Preferred Language
Articles
/
QkI1xZkBMeyNPGM3n7jF
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Diyala Journal For Pure Science
Survey of Air Quality and Health Risk Assessment Around East Baghdad Oil Field, Iraq
...Show More Authors

Air pollution evaluation of the operational processes in the East Baghdad oil field was carried out. The analysis was carried out by ICP-MS technique. Total Suspended Particles (TSP) air load was higher than Iraqi Standards and world international allowable limits of World Health Organization. The mean concentrations of gases carbon monoxide, carbon dioxide, sulfur dioxide, in the air were within national and world standards, while the mean concentration of nitrogen dioxide was higher than standard limits. The air of the study area is considered a good quality for CO, CO2 and NO2 with no health effect, while it is hazardous for TSP that have serious risk for people with respiratory disease. The mean concentrations of Cd, Cr, Cu and

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Gsc Biological And Pharmaceutical Sciences
Survey and revision of leaf miners to some plants from different localities of Iraq
...Show More Authors

This investigation showed (31) species belonging to (15) genera under (five) families and two orders. The leafminers Dipter families (Agromozidae, Anthomyiidae, Drosophilidae), Agromyzid flies is the highest level of investigated many host plants, but other families have lowest host plants. The synonyms of species were provided from GBIF scarlet's. The date and localities of sampling collection were recorded.

View Publication
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Technology And Health Care
Clinical management and infection control protocols during the COVID-19 pandemic: An online survey
...Show More Authors

BACKGROUND: SARS-CoV-2 (COVID-19) is considered a highly infectious and life threatening disease. OBJECTIVE: The present paper aims to evaluate various aspects of preventive measures and clinical management of the scheduled visits for orthodontic patients to the dental clinics during the outbreak of COVID-19, and to assess how orthodontists dealt with this challenge. METHODS: Orthodontists in private and public clinics were invited to fill a questionnaire that addressed infection control protocols and concerns about clinical management of patients in the clinics during the pandemic. Frequncies and percentages of the responses were obtained and compared using Chi-square tests. RESULTS: About 77% of those working in private clinics, a

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 22 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of time management on the performance of the functional business: Survey study at Al Salam General Company for Communications and Information Technology
...Show More Authors

The aim of the research is to know the level of time management application and its impact on the performance of the job, a survey search in the general company for communication and information technology and provide recommendations that help employees to optimize the use of time and improve performance, which is an important element in controlling the various functions of the company. In order to achieve the objectives of the research, the questionnaire was based on two main variables and distributed to a random sample of (44) employees in the company out of (308) employees, thus the proportion of the sample (14%). After collecting the samples from the sample, there are (6) incomplete forms that have been retri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ELEMENTS OF MARKETING MIX AND THEIR ROLE IN CONSUMER PERCEPTION OF BRAND IMAGE: A SURVEY OF SAMPLE OPINIONS FROM CONSUMERS OF ENIEM BRAND IN THE ALGERIAN MARKET.: ELEMENTS OF MARKETING MIX AND THEIR ROLE IN CONSUMER PERCEPTION OF BRAND IMAGE: A SURVEY OF SAMPLE OPINIONS FROM CONSUMERS OF ENIEM BRAND IN THE ALGERIAN MARKET.
...Show More Authors

The current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Violation of the Strategies of Conversation in Some English Selected Plays
...Show More Authors

The present study analyzes the violation of the strategies of conversation in two English plays namely Richard II and King Lear. The present study tries to achieve the following goals: 1. showing how the strategies of real conversation can be applied to conversation in plays. 2. analyzing how the characters communicate with each other to discover how Shakespeare violates the strategies of conversation in depicting his characters. The study has been conducted on the bases of the following hypotheses:

  1. The strategies of conversation which are derived from the study of natural conversation can be applied to conversation in drama with some modification for dramatic purposes.

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
King Khalid University towards Strategies Compatible with Brain-Based Learning (BBL)
...Show More Authors

The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony
...Show More Authors

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 24 2018
Journal Name
Journal Of Economics And Administrative Sciences
The rality of urban management strategies in the city of Baghdad
...Show More Authors

Several studies have indicated that more than 600 cities in the world (intermas of rapid growth and development) will generate about 60% of international economic growth between 2010 and 2025 . by 2025 , 66% of the worlds population will live in urban areas the management of cities will face challenges that accompany this increase in the population which requires preparing to face these challenges and problems and the need to provide the aim of the research to know the readiness of Baghdad city to implement the strategies of urban management throught on asmple representing the ( Advisiry group for the comprechnsive development plan for the city of Baghdad 2030 and its supporters ) in the municipality of Baghdad and the number of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
Journal Of Language Studies
Investigating Motivational Teaching Strategies used by Iraqi EFL Primary School Teachers
...Show More Authors

Motivation is one of the most important factors that influence students learning and has a great effect on their success and achievement. For this reason, in this paper, the researcher is going to investigate the motivational teaching strategies used by EFL Iraqi school teachers. To achieve the aim of the study, the researcher adapted a questionnaire with some changes and modification’s. This questionnaire with five point scale (always, often, sometimes, rarely and never). To achieve face validity, the questionnaire items are given to a jury of experts. Alpha Cronbach formula is used to achieve the questionnaire reliability. After that, the questionnaire was applied on a sample of 38 teachers during the academic year 2019-2020. Th

... Show More