Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.
Six house-hold Abyssinian pumps distributed in different villages of Mansoura (Mans-I, Mans-II and Mans-III) and Talkha (Talk-I, Talk-II and Talk-III) cities, Egypt, have been selected for regular seasonal water quality assessment during 2017. Water samples have been collected within the mid-periods of four seasons Standard assessment tools were employed for the integrated water quality assessment including Water Quality Index (WQI) and ISO standard algal toxicity test. WQI displayed remarkable local and seasonal variations with excellent (≥ 90) and good (70 - 89) only recorded for water samples collected from Mans-I pump located in sparsely populated area and far 50 meters only from the eastern (Damietta) branch of Nile River. WQI of
... Show MoreIn this research, we sought to identify the nature of the relationship between the exchange rate of the Chinese yuan and the value of Chinese exports, through the formulation of a standard model based on the model of common integration, and based on the data of the study and using the test "Angel-Granger" It reflects the relationship between the two research variables, through which the relationship between the RMB exchange rate and the value of Chinese exports was estimated during the period 1978-2017.
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThis research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior was
... Show MoreThe present research deals with the spatial variance analysis in Jwartadistrict and conducting a comparison on the spatial and seasonal changes of the vegetation cover between (2007-2013) in order to deduce the relationship between the vegetation density and the areas which are exposed to the risk of water erosion by using Plant Variation Index NDVI) C (coefficient and by using Satellite images of Landsat satellite which are taken in 2/7/2007 and Satellite images of Landsat satellite taken in 11/1/ 2013, the programs of remote sensitivity and the Geographic Information Systems.
The study reveals that there is a variance in the density of vegetation cover of the area under study betwee 2007 and 2013. Howev
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreQuantum dots (QDs) of zinc sulfide (ZnS) was prepared by chemical reaction with different potential of hydrogen (pH) and used to fabricate organic quantum dot hybrid junction device. The optical properties of QDs were characterized by ultraviolet-visible (UV-Vis.) and photoluminescence (PL) spectrometer. The results show that the prepared QDs were nanocrystalline with defects formation. The energy gap (Eg)calculated from PL were 3.64, 3.53 and 3.35 eV for pH=8, 10 and 12 respectively. This decreasing of energy gaps is results of the effect the pH solution increases, which in turn leads to the shifted of the PL spectrum toward red shifted, which makes the energy bands at surface states are shallow ban
... Show MoreRecognition is one of the basic characteristics of human brain, and also for the living creatures. It is possible to recognize images, persons, or patterns according to their characteristics. This recognition could be done using eyes or dedicated proposed methods. There are numerous applications for pattern recognition such as recognition of printed or handwritten letters, for example reading post addresses automatically and reading documents or check reading in bank.
One of the challenges which faces researchers in character recognition field is the recognition of digits, which are written by hand. This paper describes a classification method for on-line handwrit
... Show MoreVirtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope. The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir
... Show More