In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.
This study aims to calculate the percentage of loss and its causes of the horticultural crops tangerines and Seville oranges in Baghdad governorate for the 2020 agricultural season and estimate the economic impacts of losses both crops tangerines and Seville oranges at the study samples level. The research followed both methods descriptive and the quantitative mathematical in estimating the loss of horticultural crops from tangerines and Seville oranges trees and calculating the economic impact of this loss. The results showed that the percentage of losses of tangerines and Seville oranges crops on the level of wholesalers was about 12% and 13% respectively; causing economic losses estimated at about 3184.41 Euro. The results also displayed
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThere is no doubt that Agricultural Policy is the main responsible for the degrading in Agricultural sector in Iraq during the period 2003-2013, and that was very clear from magnitude of indicators because of little sharing of each of agricultural product in GDP because it was (9.38%) in average during the study period and the annual changing of it was negative (-5.82%), and there is increasing in deficit of trade balance in Agriculture during the study period about (4185.73) million US$, and the percentage of agricultural exports from total exports was (0.14%) in average only. The foreign trade policy in Agricultural products also cannot determine map of Revealed Comparative Advantage (RCA) of Agricultural products and crops. The study sh
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreThis study presents the debonding propagation in single NiTi wire shape memory alloy into linear low-density polyethylene matrix composite the study of using the pull-out test. The aim of this study is to investigate the pull-out tests to check the interfacial strength of the polymer composite in two cases, with activation NiTinol wire and without activation. In this study, shape memory alloy NiTinol wire 2 mm diameter and linear fully annealed straight shape were used. The study involved experimental and finite element analysis and eventually comparison between them. This pull-out test is considered a substantial test because its results have a relation with behavior of smart composite materials. The pull-out test was carried out by a u
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreUrban agriculture is one of the important urban uses of land in cities since the inception of cities and civilizations, but the great expansion of cities in the world during the twentieth century and the beginning of the twentieth century and the increase in the number of urban residents compared to the rural population has led to a decline in this use in favor of other uses.
This decline in agricultural and green land areas in cities has negatively affected the environment, natural life and biological diversity in cities in addition to the great impact on the climate and the increase in temperatures and the negative impact on the economic side, since urban agriculture is an important pillar of the economy, especially
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show Morenatural and non-natural disasters, is an environmental challenges the society and the economy as well as a direct and indirect economic affect, and the units are part of the system overlapping among themselves and thus affected by external indicators, directly or indirectly, these direct effects appear in the destruction or damage inflicted by disasters in property , infrastructure , superstructure , accounting information systems and indirectly in the outcome of future business, comes research problem through access to accounting treatments issued by the Federal Office of financial supervision to address the damage caused by the disasters and prepare the missing financial accounts it turns out us that there is negligence of a nu
... Show More