As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Background: The need of the patient for a more reasonable esthetic orthodontic intervention has risen nowadays. Thus, orthodontists make use of esthetic orthodontic materials like brackets, ligature elastics, and arch wires. The esthetic brackets come as different forms of materials, such as ceramic brackets, which have their stainability remaining as the most important consideration for the patients and the orthodontists. This study aimed to compare the staining effects of various staining materials, including black tea, cigarette smoke and Pepsi, as well as the time effect on the color stability of sapphire ceramic brackets bonded with three kinds of light cure orthodontic adhesives: Transbond, Resilience and Enlight. Materials and Met
... Show MoreThe objective of the research is to shed light on the nature of the impact of the activities of the national strategy for poverty alleviation in achieving the goals of sustainable development, and the research problem was represented by Is there an effect of the activities of the national strategy for poverty reduction in achieving the goals of sustainable development? and represents the field of research in the Ministry of Labor and Social Affairs For the years (2012-2016) and the results of the sustainable development goals indicators for the years (2012-2016), the ready-made statistical program (SPSS ver.10) was used to calculate the percentages, multiple linear regression equation, the F test and the R2 coefficient, and the research
... Show MoreThis study describes the preparation of new series of tetra-dentate N2O2 dinuclear complexes (Cr3+, Co2+, Cu2+) of the Schiff base derived from condensation of 1-Hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. The structures of the ligands were identified using IR, UV-Vis , mass, elemental analysis and 1H-NMR techniques. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, theromgravimatric analysis (TGA) and metal analysis by atomic absorption. From stoichiometry of metal to ligand and all measurements show a octahedral geometry proposed for all complexes of the (Cr3+, Co2+, Cu2+). conductivity measurement shows t
... Show More
Praise be to Allah, the Lord of the Worlds, the best prayer and the best prayer, on our master Muhammad, and on his pure God, and his companions and the faithful, and who followed them by charity to the day of religion. This relationship between emphasis, is a sincere, and this harmony, such as the relationship between water, and the green, but it is good, but, with greenery, it is better, and as well as alone, is a beautiful view, but the most beautiful, with the most beautiful. From here he was starting on myself in writing the fundamentalist research of jurisprudence, to show the depth of this interconnection. The doctrine as a new term, then the taj al-Din al-Suobki came after three centuries, and a
... Show MoreThis study involved the effect of the aqueous extracts of two plants, Origanum vulgare L.(1), Trigonella Foenum Graecum L. (Fenugreek) seeds(2) on the growth of cancer cell lines. Rhabdomyo sarcomas (RD) of human cell line and female intestine cells of Albino mice (L20B) in vitro System. These extracts were compared with the known anticancer drug Cis-platinum(Cis-Pt) as a positive control. The phytochemical tests were used for screening the active compounds in plants. The inhibition activity assay was used as a parameter of the cytotoxic effect of these extracts. Cancer cell lines were treated with four concentrations of Cis-platin, 31.25, 62.5, 125 and 250 ?g/ml for 72 hour exposure time. The same concentrations were used for the other ext
... Show MoreBackground: This study compared in vitro the marginal adaptation of three different, low shrink, direct posterior composites Filtekâ„¢ P60 (packable composite), Filtekâ„¢ P90 (Silorane-based composite) and Sonic fillâ„¢ (nanohybrid composite) at three different composite/enamel interface regions (occlusal, proximal and gingival regions) of a standardized Class II MO cavity after thermal changes and mechanical load cycling by scanning electron microscopy. Materials and methods:Thirty six sound human maxillary first premolars of approximately comparable sizes were divided into three main groups of (12 teeth) in each according to the type of restorative material that was used: group (A) the teeth were restored with Filtekâ„¢ P6
... Show More
This research aims to apply the Performance Focused Activity Based Costing System in the offices of scientific and advisory services at the University of Technology for the purpose of measuring the cost of services provided by these offices in order to reduce costs. To test the hypothesis of the research, the research was applied in the consulting offices of the University of Technology through the financial statements for the year ending 12/31/2017 of the Scientific and Consulting Services Office of the University of Technology, because the data of these years were issued and audited by the Federal Office of Financial Supervision.
A number of
... Show MoreBackground: To evaluate the effect of antierosive agents (10% Nano-Hydroxyapatite (NHA), 10% Casein Phophopeptide-Amorphous Calcium Phosphate (CPP-ACP), and combination of 10% NHA and 10% CPP-ACP) on loss of minerals from enamel surface of permanent teeth treated with antierosive agents when exposed to an acidic beverage and investigate the morphological changes of treated enamel surface after demineralization with cola based beverage under Scanning Electron Microscope (SEM). Materials and Methods: Sixty maxillary first premolars were randomly divided into four groups, 15 teeth for each group. Group I treated with 10% NHA, Group II treated with 10% CPP-ACP, Group III treated with 10% NHA and 10% CPP-ACP, and Group IV did not treat with any
... Show MoreCoronary artery disease (CAD) is a major health concern and leading of death in individuals with type 2 diabetes mellitus (T2DM). Glutathione S – Transferase(GST) are known for their broad range of detoxification and in the metabolism of xenobiotics . The role of functional variants of these genes in the development of various disorder is proven. We investigated the possible role of these variants in the development of CAD in T2DM patients. In this case – control study a total of 60 patients (T2DM = 30 ; T2DM – CAD = 30) and 30 controls were included. Serum lipid profiles were measured and DNA was extracted from the blood samples. Multiplex PCR for GSTT1/M1 (present / null) polymorphism, were performed for genotyping of study pa
... Show More