In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical user authentication and possible attacks on nineteen recognition-based authentication systems were discussed. In this study, differentiation table of attack patterns for all recognition-based techniques is shown. Finally, the positive and negative aspects of nineteen methods were explained in the form of a detailed table.
Background: Cancer is a lethal disease that results from a multifactorial process. Progression into carcinogenesis and an abnormal cell proliferation can occur due to the micro and macro environment as well as genetic mutations and modifications. In this review, cancer and the microbiota – mainly bacteria that inhabit the tumour tissue – have been discussed. The positive and negative impacts of the commensal bacteria on tumours being protective or carcinogenic agents, respectively, and their strategies have also been described. Methods: Related published articles written in English language were searched from Google Scholar, PubMed, Mendeley suggestions, as well as Google search using a combination of the keywords ‘Microbiota, commens
... Show MoreThe present study aimed to investigate effect of Pregabalin (PGB) on ovary tissue and number of follicles in female albino rats. Three groups of healthy adult female albino rats, fifteen rats in each group were used in current study. The rats of groups, G2 and G3 were administered orally with two doses 150 mg and 300mg/kg b.wt/day of pregabalin, respectively. The doses were given daily for 1 month, 2 months, and 3 months. Animals of group G1 (Control) were given saline alone. After the experimental periods, the rats were sacrificed and the isolated ovaries were histologically examined. The results of histological analysis of the ovaries in treated rats (G2, and G3) showed a significant (P≤0.05) decrease in the number of preantral, antral,
... Show MoreThe study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch
... Show MoreBackground: The Covid-19 pandemic changed the world; its most important achievement for education was changing the approach from traditional to virtual education. The present study aimed to investigate the role of virtual education networks on mental health of students including personality, beliefs, scientific, and cultural dimensions, in selected countries.Methods: This was an exploratory and applied study. According to the phenomenology strategy, theoretical saturation occurred after 24 semi-structured and targeted qualitative interviews with teachers from Iran, Iraq, Syria and Lebanon, in 2023. Quantitative data was collected through a researcher-made online questionnaire with 423 participants. Teachers with at least a Bachelor’s degr
... Show MoreUnderstanding of in-situ stress profiles and orientations plays a vital role in designing a successful hydraulic fracturing treatment. This paper is an attempet to examine the effect of lithology and in situ stress on geometery of hydraulic fractures. A hydraulic fracturing design simulator software called FracproPT with various capabilities for designing most of hydraulic fracture was used for simulate and optimize the hydraulic fracturing. For studying purpose, three different cases of stress gradient contrast between different formations are considered in this study (0.4, 0.5 and 0.75 psi/ft). The results obtained from the simulator showed that lithologies surrounding the pay zone have an effect on the fracture
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreThe presentwork is a theoretical study in the field of charged particle optics. It concentrates on the design of electrostatic enzil lens for focusing charge particles beams, using inverse method in designingthe electrostatic lens. The paraxial ray equation was solved to obtain the trajectory of the particles, the optical properties such as the focal length and spherical and chromatic aberration coefficients were determined. The shape of the electrode of the electrostatic lens were determined by solving poison equation and the results showed low values of spherical and chromatic aberrations, which are considered as good criteria for good design.
The adsorption isotherms and kinetic uptakes of CO2 were measured. Adsorption isotherms were measured at two temperatures 309 K and 333 K and over a pressure range of 1 to 7 bar. Experimental data of CO2 adsorption isotherms were modeled using Langmuir, Freundlich and Temkin. Based on coefficient of correlation it was found that Langmuir isotherm model was well suited with the experimental data of CO2 adsorption isotherms. In addition, Adsorption kinetic of CO2 mixture with N2 containing 10 % by volume CO2 and 90 % by volume N2 were determined in a temperature 36 °C and under the atmospheric pressure .When the flow rate was increased from
... Show More