Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show Moreهدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التن
... Show MoreThe compound [L] was produced in the current study through the reaction of 4-aminoacetophenon with 4-methoxyaniline in the cold, concentrated HCl with 10% NaNO2. Curcumin, several transition metal complexes (Ni (II), La (III), and Hg (II)), and compound [L] were combined in EtOH to create new complexes. UV-vis spectroscopy, FTIR, AA, TGA-DSC, conductivity, chloride content, and elemental analysis (CHNS) were used to describe the structure of produced complexes. Biological activities against fungi, S. aureus (G+), Pseudomonas (G-), E. coli (G-), and Proteus (G-) were demonstrated using complexes. Depending on the outcomes of the aforementioned methods, octahedral formulas were given as the geometrical structures for each created comp
... Show MoreImage processing applications are currently spreading rapidly in industrial agriculture. The process of sorting agricultural fruits according to their color comes first among many studies conducted in industrial agriculture. Therefore, it is necessary to conduct a study by developing an agricultural crop separator with a low economic cost, however automatically works to increase the effectiveness and efficiency in sorting agricultural crops. In this study, colored pepper fruits were sorted using a Pixy2 camera on the basis of algorithm image analysis, and by using a TCS3200 color sensor on the basis of analyzing the outer surface of the pepper fruits, thus This separation process is done by specifying the pepper according to the color of it
... Show MoreThe neutron, proton, and matter densities of the ground state of the proton-rich 23Al and 27P exotic nuclei were analyzed using the binary cluster model (BCM). Two density parameterizations were used in BCM calculations namely; Gaussian (GS) and harmonic oscillator (HO) parameterizations. According to the calculated results, it found that the BCM gives a good description of the nuclear structure for above proton-rich exotic nuclei. The elastic form factors of the unstable 23Al and 27P exotic nuclei and those of their stable isotopes 27Al and 31P are studied by the plane-wave Born approximation. The main difference between the elastic form factors of unstable nuclei and the
... Show More