Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreBackground: Although mammography is a powerful screening tool in detection of early breast cancer, it is imperfect, particularly for women with dense breast, which have a higher risk to develop cancer and decrease the sensitivity of mammogram, Automated breast ultrasound is a recently introduced ultrasonography technique, developed with the purpose to standardize breast ultrasonography and overcome some limitations of handheld ultrasound, this study aims to evaluate the diagnostic efficacy of Automated breast ultrasound and compare it with handheld ultrasound in the detection and characterization of breast lesions in women with dense breasts.
Objectives:<
... Show MorePolish Academy of Sciences
Background: Diabetic mellitus (DM) is a collection of metabolic disorder identified by hyperglycemia. The heterogeneous etiology includes defects either in insulin secretion, or in insulin action, or the both. In addition to the distraction in carbohydrate, fat and protein metabolism. Inflammatory reaction that caused by many pro-inflammatory cytokines play a central role in the pathogenicity of T2DM, these cytokines can enhance insulin resistance which led to impaired glucose homeostasis. Subjects: The study included 75 patients (38 males and 37 females) suffering from T2DM with age mean ± SE 52.30 ± 1.60, and 70 individuals as healthy controls (35 males and 35 females) with age mean ± SE 48.88 ± 0.64. Evaluation of immunological marke
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreBanks face many of the various risks: which are of dangerous phenomena that cause the state achieved a waste of money and a threat to future development plans to be applied to reach the goals set by: prompting banks and departments to find appropriate solutions and fast: and it was within these solutions rely on Banking risk management and effective role in defining and identifying: measuring and monitoring risk and trying to control and take risks is expected to occur in order to encircle and make it in within acceptable limits: and try to avoid them in the future to reduce the losses that are likely to be exposed to the bank: and it began to emerge and dominate a lot of legislation that seeks to structure the year risk management and t
... Show MoreThe purpose of this study was to measure serum levels of insulin-like growth factor-binding protein (IGFBP7), Insulin-like Growth Factor 1 (IGF-1), Growth Hormone (GH), Interleukin 6 (IL-6) and insulin in acromegaly patients and healthy controls. The acromegaly group had 60 patients, while the population group had 30 people who had never had acromegaly before. The concentration of IGFBP7, IGF-1, GH, IL-6, and insulin were determined. The results of the present study indicate that IGFBP7 level in the acromegaly group was significantly lower (1.690.07 ng/mL vs. 2.740.12 ng/mL, respectively, p = 0.001). IGF-1, GH, IL-6, and insulin concentrations were also significantly higher in acromegaly patients. The diagnostic accuracy (2.194) was exce
... Show MoreThe increased applications of technology in the field of architecture, especially digital technology and aspects of automation, have made a major impact on various aspects of local architecture, especially the traditional ones. As these technologies have succeeded in integrating many technological applications in many traditional and heritage buildings and taking them to more complex uses. And included in it characteristics that were not contained, therefore the research problem was concentrated in the absence of a holistic view of the role of the aspects of automation as a technological and design effect and its mutual effects on traditional buildings (especially the traditional Bagh