Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.
A new, accurate, precise and economic two spectrophotometric methods for determination of Paracetamol (Par), Ibuprofen (Ibu), and Caffeine (Caf) were suggested. Those methods were the first and second ratio derivative spectrum using a double devisor. Par, Ibu, and Caf showed many useful peaks for their quantified determination. The validity of all analysis modes for determination of the three compounds, peak to baseline, peak area and peak to peak were according to ICH. The linearity of two methods was between 5 µg/ml as a lower concentration and 50 µg/ml as the highest concentration for three compounds. Recovery percentage was around 100% and relative standard deviation was less than 2.6%. The methods were applied successfully in the
... Show MoreThe current research aims to identify the effect of the learning mastery strategy using interactive learning as a therapeutic method on the achievement of secondary school students in mathematics. To achieve the research objective, the researcher selected second-grade middle school students at Al-Haybah Intermediate School for Boys and determined his research sample, which consisted of (77) students distributed into two sections: Section (A) the experimental group, with (38) students, and Section (B) the control group, with (39) students. The statistical equivalence of the two research sample groups was confirmed in the variables (intelligence test, previous achievement, and previous knowledge test). The researchers chose the par
... Show MoreObjective: To identify causes of maternal death in Mizan Aman and Gebretsadik shawo general hospitals
Methodology: A case control study on 595 charts, 119 cases and 476 controls was conducted in Mizan
Aman & Gebretsadik shawo general hospitals. Data was analyzed by STATA 13.1. Propensity score
matching analysis was used to see causes of maternal death.
Results: Hemorrhage were the main direct causes of maternal death which accounts 47.9% (β =0.58
(95% CI (0.28,0.87)) in hospital but when projected to population based the sample (β =0.26 (95% CI
(0.22,0.31)). Followed by infection 36 (25.21%) (β = 0.50 (95% CI (0.08, 0.92)). when projected to
population based the sample PIH 7.6%) is significant cause (β = 0.16
This study focused on a fundamental issue which was represented by ability of Iraqi central bank in facing the difficulty of determining the optimal ratio of liquidity in the Iraqi banks in terms of the balancing between its obligations to the depositors and borrowers, and liquidate their funds on one hand and the risks on the other hand.the search aimed for achieving the goals which represented by identifying the possibility of Iraqi banks to apply the regulations rules and instructions issued by central bank of Iraq in determining ratio of liquidity and its appropriate with Iraqi banks action to implement a reasonable profit to&
... Show MoreBackground: Measuring implant stability is an important issue in predicting treatment success. Dental implant stability is usually measured through resonance frequency analysis (RFA). Osstell® RFA devices can be used with transducers (Smartpeg™) that correspond to the implants used as well as with transducers designed for application with Penguin® RFA devices (Multipeg™). Aims: This study aims to assess the reliability of a MultiPeg™ transducer with an Osstell® device in measuring dental implant stability. Materials and Methods: Sixteen healthy participants who required dental implant treatment were enrolled in this study. Implant stability was measured by using an Osstell® device with two transducers, namely, Smartpeg™ and M
... Show MoreThe aim of the study was to evaluate the efficacy of diode laser (λ=940 nm) in the management of gingival hyperpigmentation compared to the conventional bur method. Materials and methods: Eighteen patients with gingival hyperpigmentation were selected for the study with an age between 12-37 years old. The site of treatment was the upper gingiva using diode laser for the right half and the conventional method for the left half. All patients were re-evaluated after the following intervals: 3 days, 7 days, 1 month and 6 months post-operation. Pain and functions were re-evaluated in each visit for a period of 1 day, 3 days and 1 week post-operation. Laser parameters included 1.5 W in continuous mode with an initiated tip (400 μm) placed in
... Show MoreLaser shock peening (LSP) is deemed as a deep-rooted technology for stimulating compressive residual stresses below the surface of metallic elements. As a result, fatigue lifespan is improved, and the substance properties become further resistant to wear and corrosion. The LSP provides more unfailing surface treatment and a potential decrease in microstructural damage. Laser shock peening is a well-organized method measured up to the mechanical shoot peening. This kind of surface handling can be fulfilled via an intense laser pulse focused on a substantial surface in extremely shorter intervals. In this work, Hydrofluoric Acid (HF) and pure water as a coating layer were utilized as a new technique to improve the properti
... Show MoreAbstract
The Phenomenon of Extremism of Values (Maximum or Rare Value) an important phenomenon is the use of two techniques of sampling techniques to deal with this Extremism: the technique of the peak sample and the maximum annual sampling technique (AM) (Extreme values, Gumbel) for sample (AM) and (general Pareto, exponential) distribution of the POT sample. The cross-entropy algorithm was applied in two of its methods to the first estimate using the statistical order and the second using the statistical order and likelihood ratio. The third method is proposed by the researcher. The MSE comparison coefficient of the estimated parameters and the probability density function for each of the distributions were
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThe increase in obesity and the many accompanying diseases is attributed to the increased production and consumption of foods made of non-nutritive sweeteners without regard to the risks of consuming additional calories, and this in turn leads to hormonal imbalance and metabolic disorders and the resulting imbalance and ill health that have spread to all segments of society. During the research, 0.01, 0.02, 0.03, 0.04 and 0.05 % of stevia sweetener was added to the cream instead of the sugar used. Physical and chemical tests were performed for the stevia extract and the microbial content in the cream, as well as the sensory evaluation. It was noted that fortifying the cream with calorie-free stevia sugar led to the production of
... Show More