Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreTekrarlar, anlamı kuvvetlendirmek, ifadeyi zenginleştirmek amacıyla kullanılan dil unsurlarıdır. Ural Batır destanı da tekrarlar, özellikle de ikilemeler açısından zengindir. Bu yazıda, Ural Batır destanındaki ikilemeler gruplandırılarak verilecek ve değerlendirmesi yapılacaktır.
Abstract
Word repeating is language items used for strengthen the meaning and riching the expression. By this view, Ural Batır epic is a good example for word repeating units. In this paper, Ural Batır epic’s word repeating has been presented by classification.
The dictionary meaning of the word is a linguistic category of the thing in a specific way . it is also a brief description of it .The main function of the concept lies in the total scientific reflection of the things where as the main function of the meaning is a brief reference to a certain content (extralinguistic ) which shows human knowledge . The meaning is (a storage unit ) of knowledge of the world ,but this does not give the extra linguistic meaning which the old words have . Hence, additional cultural ,ethnic,communicative
and genetic information is needed.
All the old words which are brought into us
... Show MoreÖzet
Tekrarlar, anlamı kuvvetlendirmek, ifadeyi zenginleştirmek amacıyla kullanılan dil unsurlarıdır. Ural Batır destanı da tekrarlar, özellikle de ikilemeler açısından zengindir. Bu yazıda, Ural Batır destanındaki ikilemeler gruplandırılarak verilecek ve değerlendirmesi yapılacaktır.
Anahtar Kelimeler: Tekrar, ikileme, aralıklı ikileme, destan.
Abstract
Word repeating is language items used for strengthen the meaning and riching the expression. By this view, Ural Batır epic is a good example for word repeating units. In this paper, Ural Batır epic’s word repeating has been presented by classification.
Key Words: Repeating, a pair words, a pair words by space, epic.
Gas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t
The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More