Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of this paper is to
provide user authentication based on keystroke dynamic in order to avoid un
authorized user access to the system. Naive Bayes Classifier (NBC) is applied for
keystroke authentication using unigraph and diagraph keystroke features. The
unigraph Dwell Time (DT), diagraph Down-Down Time (DDT) features, and
combination of (DT and DDT) are used. The results show that the combination of
features (DT and DDT) produces better results with low error rate as compared
with using DT or DDT alone.
Predicting the network traffic of web pages is one of the areas that has increased focus in recent years. Modeling traffic helps find strategies for distributing network loads, identifying user behaviors and malicious traffic, and predicting future trends. Many statistical and intelligent methods have been studied to predict web traffic using time series of network traffic. In this paper, the use of machine learning algorithms to model Wikipedia traffic using Google's time series dataset is studied. Two data sets were used for time series, data generalization, building a set of machine learning models (XGboost, Logistic Regression, Linear Regression, and Random Forest), and comparing the performance of the models using (SMAPE) and
... Show MoreIn this paper, two different chaotic dynamic systems are coupled using a semiconductor laser to produce a new chaotic system. These two chaotic systems are Rossler and Chua systems. X-dynamic of Rossler system was coupled optically using optical fiber as a carrier of signal with x, y, and z-dynamics of Chua system. The results were analyzed and the behavior of Chua system was found to be changing in time series which, in turn, changed the attractor. The Chua attractor was converted from double scroll to single scroll. The results obtained from connecting two different systems in chaotic behavior showed a remarkable increase in the bandwidth of Chua system. This increase in bandwidth opens up a wide field for many
... Show MoreExtracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or tousing another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classi
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreIn this article we study the variance estimator for the normal distribution when the mean is un known depend of the cumulative function between unbiased estimator and Bays estimator for the variance of normal distribution which is used include Double Stage Shrunken estimator to obtain higher efficiency for the variance estimator of normal distribution when the mean is unknown by using small volume equal volume of two sample .
Tracking moving objects is one of a very important applications within the computer vision. The goal of object tracking is segmenting a region of interest from a video scene and keeping track of its motion and positioning. Track moving objects used in many applications such as video surveillance, robot vision, and traffic monitoring, and animation. In this paper a four-wheeled robotic system have been designed and implemented by using Arduino-Uno microcontroller. Also a useful algorithms have been developed to detect and track objects in real time. The main proposed algorithm based on the kernel based color algorithm and some geometric properties to tracking color object. Robotic system is a compromise of two principal parts which are th
... Show MoreA principal problem of any internet user is the increasing number of spam, which became a great problem today. Therefore, spam filtering has become a research fo-cus that attracts the attention of several security researchers and practitioners. Spam filtering can be viewed as a two-class classification problem. To this end, this paper proposes a spam filtering approach based on Possibilistic c-Means (PCM) algorithm and weighted distance coined as (WFCM) that can efficiently distinguish between spam and legitimate email messages. The objective of the formulated fuzzy problem is to construct two fuzzy clusters: spam and email clusters. The weight assignment is set by information gain algorithm. Experimental results on spam based benchmark
... Show MoreThe rapid development of automation industries and technologies has shown incredible prospects for transforming our homes into a smart home automation system, which are more secure than a simple home. This paper proposes a home application based on voice and text called the Automated Control and Monitoring System (ASCM). This application can be utilized by both normal and vision-impaired people by using with a mobile phone.
The application allows users to send voice commands through Google Assistant installed on Android to control the appliances. They can also have complete monitoring by logging onto the ThingSpeak dashboard, which displays a device status indicator and sends alert messages in the event of dang
... Show More