Preferred Language
Articles
/
EReBNI8BVTCNdQwCXWF_
Using Mouse Dynamics for Continuous User Authentication

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Nov 10 2023
Journal Name
2023 3rd International Scientific Conference Of Engineering Sciences (isces)
Using User Experience Metrics for Academic Management System of University of Baghdad

Interface evaluation has been the subject of extensive study and research in human-computer interaction (HCI). It is a crucial tool for promoting the idea that user engagement with computers should resemble casual conversations and interactions between individuals, according to specialists in the field. Researchers in the HCI field initially focused on making various computer interfaces more usable, thus improving the user experience. This study's objectives were to evaluate and enhance the user interface of the University of Baghdad's implementation of an online academic management system using the effectiveness, time-based efficiency, and satisfaction rates that comply with the task questionnaire process. We made a variety of interfaces f

... Show More
Scopus Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Constructing a Digital Certificate Authentication System for Classified Documents

             In this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the level of unemployment in Iraq by using the user / product schedule for 2010

Economic performance is one of the most important indicators of economic activity and with the performance of the economy progress varied sources of output and increase economic growth rates and per capita national income, and to recover the business environment and increase investment rates and rising effectiveness of the financial and monetary institutions and credit market. Which leads to increased employment rates and reducing unemployment rates and the elimination of many of the social problems and improve the average per capita income as well as improve the level of national income.

The input / output tables is a technique mathematical indicates economic performance

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
User Oriented Calibration Method for Stonex X300 Terrestrial Laser Scanner

    Terrestrial laser scanners (TLSs) are 3D imaging systems that provide the most powerful 3D representation and practical solutions for various applications. Hence this is due to effective range measurements, 3D point cloud reliability, and rapid acquisition performance. Stonex X300 TOF scanner delivered better certainty in far-range than in close-range measurements due to the high noise level inherent within the data delivered from Time of Flight (TOF) scanning sensors. However, if these errors are manipulated properly using a valid calibration model, more accurate products can be obtained even from very close-range measurements. Therefore, to fill this gap, this research presents a user-oriented target-based calibration routine to

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Wireless Personal Communications
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Advanced Computer Science And Applications
Crossref (3)
Crossref
View Publication