Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.
The present study aimed to investigate the effect of re-operations engineering business in continuous improvement, as the rapid development of service activities generally private and the great diversity in the goals of its operations and programs of the university and the service has led to the increasing importance of re-operations engineering business as well as continuous improvement so began to study the relationship between the re engineering and continuous improvement of university service, and applied study on a sample of professors from the faculties of administration, economics and law. Find and reach to several conclusions, notably that the preparation of the teaching staff training sessions on how to use modern teaching
... Show MoreSome coordination complexes of Co(??), Ni(??), Cu(??), Cd(??) and Hg(??) are reacted in ethanol with Schiff base ligand derived from of 2,4,6- trihydroxybenzophenone and 3-aminophenol using microwave irradiation and then reacted with metal salts in ethanol as a solvent in 1:2 ratio (metal: ligand). The ligand [H4L] is characterized by FTIR, UV-Vis, C.H.N, 1H-NMR,13C-NMR, and mass spectra. The metal complexes are characterized by atomic absorption, infrared spectra, electronic spectra, molar conductance, (C.H.N for Ni(??) complex) and magnetic moment measurements. These measurements indicate that the ligand coordinates with metal (??) ion in a tridentate manner through the nitrogen and oxygen atoms of the ligand, octahedral structures
... Show Morethe research was exposed to a study the importance of the role of the supportive entities in providing the useful information to the tax administration and their ability to extend the level of the tax base of taxpayers, through the improvement of the tax payers determination and their tax settle for the purpose of increasing the tax revenue, and shed light on the legal evidence through which these entities become officially assigned to perform a supplementary task to the General Committee for Taxes GCT, to help it to perform its task efficiently, and to study the reasons of the weak cooperation of the supportive entities and their reluctance to provide useful information which leads to limiting the tax base.
The research data hav
... Show MoreAbstract:
Musa son of Yaqoob son of Izra, the Spanish poet, linguist, and philosopher, was born in Granada. He has many poems representing types of poetry. Also, he had important books, such as "the Poetry of Israel" and "Contemplative Research". He is knowledgeable in both Hebrew and Arabic, because most of his books were written in Arabic and the then translated to Hebrew. It seemed that he was influenced by Arab poets, specifically Abo Firas, and borrowed many issues, such as comparison, repetition, exaggeration, etc. and included them in his poetry.
All know that Arabic literature clearly influenced Hebrew literature in the Spanish era. Ara
... Show MoreThis research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of universi
There are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff
... Show MoreAbstract:
The current research is aimed at analyzing the impact of the dimensions of Job involvement of all of (the enthusiasm, the Devotion, Assimilation ) in the Crystallize organizational Identification across the dimensions of (organizational loyalty, membership, similarities) and was named the Middle East, the Iraqi Investment Bank room to look as the research community of staff adopted in the bank, to be applied to a Random sample of (100) employees working in the said bank, and developed for the purposes of data collection, a questionnaire form included three axes covered (32) paragraph of the measure, which is included adopted Liekrt Quintet for the
... Show MoreHuge efforts are being made to control the spread and impacts of the coronavirus pandemic using vaccines. However, willingness to be vaccinated depends on factors beyond the availability of vaccines. The aim of this study was three-folded: to assess children’s rates of COVID-19 Vaccination as reported by parents, to explore parents’ attitudes towards children’s COVID-19 vaccination, and to examine the factors associated with parents’ hesitancy towards children’s vaccination in several countries in the Eastern Mediterranean Region (EMR).
A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More