Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The results illustrate that Euclidean Squared Distance with (UUT) feature provide low error rate and high accuracy compared with the other two types of distances used.
Modified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time
... Show MoreClinical keratoconus (KCN) detection is a challenging and time-consuming task. In the diagnosis process, ophthalmologists must revise demographic and clinical ophthalmic examinations. The latter include slit-lamb, corneal topographic maps, and Pentacam indices (PI). We propose an Ensemble of Deep Transfer Learning (EDTL) based on corneal topographic maps. We consider four pretrained networks, SqueezeNet (SqN), AlexNet (AN), ShuffleNet (SfN), and MobileNet-v2 (MN), and fine-tune them on a dataset of KCN and normal cases, each including four topographic maps. We also consider a PI classifier. Then, our EDTL method combines the output probabilities of each of the five classifiers to obtain a decision b
In this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreBackground: Ulcerative colitis (UC) is an inflammatory bowel disease restricted to the large intestine, characterized by superficial ulceration. It is a progressive and chronic disease requiring long-term treatment. Although its etiology remains unknown, it is suggested that environmental factors influence genetically susceptible individuals, leading to the onset of the disease. (C-X-C) ligand 9 is a chemokine that belongs to the CXC chemokine family, it plays a role in the differentiation of immune cells such as cytotoxic lymphocytes, natural killer T cells, and macrophages. Its interaction with its corresponding receptor CXCR3 which is expressed by a variety of cells such as effector T cells, CD8+ cytotoxic T cells, and macrophage
... Show MoreThe inhibitory effect of acetone, ethanol, and aqueous extracts of ten medicinal plants on β-lactamase from Staphylococcus sciuri and Klebsiella pneumoniae was investigated in vitro by starch-iodine agar plate method. The results revealed the success of starch-iodine method for the detection of the inhibition of β-lactamase activity by the various extracts of each individual plant. The acetone extracts of Catharanthus roseus, Eucalyptus camaldulensis, and Schinus terebinthifolius induced an inhibitory effect on β-lactamase from Staphylococcus sciuri. On the other hand, acetone extracts from only Eucalyptus camaldulensis, and Schinus
... Show MoreFetal growth restriction is a significant contributor to fetal morbidity and mortality. In addition, there are heightened maternal risks associated with surgical operations and their accompanying dangers. Monitoring fetal development is a crucial objective of prenatal care and effective methods for early diagnosis of Fetal growth restriction, allowing prompt management and timely intervention to improve the outcomes. Screening for Fetal growth restriction can be achieved via many modalities; it can be medical, biochemical, or radiological. Some recommended combining more than one for better outcomes. Currently, there is inconsistency about the best method of Fetal growth restriction screening. In this review, a comprehensive
... Show MoreRecently emerging pandemic SARS CoV-2 conquered our world since December 2019. Continuous efforts have been done to find out effective immunization and precise treatment stetratigies A way from therapeutic options that were tried in SARS CoV-2, an increased attention is directed to predict natural products and mainly phytochemicals as collaborative measures for this crisis. In this review, most of the mentioned compounds specially flavonoids (biacalin, hesperidin, quercetin, luteolin,, and phenolic (resveratrol, curcumin, and theaflavin) exert their effect through interfering with the action of one or more of this proteins (spike protein, papain like protease, 3 chymotrypsin like cysteine protease, and RNA dependent RNA
... Show MoreMost Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show More