Preferred Language
Articles
/
8BaeTIsBVTCNdQwCPsgP
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF
Quick Preview PDF
Publication Date
Wed May 10 2023
Journal Name
Journal Of Planner And Development
The role of historical memory on social and Cultural mobility of Hilla Old city
...Show More Authors

As long as the place in which a person lives has a meaning and temporal dimensions , memory is the main axis of these dimensions , today , city centers and old historical sectors of cities are abandoned , and began to turn into slums , the contradiction between old and historical sectors led cities to lose their identity while people lost their sense of belongingness to the old sectors where their ancestors used to live . The old city of Hilla used to have social , historical and cultural role on determining the identity . The study problem can be summarized as the ( lack of studies regarding the impact of historical memory related to Hilla old city on social and cultural mobility ) , the study hypothesis claims that the social , histori

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Effect of Sn Addition on Phase Transformation Behavior of Equiatomic Ni-Ti Shape Memory Alloy
...Show More Authors

Sn effect on the phase transformation behavior, microstructure, and micro hardness of equiatomic Ni-Ti shape memory alloy was studied. NiTi and NiTiSn alloys were produced using vacuum induction melting process with alloys composition (50% at. Ni, 50% at.Ti) and (Ni 48% at., Ti 50% at., Sn 2% at.). The characteristics of both alloys were investigated by utilizing Differential Scanning Calorimetry, X- ray Diffraction Analysis, Scanning Electron Microscope, optical microscope and vicker's micro hardness test. The results showed that adding Sn element leads to decrease the phase transformation temperatures evidently. Both alloy samples contain NiTi matrix phase and Ti2Ni secondary phase, but the Ti2Ni phase content dec

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 08 2018
Journal Name
Advances In Intelligent Systems And Computing
Improve Memory for Alzheimer Patient by Employing Mind Wave on Virtual Reality with Deep Learning
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Pure And Applied Mathematics Journal
Memory Effects in Diffusion Like Equation Via Haar Wavelets
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using Time Series Methods To Modify The Seasonal Variations in the Consumer Price Index
...Show More Authors

     As is  known that the consumer price index (CPI) is one of the most important  price indices because of its direct effect on the welfare of the individual and his living.

       We have been address the problem of Strongly  seasonal  commodities in calculating  (CPI) and identifying some of the solution.

   We have  used an actual data  for a set of commodities (including strongly seasonal commodities) to calculate the index price by using (Annual Basket With Carry Forward Prices method) . Although this method can be successfully used in the context of seasonal&nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Mon Apr 17 2017
Journal Name
Wireless Personal Communications
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Computer aided photographic memory enhancement and speed reading (case study)
...Show More Authors

This work aimed to design and testing of a computer program – based eyeQ improvement, photographic memory enhancement, and speed reading to match the reading speed 150 – 250 word per minute (WPM) with the mind ability of processing and eye snap shooting 5000WPM . The package designed based on Visual Basic 6. The efficiency of the designed program was tested on a 10 persons with different levels of education and ages and the results show an increase in their reading speed of approximately 25% in the first month of training with noticeable enhancement in the memory as well as an increase in the ability to read for longer time without feeling nerves or boring, a nonlinear continuously increase in reading speed is assured after the first mo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Nonlinear Ritz Approximation for the Camassa-Holm Equation by Using the Modify Lyapunov-Schmidt method
...Show More Authors

 

          In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two.  The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref