Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Thu Feb 21 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Re-engineering Business Processes in Continuous Improvement: Exploratory Statement of The Views of a Sample of The Faculties in The Law, Administration and Economy- University of Baghdad
...Show More Authors

The present study aimed to investigate the effect of re-operations engineering business in continuous improvement, as the rapid development of service activities generally private and the great diversity in the goals of its operations and programs of the university and the service has led to the increasing importance of re-operations engineering business as well as continuous improvement so began to study the relationship between the re engineering and continuous improvement of university service, and applied study on a sample of professors from the faculties of administration, economics and law. Find and reach to several conclusions, notably that the preparation of the teaching staff training sessions on how to use modern teaching

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Assisting Students of Al-Quds Open University to Design Computerized Lessons According to ADDIE
...Show More Authors

This Action research aimed at Assisting Students of Faculty of Educational Sciences  at Al-Quds Open University to design computerized  lessons using the Power Point software and according to ADDIE model. The study sample consisted of 40 students  who were taking a course titled Technology of Education during the second semester of the 2014-2015 academic year and three academic instructors . To collect the required date  , the researchers used  focus group technique and structured interviews to get information from the 40 students and the three academic instructors involved in the course Technology of Education in QOU /Nablus Branch. In addition to these methods, a workshop with a guiding checklist was employed t

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Role of Strategic Leadership in Achieving University Governance Requirements: A Survey of a Sample of Teaching Staff at College of Administration and Economics/University of Mosul
...Show More Authors

Aim of the Study: The paper aims at identifying the extent of the role of strategic leadership represented by its four dimensions (administrative, transformational, political, moral) in fulfilling the requirements of university governance (Context, message and Goal, Management orientation, Independence, Issue, Sharing)

Methodology: A survey is applied to (107) members of the teaching staff at the college of Administration and Economics/ University of Mosul.  To achieve the goals of the study, the researcher makes use of a number of tools such as:  questionnaire, statistical tools and methods (repetitions, perce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Authority control and its role in uniting old arabic authors entries at the Central Library of the University of Baghdad and the Al-Mustansiriya: A Comparative Study
...Show More Authors

The research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .

1-The lack of authority control depends on it to find a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2023
Journal Name
Iraqi Journal Of Agricultural Sciences
OPTIMIZING MEDIA STERILIZATION VIA CHLORINE DIOXIDE AND AUTOCLAVING OF PAULOWNI MICROPROPAGATION
...Show More Authors

This study was aimed to investigat integrated system for in vitro growth of paulownia plants by assessing the efficacy of chlorine dioxide (ClO2) as an alternative to autoclave in sterilizing culture medium. Therefore, this study was devised to compare autoclave sterilization at three different times (5, 10, and 15) minutes and three different concentrations of ClO2 (0, 0.4, 0,8, 1) mg/L. The results showed that, compared with (0.4) mg/L concentration,  concentrations of (0.8 and 1) mg/L are more effective at sterilizing the culture medium. ClO2 sterilization improved individual single node growth more than autoclave sterilization. Since ClO2 is non-toxic, it could be used as a safe alternative to autoclave when propagating paulown

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Spe/aapg/seg Asia Pacific Unconventional Resources Technology Conference
Optimizing the dispersion of coal fines using Sodium Dodecyl Benzene Sulfonate
...Show More Authors

Coal fines are highly prone to be generated in all stages of Coal Seam Gas (CSG) production and development. These detached fines tend to aggregate, contributing to pore throat blockage and permeability reduction. Thus, this work explores the dispersion stability of coal fines in CSG reservoirs and proposes a new additive to be used in the formulation of the hydraulic fracturing fluid to keep the fines dispersed in the fluid. In this work, bituminous coal fines were tested in various suspensions in order to study their dispersion stability. The aggregation behavior of coal fines (dispersed phase) was analyzed in different dispersion mediums, including deionized-water, low and high sodium chloride solutions. Furthermore, the effect of Sodium

... Show More
Scopus (13)
Scopus
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Use projection pursuit regression and neural network to overcome curse of dimensionality
...Show More Authors

Abstract

This research aim to overcome the problem of dimensionality by using the methods of non-linear regression, which reduces the root of the average square error (RMSE), and is called the method of projection pursuit regression (PPR), which is one of the methods for reducing dimensions that work to overcome the problem of dimensionality (curse of dimensionality), The (PPR) method is a statistical technique that deals with finding the most important projections in multi-dimensional data , and With each finding projection , the data is reduced by linear compounds overall the projection. The process repeated to produce good projections until the best projections are obtained. The main idea of the PPR is to model

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2006
Journal Name
Modern Sport
The effect of using a treadmill with different incline angles in developing some functional variables among Diyala University basketball team players
...Show More Authors

تعد لعبة كرة السلة من الألعاب الرياضية التي تحتاج متطلبات بدنية ووظيفية خاصة بها، وذلك من خلال الانتقال داخل الملعب بالكرة أو بدونها والسبل للتخلص من ملاحقة الخصم أثناء الدفاع وكيفية المناورة أثناء الهجوم مع إجادة التصويب بكافة أنواعه داخل الملعب، ومن هنا تكونت مشكلة البحث في كيفية تطوير تلك العوامل الوظيفية والتي لها الأثر في الارتقاء بمستوى أداء اللاعب أثناء اللعب، وعن طريق استخدام الباحثان لطريقة جهاز ا

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref