Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of the user for user authentication. Back Propagation Neural Network (BPNN) and the Probabilistic Neural Network (PNN) are used as a classifier to discriminate between the authentic and impostor users. Furthermore, four keystroke dynamics features namely: Dwell Time (DT), Flight Time (FT), Up-Up Time (UUT), and a mixture of (DT) and (FT) are extracted to verify whether the users could be properly authenticated. Two datasets (keystroke-1) and (keystroke-2) are used to show the applicability of the proposed Keystroke dynamics user authentication system. The best results obtained with lowest false rates and highest accuracy when using UUT compared with DT and FT features and comparable to combination of DT and FT, because of UUT as one direct feature that implicitly contained the two other features DT, and FT; that lead to build a new feature from the previous two features making the last feature having more capability to discriminate the authentic users from the impostors. In addition, authentication with UUT alone instead of the combination of DT and FT reduce the complexity and computational time of the neural network when compared with combination of DT and FT features.
This study sought to investigate the impacts of big data, artificial intelligence (AI), and business intelligence (BI) on Firms' e-learning and business performance at Jordanian telecommunications industry. After the samples were checked, a total of 269 were collected. All of the information gathered throughout the investigation was analyzed using the PLS software. The results show a network of interconnections can improve both e-learning and corporate effectiveness. This research concluded that the integration of big data, AI, and BI has a positive impact on e-learning infrastructure development and organizational efficiency. The findings indicate that big data has a positive and direct impact on business performance, including Big
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
In this paper a dynamic behavior and control of a jacketed continuous stirred tank reactor (CSTR) is developed using different control strategies, conventional feedback control (PI and PID), and neural network (NARMA-L2, and NN Predictive) control. The dynamic model for CSTR process is described by a first order lag system with dead time.
The optimum tuning of control parameters are found by two different methods; Frequency Analysis Curve method (Bode diagram) and Process Reaction Curve using the mean of Square Error (MSE) method. It is found that the Process Reaction Curve method is better than the Frequency Analysis Curve method and PID feedback controller is better than PI feedback controller.
The results s
... Show MoreNeural stem cells (NSCs) are progenitor cells which have the ability to self‑renewal and potential for differentiating into neurons, oligodendrocytes, and astrocytes. The in vitro isolation, culturing, identification, cryopreservation were investigated to produce neural stem cells in culture as successful sources for further studies before using it for clinical trials. In this study, mouse bone marrow was the source of neural stem cells. The results of morphological study and immunocytochemistry of isolated cells showed that NSCs can be produced successfully and maintaining their self‑renewal and successfully forming neurosphere for multiple passages. The spheres preserved their morphology in culture and cryopreserved t
... Show MoreThe performance of sewage pumps stations affected by many factors through its work time which produce undesired transportation efficiency. This paper is focus on the use of artificial neural network and multiple linear regression (MLR) models for prediction the major sewage pump station in Baghdad city. The data used in this work were obtained from Al-Habibia sewage pump station during specified records- three years in Al-Karkh district, Baghdad. Pumping capability of the stations was recognized by considering the influent input importance of discharge, total suspended solids (TSS) and biological oxygen demand (BOD). In addition, the chemical oxygen demands (COD), pH and chloride (Cl). The proposed model performanc
... Show MoreThe multi-focus image fusion method can fuse more than one focused image to generate a single image with more accurate description. The purpose of image fusion is to generate one image by combining information from many source images of the same scene. In this paper, a multi-focus image fusion method is proposed with a hybrid pixel level obtained in the spatial and transform domains. The proposed method is implemented on multi-focus source images in YCbCr color space. As the first step two-level stationary wavelet transform was applied on the Y channel of two source images. The fused Y channel is implemented by using many fusion rule techniques. The Cb and Cr channels of the source images are fused using principal component analysis (PCA).
... Show MoreAerial manipulation of objects has a number of advantages as it is not limited by the morphology of the terrain. One of the main problems of the aerial payload process is the lack of real-time prediction of the interaction between the gripper of the aerial robot and the payload. This paper introduces a digital twin (DT) approach based on impedance control of the aerial payload transmission process. The impedance control technique is implemented to develop the target impedance based on emerging the mass of the payload and the model of the gripper fingers. Tracking the position of the interactional point between the fingers of gripper and payload, inside the impedance control, is achieved using model predictive control (MPD) approach.
... Show MoreThis document provides an examination of research, on combining orthogonal frequency division multiplexing (OFDM) and optical fibers in communication networks. With the increasing need for data speeds and efficient use of bandwidth experts have been exploring the connection between OFDM, valued for its ability to handle multipath interference and optimize spectral usage and optical fiber technology which provides superior data transmission capabilities with low signal loss and strong protection, against electromagnetic disturbances. The review summarizes discoveries from studies examining the pros and cons of using OFDM, in optical communication networks. It discusses obstacles like fiber nonlinearity, chromatic dispersion and the effects o
... Show More