Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show MoreIn this paper, a new 5G Passive Optical Network (5G-PON) employing all-optical orthogonal frequency division multiplexing (AO-OFDM) is proposed in hybrid bidirectional standard single mode fiber (SSMF)/free space optical (FSO). Additionally, an optical frequency generator (OFG) source is utilized. The proposed model is simulated using VPI photonics software. Analytical modeling and simulations have been conducted for a new approach to generate OFG by cascaded two-frequency modulators and one electro-absorption modulator. A sinusoidal RF signal source is utilized to drive all these modulators. The results reveal that 64 optical multiplexed carriers with a frequency spacing of 30 GHz are generated. These optical carriers have power variations
... Show MoreAbstract
The research aims to identify the mediator role of workplace spirituality in the relationship between psychological capital and entrepreneurial behavior: field research to a sample opinions from employees at the center of the Iraqi ministry of Oil . The importance of the current research emerged from paucity of studies that have attempted to identify and know the nature of the relationship between the variables as well as trying to find the current address and realistic problem directly affects the performance of employees in the Iraqi oil sector.
In order to achieve the goal of research the use of the analytical method (quantitative)
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreThis research is Interested in how the performance and implementation of factory production engine coolants of the General Company for Electrical Industries of its work, and to facilitate the flow of the decisions of senior management and access to all configurations, to ensure differentiation desired and reduce lost sales, resulting from poor scheduling of operations through the application of certain rules of scheduling operations in the production plant Engines Air-cooler, the objectives of research in identifying the best base and working to reduce the time and cost of Same Rules of Process which are considered the most influential of any organization and thr
... Show MoreThe construction project is a very complicated work by its nature and requires specialized knowledge to lead it to success. The construction project is complicated socially, technically and economically in its planning, management and implementation aspects due to the fact that it has many variables and multiple stakeholders in addition to being affected by the surrounding environment. Successful projects depend on three fundamental points which are cost-time, performance and specifications. The project stakeholder's objective to achieve best specifications and the cost-time frame stipulated in the contract.
The question is, was the optimum implementation accomplished? The provision for the success of the project
... Show MoreThe aim of the research is to diagnose and analyze the gap between the actual reality and the application of the eighth requirement (operation) in the National Insurance Company in accordance with the international standard specification for the quality management system (ISO 9001:2015), which is related to the planning, implementation and control of operations, which would raise the level of performance of employees and be reflected in the provision of An appropriate service for the faithful, as the reality of the condition of the requirement was studied by identifying the strengths and weaknesses of the system to diagnose the gap and find ways to address it. A workshop was held with company officials, through which questions were raise
... Show More