The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThe aim of this research is to study the effect of high concentrations of salts, pressure and temperature on the performance of the RO membrane with time. Four different (Na2CO3) concentrations (5000, 15000, 25000 and 35000) ppm and various pressures such as (1, 3 and 5) bars at different temperatures of the feed solution (i.e., 25, 35 and 45) ◦C were used in this work. It was found that, as the concentration of salt and feed temperatures increase, the rejection of the salt decrease. While the salt rejection of the membranes increases with increase of transmembrane pressure.
The adsorption isotherms and kinetic uptakes of CO2 were measured. Adsorption isotherms were measured at two temperatures 309 K and 333 K and over a pressure range of 1 to 7 bar. Experimental data of CO2 adsorption isotherms were modeled using Langmuir, Freundlich and Temkin. Based on coefficient of correlation it was found that Langmuir isotherm model was well suited with the experimental data of CO2 adsorption isotherms. In addition, Adsorption kinetic of CO2 mixture with N2 containing 10 % by volume CO2 and 90 % by volume N2 were determined in a temperature 36 °C and under the atmospheric pressure .When the flow rate was increased from
... Show MoreCadmium sulfide photodetector was fabricated. The CdS nano
powder has been prepared by a chemical method and deposited as a
thin film on both silicon and porous p- type silicon substrates by spin
coating technique. Structural, morphological, optical and electrical
properties of the prepared CdS nano powder are studied. The X-ray
analysis shows that the obtained powder is CdS with predominantly
hexagonal phase. The Hall measurements show that the nano powder
is n-type with carrier concentration of about (-5.4×1010) cm-3. The
response time of fabricated detector was measured by illuminating
the sample with visible radiation and its value was 5.25 msec. The
specific detectivity of the fabricated det
This study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (
... Show MoreThe purpose of this research is to demonstrate the effectiveness of a program to address the problem of mixing similar letters in the Arabic language for students in the second grade of primary and to achieve the goal of the research. The researcher followed the experimental method to suit the nature of this research and found that there are statistically significant differences between the tribal and remote tests, The effectiveness of the proposed educational program. At the end of the research, the researcher recommends several recommendations, the most important of which are: 1 - Training students to correct pronunciation of the outlets, especially in the first three stages of primary education (primary) and the use of direct training
... Show MoreVolunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these fun
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More