Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Predominant Beliefs toward Coronavirus of Baghdad University Students
...Show More Authors

Abstract

The current research aims to identify the most prominent beliefs about coronavirus of Baghdad University students, as well as to identify the prominent beliefs toward coronavirus of male and female students. To achieve the research objectives, a questionnaire of (15) items was administered to a sample of (600) male and female students collected from ten different colleges at the university of Baghdad. The findings of the research illustrated that item (8) took priority as students believe there is a misleading about coronavirus spreading by governments, item (2) which indicated that coronavirus is man-made took level two, followed by item (10), it proposes that coronavirus emerged from the American milit

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
The Authority Concept among University students of Baghdad
...Show More Authors

The Present study aims to shed some light on the concept of authority of university students and to find statistically significant differences as regards this concepts in accordance with three variables gender (males, females),field of study(scientific ,humanities)and grade(second ,fourth). To accomplish the study a ( 7) level scale was developed for the concept of authority and it subjected to validity and credibility the scale was used with 590 student sample (237) males and (353) females Results show that male students show obedience to authority forms below the Avery e component with the theoretical Avery of the scale besides ,reinforcement was on the top of authority chain ,followed by person traits ,friends, affect punishment and t

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Personality types (The Enneagram) among the lecturers of Baghdad University and its relation to some variables
...Show More Authors

The current study is aimed to identify personality types of the lecturers of Baghdad University as well as identify the prevailing types among the lecturers. In addition, the study aimed to identify the significant difference among personality types (The Enneagram) according to the variables of academic title and scientific major . One hundred and ninety four lecturers were involved in this study. In order to achieve the study's aims, the scale of (Baron& Wagele 1994) was used to measure the nine personality types (The Enneagram) that was translated by( Anwar Omar Ibrahim 2012). Some statistical analysis were used and the result demonstrated that Romantic types was found to be the most prevailing types among the lecturers of Baghdad

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Review Of International Geographical Education
Application of strategic management in the colleges of Education / University of Baghdad
...Show More Authors

A field study aimed at identifying the reality of the application of strategic management in the colleges of education/ University of Baghdad. The research adopted the descriptive analytical approach. The research community, consisting of 801 faculty teachers, has been identified. The research sample was selected in a simple random way and represented 15% of the research community, totalling 124 teaching members. A questionnaire was constructed that included (46) items divided between areas (strategic objectives, strategy planning and formulation, implementation of the strategy, and evaluation of the strategy). The honesty and consistency of the tool was verified. The researcher analyzed the research data using SPSS. The most important resu

... Show More
Preview PDF
Publication Date
Thu Aug 20 2020
Journal Name
Arab World English Journal
Investigating the Effectiveness of YouTube as a Learning Tool among EFL Students at Baghdad University
...Show More Authors

YouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair

... Show More
View Publication
Crossref (2)
Crossref