In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical user authentication and possible attacks on nineteen recognition-based authentication systems were discussed. In this study, differentiation table of attack patterns for all recognition-based techniques is shown. Finally, the positive and negative aspects of nineteen methods were explained in the form of a detailed table.
The aim of this research is to employ the roundhouse strategy to study its impact on the students achievement of the 10th grade in physics and their core thinking. After the application of the research experience and gaining data, which was processed statistically using the statistical packages program (SPSS). The results of the researcher revealed the superiority of the students of the experimental group who studied using the roundhouse strategy on the students of the control group who studied the usual method in the achievement test. As results showed that there were statistically significant differences between the average scores of the experimental group and the average scores of the control group students in the core thinking test and
... Show MorePlant tissue culture techniques were exploited for the micropropigation of Lisianthus (Eustoma grandiflora). Different concentrations of Benzyl adenine (BA), 6- Furfural amino purine (Kinetin), Indol butyric acid (IBA), were investigated in their effects at different micropropagation stages. Three explants (apical shoots, internodes, leaf discs) were used in this study. The effect of the interaction between BA and IBA on shoot multiplication was investigated in increasing the number of shoots on explants. Rooting was also studied after inclusion of IBA and NAA to Murashige and Skoog, 1962 culture medium (MS). During acclimatization stage, different ratios of river sand and peat moss as agricultural media were tested and plantlets survival w
... Show MoreThe durability of asphalt concrete is highly dependent on the geometry and mineralogy of coarse aggregates, yet their combined influence on mechanical and moisture resistance properties is still not fully understood. This study evaluates the effects of coarse aggregate geometry, specifically flat and elongated particle ratios and angularity, as well as mineral composition (quartz versus calcite), on asphalt mixture durability. The durability of mixtures was evaluated through Marshall properties as well as moisture susceptibility indicators, including the tensile strength ratio (TSR) and index of retained strength (IRS). Statistical analyses (ANOVA and t-tests) were also conducted to confirm the significance of the observed effects.
... Show MoreThe detection of fungi contaminating maize grain and the effect of four plant extracts Azadirachta indica, Eucalyptus globulus Glycyrrhiza glabra and Zingiber officinale on the growth of A. flavus and its ability to produce AflatoxinB1. The results showed that the incidence of Aspergillus spp., was 52.75% of the isolated fungi, of which 29.50% was due to Aspergillus flavus, followed by Penicillium spp., with an incidence of 21.06%, and then Fusarium spp., with a rate of 18.13%. The percentage of toxin-producing A. flavus isolates reached 70.8% out of 24 isolates. The results showed the effect of alcoholic plant extracts at a concentration of 10 mg/ml on the fungal growth activity of A. flavus, the alcoholic extract of neem leaves was superi
... Show MoreAt a time when any tourist in the world wants a trip to reload his energy and enjoy peace and quiet and engage in adventures in a safe environment, terrorism comes to disturb him on that journey through operations aimed at the tourist and entertainment destinations, such as shops, restaurants, cafes and hotels Is the orbit of research) for many reasons. The security measures taken by hotels play an important and fundamental role in preventing or limiting these terrorist operations. At the same time, while some hotel administrations are constantly seeking to improve these measures to preserve the safety of their guests and visitors, In spite of the high number of attacks on hotels since 2001 and today. This research is intended to highlight
... Show More