It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The particle-hole state densities have been calculated for 232Th in
the case of incident neutron with , 1 Z Z T T T T and 2 Z T T .
The finite well depth, surface effect, isospin and Pauli correction are
considered in the calculation of the state densities and then the
transition rates. The isospin correction function ( ) iso f has been
examined for different exciton configurations and at different
excitation energies up to 100 MeV. The present results are indicated
that the included corrections have more affected on transition rates
behavior for , , and above 30MeV excitation energy
The problem of research is the need to find out the obstacles and difficulties facing women in accessing leadership positions at the University of Baghdad from their point of view. The importance of research comes from the importance of women in the university and their vital role in the development of society. The research objectives summarized the most important obstacles facing women Access to the leadership positions in the university and the relative weight of these obstacles as well as trying to identify differences in their view of these obstacles according to the variables of specialization (scientific, human) and the scientific title (Professor, Assistant Professor, Teacher, Assistant Lecturer). They were (144) university female
... Show MoreThis research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with economic concentration. &n
... Show MoreThe moral aspect is an important one in the structure of personality , and the lack of moral aspect is responsible for what we suffering today from problems . there is no exaggeration to say that many of our current problems are moral problems , and reflects the lack of moral growth.
The goal of research is to build scale in order to detect the level of moral reasoning among junior high school students in Baghdad , The researcher followed the procedures in the construction of scientific standards in order to measur
... Show MoreBackground: Knowledge is considered to be essential for developing healthy practices and preventing the main oral diseases. In some developing countries, women were at higher risk to develop these diseases. This study was conducted to evaluate women’s dental knowledge and practices through a specific questionnaire and the relationship with patient’s educational level and the number of their children. Subjects and method: Women, aged from 25-35 years old, were selected to participate in the current study. They were attending dental clinics in the teaching hospital of Baghdad University. Each participant was instructed to answer questionnaire sheet which is previously prepared in Arabic language by the authors. The total numb
... Show MoreThe current research aimed to identify psychological stability and its relationship to university integration and spiritual intelligence among university students. The research sample consisted of (158) students from the College of Education - Al-Mustansiriya University.
A scale was applied: psychological stability, university integration, and spiritual intelligence, and by using the (Pearson) correlation coefficient, and the t-test, the results showed: the sample members enjoy psychological stability, university integration, and spiritual intelligence, and there is a positive, statistically significant correlation between the research variables, and the results resulted in some recommendations and proposals.
This paper performance for preparation and identification of six new complexes of a number of transition metals Cr (lII), Mn (I1), Fe (l), Co (II), Ni (I1), Cu (Il) with: N - (3,4,5-Trimethoxy phenyl-N - benzoyl Thiourea (TMPBT) as a bidentet ligand. The prepared complexes have been characterized, identified on the basis of elemental analysis (C.H.N), atomic absorption, molar conductivity, molar-ratio ,pH effect study, I. Rand UV spectra studies. The complexes have the structural formula ML2X3 for Cr (III), Fe (III), and ML2X2 for Mn (II), Ni (II), and MLX2 for Co (Il) , Cu (Il).
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show More