Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreContracting cancer typically induces a state of terror among the individuals who are affected. Exploring how chemotherapy and anxiety work together to affect the speed at which cancer cells multiply and the immune system’s response model is necessary to come up with ways to stop the spread of cancer. This paper proposes a mathematical model to investigate the impact of psychological scare and chemotherapy on the interaction of cancer and immunity. The proposed model is accurately described. The focus of the model’s dynamic analysis is to identify the potential equilibrium locations. According to the analysis, it is possible to establish three equilibrium positions. The stability analysis reveals that all equilibrium points consi
... Show MoreThis study was carried out to study effect of magnetic water ( M0 and M) and different concentrations of coconut extract in Fragaria x ananassa (Duch) C.V Festival. The results showed significant differences in the plants treated with magnetic water ( 0.12 Tesla) and different concentrations of coconut extract C1 (0%), C2 (2.5%), C3 (5%), C4 (7.5%) and C5 (10%) in vegetative parameters as in leaf area and chlorophyll in treatment M0C3 was (53.72 Dcm2, 50.00), respectively, highest leaf number and plant dry weight in MC4 (12.77,14.22 gm), respectively. Results recorded significant differences in fruit parameters such as weight in MC1 (18.97 gm). The maximum fruit number was in MC3 (110), the greatest fruit size was in MC4 (15.78 cm3) and the
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe experiment was carried out in the spring season of 2017 in the open fields of the College of Agricultural Engineering Sciences/University of Baghdad/Al-Jadriya camps in order to improve the growth and yield of potato plants resulting from the cultivation of true potato seeds of the hybrid BSS-295 by spraying with two organic nutrients. The experiment included two factors: First one was spraying with Megafol nutrient at concentrations 0, 1, 2 and 4 ml l-1 and the second was spraying with Algazone nutrient at concentrations 0, 1.5 and 3 ml l-1, the experiment was applied according to the complete randomized block design with three replicatio
In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
In this paper, the delay integral equations in population growth will be described,discussed , studied and transfered this model to integro-differential equation. At last,we will solve this problem by using variational approach.
To explore the potential for in vitro rapid regeneration of Spanish dagger (Yucca gloriosa 'Variegata'), different concentrations of 6-Benzyladenine (BA), 1-naphthaleneacetic acid (NAA) and combinations of both were evaluated for callus induction initiated on leaf and bud (terminal and axillary buds) explants using Murashige and Skoog (MS) medium. Callus response induction percentage, fresh weight, color and texture of the callus were assessed after 1.5 and 6.0 months in culture. The appropriate medium for callus initiation on leaf explants was MS medium supplemented with 6.0 mg/L NAA. A combination of 0.2 mg/L BA and 1.5 mg/L NAA also exhibited a remarkable callus induction on bud explants. Effect of thidiazuron (TDZ) addition to the cultu
... Show More