The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreOne wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.
Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreCrime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin
... Show MoreMixed ligand complexes of bivalent metal ions, viz ; M= Co(II),Ni(II),Cu(II), Zn(II), Cd (II), and Hg(II) of the composition [M(Anth)2(TMP)] in 1:2:1 molar ratio, (where . AnthrH= Anthranilic acid (C7H7NO2) and Trimethoprime (TMP) = (C14H18N4O3) have been synthesized and characterized by repeated melting point determination, Solubility, Molar conductivity (Λm ),determination the percentage of the metal (M%) in the complexes by (AAS), FT-IR, magnetic susceptibility measurements [μeff (BM)] and electronic spectral data. The two ligands and their metal complexes have been screened for their bacterial activity against selected microbial strains (Gram +ve) & (Gram -ve).
Mixed ligand complexes of bivalent metal ions, viz ; M= Co(II),Ni(II),Cu(II), Zn(II), Cd (II), and Hg(II) of the composition [M(Anth)2(TMP)] in 1:2:1 molar ratio, (where . AnthrH= Anthranilic acid (C7H7NO2) and Trimethoprime (TMP) = (C14H18N4O3) have been synthesized and characterized by repeated melting point determination, Solubility, Molar conductivity (Λm ),determination the percentage of the metal (M%) in the complexes by (AAS), FT-IR, magnetic susceptibility measurements [µeff (BM)] and electronic spectral data. The two ligands and their metal complexes have been screened for their bacterial activity against selected microbial strains (Gram +ve) & (Gram -ve).