Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreBackground: Thalassemia is characterized by the decrease or absence of the synthesis of one or more globin chains of hemoglobin. Thalassemia is distributed worldwide and is characterized by; regular blood transfusion which is creating alloimmunization to erythrocyte antigens is one of the major complications of regular blood transfusions in thalassemia, particularly in patients who are chronically transfused.Objectives: The aims of this study are to understand the immune system profile as the triggering factor for thalassemia.Methods: Thirty patients aging between one year and four months and twenty two years, twenty two of them were boys and eight were girls. Twenty nine patients, their parents are relative except one and studied in the
... Show MoreBackground: Salivary immunoglobulin IgA plays an essential role in the immune response against dental caries. This studywas conducted to compare the salivary IgA levels and flow rate of stimulated saliva in caries active and caries free children. Materials and methods: The present study included sixty healthy children age 7-10 yearswho were divided into two groups. They were caries free and caries active children (30 children in each group). Assessment and recording of caries – experience were through the application of Decayed, Missing and Filled Tooth Index (DMFT) and (dmft) index, for permanent and deciduous teeth respectively. After dental examination, stimulated saliva samples were collected from the subjects and performed und
... Show MoreBackground: Salivary immunoglobulin IgA plays an essential role in the immune response against dental caries. This studywas conducted to compare the salivary IgA levels and flow rate of stimulated saliva in caries active and caries free children. Materials and methods: The present study included sixty healthy children age 7-10 yearswho were divided into two groups. They were caries free and caries active children (30 children in each group). Assessment and recording of caries – experience were through the application of Decayed, Missing and Filled Tooth Index (DMFT) and (dmft) index, for permanent and deciduous teeth respectively. After dental examination, stimulated saliva samples were collected from the subjects and performed und
... Show More