Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model for Using a Students Attendance Management Information Systems/ A Case Study In Lebanese French University/ Erbil
...Show More Authors

This study aims to design unified  electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed  the acceptable limit of being absent, and by that we can replace the traditional way of  using papers to count absence,  with  a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.

            In order to achieve the study's objectives, we designed an information syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education
Evaluating the performance of project management using network diagrams methods: A case study in the Ramadi Municipality
...Show More Authors

This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the applica

... Show More
Scopus (1)
Scopus
Publication Date
Mon Jul 18 2022
Journal Name
Ieee Access
Moderately Multispike Return Neural Network for SDN Accurate Traffic Awareness in Effective 5G Network Slicing
...Show More Authors

Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi

... Show More
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Self Protection and it's Relation with the social ignorance OF UNIVERSITY STUDENTS
...Show More Authors

The aim of this research is to find a relation between self-protection and the social - ignorance of the univresity students. In applying the aims of the reaearch, the ressearcher has constructed two scales to measure
self - protection and the social - ignorance. After finding their validity and stability and their discriminative power, the researcher has applied them on a sample of (200) male and female. University students, who were selected randomly. The results of the research has arrived at finding a positive relation between self-protection and social - ignorance.

The researcher has recommended a concentration on the role of parents in raising their childern depending on themselves and making f

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors

Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors

Publication Date
Sat Oct 12 2019
Journal Name
Journal Of The College Of Education For Women
Uncompleted Personality and it’s relation with Some Variables of the University Students
...Show More Authors

Uncompleted Personality and it’s relation with Some Variables of the University Students

View Publication Preview PDF
Publication Date
Thu Aug 31 2017
Journal Name
Available At Ssrn 3030385
Synthesis, Spectral Studies And Antimicrobial Activity Of Mixed Ligand Complexes Of Cephalexin And Dimethylglyoxime With Some First Row Transition Metal Ions
...Show More Authors

In this paper ,six new mixed metal ligand complexes are reported with Cephalexin (Ceph.H)as a primary ligand and Dimethylglyoxime (DMG) as secondary ligand with metal Chloride [MCl2 .nH2O. M=Mn(II),Co(II),Cu(II),Ni(II) and Zn(II),n=0-6] ,CrCl3.6H2O.The complexes are of (1:1:1)(Metal:Ligand: Ligand) Stoichiometry.The structures of these complexes are confirmed by using FT-IR and UV- electronic spectroscopies, magnetic moments, melting points, molar conductivity measurements and the metal % analysis revealed that the complexes analyze indicates a four coordinated as (A)=[M(HDMG) (Ceph)] .M=[Ni(II)and Zn(II).Six coordinated as (B) = K2[M(DMG)(CePh)(H2O)]. M= Mn (II),Co(II) and Cu(II) and (C)=[Cr(DMG)(Ceph)]Cl2. Interestingly, the in-vitro anti

... Show More
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Educational And Psychological Researches
Teaching methods approved in the university and its relationship to classroom discipline and management proposals treated
...Show More Authors

The study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.

     Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio

... Show More
View Publication Preview PDF