Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreIn this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the BE
... Show More<abstract><p>Many variations of the algebraic Riccati equation (ARE) have been used to study nonlinear system stability in the control domain in great detail. Taking the quaternion nonsymmetric ARE (QNARE) as a generalized version of ARE, the time-varying QNARE (TQNARE) is introduced. This brings us to the main objective of this work: finding the TQNARE solution. The zeroing neural network (ZNN) technique, which has demonstrated a high degree of effectiveness in handling time-varying problems, is used to do this. Specifically, the TQNARE can be solved using the high order ZNN (HZNN) design, which is a member of the family of ZNN models that correlate to hyperpower iterative techniques. As a result, a novel
... Show MoreGlobally, buildings use about 40% of energy. Many elements, such as the physical properties of the structure, the efficiency of the cooling and heating systems, the activity of the occupants, and the building’s sustainability, affect the energy consumption of a building. It is really difficult to predict how much energy a building will need. To improve the building’s sustainability and create sustainable energy sources to reduce carbon dioxide emissions from fossil fuel combustion, estimating the building's energy use is necessary. This paper explains the energy consumed in the lecture building of the Al-Khwarizmi College of Engineering, University of Baghdad (UOB), Baghdad, Iraq. The weather data and the building construction informati
... Show MoreThis paper introduces a Laplace-based modeling approach for the study of transient converter-grid interactions. The proposed approach is based on the development of two-port admittance models of converters and other components, combined with the use of numerical Laplace transforms. The application of a frequency domain method is aimed at the accurate and straightforward computation of transient system responses while preserving the wideband frequency characteristics of power components, such as those due to the use of high frequency semiconductive switches, electromagnetic interaction between inductive and capacitive components, as well as wave propagation and frequency dependence in transmission systems.
With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreThis study focuses on synthesizing Niobium pentoxide (Nb2O5) thin films on silicon wafers and quartz substrates using DC reactive magnetron sputtering for NO2 gas sensors. The films undergo annealing in ambient air at 800 °C for 1 hr. Various characterization techniques, including X-ray diffraction (XRD), atomic force microscopy (AFM), energy-dispersive X-ray spectroscopy (EDS), Hall effect measurements, and sensitivity measurements, are employed to evaluate the structural, morphological, electrical, and sensing properties of the Nb2O5 thin films. XRD analysis confirms the polycrystalline nature and hexagonal crystal structure of Nb2O5. The optical band gap values of the Nb2O5 thin films demonstrate a decrease from 4.74 to 3.73 eV
... Show MoreThis study focuses on synthesizing Niobium pentoxide (Nb2O5) thin films on silicon wafers and quartz substrates using DC reactive magnetron sputtering for NO2 gas sensors. The films undergo annealing in ambient air at 800 °C for 1 hr. Various characterization techniques, including X-ray diffraction (XRD), atomic force microscopy (AFM), energy-dispersive X-ray spectroscopy (EDS), Hall effect measurements, and sensitivity measurements, are employed to evaluate the structural, morphological, electrical, and sensing properties of the Nb2O5 thin films. XRD analysis confirms the polycrystalline nature and hexagonal crystal structure of Nb2O5. The optical band gap val
... Show More