In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreBackground: Cystoid Macular Edema (CME) in its various forms can be considered one of the leading causes of central vision loss in the developed world. It is not a disease itself, It represents a common pathologic sequel of the retina and occurs in a variety of pathological conditions such as, diabetic retinopathy, central or branch retinal vein occlusion(CRVO,BRVO), intraocular inflammation and following cataract extraction. Objective: This study was done to investigate the pattern of CME in patient attending Erbil Teaching Hospitals.Type of the study: Cross- sectional study.Methods and Materials: This is a hospital base cross- sectional study that included 61 patients (75 eyes) conducted at Erbil Teaching Hospitals for six months. All
... Show MoreNowadays, energy demand continuously rises while energy stocks are dwindling. Using current resources more effectively is crucial for the world. A wide method to effectively utilize energy is to generate electricity using thermal gas turbines (GT). One of the most important problems that gas turbines suffer from is high ambient air temperature especially in summer. The current paper details the effects of ambient conditions on the performance of a gas turbine through energy audits taking into account the influence of ambient conditions on the specific heat capacity ( , isentropic exponent ( ) as well as the gas constant of air . A computer program was developed to examine the operation of a power plant at various ambient temperature
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreFacial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f
... Show MoreFace recognition is required in various applications, and major progress has been witnessed in this area. Many face recognition algorithms have been proposed thus far; however, achieving high recognition accuracy and low execution time remains a challenge. In this work, a new scheme for face recognition is presented using hybrid orthogonal polynomials to extract features. The embedded image kernel technique is used to decrease the complexity of feature extraction, then a support vector machine is adopted to classify these features. Moreover, a fast-overlapping block processing algorithm for feature extraction is used to reduce the computation time. Extensive evaluation of the proposed method was carried out on two different face ima
... Show MoreAbstract:
This study deals with the influence of the industrial buyer behavior in Channels of distribution. It concentrates on one section of management levels in the company. Which is that of administrative managers The research problem is attempt to study and analysis the influence of industrial buyer behavior in channels of distribution.. The aiming at achieving a number of applicable goals depending on one major hypotheses I set a questionnaire in collecting the data and information relating to the study، which was distributed to sample of ( 30) department manager heads of section states company . In order to process the data resorted to many statistical methods such as arithmetic means the sta
... Show MoreOne of the major problems in modern construction is the accumulation of construction and demolition waste; this study thus examines the consumption of waste brick in concrete based on the use of blended nano brick powder as replacement for cement and as a fine aggregate. Seven concrete mixes were developed according to ACI 211.1 using recycled waste brick. Nano powder brick at 0, 5, and 10% was used as a replacement by cement weight, with other mixes featuring 10, 20, and 30% partial replacement by volume of river sand with brick. The experimental results for replacement of cement with nano brick powder showed an enhancement in mechanical properties (compressive, flexural, and tensile strength) at 7,