Preferred Language
Articles
/
OBe3TpABVTCNdQwCdoZ7
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Maternal knowledge related to anemia during pregnancy among a sample of mothers attending Primary Health Care centers. Baghdad.
...Show More Authors

Background: Anaemia is a major public health concern and is one of the most prevalent health issue in women within reproductive age group.

Objective: to assess maternal knowledge related to anaemia during pregnancy.

Type of the study: A cross –sectional study.

Method: The study including 200 mothers who attended selected primary health care centres, Baghdad during November and December 2015, they completed a previously prepared questionnaire coveringsocio-demographic characteristics and knowledge regarding anaemia in 4 main domains. The responses were analysed by using frequency, percentage and percent score for each statement a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model for Using a Students Attendance Management Information Systems/ A Case Study In Lebanese French University/ Erbil
...Show More Authors

This study aims to design unified  electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed  the acceptable limit of being absent, and by that we can replace the traditional way of  using papers to count absence,  with  a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.

            In order to achieve the study's objectives, we designed an information syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Traumatic dental injuries in relation to quality of life among school children in Baghdad /Iraq
...Show More Authors

Background: One of the significant public health problems is the traumatic dental injury to the anterior teeth, it has a great impact on children’s daily. Physical and psychological disturbance, pain and other negative impacts, such as tendency to avoid laughing or smiling may be associated with traumatic dental injuries, that may affect the social relationships. To determine the occurrence of traumatic dental injuries in relation to quality of life, this study was established among children of primary schools. Material and Methods: A cross-sectional study was conducted among private (574) and governmental (1026) primary school children in Baghdad city. Dental trauma was assessed according to Ellis and Davey classification in1970

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Opcion
Fast-slow thinking and its relationship to cognitive failure At university students
...Show More Authors

Scopus
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effects of Using Educational Moodle Platform to Develop Instructors’ Skills in Designing Electronic Tests at Dhofar University
...Show More Authors

With the premise that effective use of online instructional practices is of vital importance in classrooms, the current study aimed to examine the effects of using Moodle applications to develop instructors’ skills in designing electronic tests at Dhofar University. The sample of this study consisted of (25) instructors participated in the experimental group. The researchers implemented a quasi-experimental design with one group pre- and post-test; in addition, an observation card was implemented to measure the target skills related to test design. The research instruments were subjected to validity and reliability measures to ensure valid and reliable data and results. The study results showed that those instructors who participated i

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
A comparative study between the emotional responses in patients with blood pressure on a scale of music types characteristics compared with responses to some Healthy patients
...Show More Authors

The problem of the study and its significance:

           Due to the increasing pressures of life continually, and constant quest behind materialism necessary and frustrations that confront us daily in general, the greater the emergence of a number of cases of disease organic roots psychological causing them because of severity of a lack of response to conventional treatments (drugs), and this is creating in patients a number of emotional disorders resulting from concern the risk of disease

 

     That is interested psychologists and doctors searchin

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More