Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The relationship between organizational culture and administrative creativity among colleges' deans and their assistants in Baghdad University
...Show More Authors

Generally, the academic facilities necessitate specific criteria to be under the regional standards such as creative leaders, and a positive climates that induce to create an organizational culture within the academic institution. Consequently, these variables promote to improve the educational and administrative performance pursuing to achieve the general objectives. Thus, the current research aims to explore the level of privileged organizational culture among Baghdad University Colleges, explore the administrative creativity of deans and their assistants in addition to identify the relationship between them. The researchers prepared two instruments which were distributed among (70) individual of the targeted sample to collect the requ

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improving the Network Lifetime in Wireless Sensor Network for Internet of Thing Applications
...Show More Authors

Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Theoretical insights into the study of the electronic transition reaction process from D35CPDT molecule dye to SnO2 semiconductor
...Show More Authors

View Publication
Crossref
Publication Date
Thu Jul 04 2019
Journal Name
Journal Of Research In Medical And Dental Science
The Role of Epithelial Mesenchymal Transition Process in Inflammatory Gingival Hyperplasia
...Show More Authors

Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Forbidden Montage and the transition Technique in one-snapshot Movies 1917 Film- A model: محمد عبد الجبار كاظم-عذراء محمد حسن
...Show More Authors

  Starting from the term (forbidden montage) initiated by the French critic (Andre Bazin) as a method of processing the movies that depend on (mise en scene) achieved by the action of the camera and its ability to photograph and employ the depth of the field, in addition to the possibility of free movement without interruption in the filming environment in order to avoid montage as much as possible (the montage that distorts focus and distracts attention and moves away from realism, which is the most important theoretical pillar of Bazin in photography). The pursuit was behind a cinema that depicts its topics in one integrated snapshot with all its details thus approximating reality without any interference of montage. Our study sta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Design and Implementation of a Contactless Smart House Network System
...Show More Authors

The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Arab Gulf Journal Of Scientific Research
Investigation of Pseudomonas aeruginosa bacteria in a number of Baghdad schools and extent of their resistance to disinfectants and sterilizers
...Show More Authors

Purpose This study was design to investigate of Purpose This study was design to investigate of P. aeruginosa, an example of Gram-negative bacteria, in seven primary and secondary schools of Baghdad city, and the effects of Ethanol and Dettol of P. aeruginosa biofilm. Design/methodology/approach Seventy swabs were collected from seven primary and secondary schools of Baghdad city, Iraq, during November -December 2022. Swabs were collected from classes desk, doors handles, students hands and water taps. Standard microbiological testing methods were used on the samples for isolation and identification. The ability of bacteria to form biofilm and the effects of Ethanol and Dettol on “preformed” biofilms was examined by microtiter plate wi

... Show More
Scopus (1)
Scopus
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Complexes of Some Transition Metal with 2-Benzoyl thiobenzimidazole and 1,10-Phenanthroline and Studying their Antibacterial Activity
...Show More Authors

Mixed ligands of 2-benzoyl Thiobenzimiazole (L1) with 1,10-phenanthroline (L2) complexes of Cr(III) , Ni(II) and Cu(II) ions were prepared. The ligand and the complexes were isolated and characterized in solid state by using FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR, flame atomic absorption, elemental micro analysis C.H.N.S, magnetic susceptibility , melting points and conductivity measurements. 2-Benzoyl thiobenzimiazole behaves as bidenetate through oxygen atom of carbonyl group and nitrogen atom of imine group. From the analyses Octahedral geometry was suggested for all prepared complexes. A theoretical treatment of ligands and their metal complexes in gas phase were studied using HyperChem-8 program, moreover, ligands in gas phase

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Sun Sep 28 2025
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication