Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.
Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreRoller Compacted Concrete is a type of concrete that is environmentally friendly and more economical than traditional concrete. Roller Compacted Concrete is typically used for heavy-duty and specialist constructions, such as hydraulic structures and pavements, because of its coarse surface. The main difference between RCC and conventional concrete mixtures is that RCC has a more significant proportion of fine aggregates that allow compaction and tight packing. In recent years, it has been estimated that several million tons of waste demolished material (WDM) produced each year are directed to landfills worldwide without being recycled for disposal. This review aimed to study the literature about creating a Roller-Comp
... Show MoreBackground: The evaluation of the chronological age is a practical method in crime investigation field that assists in identifying individuals to treat them as underage or adult. This study aimed to assess the stages of third molars mineralization in relation to chronological age of Iraqi individuals, determine the gender differences and arches (maxillary/mandibular) differences.
Materials and Methods: A total of 300 orthopantomograms of orthodontic patients were collected according to specific criteria and evaluated visually. The developmental stages of maxillary and mandibular third molars were determined according to Demirjian method. T
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreThe fresh water ecosystem constitute an essential and very important for human life, for this reason it should be kept away from all the chemical pollutants including the pesticides The best way for Fighting harmful insects.(such as Anophles larvae) is by the biological control.
In the present study two species of Cyclopoida: Copepod, Mesocyclops hyalinus and Cyclops agilis آ were used as predators for Anophles larvae.
The data showed that the percentages of predation were 65% and 56%
forM. hyalinus and C. agilis respectively
and the means of predation were 1.3 larvae/ female and 1.1
... Show MoreThe research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
The ZnO nanoparticles were synthesized at various precursor concentrations i.e. 0.05, 0.1, and 0.5 M by biosynthesis method based on Pometia pinnata Leaf Extracts. Initial nanoparticle concentration influenced the optical bandgap, shape, and structure of nanoparticles. The photodegradation process was carried out under UV illumination. The efficiency of MB degradation was determined by measuring the decrease in MB concentration and by analyzing the optical absorption at 663 nm recorded by UV-Vis spectroscopy. Results showed that the biosynthesized ZnO nanoparticles exhibited efficient photodegradation of MB, with a maximum degradation rate of 80% after 90 minutes of exposure to UV-C light. The study highlights the potential of Pometia pi
... Show MoreThe search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.
The estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To
... Show More