People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed of under 40 milliseconds. This paper uses global password datasets with different stages of password complexity. This method protects the bank’s clients' password accounts inside the bank database.
In this study, an industrial source) E-Glass fiber) and a natural source (chestnut filler) were combined to improve the properties of polyesters. Hand-layup technique was applied in this work. Polyester (UPE) were reinforced with E-glass fibers, then reinforced with nano chestnut particles. All composites were prepared with (10% wt.) of E-glass for all prepared sheet and this ratio applied for Nano chestnut composite to preparing nano hybrid composites, Nano chestnut particles were used to reinforce E-glass/UPE composites with weight ratio (3%, 6% and 9% wt.). The evaluated mechanical performances for E-glass/NCSP polyester composite were tensile strength, impact strength and hardness. The higher ultimate tensile strength, Y
... Show MoreThe research aims to demonstrate the dual use of analysis to predict financial failure according to the Altman model and stress tests to achieve integration in banking risk management. On the bank’s ability to withstand crises, especially in light of its low rating according to the Altman model, and the possibility of its failure in the future, thus proving or denying the research hypothesis, the research reached a set of conclusions, the most important of which (the bank, according to the Altman model, is threatened with failure in the near future, as it is located within the red zone according to the model’s description, and will incur losses if it is exposed to crises in the future according to the analysis of stress tests
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreIndustrial characteristics calculations concentrated on the physical properties for break down voltage in sf6, cf4 gases and their mixture with different concentrations are presented in our work. Calculations are achieved by using an improved modern code simulated on windows technique. Our results give rise to a compatible agreement with the other experimental published data.
The Internet of Things (IoT) technology and smart systems are playing a major role in the advanced developments in the world that take place nowadays, especially in multiple privilege systems. There are many smart systems used in daily human life to serve them and facilitate their tasks, such as alarm systems that work to prevent unwanted events or face detection and recognition systems. The main idea of this work is to capture live video using a connected Pi camera, save it, and unlock the electric strike door in several ways; either automatically by displaying a live video connected via USB webcam using a deep learning algorithm of facial recognition and OpenCV or by RFID technology, as well as by detecting abnormal entrance wit
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show MoreThe Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without
... Show MoreThe preliminary test of the compounds N [2– (3,4–dimethoxy nitrobenzene oxazepine– 2,3–dihydro–4,7–dione]–5–mercupto–2–amino–1,3,4–thiadiazol [A] and N [ 2–anthralidene– 5– ( 2–nitrophenyl ) –1,3–oxazepine–4,7–dione–2–d](5–mercapto–1,3,4–thiadiazole–2–amin) [B] , showed that they possess high activity against some positive and negative bacteria , like pseudomonas aeruginosa (pseudo.), Escherichia coli (E-coli), staphylococcus aureus (sta.) and Bacillus subtilis (Ba.) and finally there is a study of the effect of some antibiotics like streptomyci
... Show MoreBackground: Fenugreek herb is one of the most abundant plants in our country. The dried ripe seeds of this plant are the effective medicinal part the plant.
Aim of the work: The aim of this study is to determine the pharmacological effect of a new chemical substance that has been extracted from crude fenugreek seeds which has a hormonal like action and to assess the safety of this experimental material in order to recommend it in future as a stimulator for ovulation or a contraceptive pill.
Materials and Methods: Sixty uncoupled female rats and mice were enrolled in this study, categorized into groups as mentioned in the text. Prolactin, estradiol and progesterone serum levels where measured for all gr
The monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show More