In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThrough recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreSn effect on the phase transformation behavior, microstructure, and micro hardness of equiatomic Ni-Ti shape memory alloy was studied. NiTi and NiTiSn alloys were produced using vacuum induction melting process with alloys composition (50% at. Ni, 50% at.Ti) and (Ni 48% at., Ti 50% at., Sn 2% at.). The characteristics of both alloys were investigated by utilizing Differential Scanning Calorimetry, X- ray Diffraction Analysis, Scanning Electron Microscope, optical microscope and vicker's micro hardness test. The results showed that adding Sn element leads to decrease the phase transformation temperatures evidently. Both alloy samples contain NiTi matrix phase and Ti2Ni secondary phase, but the Ti2Ni phase content dec
... Show MoreThis paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreThis research has been devoted to the objective and important issue which is the legal protection of the printing form of the newspaper in the Iraqi press.
As this issue constitutes the integrated unit of the printing format in addition to achieving legal protection for the illustrative image used in the press. Such matter, on both level the integrated unit of the printing format and the legal protection, is out of reach of study due to the comprehension of the subject is concerned.
Although there is a justification for dealing with both of them together as the explanatory image is one of the foundations on which the printing format of the newspaper is built. This case generates, at least, the same legal subject that appe
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon our Master Muhammad and upon all his family and companions:
And then: What most concerns rational people and reformers in the modern era is the moral deviation and delinquency that dominates childhood, due to family disintegration and the lack of discipline of most societies according to the religious and moral motives called for by the heavenly messages, especially Islam, which is the final message and guarantees the reform of people in life. Every time and place.
Islam has drawn attention to this issue (childhood) and made it the focus of its consideration, considering that the child is the nucleus of society and the preparation for the future, so it ordered that
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe research deals with analyzing the influencing role of trade policies in the growth and development of productive economic sectors and their contribution to GDP and its reflection on workforce employment. Studies have proven the success of the Malaysian experience in stimulating the productive economic sectors to grow and their contribution to the gross domestic product with an increase in the growth of local markets and access to international markets for national products. The research also deals with the ineffectiveness of Iraqi trade policies after 2003 in stimulating the productive economic sectors (agricultural and industrial) on economic growth, as most of the increase in Iraqi GDP growth throughout the study period was
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More