It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The study aims to demonstrate the importance of instructional methods in teaching Arabic language as a second language or teaching the Arabic language to non-native speakers. The study is in line with the tremendous development in the field of knowledge, especially in the field of technology and communication, and the emergence of many electronic media in education in general and language teaching in particular. It employs an image in teaching vocabulary and presenting the experience of the Arabic Language Institute for Non-Speakers-King Abdul-Aziz University. The study follows the descriptive approach to solve the problem represented by the lack of interest in the educational methods when teaching Arabic as a second language. Accordingl
... Show MoreThe present study investigates the notion of untranslatability where the concept of equivalence is reconsidered since the misconceptions, related to the said concept, inevitably lead to the emergence of untranslatability. Identifying equivalence as relative, approximate and necessary identity makes the notion of untranslatability a mere theorization. The objectives of the present study are (1) to investigate the notion of untranslatability in terms of the misconceptions associated with the concept of equivalence (2) to examine the possibility of translatability from Arabic into English focusing on culture-bound euphemistic expressions in the Quran as an area of challenge in translation. Data on the translation of culture-bound euphemistic e
... Show MoreIn our time, not too long ago, the universities of the world have been fast to take care of the study of an innovative type of technical and human studies, called the science of "comparative literature". Comparative research studies have grown and flourished rapidly in response to the demands of both mental and artistic life. This shows the increasing awareness at both the modern national and the international levels in order to develop through connecting with the international intellectual, nental and artistic currents to nurture ethics and originality. Comparative studies show that the beginning of the comparative literature goes back to the time when the Latin literature was connected to the Greek literature and th
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThe research focuses on determination of best location of high elevated tank using the required head of pump as a measure for this purpose. Five types of network were used to find the effect of the variation in the discharge and the node elevation on the best location. The most weakness point was determined for each network. Preliminary tank locations were chosen for test along the primary pipe with same interval distance. For each location, the water elevation in tank and pump head was calculated at each hour depending on the pump head that required to achieve the minimum pressure at the most weakness point. Then, the sum of pump heads through the day was determined. The results proved that there is a most economical lo
... Show MoreQuality function deployment tool is trying to improve health services through this study that will be applied in health sector environment , and be based on applying quality function deployment tool (QFD) TO preferable evaluation of main patients requirements in order to determine the technical requirements that need most attention across improving and developing health services .
Main requirements are determined to patients lying in the hospital (under research) which is (educational Baghdad \ medicine city office) in Baghdad, and other technical requirements through pers
... Show MoreThe study aims to examine the emotional innovation, constructive thinking, foresight, and meditation among university students. Besides, attempts to explore the relationship between emotional innovation and constructive thinking, the relationship between emotional innovation and foresight, and meditation, the relationship between constructive thinking and foresight, and meditation, finally, the relationship among emotional innovation, constructive thinking, foresight, and meditation of university students regarding the variables of gender and major. A total of (400) students were selected as a sample for the study. The results revealed that university students have a high level of emotional innovation that induce them to take positive ro
... Show MoreThe purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st
... Show MoreSchizophrenic patients who are at great risk of relapse are characterized by non-compliance,
denial of illness and need for treatment and no contact with family. So, the prevention of relapse
and readmission to hospital are crucial in mental health practice.
The present study is a descriptive-analytical study that was carried out from November 2nd
2006 through the end of 20 of April 2008.
Objectives: To assess the associated factors with the risk of relapse in schizophrenic patients at
psychiatric hospitals in Baghdad city.
Methodology: A purposive "non-probability" sample of (50) schizophrenic patient who hasd
relapsed was involved in the present study. Data were collected through the use of the constructed
qu