Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreTransport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreDue to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we have consideredwaste as an alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreEnvironmental pollution is experiencing an alarming surge within the global ecosystem, warranting urgent attention. Among the significant challenges that demand immediate resolution, effective treatment of industrial pollutants stands out prominently, which for decades has been the focus of most researchers for sustainable industrial development aiming to remove those pollutants and recover some of them. The liquid membrane (LM) method, specifically electromembrane extraction (EME), offers promise. EME deploys an electric field, reducing extraction time and energy use while staying eco-friendly. However, there's a crucial knowledge gap. Despite strides in understanding and applying EME, optimizing it for diverse industrial pollutant
... Show MoreThis study was conducted to evaluate the efficacy of different techniques for extraction and purification of Tomato yellow leaf curl virus (TYLCV). An isolate of the virus free of possible contamination with other viruses infecting the same host and transmitted by the same vector Bemisia tabaci Genn. was obtained. This was realized by indicator plants and incubation period in the vector. Results obtained revealed that the virus infect Nicotiana glutinosa without visible symptoms, while Nicotiana tabaccum var. White Burley was not susceptible to the virus. The incubation period of the virus in the vector was found to be 21 hrs. These results indicate that the virus is TYLCV. Results showed that Butanol was more effective in clarification the
... Show MoreObjective: To evaluate two kinds of extraction (aqueous and ethanolic) for coriander using seeds, leaves and stems and
studying their antibacterial activity against nine different microorganisms.
Methodology: Coriander was selected to carry out this study. Seeds, leaves and stems were collected from local markets in
Baghdad then dried in shade for at least 10 days and grinded to fine powder. Aqueous hot extracts for 1hr. at (50
c) and
cold extracts for 24 hrs at (4
c) were performed by using seeds, leaves and stems then studied antibacterial effect against
nine different microorganisms by using well diffusion technique. Cold aqueous extracts of coriander seeds for 48 hrs. and
72 hrs and ethanolic extraction
Abstract Objective: Comparison of femtosecond small incision lenticule extraction (FS-SMILE) versus Femtosecond laser Insitu keratomileusis (FS-LASIK) regarding dry eye disease (DED) and corneal sensitivity (CS) after those refractive surgeries. Methods: A comparative prospective study conducted for a period of 2 years; from March 2017 until February, 2019. Enrolled patients were diagnosed with myopia. Fifty patients (100 eyes) were scheduled for bilateral FS-SMILE and the other 50 patients (100 eyes) had been scheduled for bilateral FS-LASIK. Both groups were followed for six months after surgery. The age, gender, and preoperative refraction for both groups were matched. Complete evaluation of dry eye disease had been
... Show More