Preferred Language
Articles
/
DPqxsJkBMF18lwyZqc3S
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being hashed and stored on the website. The results of the two methods are compared in terms of speed and resistance to attackers, then password attacks are analysed in addition to calculating the strength of the password, the time it takes for the user to log in, and the time required for the attacker to guess the passwords per second. The Wolfram Alpha is used to calculate the mathematic operations and system implementation was done by using IntelliJ IDEA with java FX.

Crossref
View Publication
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Partial Least Squares and Principal Components Methods by Simulation
...Show More Authors

Abstract                                                                                              

The methods of the Principal Components and Partial Least Squares can be regard very important methods  in the regression analysis, whe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Properties of Kumaraswamy binary Distribution and compare methods of estimating parameters
...Show More Authors

The recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Laser Cutting Methods on Hole Deviation and Surface Integrity
...Show More Authors

In the present work usedNd:YAG laser systems of different output characteristic were employed to study the drilling process of material used in scientific and industrial fields. This material include Manganese hard steel. Our study went into the affecting parameters in drilling of Manganese hard steel by laser. Drilling process is achieved through material absorption of part of the incident laser beam. It is the resultant of interfering both, laser beam and material properties and the focusing conditions of the beam. The results as shown that the increase in the laser pulse energy over the used level has raised the hole diameter, depth and increased the hole taper. In addition to that a hole taper was affected by the laser energy, the fo

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 15 2023
Journal Name
2023 6th International Conference On Engineering Technology And Its Applications (iiceta)
Methodology for the Design and Programming Methods for a Smart Home
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Several developed and modern methods for estimating some anti-inflammatory drugs
...Show More Authors

     With the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood

... Show More
View Publication
Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Down Syndrome causes, symptoms, and most important methods of functional treatment
...Show More Authors

This study is descriptive and theory of Dawn syndrome as the problem of research lies in the need to identify the identification of the causes of Dawn syndrome and its symptoms and methods of dealing with it, which has become a problem that needs treatment, especially after the numbers have become high in Iraq, which has not yet taken the necessary importance for treatment and care.

The objectives of the research were summarized in the identification of the most important causes of Dawn syndrome and its symptoms and diagnosis and ways or methods of dealing with people with Dawn syndrome in order to develop therapeutic plans for him.

       

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Environmental Engineering And Management Journal
TREATMENT OF DAIRY WASTEWATER BY ELECTROCOAGULATION AND ULTRASONIC-ASSISTED ELECTROCOAGULATION METHODS
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Business Risk Assessment Using Client Strategy Analysis Approach in order to Increase the Efficiency and Effectiveness of the Audit Process
...Show More Authors

Abstract

This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref