Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of this paper is to
provide user authentication based on keystroke dynamic in order to avoid un
authorized user access to the system. Naive Bayes Classifier (NBC) is applied for
keystroke authentication using unigraph and diagraph keystroke features. The
unigraph Dwell Time (DT), diagraph Down-Down Time (DDT) features, and
combination of (DT and DDT) are used. The results show that the combination of
features (DT and DDT) produces better results with low error rate as compared
with using DT or DDT alone.
Carbon nanotubes are an ideal material for infrared applications due to their
excellent electronic and photo electronic properties, suitable band gap, mechanical
and chemical stabilities. Functionalised multi-wall carbon nanotubes (f-MWCNTs)
were incorporated into polythiophen (PTh) matrix by electro polymerization
method. f-MWCNTs/ PTh nanocomposit films were prepared with 5wt% and
10wt% loading ratios of f-MWCNTs in the polymer matrix. The films are deposited
on porous silicon nanosurfaces to fabricate photoconductive detectors work in the
near IR region. The detectors were illuminated by semiconductor laser diode with
peak wavelength of 808 nm radiation power of 300 mW. FTIR spectra assignments
verify that t
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe Present Work includes the study of the population dynamics of Armadillidium vulgare in AL- Jadiriya region in Baghdad. Monthly samples were collected using a quadrat 0.0625 m2 from November 2007 to November 2008.. The population density of A.vulgare, ranged from 880 ind/m2 in May to251 ind/m2 in January respectively. This species showed high aggregation dispersion in the study area. The sex ratio showed that the number of females were more than that of males and significantly differd (P < 0.05) during the reproductive months. Furthermore, it was found that the juveniles of species were present at most time of the year, But the large sized groups have been observed during summer and spring. And showed a positive linear correlations betwe
... Show MoreStart your abstract here the objective of this paper is to study the dynamical behaviour of an eco-epidemiological system. A prey-predator model involving infectious disease with refuge for prey population only, the (SI_) infectious disease is transmitted directly, within the prey species from external sources of the environment as well as, through direct contact between susceptible and infected individuals. Linear type of incidence rate is used to describe the transmission of infectious disease. While Holling type II of functional responses are adopted to describe the predation process of the susceptible and infected predator respectively. This model is represented mathematically by
Abstract\
In this research we built a mathematical model of the transportation problem for data of General Company for Grain Under the environment of variable demand ,and situations of incapableness to determining the supply required quantities as a result of economic and commercial reasons, also restrict flow of grain amounts was specified to a known level by the decision makers to ensure that the stock of reserves for emergency situations that face the company from decrease, or non-arrival of the amount of grain to silos , also it took the capabilities of the tanker into consideration and the grain have been restricted to avoid shortages and lack of processing capability, Function has been adopted
... Show MoreIn this paper, an eco-epidemiological model with media coverage effect is proposed and studied. A prey-predator model with modified Leslie-Gower and functional response is studied. An -type of disease in prey is considered. The existence, uniqueness and boundedness of the solution of the model are discussed. The local and global stability of this system are carried out. The conditions for the persistence of all species are established. The local bifurcation in the model is studied. Finally, numerical simulations are conducted to illustrate the analytical results.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More