As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Represent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreEvaluation is one of the most important elements of teaching process. The recent trends in evaluation and educational reform movements have called for using alternative evaluation, which focuses on performance evaluation. Authentic assessment is usually described as formative, in which students participate in their acquisition, in addition to the fact that students are productive and active, which is reflected in the students' achievement and skill level. The study aims to reveal the degree of knowledge and use of alternative assessment tools by primary school teachers in Gaza -Palestine. To meet the objective of the study, the researchers used the descriptive-analytical method and the questioner as a study tool. The study sample c
... Show MoreThe aim of this research is to identify the extent to which the Conventional and Islamic banks are committed to implement the requirements of the corporate governance in its financial reports. In addition to its commitment to transparency and clarity in dealing with the shareholders and stockholders to protect their interests and to determine the impact of the commitment of the corporate governance on assessing the financial performance of the conventional and Islamic banks that participate in Bahrain Stock Exchange.
This research aimed to evaluate the level of readiness to teach science in the light of the information, media, and technology skills among undergraduate students at the Faculty of Edu-cation, King Khalid University. To achieve this goal, a descriptive and analytical approach was used. A list of readiness to teach science was prepared in the light of Information, media, and technology skills, and in the light of this list, a cognitive test, observation sheet, and attitude scale were prepared to assess readiness to teach science in its three aspects, cognitive, behavioral, and emotional. The sample of the research consisted of (42) students enrolled in field training courses at the sixth, seventh and eighth levels. Research tools were app
... Show More
Abstract
Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t
... Show MoreThe present study deals with the story of Epidemic in two literary works issued in the same year (1947). One of them is a novel titled "Plague" written by the French writer Alber Kamo, the second is a poem of the Iraqi poetess Nazik Al-Malaekah. The research reflects a contrastive study of the war vision in the two works as both writers used science to serve literature by using Epidemic as a metaphor to refer to the dangers that the societies faced.
The problem of the present research lies in answering the question about the reason that makes the two writers use metaphor while narrating the issues of the society instead of mentioning them directly and illuminate what implications do the narrative style of Epidemic story have and
... Show MoreAsthma is a chronic respiratory disease highly prevalent worldwide. Recent studies have suggested a role for microbiome-associated gut–lung axis in asthma development. In the current study, we investigated if Resveratrol (RES), a plant-based polyphenol, can attenuate ovalbumin (OVA)-induced murine allergic asthma, and if so, the role of microbiome in the gut–lung axis in this process. We found that RES attenuated allergic asthma with significant improvements in pulmonary functions in OVA-exposed mice when tested using plethysmography for frequency (F), mean volume (MV), specific airway resistance (sRaw), and delay time(dT). RES treatment also suppressed inflammatory cytokines in the lungs. RES modulated lung microbiota and cause
... Show MoreMM ABDUL-WAHHAB, SA AHMED, International Journal of Pharmaceutical Research, 2020 - Cited by 2
Background: Many types of instruments and techniques are used in the instrumentation of the root canal system. These instruments and techniques may extrude debris beyond the apical foramen and may cause post-instrumentation complications. The aim of this study was to evaluate the amount of apically extruded debris resulted by using 4 types of nickel-titanium instruments (WaveOne, TRUShape 3D conforming files, Hyflex CM, and One Shape files) during endodontic instrumentation. Materials and methods: Forty freshly extracted human mandibular second premolar with straight canals and a single apex were collected for this study. All teeth were cut to similar lengths. Pre-weighted glass vials were used as collecting containers. Samples were randoml
... Show More