Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of the user for user authentication. Back Propagation Neural Network (BPNN) and the Probabilistic Neural Network (PNN) are used as a classifier to discriminate between the authentic and impostor users. Furthermore, four keystroke dynamics features namely: Dwell Time (DT), Flight Time (FT), Up-Up Time (UUT), and a mixture of (DT) and (FT) are extracted to verify whether the users could be properly authenticated. Two datasets (keystroke-1) and (keystroke-2) are used to show the applicability of the proposed Keystroke dynamics user authentication system. The best results obtained with lowest false rates and highest accuracy when using UUT compared with DT and FT features and comparable to combination of DT and FT, because of UUT as one direct feature that implicitly contained the two other features DT, and FT; that lead to build a new feature from the previous two features making the last feature having more capability to discriminate the authentic users from the impostors. In addition, authentication with UUT alone instead of the combination of DT and FT reduce the complexity and computational time of the neural network when compared with combination of DT and FT features.
Coagulation - flocculation are basic chemical engineering method in the treatment of metal-bearing industrial wastewater because it removes colloidal particles, some soluble compounds and very fine solid suspensions initially present in the wastewater by destabilization and formation of flocs. This research was conducted to study the feasibility of using natural coagulant such as okra and mallow and chemical coagulant such as alum for removing Cu and increase the removal efficiency and reduce the turbidity of treated water. Fourier transform Infrared (FTIR) was carried out for okra and mallow before and after coagulant to determine their type of functional groups. Carbonyl and hydroxyl functional groups on the surface of
... Show MoreBackground: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs) on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and
... Show MoreThe production companies in the Iraqi industry environment facing many of the problems related to the management of inventory and control In particular in determining the quantities inventory that should be hold it. Because these companies adoption on personal experience and some simple mathematical methods which lead to the identification of inappropriate quantities of inventory.
This research aims to identify the economic quantity of production and purchase for the Pepsi can 330ml and essential components in Baghdad soft drinks Company in an environment dominated by cases of non ensure and High fluctuating as a result of fluctuating demand volumes and costs ass
... Show MoreFiscal policy is one of the important economic tools that affect economic development in general and human development in particular through its tools (public revenues, public expenditures, and the general budget).
It was hoped that the effects of fiscal policy during the study period (2004-2007) will positively reflect on human development indicators (health, education, income) by raising these indicators on the ground. After 2003, public revenues in Iraq increased due to increased revenues. However, despite this increase in public budgets, the actual impact on human development and its indicators was not equivalent to this increase in financial revenues. QR The value of the general budget allocations ha
... Show MoreBack ground: Zygote produce from once a sperm fertilizes an egg cell. Then, the zygote (unicellular) will begin chain of cellular cleavages to produce multicellular mass, its embryo, the differentiated to different tissues and organism. The development of the embryo is called embryogenesis. Coenzyme Q10, is an antioxidant produced in the body. It boosts cellular energy and may enhance the immune system. CoQ10 is present and measurable in seminal fluid, the concentration of CoQ10 directly correlates with both sperm count and motility. It is beneficial in the prevention and treatment a wide range of health problems. Objectives: The present study was aimed to investigate the possibility of using coenzyme Q10 to improve in vitro fertilization (
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn current study a computation fluid dynamic (CFD) technique was used to investigate the effect of groynes shape and spacing on the scour pattern and the maximum scour depth in open channel flow. CFD model have been validated throughout comparing the numerical results with three previous experimental studies for a single groyne located in open channel with three different shapes (L, quadrant, and parabola shapes). The comparison revealed very good agreement between numerical results of the maximum scour depth with the results of all experimental models. Moreover, investigations of the effect of multi-groynes (three groynes and four groynes) arranged in parallel with constant spacing and also with variable spacing have been done, the
... Show MoreThis study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show MoreBackground: The presence of anatomic variations within the maxillary sinus such as septa has been reported to increase the risk of sinus membrane perforation during sinus elevation procedure for implant placement. This study aimed to measure the septal heights and correlate it with different types of septa. Material and methods: Thirty patients (15 males and 15 females) with partially edentulous maxillae and mean age (35) years were enrolled in this study. Sixty sinuses scanned with Spiral multislice Computed Tompgraphy, septal height measured after evaluation of septal type whether it was primary or secondary. Results: The results showed that 72.5 % of the septa detected were primary and this is statistically significant when compared w
... Show MoreRandom matrix theory is used to study the chaotic properties in nuclear energy spectrum of the 24Mg nucleus. The excitation energies (which are the main object of this study) are obtained via performing shell model calculations using the OXBASH computer code together with an effective interaction of Wildenthal (W) in the isospin formalism. The 24Mg nucleus is assumed to have an inert 16O core with 8 nucleons (4protons and 4neutrons) move in the 1d5/2, 2s1/2 and 1d3/2 orbitals. The spectral fluctuations are studied by two statistical measures: the nearest neighb