As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.
Air pollution evaluation of the operational processes in the East Baghdad oil field was carried out. The analysis was carried out by ICP-MS technique. Total Suspended Particles (TSP) air load was higher than Iraqi Standards and world international allowable limits of World Health Organization. The mean concentrations of gases carbon monoxide, carbon dioxide, sulfur dioxide, in the air were within national and world standards, while the mean concentration of nitrogen dioxide was higher than standard limits. The air of the study area is considered a good quality for CO, CO2 and NO2 with no health effect, while it is hazardous for TSP that have serious risk for people with respiratory disease. The mean concentrations of Cd, Cr, Cu and
... Show MoreThis investigation showed (31) species belonging to (15) genera under (five) families and two orders. The leafminers Dipter families (Agromozidae, Anthomyiidae, Drosophilidae), Agromyzid flies is the highest level of investigated many host plants, but other families have lowest host plants. The synonyms of species were provided from GBIF scarlet's. The date and localities of sampling collection were recorded.
BACKGROUND: SARS-CoV-2 (COVID-19) is considered a highly infectious and life threatening disease. OBJECTIVE: The present paper aims to evaluate various aspects of preventive measures and clinical management of the scheduled visits for orthodontic patients to the dental clinics during the outbreak of COVID-19, and to assess how orthodontists dealt with this challenge. METHODS: Orthodontists in private and public clinics were invited to fill a questionnaire that addressed infection control protocols and concerns about clinical management of patients in the clinics during the pandemic. Frequncies and percentages of the responses were obtained and compared using Chi-square tests. RESULTS: About 77% of those working in private clinics, a
... Show MoreThe aim of the research is to know the level of time management application and its impact on the performance of the job, a survey search in the general company for communication and information technology and provide recommendations that help employees to optimize the use of time and improve performance, which is an important element in controlling the various functions of the company. In order to achieve the objectives of the research, the questionnaire was based on two main variables and distributed to a random sample of (44) employees in the company out of (308) employees, thus the proportion of the sample (14%). After collecting the samples from the sample, there are (6) incomplete forms that have been retri
... Show MoreThe current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o
... Show MoreThe present study analyzes the violation of the strategies of conversation in two English plays namely Richard II and King Lear. The present study tries to achieve the following goals: 1. showing how the strategies of real conversation can be applied to conversation in plays. 2. analyzing how the characters communicate with each other to discover how Shakespeare violates the strategies of conversation in depicting his characters. The study has been conducted on the bases of the following hypotheses:
- The strategies of conversation which are derived from the study of natural conversation can be applied to conversation in drama with some modification for dramatic purposes.
The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreThis study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show MoreSeveral studies have indicated that more than 600 cities in the world (intermas of rapid growth and development) will generate about 60% of international economic growth between 2010 and 2025 . by 2025 , 66% of the worlds population will live in urban areas the management of cities will face challenges that accompany this increase in the population which requires preparing to face these challenges and problems and the need to provide the aim of the research to know the readiness of Baghdad city to implement the strategies of urban management throught on asmple representing the ( Advisiry group for the comprechnsive development plan for the city of Baghdad 2030 and its supporters ) in the municipality of Baghdad and the number of
... Show MoreMotivation is one of the most important factors that influence students learning and has a great effect on their success and achievement. For this reason, in this paper, the researcher is going to investigate the motivational teaching strategies used by EFL Iraqi school teachers. To achieve the aim of the study, the researcher adapted a questionnaire with some changes and modification’s. This questionnaire with five point scale (always, often, sometimes, rarely and never). To achieve face validity, the questionnaire items are given to a jury of experts. Alpha Cronbach formula is used to achieve the questionnaire reliability. After that, the questionnaire was applied on a sample of 38 teachers during the academic year 2019-2020. Th
... Show More