Preferred Language
Articles
/
bsj-903
The Writer Authentication by Using Syllables Frequency

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in the second case.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 17 2012
Journal Name
Smart Materials And Structures
Scopus (97)
Crossref (89)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Analysis of the symbolic images in the work of Mexican theater of: "all cats are brown," the writer Carlos Fuentes and "Palinuro on the stairs," the writer Fernando del Paso

 This article briefly analyzing contemporary works appeared in theater writer from Latin America, which comes within the theme of "power." Latin American Literature, such as two-way extremely clear: the vanguard of social and attention, have arrived at certain moments to some extent be regarded as a two-way rival. That desire to participate in the revolution of expression and artistic significance, has appeared evident in the literature of Latin America in the late nineteenth century and ended in the third decade of the twentieth century. The writers that stage would prefer not to serve the objectives of the revolution of Arts own but the objectives of social and political revolution that stimulate the world. These acts were issued

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
International Conference Of Reliable Information And Communication Technology
Classification of Arabic Writer Based on Clustering Techniques

Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio

... Show More
Scopus (5)
Scopus
Publication Date
Wed Jul 17 2019
Journal Name
Iraqi Journal Of Science
Frequency-Frequency Interactions in Chaos Communications

In this research, the frequency-frequency interactions in chaotic systems has been experimentally and numerically studied. We have injected two frequencies on chaotic system where one of these frequencies is modulated with chaotic waveform and the other is untiled as a scanning frequency to find modulating frequency. It is observed that the Fast Fourier Transformation (FFT) peaks amplitude increased when the value of the two frequencies are matched. Thus, the modulating frequency could be observed, this leads to discover a new method to detect the modulating frequency without synchronization.

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (6)
Scopus
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Die Dimensionen der Kurzgeschichte”Steh auf, steh doch auf“ The Dimension of short story (wake, Wake) 1958 by the German writer, Heinrich Böll.

In dieser Kurzgeschichte werden die Züge der Trümmerliteratur präzis dargestellt. Die wurde von Heinrich Böll im Jahr 1958 geschrieben. In der vorliegenden Arbeit konzentriere ich mich auf vielfältige Stoffe in Bezug auf die Lage nach dem Zweiten Weltkrieg. So gab ich dieser Arbeit einen besonderen Titel, der die Dimensionen dieser Kurzgeschichte heißt. Ich meine hier, die profunde Interpretation dieses Werkes, denn ich fand zwar hinter einigen Wörtern eine ganze Geschichte, die uns der Erzähler dadurch zeigen wollte.

So teilte ich diese Wörter (Grab, Schatten, Last, Schrei) als Dimensionen, von denen diese Arbeit umgekreist wird.

Diese Arbeit besteht aus vier Kapiteln, die aufeinander aufgebaut sind. Im ersten K

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Frequency analyses of human voice using fast Fourier transform

Quantitative analysis of human voice has been subject of interest and the subject gained momentum when human voice was identified as a modality for human authentication and identification. The main organ responsible for production of sound is larynx and the structure of larynx along with its physical properties and modes of vibration determine the nature and quality of sound produced. There has been lot of work from the point of view of fundamental frequency of sound and its characteristics. With the introduction of additional applications of human voice interest grew in other characteristics of sound and possibility of extracting useful features from human voice. We conducted a study using Fast Fourier Transform (FFT) technique to analy

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi

... Show More
View Publication Preview PDF