
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAbstract
The current research aims to identify the effect of the proposed strategy in accordance with realistic mathematics on the achievement and mathematical Interrelation of third Intermediate students. Two samples were tested from the middle third grade in a school affiliated with the General Directorate of Baghdad- Rusafa, the first for the academic year (2022-2021). The experimental group is (30) students taught according to the proposed strategy, and the control group is (30) students based on the traditional method. To achieve the research objective, the researchers developed a test for achievement consisting of (30) items and a test of sports interconnection composed of (20) items. The results of the stu
... Show MoreAIM: To determine the value of the combination of thin-section 3 mm coronal and standard axial DWI and their impact in facilitating the diagnosis of acute brainstem infarction. METHODS: A cross-sectional study conducted from the 1st of April 2017 to the end of February 2018 on 100 consecutive patients (66% were male, and 34% were female) with isolated acute ischemic infarction in the brainstem. The abnormal MRI findings concerning the ischemic lesions were interpreted on standard axial 5 mm and thin-section coronal 3mm DWI. RESULTS: The mean age of the studied group was 69.2 ± 4.3 for male and 72.3 ± 2.5 years. The standard axial DWI can diagnose 20%, 6.7% and 6.7% of the infarctions in midbrain, pons an
... Show MoreThe present study develops an artificial neural network (ANN) to model an analysis and a simulation of the correlation between the average corrosion rate carbon steel and the effective parameter Reynolds number (Re), water concentration (Wc) % temperature (T o) with constant of PH 7 . The water, produced fom oil in Kirkuk oil field in Iraq from well no. k184-Depth2200ft., has been used as a corrosive media and specimen area (400 mm2) for the materials that were used as low carbon steel pipe. The pipes are supplied by Doura Refinery . The used flow system is all made of Q.V.F glass, and the circulation of the two –phase (liquid – liquid ) is affected using a Q.V.F pump .The input parameters of the model consists of Reynolds number , w
... Show More