Preferred Language
Articles
/
tRcJPo8BVTCNdQwCaGSe
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.

Publication Date
Wed Jan 01 2020
Journal Name
Karbala Journal Of Physical Education Sciences
The effect of using a designed device to develop the technical performance of the descending landing skill facing with half a cycle on the parallel device of the technical men's
...Show More Authors

The research included five sections containing the first section on the introduction of the research and its importance and was addressed to the importance of the game of gymnastic and skilled parallel effectiveness and the importance of learning, but the problem of research that there is a difference in learning this skill and difficulty in learning may be one of the most important reasons are fear and fear of falling and injury, And a lack of sense of the movement of the movement is one of the obstacles in the completion of the skill and the goal of research to design a device that helps in learning the skill of descending Almtor facing with half a cycle according to the typical locomotor track on the parallel device of the technical men'

... Show More
Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
The Remediation of Congo Red-Contaminated Groundwater by using a Permeable Reactive Barrier Through Modified Waterworks Sludge MgAl-LDH
...Show More Authors

This investigation aims to explore the potential of waterworks sludge (WS), low-cost byproduct of water treatment processes, as a sorbent for removing Congo Red (CR) dyes. This will be achieved by precipitating nano-sized (MgAl-LDH)-layered double hydroxide onto the surface of the sludge. The efficiency of utilizing MgAl-LDH to modify waterworks sludge (MWS) for use in permeable reactive barrier technology was confirmed through analysis with Fourier transform infrared and X-ray diffraction. The isotherm model was employed to elucidate the adsorption mechanisms involved in the process. Furthermore, the COMSOL model was utilized to establish a continuous testing model for the analysis of contaminant transport under diverse conditions.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 23 2022
Journal Name
Dental Hypotheses
Remineralization of Dentine Caries Using Moringa Oleifera Based Nano-Silver Fluoride: A Single-Blinded, Randomized, Active-Controlled Clinical Trial
...Show More Authors

View Publication
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Microporous And Mesoporous Materials
Using the ash of common water reeds as a silica source for producing high purity ZSM-5 zeolite microspheres
...Show More Authors

View Publication
Scopus (33)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon May 31 2021
Journal Name
Journal Of Research In Medical And Dental Science
A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique
...Show More Authors

A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique, Omar Jihad Banawi*, Raghad

View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Detection of Methamphetamine using Nanobentonite as a Novel Solid Phase Extraction Column Matrix Assisted with Gas Chromatography- Mass Spectroscopy
...Show More Authors

          This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref