In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical user authentication and possible attacks on nineteen recognition-based authentication systems were discussed. In this study, differentiation table of attack patterns for all recognition-based techniques is shown. Finally, the positive and negative aspects of nineteen methods were explained in the form of a detailed table.
Erythrocytes aggregation is an important physiological phenomenon in the circulation of blood, and is a basic characteristic of normal blood that plays a major role in cardiovascular system especially in the microcirculation. Blood samples have been taken from (30) volunteers (15 male, and 15 female), their ages (20-30) years. The Erythrocytes Sedimentation Rate (ESR) for those subjects was measured at different Packed Cells Volume (PCV) (10%-25%), and also it was measured at different temperature (10oC-25oC). The results show that there was a highly significant decrease (P<0.01) in ESR when the PCV increase and a highly significant increase (P<0.01) in ESR when the temperatures increase. The conclusion from these results is that the ESR va
... Show MoreAeromonas hydrophila have been isolated as a cause of a cute gastroenteritis in 23 (5.6%) of 410 patients. Other bacterial enteropathogens have been isolated from 387 patients with diarrhea, were 19 different strains. A. hydrophila occurred more commonly in children with acute diarrhea, the results showed that 18(78.26%) isolates of A. hydrophila found in children under 10 years old ,distributed to 10(43.47%) in male and 8(34.78%) in female ,and in adults with diarrhea 5 (21.73%). In the other hand, we noticed frequency of isolation was higher in male 14(60.86%) when compared with 9(39.14%) in female. Six strains of A. hydrophila have been observed to have bacteriocin activity against 12 of 23 different A. hydrophila ,as well as Staphy
... Show MoreRare earth elements (Cerium, Lanthanum and Neodymium) doped CdS thin films are prepared using the chemical Spray Pyrolysis Method with temperature 200 oC. The X-ray diffraction (XRD) analysis refers that pure CdS and CdS:Ce, CdS:La and CdS:Nd thin films showed the hexagonal crystalline phase. The crystallite size determined by the Debye-Scherrer equation and the range was (35.8– 23.76 nm), and it was confirmed by field emission scanning electron microscopy (FE-SEM). The pure and doped CdS shows a direct band gap (2.57 to 2.72 eV), which was obtained by transmittance. The room-temperature photoluminescence of pure and doped CdS shows large peak at 431 nm, and two small peaks at (530 and 610 nm). The Current – voltage measurement in da
... Show MoreObjectives: The study aims to investigate the efficiency of physiotherapy methods to improve the
degree of the clinical recovery of the peripheral facial palsy.
Methodology: This study is carried out at the Rehabilitation Center-Baghdad from November 2009 till
March 2010. This study includes (40) patient, their ages are from (13) to (55) years old; (24) male and
(16) female with unilateral facial palsy of undetermined cause. House-Brackmann facial recovery
scores have been used before and after the physiotherapy treatment.
Results: The results show that the physiotherapy sessions obtained the best effect of the electrical
stimulation, exercises and massage in the treatment of facial palsy. Highly respondents in femal
Fraud crimes, which is a form of crimes against the funds in public office, is one of the crimes of traditional and cutting-edge in the same time, but it took a distinct character from other traditional crimes because of what is based upon, behavioral fundamentals and foundations and expressive image of personal qualities, concentrated in the mental work, the inventive sophistication, and skillful abilities of the perpetrators of these crimes, in addition to what is owned by crooks today a behavioral ability represented in underestimating laws and instructions. Fraud is considered one of the organized crime methods It is the most important method of its methods, all crimes practiced by the cro
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreAbstract
The current study presents numerical investigation of the fluid (air) flow characteristics and convection heat transfer around different corrugated surfaces geometry in the low Reynolds number region (Re<1000). The geometries are included wavy, triangle, and rectangular. The effect of different geometry parameters such as aspect ratio and number of cycles per unit length on flow field characteristics and heat transfer was estimated and compared with each other. The computerized fluid dynamics package (ANSYS 14) is used to simulate the flow field and heat transfer, solve the governing equations, and extract the results. It is found that the turbulence intensity for rectangular extended surface was larg
... Show MoreBackground: This in vitro study evaluated the effect of canal dryness and flaring on the accuracy of two electronic apex locators for working length (WL) determination. Materials and methods: Sixty extracted teeth were used, after access opening was done, the occlusal surface was flattened to create stable reference point. The teeth were randomly divided into two equal main groups of flared and unflared group each one of 30 teeth. The flaring was done with Gates Glidden drills. The two main groups were further subdivided into two subgroups: dry canal and wet canal using 5.25% sodium hypochlorite groups, Electronic WL of each sample was determined using both Root ZX and i-Root apex locator. Consequently, histologic WL was determined by shav
... Show More