Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The results illustrate that Euclidean Squared Distance with (UUT) feature provide low error rate and high accuracy compared with the other two types of distances used.
Abstract
The research seeks to shed light on green accounting information systems, analyze them, identify sustainability reporting and how to improve it, as well as study the importance of the Iraqi oil sector, analyze it, and work on applying green accounting information systems in order to improve the quality of sustainability reporting. Oil as a branch of the General Corporation for the Distribution of Oil and Gas Products to apply the practical aspect and prove the hypothesis of the research. Explaining the company's role in improving environmental conditions
In this paper, the effect of temperature on the charge transfer rate of dye (N3) in contact with ZnS semiconductors is discussed and studied when electrons move from the excited N3 dye to the conduction band of ZnS based on quantum shift theory. In a heterogeneous system, the energy levels are assumed to be continuous, and the N3-ZnS system is surrounded by a variety of polar solvent media. The transition energy of the N3/ZnS heterojunction was calculated using seven different solvents at room temperature, considering the refractive index and dielectric constant of the solvents and the ZnS semiconductor, respectively. The charge-transport reaction rate was calculated over different te
In this research TiO2 nano-powder was prepared by a spray pyrolysis technique and then adds to the TiO2 powder with particle size (0.523 μm) in ratio (0, 5, 10, 15 at %) atomic percentage, and then deposition of the mixture on the stainless steel 316 L substrate in order to use in medical and industrial applications.
Structure properties including x-ray diffraction (XRD) and scanning electron microscope (SEM0, also some of mechanical properties and the effect of thermal annealing in different temperature have been studied. The results show that the particle size of a prepared nano-powder was 50 up to 75 nm from SEM, and the crystal structure of the powders (original and nano powder) was rutile with tetragonal cell. An improvement in
The study of economic growth indicators is of fundamental importance in estimating the effectiveness of economic development plans, as well as the great role it plays in determining appropriate economic policies in order to optimally use the factors that lead to the dynamics of growth in Iraq, especially during a certain period of time. The gross domestic product (GDP) at current prices), which is considered a part of the national accounts, which is considered as an integrated dynamic of statistics that produces in front of policy makers the possibility of determining whether the economy is witnessing a state of expansion or evaluating economic activity and its efficiency in order to reach the size of the overall economy. The research aims
... Show MoreThere are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIntroduction: In recent decades, the endovascular treatment of cerebral arteriovenous malformations (AVMs) has advanced. However, it still carries risks of unanticipated complications. Coil migration is a reported complication of aneurysmal coiling procedures. Herein, we report a case of early intraprocedural coil migration during pressure cooker technique embolization of right thalamic AVM, discussing the management and potential explanations. The literature showed no report of coil migration after the pressure cooker technique in the form of coil-augmented Onyx injection technique (CAIT). Case description: An otherwise healthy 26-year-old female suddenly developed a severe headache with no loss of consciousness. Computed tomograp
... Show More