It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Situational regret and its relation to the vitality of conscience among university students The research seeks to identify situational regret and its relation to the vitality of conscience among university students, identify the significant differences in regard with students’ gender, and identify if there is a correlation between situational regret and the vitality of conscience. To do this, two scales were adopted; one to measure situational regret consisted of (31) items, which was designed by (Al-badrani, 2006), besides, costa and macrys’ (1992) scale that translated in Arabic language by (Al-qaisy, 2013). It composed of (35) items. Total of (120) male and female students were collected from three-different colleges (science, art
... Show MoreThe research aimed to identifying :
- Egocentrism of the university students .
- Academic adaptation of the university student.
- Differences in Egocentrism according to the both variable ( Gender and Specialization ) of the university student.
- Differences in academic adaptation according to the both variable ( Gender and Specialization ) of the university student .
- The Contribution of academic adaptation to Egocentrism of the university student .
The sample of the research consisted of ( 400 ) students.
Tow instruments have been us
Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreThe Tigris River, a vital water resource for Iraq, faces significant challenges due to urbanization, agricultural runoff, industrial discharges, and climate change, leading to deteriorating water quality. Traditional methods for assessing irrigation water quality, such as laboratory testing and statistical modeling, are often insufficient for capturing dynamic and nonlinear relationships between parameters. This study proposes a novel application of the Gravitational Search Algorithm (GSA) to estimate the Irrigation Water Quality Index (IWQI) along the Tigris River. Using data from multiple stations, the study evaluates spatial variability in water quality, focusing on key paramete
The seventh international scientific conference held at the "University of Baghdad" College of Education "Ibn Rushd" 14-15 / 4/2019, confirmed in its recommendations the need to draw clear strategic planning to invest the qualitative inputs from the Ministry of Education and focus on it in higher education, which requires educational institutions to amend from its current strategies or adopting new strategies in a way that contributes to presenting new ways to compete and keep pace with scientific progress and to find realistic and objective working methods. The aim of the current study is to identify the reality of university strategic planning to invest the outputs of the distinguished schools of the heads of public universities. The r
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MoreObjective(s): The study aims at examining the role of technical information used in nursing education, such as "the
Internet, e-mail services, video, audio conferencing and other "in the College of Nursing at the University of Baghdad.
Methodology: A descriptive and analytical study which was using the examination approach was conducted on a
non-probability sample (purposive sample) of (42) members of the faculty of the College of Nursing at the University
of Baghdad. A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first part
which included the demographic characteristics of faculty members (such as age, sex,
qualification, scientific title, and the scientific department
Research seeks to test the impact of the dimensions of mindfulness on organizational Innovation, proposed in the light of the review literature on two variables of the research, which referred in General to the dynamic relationship between them, as result of weakness of mindfulness as one important factor driving the diversity of innovation and time, ways to sustain and preserve and then support innovations made by creators, weakness in the overall level of organizational Innovation, this represents the problem research, data collection over designing identification, distributed to sample Formed from (30) head Department at a number of colleges of the University of Baghdad, results confirms the validity of resea
... Show More