Preferred Language
Articles
/
2RcYPo8BVTCNdQwCpmTC
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The results illustrate that Euclidean Squared Distance with (UUT) feature provide low error rate and high accuracy compared with the other two types of distances used.

Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Economic perspectives on employment 2021-2030
...Show More Authors

Long before the pandemic, labour force all over the world was facing the quest of incertitude, which is normal and inherent of the market, but the extent of this quest was shaped by the pace of acceleration of technological progress, which became exponential in the last ten years, from 2010 to 2020. Robotic process automation, work remote, computer science, electronic and communications, mechanical engineering, information technology digitalisation o public administration and so one are ones of the pillars of the future of work. Some authors even stated that without robotic process automation (RPA) included in technological processes, companies will not be able to sustain a competitive level on the market (Madakan et al, 2018). R

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Miltefosine Efficacy on Leishmania Donovani Promastigote
...Show More Authors

In the current study, different concentrations of miltefosine drug, which is the first effective and safe oral treatment for visceral leishmaniasis, was evaluated against L. donovani promastigotes in comparison with pentosam drug. Direct counting microscopic assay was used to find 50% inhibitory concentration (IC50) of miltefosine and pentostam against L. donovani promastigotes. The IC50 of miltefosine drug was 45.42μg/ml, 46.76μg/ml and 36.68μg/ml after 24 hr, 48hr and 72hr respectively, In comparison with IC 50 of pentostam drug was 75.39 μg/ml after 72hr. There were significant differences (P˂0.05) between IC50 values of miltefosine and pentostam drugs from first day to third day.

View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
Arab Women’s Self-Performance on Instagram
...Show More Authors

This study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
2019 Ieee International Conference On Automatic Control And Intelligent Systems (i2cacis)
Study on Solar Panel Cleaning Robot
...Show More Authors

View Publication
Scopus (32)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Pharmacy Practice
Scholarly publishing depends on peer reviewers
...Show More Authors

View Publication
Scopus (8)
Crossref (10)
Scopus Crossref
Publication Date
Fri Apr 14 2017
Journal Name
7th International Visible Conference On Educational Studies & Applied Linguistics 2016
The Effect of Culture on Language
...Show More Authors

It is believed that culture plays an important role in the ELF classroom activities (Al- Mutawa, & Kilani, 1989:87). It is important for the teacher to recognize potential negative (culturally based) perceptions of their learners. In Iraq, for instance, it is not. Uncommon to meet silent expressionless students that arc supposedly English language learners. It is possible for the beginner to interpret this negatively as a lack of interest in the study of English. This interpretation may play a harmful role in the classroom methodology. An instructor has to be intercultural competent to be an effective teacher. It will be more effective if the instructor adopts a consistent style of instruction to allow learners to adapt within the bounds of

... Show More
Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Bulletin Of The Iraq Natural History Museum
Survey of Brachycera flies on alfalfa
...Show More Authors

Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of a Structural Theory- based Training Program in Enhancing Arabic Language Teachers’ Teaching Practices and their Tendencies towards Structural Teaching: مريم بنت حسن البلوشي، ريا بنت سالم المنذري، علي مهدي كاظم
...Show More Authors

The study aims to identify the effectiveness of a structural theory-based training program in enhancing the teaching practices of Arabic language teachers teaching grade ten in South Al Batinah in Sultanate of Oman. The study used the quasi-experimental design, and the sample consisted of 40 male and female teachers. To achieve the objectives of the study, a training program, an observation form and a measurement tool of teachers’ tendencies towards a structural teaching were made. The program was implemented with an experimental group of 20 female and male teachers in the first semester of the academic year 2018/2019. The study has found that there is a statistically significant difference between the average grades before and after i

... Show More
View Publication Preview PDF
Crossref