Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research.
War as a human phenomenon, has its own literature. Poetry is a major genre in this literature. This paper is an attempt to investigate and analyse some stylistic features in two selected, English and Arabic, war poems. These poems share the same theme.Both promote the principle of sacrificing one’s own life for the sake of homeland. This paper limits itself to analyse, thecontent words, tenses, semantic grouping of vocabulary and foregrounding in the two poems. The areas of analysis show great similarities in distributing the general content words (nouns, verbs, adjectives, and adverbs). In the analysis of the semantic areas of each content word, these poems reveal some similarities and some differences in their frequency rates.
... Show Moremodel is derived, and the methodology is given in detail. The model is constructed depending on some measurement criteria, Akaike and Bayesian information criterion. For the new time series model, a new algorithm has been generated. The forecasting process, one and two steps ahead, is discussed in detail. Some exploratory data analysis is given in the beginning. The best model is selected based on some criteria; it is compared with some naïve models. The modified model is applied to a monthly chemical sales dataset (January 1992 to Dec 2019), where the dataset in this work has been downloaded from the United States of America census (www.census.gov). Ultimately, the forecasted sales
This study explores the semiotic aspects of American slang, specifically focusing on the phenomenon of reduplicative expressions in informal speech. Despite the extensive research on American slang, limited attention has been given to the cultural and mythical meanings embedded within reduplicative expressions. To address this gap, the study investigates how these expressions convey denotative, connotative, and mythical meanings within casual American discourse. The objectives of the study include: 1. To what extent does Barthes’ semiotic model hold potential for application in this study? 2. How are reduplicative slang expressions widely used in everyday American life? 3. To what extent do qualitative and quantitative methods hav
... Show MoreThis study includes a detailed morphological description of Cosmina baghdadensis sp. nov.
from Iraq.
Many characters are used in identification especially chaetotaxy and male genetalia.
Locality, host plant, and data of collection were given.
A set of ten drug compounds containing an amino group in the structure were determined theoretically. The parameters were entered into a model to forecast the optimal values of practical (log P) medicinal molecules. The drugs were evaluated theoretically using different types of calculations which are AM1, PM3, and Hartree Fock at the basis set (HF/STO-3G). The Physico-chemical data like (entropy, total energy, Gibbs Free Energy,…etc were computed and played an important role in the predictions of the practical lipophilicity values. Besides, Eigenvalues named HOMO and LUMO were determined. Linearity was shown when correlated between the experimental data with the evaluated physical properties. The statistical analysis was used to analy
... Show MoreNanocomposites of polymer material based on CdS as filler
material and poly methyl methacrylate (PMMA) as host matrix have
been fabricated by chemical spray pyrolysis method on glass
substrate. CdS particles synthesized by co-precipitation route using
cadimium chloride and thioacetamide as starting materials and
ammonium hydroxide as precipitating agent. The structure is
examined by X-ray diffraction (XRD), the resultant film has
amorphous structure. The optical energy gap is found to be (4.5,
4.06) eV before and after CdS addition, respectively. Electrical
activation energy for CdS/PMMA has two regions with values of
0.079 and 0.433 eV.
Background: Maxillary sinusitis can arise after sinus floor elevation surgery and should be treated immediately to prevent further complications which included dental implants failure, graft lost, and oro-antral fistula. This is the first systematic review to assess the incidence, causes, and treatment of sinusitis after sinus lift surgery. Materials and methods: An electronic search included MEDLINE (PUBMED) data base site was carried out for articles involving development of sinusitis after sinus lift surgery from September 1997 up to April, 8, 2017. The search was done and reviewed by two independent authors. Results: The total results of electronic search were (182) abstracts and articles, the extracted articles which involved develo
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show More