Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreTransport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreAn experiment was carried out by using post in kalar horticulture Station/Sulaimania province on soil taked from once region sields during growing season of 2008-2009. The objective was to study adding increasing levels of urea fertilizer which is (0.0, 0.20, 0.40, 0.80) gm/Pot and superphosphate fertilizer which is (0.0, 0.24, 0.48) gm/pot in some chemical properties of grain for wheat IPA 95. This experiment was carried out by completely randomized design (CR D) with three replications. Results in dictated of clear increase in all the studied characteristics (concentration for each nitrogen, phosphorus and potassium and carbohydrate percentage with increasing levels of fertilizers).
This study was conducted on five kinds of local soybean seeds (Ibaa, Hawija, Taqa.2, Lee74 and Hassan). The chemical analysis results showed that Hawija soybean has the highest percent of protein which was 38-08%, The amino acid percent was also higher than the other kinds(lysine, Thereonine and Tryptopham), and being 389,250,81 mg/gm nitrogen respectively Both amino acids were important for child nutrition. Hawija was selected, being the best for proteins and basic amino acids, and was utilized in preparation of the adjunct baby food formula. Eighteen formulas had been prepared by using soybean flour kind(Hawija), wheat flour kind (Abu gharib) and full fat powder milk (NIDO). Each formula contained 20% protein as recommended by F.A.O, W.
... Show MoreObjectives: The study aims at:
1- Measuring the level of lead in workers’ saliva and blood in the factory.
2- Studying the correlation between the saliva lead level and the infection that caused by microorganisms, isolation and
identification.
3-Studying the influence of high blood lead level on the total white blood cells.
Methodology: This study has been conducted for the period from March 15th, 2010 to May, 20th
, 2010. A total of (60)
saliva and blood samples were collected from workers in batteries industry factory in Baghdad and another (20) samples
were collected as a control group. Lead level had been measured in blood and saliva samples, then microorganisms were
isolated the from the saliva samples.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreA new class of higher derivatives for harmonic univalent functions defined by a generalized fractional integral operator inside an open unit disk E is the aim of this paper.
In this study, pebble bed as an absorber and storage material was placed in a south facing, flat plate air-type solar collector at fixed tilt angle of (45°). The effect of this material and differ- ent parameters on collector efficiency has been investigated experimentally and
theoretically. Two operation modes were employed to study the performance of the solar air heater. An inte- grated mode of continuous operation of the system during the period of (11:00 am – 3:00 pm) and non-integrated mode in which the system stored the solar energy through the day then used the stored energy during the period of (3:00 pm – 8:00 pm). The results of parametric study in case of continuous operating showed that the maximum average temperatur
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show More