
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Introduction: The major drawback of Silver diamine ϔuorde was the dark discoloration of the treated carious lesion. Aim: This study was conducted to determine the parental acceptability and perceptions to the discoloration and assess whether the degree of their acceptability could be altered with the position of the discoloured teeth, child attitude and the demographic characteristics of parents. Method: The parents who attended the dental clinic received a questionnaire which formulated with short summery about silver diamine ϔuorde with photographs (before and after treatment) and containing questions about the demographical data, attitude of the child in the dental clinic and the acceptability of SDF discoloration at different
... Show MorePollen morphology characterization is an important field in taxonomy. This study aims to identify and characterize the pollen morphology for fourteen species from subfamily Caesalpiniodeae (Fabaceae). The results showed the similarity of all species pollen in terms of being monad and tri,zono-colporate type, and each Ceratonia siliqua and Senna occidentalis distinguished by having tetra,zono-colporate pollen as well, and the results revealed the prevalence of reticulate configuration in most studies species, while Ceratonia siliqua characterized by striates configuration, Cassia fistula distinguished by verrrucate-gemmate wall, and Senna species by verrrucate- perforate, as for the shape, showed a discrepancy in the general shape fr
... Show MoreThe inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThis study was done to determine the concentration of several heavy metals in the water of Al-Saddah agricultural drainage in Al-Saddah District in Babylon Province/Iraq. The concentrations of six heavy metals were measured (Pb, Cd, Cu, Hg, Fe, Zn). It was found that Pb concentration ranged from 0.06 mg/L at St.2 in autumn to 0.13 mg/L at St.2 in winter. Fe concentrations ranged from 0.04 mg/L at St.2 in autumn and winter to 0.41 at St.2 in Summer. Cd concentrations ranged from 0.008 mg/L at St.2 in summer to 0.05 mg/L at St.2 in winter. Cu concentrations ranged from 0.01 mg/L at St.1 in both autumn and winter to 0.63 mg/L at St.2 in winter. Hg concentrations was ranged from 0.002 mg/