Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreMost approaches to combat antibiotic resistant bacteria concentrate on discovering new antibiotics or modifying existing ones. However, one of the most promising alternatives is the use of bacteriophages. This study was focused on the isolation of bacteriophages that are specific to some of commonly human pathogens namely E. coli, Streptococcus pyogenes, Staphylococcus aureus, Proteus mirabilis, Pseudomonas aeruginosa, Salmonella spp. and Klebsiella pneumoniae. These bacteriophages were isolated from sewages that were collected from four different locations in Kirkuk City. Apart from S. pyogenes, bacteriophages specific to all tested bacteria were successfully isolated and tested for their effectiveness by spot test. The most effective
... Show MoreIn this research two series of the new derivatives of Trimethoprim and paracetamol drugs have been prepared which known as a high medicinal effectiveness. Series (A) is including the interaction of diazonium salt of trimethoprim and coupling with some substituted phenol compounds (2-amino phenol, 3-ethyl phenol, 1-naphthol, 2-nitro phenol, Salbutamol). Series (B) is including the interaction coupling alkali solution of paracetamol with diazonium salt of some substituted aniline compounds (Benzedine, 2, 3-di chloro aniline, Trimethoprim, Anilinium chloride, 2-nitro- 4-chloro aniline).Chemical structures of all synthesized compounds were confirmed by UV-visible and FTIR spectroscopy.
Many risks have adverse consequences for construction projects’ objectives such as quality, schedule, and cost. As engineering procurement construction (EPC) contracts gradually become one of the most common types used in implementing major large-scale construction projects, identifying common risk types and analyzing their root causes is important for developing measures to decrease and eliminate future risks in these types of contracts. The information about the main causes of risks was collected