Preferred Language
Articles
/
2RcYPo8BVTCNdQwCpmTC
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The results illustrate that Euclidean Squared Distance with (UUT) feature provide low error rate and high accuracy compared with the other two types of distances used.

Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Audio Classification Based on Content Features
...Show More Authors

Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 19 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
The use of still and animated comics in providing user services in university information institutions: a field study
...Show More Authors

Comics is a visual art (Still and motion pictures) it seeks to provide a Training courses are a series of intensive important educational and complementary programs, based on previous foundation experiences. Create to development the participants in aspects of specialization according to the requirements of the educational system to continue developing the previous scienti􀂡c and practical experiences. Personally, or adopted by the trainee institution, where the trainee gets a professional skill certi􀂡cate that contributes to the development his work.Development and Continuous Education Center (DCEC) at the University of Baghdad (UoBaghdad) is a center dedicated to continuing education courses in which the participant is awarded a cert

... Show More
Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Pleasure and Emotions and their role in aesthetics' experience of the user: صلاح نوري محمود، جاسم خزعل العقيلي
...Show More Authors

Industrial product is one of the things of daily use and direct interaction with the user, so the ranges of its association to the user, took a varied and multiple aspects. The user today sees the products as things have specifications related directly to the psychology of the user, so he can reflects his values, principles and ideas on the composition of the total structure of the product, making them a means by which manifested the internal entity's of the user took an external materiality. And then counting the products being things excite positive feelings among different user was a natural result given the complexity of the relationship between the user and the industrial product. So pleasure is one important effects that result fro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Research on Emotion Classification Based on Multi-modal Fusion
...Show More Authors

Nowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Comparison of Maximum Likelihood and some Bayes Estimators for Maxwell Distribution based on Non-informative Priors
...Show More Authors

In this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of Bayes est

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 05 2018
Journal Name
International Journal Of Science And Research (ijsr)
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Applied Engineering Science
Design and implementation of a smart home automation system based on global system for mobile communications
...Show More Authors

Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref