Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
The Role of Transition of Workforce between Companies in Transferring Technology
...Show More Authors

The transition of professionals between different sectors is considered as one of sources of
acquisition of technology and will lead to add the practical experience to them. This experience
depending on different factors like: the scientific degree and practical experience by the
professionals, the technology possessed by the transferor sector, the duration that spent by
experienced in transferor sector, the type of work performed by professional….etc.
The research aims to verify the affect of these factors in technology transfer process.
Research reached that the technology transfer process which is depending on the Iraqi competencies
in work is unsatisfied level between Iraqi organizations because there are dif

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 27 2025
Journal Name
Journal Of Physical Education
The reality of the heroic graduate students in the College of Physical Education and Sports Sciences, University of Baghdad
...Show More Authors

View Publication
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Authority control and its role in uniting old arabic authors entries at the Central Library of the University of Baghdad and the Al-Mustansiriya: A Comparative Study
...Show More Authors

The research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .

1-The lack of authority control depends on it to find a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2006
Journal Name
Modern Sport
The effect of using a treadmill with different incline angles in developing some functional variables among Diyala University basketball team players
...Show More Authors

تعد لعبة كرة السلة من الألعاب الرياضية التي تحتاج متطلبات بدنية ووظيفية خاصة بها، وذلك من خلال الانتقال داخل الملعب بالكرة أو بدونها والسبل للتخلص من ملاحقة الخصم أثناء الدفاع وكيفية المناورة أثناء الهجوم مع إجادة التصويب بكافة أنواعه داخل الملعب، ومن هنا تكونت مشكلة البحث في كيفية تطوير تلك العوامل الوظيفية والتي لها الأثر في الارتقاء بمستوى أداء اللاعب أثناء اللعب، وعن طريق استخدام الباحثان لطريقة جهاز ا

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Assisting Students of Al-Quds Open University to Design Computerized Lessons According to ADDIE
...Show More Authors

This Action research aimed at Assisting Students of Faculty of Educational Sciences  at Al-Quds Open University to design computerized  lessons using the Power Point software and according to ADDIE model. The study sample consisted of 40 students  who were taking a course titled Technology of Education during the second semester of the 2014-2015 academic year and three academic instructors . To collect the required date  , the researchers used  focus group technique and structured interviews to get information from the 40 students and the three academic instructors involved in the course Technology of Education in QOU /Nablus Branch. In addition to these methods, a workshop with a guiding checklist was employed t

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 23 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Students Experience of Hybrid- Education Model at The University of Baghdad College of Pharmacy
...Show More Authors

The impact of COVID-19 pandemic on education models was mainly through the expansion of technology use in the different educational programs. Earlier impact of COVID-19 was manifested in the complete and sudden transition to distance education regardless of institution preparedness status. Gradually, many institutions are moving back to on-campus face-to-face education. However, others including all higher education institutions in Iraq are adopting the hybrid education model. This report presents part of the end of semester evaluation survey conducted at the University of Baghdad College of Pharmacy for the Spring 2021 semester. The survey aims to address points of strength and weakness associated with the hybrid education model and spe

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Stress and Its Associated Factors among Students of the College of Nursing University of Baghdad
...Show More Authors

Objectives: The current study aims at identifying the level of perceived stress among nursing college students and determining the factors associated with stress they have. Methodology: A cross-sectional descriptive study initiated for the period on November 1st, 2014 to May 1st, 2015. The study has been conducted on the undergraduate nursing college students / University of Baghdad. The sample of the study was consisted of (128) students who were selected purposively. The questionnaire of the study was adopted and modified for the present study which consisted of socio-demographic data and the scale of

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Assessment of the Depression Level among Medical Students at University of Baghdad, College of Medicine
...Show More Authors

Background: Depression, a state of low mood and aversion to activity, can affect people's thoughts, behavior, tendencies, feelings, and sense of well-being. It can either be short-term or long-term, depending on the severity of the person's condition. Risk factors include personal or family history of depression, major life changes, trauma, stress, certain physical illnesses, and medications.

Objective: This study investigates the prevalence of depression among medical students at the University of Baghdad, college of medicine in Iraq, and the association between some variables and depression.

Subjects and Methods: A cross-sectional study design with a convenience sampling method was conducted.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref