Preferred Language
Articles
/
sBcGPo8BVTCNdQwCJ2Rs
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identifies a user based on the analysis of his/her typing rhythm. This paper utilizes keystroke features including dwell time (DT), flight time (FT), up-up time (UUT), and a mixture of theses features as keystroke representation. The back propagation neural network is trained with the mean of keystroke timing information for each character of password. These times are used to discriminate between the authentic users and impostors. Results of the experiments demonstrate that the backpropagation network with UUT features comparable to combination of DT and FT. Also, the results of backpropagation with combination of DT, FT and UUT provide low False Alarm Rate (FAR) and False Reject Rate (FRR) and high accuracy.

Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
The dynamics of a delayed ecological model with predator refuge and cannibalism
...Show More Authors

This study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS OF THE NEW NAPROXEN SELECTIVE ELECTRODE BASED ON IMPRINTED POLYMER USING DIFFERENT MONOMERS AND ITS DETERMINATION AT PHARMACEUTICAL PREPARATION: SYNTHESIS OF THE NEW NAPROXEN SELECTIVE ELECTRODE BASED ON IMPRINTED POLYMER USING DIFFERENT MONOMERS AND ITS DETERMINATION AT PHARMACEUTICAL PREPARATION
...Show More Authors

ABSTRACT

Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Computer Model Application for Sorting and Grading Citrus Aurantium Using Image Processing and Artificial Neural Network
...Show More Authors
Abstract<p>This study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Civil Engineering Journal
Prediction of Sediment Accumulation Model for Trunk Sewer Using Multiple Linear Regression and Neural Network Techniques
...Show More Authors

Sewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated.  For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers propos

... Show More
View Publication
Scopus (20)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2016
Journal Name
Al-khwarizmi Engineering Journal
Modeling the removal of Cadmium Ions from Aqueous Solutions onto Olive Pips Using Neural Network Technique
...Show More Authors

The uptake of Cd(II) ions from simulated wastewater onto olive pips was modeled using artificial neural network (ANN) which consisted of three layers. Based on 112 batch experiments, the effect of contact time (10-240 min), initial pH (2-6), initial concentration (25-250 mg/l), biosorbent dosage (0.05-2 g/100 ml), agitation speed (0-250 rpm) and temperature (20-60ºC) were studied. The maximum uptake (=92 %) of Cd(II) was achieved at optimum parameters of 60 min, 6, 50 mg/l, 1 g/100 ml, 250 rpm and 25ºC respectively.

Tangent sigmoid and linear transfer functions of ANN for hidden and output layers respectively with 7 neurons were sufficient to present good predictions for cadmium removal efficiency with coefficient of correlatio

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Conference: First International Conference On Water Resources
Modeling BOD of the Effluent from Abu-Ghraib Diary Factory using Artificial Neural Network October 2018
...Show More Authors

The proper operation, and control of wastewater treatment plants, is receiving an increasing attention, because of the rising concern about environmental issues. In this research a mathematical model was developed to predict biochemical oxygen demand in the waste water discharged from Abu-Ghraib diary factory in Baghdad using Artificial Neural Network (ANN).In this study the best selection of the input data were selected from the recorded parameters of the wastewater from the factory. The ANN model developed was built up with the following parameters: Chemical oxygen demand, Dissolved oxygen, pH, Total dissolved solids, Total suspended solids, Sulphate, Phosphate, Chloride and Influent flow rate. The results indicated that the constructed A

... Show More
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Predicting biochemical oxygen demand at Al-Rustumiya wastewater treatment plant inlet using the artificial neural network
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 16 2025
Journal Name
Radioelectronics. Nanosystems. Information Technologies.
Intelligent Control and Stability Analysis of Smart Grids Using CNN-LSTM Network and Model Predictive Controller
...Show More Authors

It is important that real time stability in smart grids is ensured as the integration of renewables and the complexity of the systems grows. In this paper, we provide a solid architecture, which combines a Residual CNNLSTM deep neural network predictor, FPGA-accelerated Model Predictive Control (MPC), and SHAP-based explainability. The proposed method predicted with 99.8% accuracy using the Electrical grid Stability Simulated Dataset (UCI) and minimized the instability rates surpassing 85 percent in all operating conditions. Meeting real-time operating needs, FPGA deployment on a Xilinx Zynq UltraScale+ provided 3.1 ms latency and 5 times reduced energy consumption against CPU processing. By emphasizing bus voltage and frequency as major in

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 27 2019
Journal Name
Journal Of Low Power Electronics And Applications
Tolerating Permanent Faults in the Input Port of the Network on Chip Router
...Show More Authors

Deep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f

... Show More
View Publication
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref