Preferred Language
Articles
/
bsj-6930
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Using the Critical Path Method (CPM) for scheduling the project (paving the Amil Sayid Al-Ayyam Street with a length of 1.25 km) In terms of Decresing the time
...Show More Authors

The implementation of the concept of project scheduling in the organizations generally requires a set of procedures and requirements, So, most important of all is the understanding and knowledge of the tools and techniques which are called the methods of scheduling projects. Consequently, the projects of the municipality administration in the holy governorate of Karbala suffer from the problem of delaying their projects and chaos in the ways of implementation. To provide assistance to this directorate and to demonstrate how to schedule projects using one of the advanced scientific methods that proved their ability to schedule any project and its potential to accelerate the time of completion, as well as ease of use and effectiven

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Using the Abbreviated Version of Modification of Diet in Renal Disease Formula as A Primary Estimate for the Prevalence of Undiagnosed Chronic Kidney Disease in Patients with Acute Stroke
...Show More Authors

Introduction: The association between acute stroke and
renal function is well known. The aim of this study is to
know which group of patients with acute stroke is more
likely to have undiagnosed Chronic Kidney Disease and
which risk factors are more likely to be associated with.
Methods:We studied 77 patients who were diagnosed to
have an acute stroke.Patients were selected between
April2011andJune 2011 using the " 4-variable
Modification of
Diet in Renal Disease Formula " which estimates
Glomerular Filtration Rate using four variables :serum
creatinine ,age ,race and gender.
Results :The study included 38 male and 39 females
patients ,aged (35-95) years. Glomerular Filtration Rate in
patients wi

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 10 2018
Journal Name
Al–bahith Al–a'alami
Using of digital media and its effect on constructing the value system of Iraqi society (Field study on a sample of the audience for the city of Baghdad model)
...Show More Authors

With the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the effectiveness of using platelet rich fibrin (PRF) as a sole grafting material and membrane in augmentation of dehiscence and fenestration defects encountered during dental implant surgery
...Show More Authors

Background: Bone regeneration in dehiscence and fenestration defect can be improved with the use of platelet rich fibrin (PRF) that provides a scaffold for new bone regeneration. This study was conducted to assess the effectiveness of PRF as a graft material and membrane in dehiscence and fenestration defects. Materials and Methods: This prospective clinical study included patients who received dental implants that demonstrated peri-implant defects which were augmented using Leukocyte- PRF (L-PRF) or Advanced-PRF (A-PRF). Twenty four weeks postoperatively the defect resolution and the density of regenerated bone were assessed by CBCT and re-entry surgery. The assessment also included measurement of primary and secondary implant stability

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI: ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI
...Show More Authors

The study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
مجلة كلية التراث الجامعة
تطبيق نظرية القيود لتحسين اداء العمليات باستخدام المحاكاة - دراسة لعينك من منتجات شركة صناعات الأصباغ الحديثة
...Show More Authors

يهدف البحث ابر تحديد نقاط الاختناق من خلال تحديد القيود التي تعترض عمل الشركة وبالتالي معالجتها من خلال تطبيق خطوات نظرية القيود والتي تمثل اداة فاعلة تساعد في التخلص من نقاط الاختناق وجدولة تلك القيود

Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 08 2022
Journal Name
Journal Of Physical Education
تأثير تمرينات باستخدام جهاز مصمم في دقـة الرؤية البصـرية لمهارة الضرب الساحق بالكـرة الطائـرة لالعبــي الشبـــاب
...Show More Authors

هدفت الدراسة الى تصميم جهاز يحاكي مهارة حائط الصد، وإعداد تمرينات خاصة باستعمال الجهاز المصمم لتطوير دقة الرؤيا البصرية لمهارة الضرب الساحق لالعبي الكرة الطائرة الشباب. استخدام الباحثان المنهج التجريبي، بتصميم المجموعتين المتكافئتين الضابطة والتجريبية. تم تحديد مجتمع البحث من العبي نادي الصناعة الرياضي )فئة الشباب( بأعمار ) 17 – .ً واستنتج الباحثان ان استخدام التمارين 18( سنة. تم اختبار دقة الرؤيا البصرية ل

... Show More
Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Bioremediation Potential of Chlorella vulgaris and Nostoc paludosum on azo Dyes with Analysis of Metabolite Changes
...Show More Authors

               Microalgae have been used widely in bioremediation processes to degrade or adsorb toxic dyes. Here, we evaluated the decolorization efficiency of Chlorella vulgaris and Nostoc paludosum against two toxic dyes, crystal violet (CV) and malachite green (MG). Furthermore, the effect of CV and MG dyes on the metabolic profiling of the studied algae has been investigated. The data showed that C. vulgaris was most efficient in decolorization of CV and MG: the highest percentage of decolorization was 93.55% in case of MG, while CV decolorization percentage was 62.98%. N. paludosum decolorized MG dye by 77.6%, and the decolorization percentage of CV was 35.1%. Metabolic profiling of

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref