Preferred Language
Articles
/
DPqxsJkBMF18lwyZqc3S
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being hashed and stored on the website. The results of the two methods are compared in terms of speed and resistance to attackers, then password attacks are analysed in addition to calculating the strength of the password, the time it takes for the user to log in, and the time required for the attacker to guess the passwords per second. The Wolfram Alpha is used to calculate the mathematic operations and system implementation was done by using IntelliJ IDEA with java FX.

Crossref
View Publication
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Bayes and Non-Bayes Estimation Methods for the Parameter of Maxwell-Boltzmann Distribution
...Show More Authors

In this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 02 2019
Journal Name
Journal Of Planner And Development
ways to employ planning and architectural methods to rationalize the introduction of electricity
...Show More Authors

the rationalization of energy consumption Require awareness in the possibility of bridging the local need severe shortage of electric power for daily requirements. The research aims to show that the engineers of various specializations and architects, including in particular can have an active role in about the importance of the role of energy in human life, and it’s best utilization without extravagance (which our religion forbids it). Here lies the problem of the research to find possible means and alternative methods to reduce (rationalization) electrical energy consumption in hot dry areas in general which need large energy for air conditioning because of the crucial climate of these regions that making access to the area o

... Show More
View Publication
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Problematic of Non Performing Banking Loans in Iraq and the Methods of Treatment
...Show More Authors

The banking system considered as one of the most important intermediate circle between creditor and debtors it is mean the most important funding rings in economic activity, whether finance takes the a consumer or investment form and therefore it is the main base to stimulate economic activity both on the demand side, both consumption and investment and therefore of the main motivating factors for economic growth.

The banking system depends in achieve its goals on the grants and loan recovery, or what is known credit process and according to what the importance referred to the role of the banking system, it is important to ensure the safety and efficiency of the mechanisms of banking device and safety is

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Abdulraheem Assi Obaid
Effect of shading net, planting methods and bio-extract on production of muskmelon
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
Computer Networks, Big Data And Iot
A Comprehensive Study of Various DC Faults and Detection Methods in Photovoltaic System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of Decision –Making and Performance evaluation methods through Employing Strategic Management Accounting
...Show More Authors

This research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the  company's relian

... Show More
View Publication
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Biomedicine And Chemical Sciences
Identification of Pathogenic Fungi in Renal Transplant Patients by Conventional and Molecular Methods
...Show More Authors

Opportunistic fungal infections due to the immune- compromised status of renal transplant patients are related to high rates of morbidity and mortality regardless of their minor incidence. Delayed in identification of invasive fungal infections (IFIs), will lead to delayed treatment and results in high mortality in those populations. The study aimed to assess the frequency of invasive fungal infection in kidney transplant recipients by conventional and molecular methods. This study included 100 kidney transplant recipients (KTR) (75 males, and 25 females), collected from the Centre of Kidney Diseases and Transplantation in the Medical City of Baghdad. Blood samples were collected during the period from June 2018 to April 2019. Twent

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
The role of educational curricula and teaching methods in the development of environmental
...Show More Authors

Described the Arabic language being of genius sets by top models of eloquence , rhetoric and clarity of sounds and developments Moreover , it is an important element of our existence and our identity and our survival . That my methods and best in teaching Arabic language what has pursued the easiest ways to learning and teaching and helped learners to be aware of the function linguistic information , and they need it and its impact on their lives , and contributed to unleashing the potential of activism and led them to make the effort to apply them in the form of examples and uses of new life , as well as fits are the capabilities and tendencies of different learners , so the goal of current research into the importance of the curriculum

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Investigation and Comparative Study Among Various Methods of Contraception Used in Erbil City
...Show More Authors

The objective of this study was to investigate and compare among five different methods of contraception including combined oral contraceptive pills (COC), Depot medroxyprogesterone acetate (DMPA), copper Intrauterine contraceptive device (IUCD), vaginal spermicides and male condom used in Hawler City through estimate of their effect, relative failure rate, percentage of use, adherence and compliance and adverse effects of each contraceptive method. In order to reach to these aims, a retrospective study was conducted in Hawler City in Azadi Health Care Center over a period of 6 months from 22th November, 2010 to 15th May, 2011 during which data collection and subjects follow up for 3 months had been achieved. A conv

... Show More
View Publication Preview PDF
Crossref