Preferred Language
Articles
/
bsj-6930
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
قياس وتحليل تفاعل عمل المضاعف والمعجل في الاقتصاد العراقي باستخدام نموذج المستخدم – المنتج الديناميكي
...Show More Authors

The individual average income is considered one of the most used criteria for the distinguishing between the developed and the developing countries, for this reason the efforts of economic development has been construed on increasing the average national income, the investment expenditures is considered one of the basic foundations for economic development operation which lead to the expanding the prodection power of the economy, and increasing the level of national income in an averages greaten than the primary expenditures due to the work and interaction between the multiplier and the accelerator. But the ability of the economic sectors in the generation of national income as a result of the primary expenditures is different fr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Post COVID-19 Effect on Medical Staff and Doctors' Productivity Analysed by Machine Learning
...Show More Authors

The COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (13)
Scopus Crossref
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة طرائق تقدير معلمات توزيع كاما ذي المعلمتين في حالة البيانات المفقودة باستخدام المحاكاة
...Show More Authors

The estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best meth

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
دراسة المتغيرات المؤثرة على زيادة أعداد الحيوانات المنوية النشطة باستخدام نموذج توبت (Tobit Model
...Show More Authors

The no parity problem causes determining is the most interesting case by doctors and researchers in this filed, because it helps them to pre-discovering of it, from this point the important of this paper is came, which tries to determine the priority causes and its fluency, thus it helps doctors and researchers to determine the problem and it’s fluency of increase or decrease the active sperm which fluencies of peregrinating. We use the censored regression (Tobit) model to analyze the data that contains 150 observations may by useful to whom it concern.         

 

 

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 08 2021
Journal Name
Ournal Of The College Of Basic Education
تحضير الكاربون المنشط المايكروي والنانوي من مخلفات حبوب الذرة باستخدام الكربنة الحرارية واشعاع المايكروويف
...Show More Authors

This research work involves the preparation of nano activated carbonand macro activated carbon from corn seeds with a various mixing ratio ofpotassium hydroxide (1:0, 1:0.2, 1:0.4, 1:0.6, 1:0.8 and 1:1) % using thermaland micro radiation carbonization to identify the best mixing ratio. At studyto confirmed that the efficiency and effectiveness of the prepared of activatedcarbon samples increase when ratio potassium hydroxide increase with athermal and micro radiation carbonization was used. The study of samplesexternal surface area was performed via studying the adsorption of methyleneblue from their aqueous solution, also measured the internal surface area wasperformed via studying the adsorption of iodine from their aqueous solution.Measu

... Show More
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Sealing Depth of Q-Switched Nd:YAG 1064nm Laser in the Treatment of Patients with Hypersensitive Teeth: An In Vitro Study
...Show More Authors

The purpose of this work was to study the effects of the Nd:YAG laser on exposed dentinal
tubules of human extracted teeth using a scanning electron microscope (SEM). Eighty 2.5mm-thick
slices were cut at the cementoenamel junction from 20 extracted human teeth with an electric saw. A
diamond bur was used to remove the cementum layer to expose the dentinal tubules. Each slice was
sectioned into four equal quadrants and the specimens were randomly divided into four groups (A to D ).
Groups B to D were lased for 2 mins using an Nd:YAG laser at 6 pulses per second at energy outputs of
80 , 100 and 120 mJ. Group A served as control. Under SEM observation, nonlased specimens showed
numerous exposed dentinal tubules. SEM o

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref