Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Coblatcomplex has been prepared by reaction between C16H19N3O3S (L) as ligand and metal salt (II). The prepared complex were characterized by infrared spectra, electromic spectra, magnetic susceptibility, molar conductivity measurement and metal analysis by atomic absorption and (C.H.N) analysis. From these studies tetrahedral geometry structure for the complex was suggested. The photodegredation of complex were study using photoreaction cell and preparednanoTiO2 catalyst in different conditions (concentration, temperatures, pH).The results show that the recation is of a first order with activation energy equal to (6.6512 kJ /mol).
Coblatcomplex has been prepared by reaction between C16H19N3O3S (L) as ligand and metal salt (II). The prepared complex were characterized by infrared spectra, electromic spectra, magnetic susceptibility, molar conductivity measurement and metal analysis by atomic absorption and (C.H.N) analysis. From these studies tetrahedral geometry structure for the complex was suggested. The photodegredation of complex were study using photoreaction cell and preparednanoTiO2 catalyst in different conditions (concentration, temperatures, pH).The results show that the recation is of a first order with activation energy equal to (6.6512 kJ /mol).
Its well known that understanding human facial expressions is a key component in understanding emotions and finds broad applications in the field of human-computer interaction (HCI), has been a long-standing issue. In this paper, we shed light on the utilisation of a deep convolutional neural network (DCNN) for facial emotion recognition from videos using the TensorFlow machine-learning library from Google. This work was applied to ten emotions from the Amsterdam Dynamic Facial Expression Set-Bath Intensity Variations (ADFES-BIV) dataset and tested using two datasets.
A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
Over the last few years, there has been a worldwide increase in the use of composite materials for rehabilitation of deficient reinforced concrete structures. One important application of this technology is the use of Carbon Fiber Reinforced Polymer (CFRP) jacket to provide external confinement of reinforced concrete columns. Square concrete column specimens 100×100×1000 mm with concrete
compressive strength of about 30 and 50 MPa, steel fiber volume fraction 0%, 0.5%, 0.75%, and percentage of longitudinal reinforcement 2.01%, 3.14% and 4.52% were tested until failure in previous research. In this research seven tested columns were repaired and rehabilitated using one layer of CFRP flexible wraps and tested to determine their ultim
This paper presents a study (experimentally) for strengthening reinforced concrete (RC) beams with Near-Surface-Mounted (NSM) technique. The use of this technique with CFRP strips or rebars is an efficient technology for increasing the strength for flexure and shear or for repairing damaged reinforced concrete (RC) members. The objective of this research is to study, experimentally, RC beams either repaired or strengthened with NSM CFRP strips and follow their flexural behavior and failure modes. NSM-CFRP strips were used to strengthen three RC beam specimens, one of them was initially strengthened and tested up to failure. Four beam specimens have been initially subjected to preloading to 50% and 80% of ultimate load. Two of the sp
... Show More