concerns the prediction of the leaching scheduling (depth and date of leaching water), illustrating the main problems (soil salinity, save the amount of leaching requirement, and to maintain crops growth).The other objective is to compare be
Background: Osteoporosis is a skeletal defect manifested by a reduction of bone strength as a result of reduced bone mass to the extent that there is a higher risk of fracture even on minor trauma. Hysterectomy in a premenopausal woman is a well known cause of ovarian failure resulting in an increased risk of osteoporosis.
Objective : To clarify bisphosphonate's preventive effect on osteopenia and osteoporosis in premenopausal women after hysterectomy.
Type of the study: Cross –sectional study.
Method: 84 premenopausal females post hysterectomy aged between 40 – 50 years, were enrolled in this randomized controlled double blinded trail a
... Show MoreIt is generally accepted that there are two spectrophotometric techniques for quantifying ceftazidime (CFT) in bulk medications and pharmaceutical formulations. The methods are described as simple, sensitive, selective, accurate and efficient techniques. The first method used an alkaline medium to convert ceftazidime to its diazonium salt, which is then combined with the 1-Naphthol (1-NPT) and 2-Naphthol (2-NPT) reagents. The azo dye that was produced brown and red in color with absorption intensities of ƛmax 585 and 545nm respectively. Beer's law was followed in terms of concentration ranging from (3-40) µg .ml-1 For (CFT-1-NPT) and (CFT-2-NPT), the detection limits were 1.0096 and 0.8017 µg.ml-1, respec
... Show MoreBackground: Hyperfunction of the muscles of the upper lip is considered as the most common cause of excessive gingival display (EGD). The aim of this study was to demonstrate the effectiveness of botulinum toxin (BT) injection as a conservative treatment for EGD due to muscular hyperfunction and to compare the outcome of 2 injection methods. Material and methods: This study included 40 participants who were randomly assigned into 2 groups of 20 each, The first group received 2.5IU BT injection at 1 point per side (2-points group), while the second group received a total of 5 IU of BT at 2 points per side (4-points group). The outcome variables were the reduction in the central and lateral gingival display expressed as the difference between
... Show More