It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
A new series of transition metal complexes of Cu(II), Ni(II), Co(II) and Fe(III) have been synthesized from the Schiff base (L1) and (L2) derived from Semicarbazide hydro chloride and 4-chlorobenzaldehyde or 4-bromobenzaldehyde. The structural features have been arrived from their elemental analyses, magnetic susceptibility, molar conductivity, IR, UV-Vis. and 1H NMR spectral studies. The data show that the complexes have composition of [M(L)2](NO3)2 and [Fe(L)2 (NO3)2](NO3) where the M=Co(II),Ni(II) and Cu(II) ;L=L1and L2 type. The magnetic susceptibility and UV-Vis spectral data of the complexes suggest a square planer geometry for Co(II) and Cu(II) but Fe(III) octahedral geometry and Ni(II) tetrahedral geometry around the central metal i
... Show MoreA new Schiff base of 4- flourophenyl-4- nitrobenzyliden (L) ,was prepared and used to prepare a number of metal complexes with Cr (III) , Fe (III), Co(II) ,Ni (II) and Cu (II). These complexes were isolated and characterized by (FITR),UV-Vis spectroscopy and flame atomic absorption techniques in addition to magnetic susceptibility, and conductivity measurements. The study of the nature of the complexes formed in ethanol was done following the molar ratio method gave results, agreed with those obtained from isolated solid state studies. The antibacterial activity for the ligand and its metal complexes were examined against two selected microorganisms, Pseudomonas aeruginosa and Staphylococcus aureus.The results indicated that the complexes
... Show MoreAbstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under
... Show MoreThe current research aims to identify the impact of the (Landa) model on acquiring grammatical concepts among students of the College of Administration and Economics, University of Baghdad, and to achieve the research goal, the researcher has set the following hypotheses: There are no statistically significant differences at the level of significance (0.05) between the average degrees Students of the experimental group who studied the Arabic language according to the (Landa) model and the marks of the students of the control group who studied the same subject in the usual way in the post test, there are no statistically significant differences at the level of significance (0.05) in the average differences between the test scores before and
... Show MoreCohesion is well known as the study of the relationships, whether grammatical and/or lexical, between the different elements of a particular text by the use of what are commonly called 'cohesive devices'. These devices bring connectivity and bind a text together. Besides, the nature and the amount of such cohesive devices usually affect the understanding of that text in the sense of making it easier to comprehend. The present study is intendedto examine the use of grammatical cohesive devicesin relation to narrative techniques. The story of Joseph from the Holy Quran has been selected to be examined by using Halliday and Hasan's Model of Cohesion (1976, 1989). The aim of the study is to comparatively examine to what extent the type
... Show MoreAbstract:
The research aims to identify the concept of trading securities in Iraq and to propose a new mechanism for the taxation of trading profits and the extent of its impact on tax revenues, as it was observed that there are professional investors in the trading market and some of them achieve huge annual profits. and this profit should be like other taxable profits. The General Commission of Taxes and in cooperation with the Iraq Stock Exchange should identifying those profits, subjecting them to income tax, and adding them to the tax base. The researcher relied on the use of the descriptive and analytical approach bas
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show More