Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
To: Author
Article Fingerprint
ReserarchID
CSTB2N106
The UNIX operating system is an operating system that safeguards against illegal access and other threats to the computer system. In this paper, the UNIX file system is analyzed, the security weaknesses are x-rayed, an improved on-time password authentication technique is presented, and the underlying model used for the design is described. Moreover, a password authentication programme was designed which implements an improvement of the general onetime password technique. Passwords, which are individually selected by users from a codebook are now randomly selected by the system for the user in the improved programme. Real-data entries into the programme demonstrate an enhancement of the security of the system even on the event of the loss of the codebook.
Aryan Pratap Singh. 2026. \u201cAnalysis of the UNIX Operating System and improvement of the Password Authentication Technique\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 23 (GJCST Volume 23 Issue B1): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 101
Country: India
Subject: Global Journal of Computer Science and Technology - B: Cloud & Distributed
Authors: Aryan Pratap Singh (PhD/Dr. count: 0)
View Count (all-time): 286
Total Views (Real + Logic): 2388
Total Downloads (simulated): 18
Publish Date: 2026 01, Fri
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
The UNIX operating system is an operating system that safeguards against illegal access and other threats to the computer system. In this paper, the UNIX file system is analyzed, the security weaknesses are x-rayed, an improved on-time password authentication technique is presented, and the underlying model used for the design is described. Moreover, a password authentication programme was designed which implements an improvement of the general onetime password technique. Passwords, which are individually selected by users from a codebook are now randomly selected by the system for the user in the improved programme. Real-data entries into the programme demonstrate an enhancement of the security of the system even on the event of the loss of the codebook.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.