Preferred Language
Articles
/
DPqxsJkBMF18lwyZqc3S
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being hashed and stored on the website. The results of the two methods are compared in terms of speed and resistance to attackers, then password attacks are analysed in addition to calculating the strength of the password, the time it takes for the user to log in, and the time required for the attacker to guess the passwords per second. The Wolfram Alpha is used to calculate the mathematic operations and system implementation was done by using IntelliJ IDEA with java FX.

Crossref
View Publication
Publication Date
Sat Aug 10 2024
Journal Name
American Journal Of Economics And Business Innovation
Factors Associated with Employees’ Intention to Leave in ICT Sector in Iraq: A Factor Analysis
...Show More Authors

The current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Engineering
Finite Element Analysis of Reinforced Concrete T-Beams with Multiple Web Openings under Impact Loading
...Show More Authors

Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Measure for Effect Size in Mediation Analysis with Solution to Some Mediation Process Problems
...Show More Authors

In this paper, the effect size measures was discussed, which are useful in many estimation processes for direct effect and its relation with indirect and total effects. In addition, an algorithm to calculate the suggested measure of effect size was suggested that represent the ratio of direct effect to the effect of the estimated parameter using the Regression equation of the dependent variable on the mediator variable without using the independent variable in the model. Where this an algorithm clear the possibility to use this regression equation in Mediation Analysis, where usually used the Mediator and independent variable together when the dependent variable regresses on them. Also this an algorithm to show how effect of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Finite Element Analysis of Reinforced Concrete T-Beams with Multiple Web Openings under Impact Loading
...Show More Authors

In this study, a three-dimensional finite element analysis using ANSYS 12.1 program had been employed to simulate simply supported reinforced concrete (RC) T-beams with multiple web circular openings subjected to an impact loading. Three design parameters were considered, including size, location and number of the web openings. Twelve models of simply supported RC T-beams were subjected to one point of transient (impact) loading at mid span. Beams were simulated and analysis results were obtained in terms of mid span deflection-time histories and compared with the results of the solid reference one. The maximum mid span deflection is an important index for evaluating damage levels of the RC beams subjected to impact loading. Three experi

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using panel data in structural equations with application
...Show More Authors

The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration.  chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Screening and optimization of a novel gallic acid and tannase production under semi quantitative and quantitative methods
...Show More Authors
Abstract<p>Tannin acyl hydrolase as the common name of tannase is an inducible extracellular enzyme that causes the hydrolysis of galloyl ester and depside bonds in tannins, yielding gallic acid and glucose. The main objective of this study is to find a novel gallic acid and tannase produced by <italic>Acinetobacter Baumannii</italic>. A number of optimization steps were followed in order to improve the highest production of gallic acid and tannase. In present study, <italic>A. baumannii</italic> were isolated from ICU burn. <italic>A. baumannii</italic> was examined by microscopic examination, morphological and biochemical assay including oxidase and catalase. The </p> ... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Fri Mar 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Numerical Analysis of Laminar Natural Convection in Square Enclosure with and without Partitions and Study Effect of pPartition on the Flow Pattern and Heat Transfer
...Show More Authors

The problem of steady, laminar, natural convective flow in an square enclosure with and without partitions is considered for Rayleigh number (103-106) and Prandtl number (0.7). Vertical walls were maintained isothermal at different temperatures while horizontal walls and the partitions were insulated. The length of partition was taken constant. The number of partitions were placed on horizontal surface in staggered arrangement from (1– 3) and ratio of partition thickness (H/L= 0.033, 0.083, 0.124). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on a program in Fortran 90 with the finite difference method is obtained. Representative results illustrating the effects of the thickn

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 26 2018
Journal Name
Journal Of Planner And Development
Alternative Methods for Decreasing Infrastructure Deficiencies in Iraq
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Directed designs the covers of children's magazines methods
...Show More Authors

The design processes in general and the design system in particular need to be studied and knowledge. Based on this vision, we find the need for constant research on the design processes, and the subject of the techniques of the designs of the covers of children magazines did not have the view of the researchers to make them the subject of study, For the subject of this research, the problem of research is determined according to the following question:

- What are the methods used in designing children magazine covers in Iraq?

Through this research we seek to find solutions to this question as well as it will serve the cognitive side of a modern study and development of a broader understanding of the subject. Through four

... Show More
View Publication Preview PDF
Crossref