A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreThe current research deals with an analytical study of the ceramic works of one of the most important Japanese cities in the ceramics industry, which is the city (Dachi-Cho), which is characterized by a special and unique style from the rest of the other Japanese cities, as it uses special techniques for its potters and the families to which they belong, such as the technique of grafting and neriage. And printing graphics on ceramic pots. These and other techniques have spread in various countries of Asia and Europe, all the way to America, and transformations and revolutions have begun in these techniques until they have reached the point of absurdity. With all this scientific and technological development, the city (Dachi-Chu) remained
... Show MoreThe application of low order panel method with the Dirichlet boundary condition on complex aircraft configuration have been studied in high subsonic and transonic speeds. Low order panel method has been used to solve the case of the steady, inviscid and compressible flow on a forward swept wing – canard configuration with cylindrical fuselage and a vertical stabilizer with symmetrical cross section. The aerodynamic coefficients for the forward swept wing aircraft were calculated using measured wake shape from an experimental work on same model configuration. The study showed that the application of low order panel method can be used with acceptable results
Soil suction is one of the most important parameters describing the moisture condition of unsaturated soils. The measurement of soil suction is crucial for applying the theories of the engineering behavior of unsaturated soils.
The filter paper method is one of the soil suction measurement techniques In this paper, five soil samples were collected from five sites within Baghdad city – al-Rasafa region. These soils have different properties and they were prepared at different degrees of saturation. For each sample, the total and matric suction were measured by the filter paper method at different degrees of saturation. Then correlations were made between the soil properties and the total and matric suction. It was concluded that the
Aerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreResearch aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a number of academics professionals experts, in addition to financial analysts and have concluded a set of conclusions , the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve
... Show MoreThe paper has been summarized into the following:
Chapter one: the researcher deals with the problem of the paper, the most important points and the terminology. Chapter two: the researcher deals Surat Luqman from the Aya 12-19 , (the demonstration, the explanations, the values ). In chapter three the researcher deals with Surat AL-Hujurat from Aya 6-12, (the demonstration, the explanations, the values ). Chapter four include (the educational properties for individual and society, the educational applications, and the most important indicators in the texts). Chapter five include the results , the conclusions and the recommendations. One of the basic results that the Quran is a complete educational curriculum, and the texts of Surat Lu
the present study is designed to evaluate the effect of low level laser irradiation on the immume system when administere intravenoisly