Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of the user for user authentication. Back Propagation Neural Network (BPNN) and the Probabilistic Neural Network (PNN) are used as a classifier to discriminate between the authentic and impostor users. Furthermore, four keystroke dynamics features namely: Dwell Time (DT), Flight Time (FT), Up-Up Time (UUT), and a mixture of (DT) and (FT) are extracted to verify whether the users could be properly authenticated. Two datasets (keystroke-1) and (keystroke-2) are used to show the applicability of the proposed Keystroke dynamics user authentication system. The best results obtained with lowest false rates and highest accuracy when using UUT compared with DT and FT features and comparable to combination of DT and FT, because of UUT as one direct feature that implicitly contained the two other features DT, and FT; that lead to build a new feature from the previous two features making the last feature having more capability to discriminate the authentic users from the impostors. In addition, authentication with UUT alone instead of the combination of DT and FT reduce the complexity and computational time of the neural network when compared with combination of DT and FT features.
This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreThree mesoporous silica with different functional group were prepared by one-step synthesis based on the simultaneous hydrolysis and condensation of sodium silicate with organo - silane in the presence of template surfactant polydimethylsiloxane - polyethyleneoxide (PDMS - PEO). The prepared materials were characterized by Fourier transform infrared spectroscopy (FTIR), thermogravimetric analysis (TGA), atomic force microscopy (AFM) and nitrogen adsorption/desorption experiments. The results indicate that the preparation of methyl and phenyl functionalized silica were successful and the mass of methyl and phenyl groups bonded to the silica structure are 15, 38 mmol per gram silica. The average diameter of the silica particles are 103.51,
... Show MoreBackground: White spot lesions are esthetic problems caused by subsurface enamel demineralization that seen as white opacity. Aim of the study: This study aimed to evaluate and to compare the color change after the treatment of the white spot lesions with resin nϔtrton and micro abrasion. Materials and Methods: rtϔ white spot lesions were generated on 48 premolar teeth by the use of a demineralization solution. The teeth were randomly divided using the Diagnodent into three study groups (16 teeth for each group) depending on the depth of the induced lesions: outer enamel, inner enamel and outer dentine. Then each group was fatherly subdivided into two groups (8 teeth for each group) the ϔrst group was treated wit
... Show MoreRoller compacted concrete (RCC) is a special type of concrete with zero or even negative slump consistency. In this work, it had aimed to produce an RCC mix suitable for roads paving with minimum cost and better engineering properties so, different RCC mixes had prepared i.e. (M1, M2, M3, and M4) using specified percentages of micro natural silica sand powder (SSP) as partial replacement of (0%, 5%, 10%, and 20%) by weight of sulfate resistant Portland cement. Additionally, M-sand, crushed stone, filler, and water had been used. The results had obtained after 28 days of water curing. The control mix (M1) had satisfied the required
The research aims to measure the efficiency of health services Quality in the province of Karbala, using the Data Envelopment analysis Models in ( 2006). According to these models the degree of efficiency ranging between zero and unity. We estimate Scale efficiency for two types of orientation direction, which are input and output oriented direction.
The results showed, according Input-oriented efficiency that the levels of Scale efficiency on average is ( 0.975), in the province of Karbala. While the index of Output-oriented efficiency on average is (o.946).
In this study, concentrations of radon and uranium were measured for twenty six samples of soil. The radon concentrations in soil samples measured by registrant alpha-emitting radon (222Rn) by using CR-39 track detector. The uranium concentrations in soil samples measured by using registrar fission fragments tracks in CR-39 track detector that caused by the bombardment of U with thermal neutrons from 241 Am-Be neutron source that has flux of 5 ×103n cm-2 s-1.
The concentrations values were calculated by a comparison with standard samples The results show that the radon concentrations are between (91.931-30.645Bq/m3).
The results show that also the uranium concentrat
Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show More