Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of this paper is to
provide user authentication based on keystroke dynamic in order to avoid un
authorized user access to the system. Naive Bayes Classifier (NBC) is applied for
keystroke authentication using unigraph and diagraph keystroke features. The
unigraph Dwell Time (DT), diagraph Down-Down Time (DDT) features, and
combination of (DT and DDT) are used. The results show that the combination of
features (DT and DDT) produces better results with low error rate as compared
with using DT or DDT alone.
The lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreVol. 6, Issue 1 (2025)
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreCritical buckling and natural frequencies behavior of laminated composite thin plates subjected to in-plane uniform load is obtained using classical laminated plate theory (CLPT). Analytical investigation is presented using Ritz- method for eigenvalue problems of buckling load solutions for laminated symmetric and anti-symmetric, angle and cross ply composite plate with different elastic supports along its edges. Equation of motion of the plate was derived using principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. Various numerical investigation were studied to exhibit a convergence and accuracy of the present solution for considering some design parameters such as edge
... Show More‎ Since the first outbreak in Wuhan, China, in December 31, 2019, COVID-19 pandemic ‎has been spreading to many countries in the world. The ongoing COVID-19 pandemic has caused a ‎major global crisis, with 554,767 total confirmed cases, 484,570 total recovered cases, and ‎‎12,306 deaths in Iraq as of February 2, 2020. In the absence of any effective therapeutics or drugs ‎and with an unknown epidemiological life cycle, predictive mathematical models can aid in ‎the understanding of both control and management of coronavirus disease. Among the important ‎factors that helped the rapid spread of the ep
... Show MoreThis study deals with the absence of state control over the whole of the Syrian geography in creating an environment conducive to the emergence of a new force represented by armed groups and organizations that point to fundamental changes in the conflict and to transform competition for control over the land into a struggle for influence. Which in itself represents the prospects of change in the Syrian scene, and that understanding their interests requires shedding light on the extent of the continuation of this competition and the conflict on land and expansion at the expense of the other, and thus contribute to complicate the Syrian scene, especially after attempts to bite Of land and annexation to each party's areas of influence, espe
... Show More