Preferred Language
Articles
/
DPqxsJkBMF18lwyZqc3S
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being hashed and stored on the website. The results of the two methods are compared in terms of speed and resistance to attackers, then password attacks are analysed in addition to calculating the strength of the password, the time it takes for the user to log in, and the time required for the attacker to guess the passwords per second. The Wolfram Alpha is used to calculate the mathematic operations and system implementation was done by using IntelliJ IDEA with java FX.

Crossref
View Publication
Publication Date
Mon Jun 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Several developed and modern methods for estimating some anti-inflammatory drugs
...Show More Authors

     With the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood

... Show More
View Publication
Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Down Syndrome causes, symptoms, and most important methods of functional treatment
...Show More Authors

This study is descriptive and theory of Dawn syndrome as the problem of research lies in the need to identify the identification of the causes of Dawn syndrome and its symptoms and methods of dealing with it, which has become a problem that needs treatment, especially after the numbers have become high in Iraq, which has not yet taken the necessary importance for treatment and care.

The objectives of the research were summarized in the identification of the most important causes of Dawn syndrome and its symptoms and diagnosis and ways or methods of dealing with people with Dawn syndrome in order to develop therapeutic plans for him.

       

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Environmental Engineering And Management Journal
TREATMENT OF DAIRY WASTEWATER BY ELECTROCOAGULATION AND ULTRASONIC-ASSISTED ELECTROCOAGULATION METHODS
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Sat Jul 15 2023
Journal Name
2023 6th International Conference On Engineering Technology And Its Applications (iiceta)
Methodology for the Design and Programming Methods for a Smart Home
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Laser Cutting Methods on Hole Deviation and Surface Integrity
...Show More Authors

In the present work usedNd:YAG laser systems of different output characteristic were employed to study the drilling process of material used in scientific and industrial fields. This material include Manganese hard steel. Our study went into the affecting parameters in drilling of Manganese hard steel by laser. Drilling process is achieved through material absorption of part of the incident laser beam. It is the resultant of interfering both, laser beam and material properties and the focusing conditions of the beam. The results as shown that the increase in the laser pulse energy over the used level has raised the hole diameter, depth and increased the hole taper. In addition to that a hole taper was affected by the laser energy, the fo

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Properties of Kumaraswamy binary Distribution and compare methods of estimating parameters
...Show More Authors

The recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jan 21 2025
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A comparison between the hierarchical clustering methods for postgraduate students in Iraqi universities for the year 2019-2020 using the cophenetic and delta correlation coefficients
...Show More Authors

The educational sector is one of the important sectors in the world, and it is considered one of the means of community development. In addition, it is one of the means of making the country’s renaissance and devel-opment because it represents the factory of thinking minds that make change. There is no doubt that this sector is the same as any other sector. The deficit in the studied scientific planning has been prolonged, which led to its deterioration, and the problems of education remain diverse and inherited from previous time periods, where the hierarchical cluster analysis was used on postgraduate students in universities in Iraq, except for Kurdistan region, and the number of universities that were included in the study was

... Show More
View Publication
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Business Risk Assessment Using Client Strategy Analysis Approach in order to Increase the Efficiency and Effectiveness of the Audit Process
...Show More Authors

Abstract

This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref