Preferred Language
Articles
/
ijs-10267
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of this paper is to
provide user authentication based on keystroke dynamic in order to avoid un
authorized user access to the system. Naive Bayes Classifier (NBC) is applied for
keystroke authentication using unigraph and diagraph keystroke features. The
unigraph Dwell Time (DT), diagraph Down-Down Time (DDT) features, and
combination of (DT and DDT) are used. The results show that the combination of
features (DT and DDT) produces better results with low error rate as compared
with using DT or DDT alone.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
An Integrated Information Gain with A Black Hole Algorithm for Feature Selection: A Case Study of E-mail Spam Filtering
...Show More Authors

     The current issues in spam email detection systems are directly related to spam email classification's low accuracy and feature selection's high dimensionality. However, in machine learning (ML), feature selection (FS) as a global optimization strategy reduces data redundancy and produces a collection of precise and acceptable outcomes. A black hole algorithm-based FS algorithm is suggested in this paper for reducing the dimensionality of features and improving the accuracy of spam email classification. Each star's features are represented in binary form, with the features being transformed to binary using a sigmoid function. The proposed Binary Black Hole Algorithm (BBH) searches the feature space for the best feature subsets,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Pakistan Journal Of Statistics
Estimation intensity radiation of chest X-ray (CXR) with application
...Show More Authors

In this research we assumed that the number of emissions by time (𝑡) of radiation particles is distributed poisson distribution with parameter (𝑡), where  < 0 is the intensity of radiation. We conclude that the time of the first emission is distributed exponentially with parameter 𝜃, while the time of the k-th emission (𝑘 = 2,3,4, … . . ) is gamma distributed with parameters (𝑘, 𝜃), we used a real data to show that the Bayes estimator 𝜃 ∗ for 𝜃 is more efficient than 𝜃̂, the maximum likelihood estimator for 𝜃 by using the derived variances of both estimators as a statistical indicator for efficiency

Preview PDF
Scopus
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Planning the Production of the Electrical Distribution Converter (400KV/11) Using Time Series Methods and Goal Programming in the Fuzzy Environment
...Show More Authors

This Paper aims to plan the production of the electrical distribution converter (400 KV/11) for one month at Diyala Public Company and with more than one goal for the decision-maker in a fuzzy environment. The fuzzy demand was forecasting using the fuzzy time series model. The fuzzy lead time for raw materials involved in the production of the electrical distribution converter (400 KV/11) was addressed using the fuzzy inference matrix through the application of the matrix in Matlab, and since the decision-maker has more than one goal, so a mathematical model of goal programming was create, which aims to achieve two goals, the first is to reduce the total production costs of the electrical distribution converter (400 KV/11) and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Data Mining Methods for Extracting Rumors Using Social Analysis Tools
...Show More Authors

       Rumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Multilevel Analysis to Recognize Original Voucher from Faked Voucher
...Show More Authors

Voucher documents have become a very important information carrier in daily lives to be used in many applications. A certain class of people could exploit the trust and indulge in forging or tampering for short or long term benefits unlawfully. This holds a serious threat to the economics and the system of a nation. The aim of this paper is to recognize original voucher document through its contents. Forgery of voucher document could have serious repercussions including financial losses, so the signature, logo and stamp that are used to determine being a genuine or not by using multilevel texture analysis. The proposed method consists of several operations. First, detection and extraction of signature, logo and stamp images from original

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Solution of Time-Varying Index-2 Linear Differential Algebraic Control Systems Via A Variational Formulation Technique
...Show More Authors

    This paper deals with finding an approximate solution to the index-2 time-varying linear differential algebraic control system based on the theory of variational formulation. The solution of index-2 time-varying differential algebraic equations (DAEs) is the critical point of the equivalent variational formulation. In addition, the variational problem is transformed from the indirect into direct method by using a generalized Ritz bases approach. The approximate solution is found by solving an explicit linear algebraic equation, which makes the proposed technique reliable and efficient for many physical problems. From the numerical results, it can be implied that very good efficiency, accuracy, and simplicity of the pre

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
An Investigation into Thermal Performance of Closed Wet Cooling Tower for Use with Chilled Ceilings in Buildings
...Show More Authors

Chilled ceilings systems offer potential for overall capital savings. The main aim of the present research is to investigate the thermal performance of the indirect contact closed circuit cooling tower, ICCCCT used with chilled ceiling, to gain a deeper knowledge in this important field of engineering which has been traditionally used in various industrial & HVAC systems. To achieve this study, experimental work were implemented for the ICCCCT use with chilled ceiling. In this study the thermal performances of closed wet cooling tower use with chilled ceiling is experimentally and theoretically investigated. Different experimental tests were conducted by varying the controlling parameters to investigate their effects

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Posterior Estimates for the Parameter of the Poisson Distribution by Using Two Different Loss Functions
...Show More Authors

In this paper, Bayes estimators of Poisson distribution have been derived by using two loss functions: the squared error loss function and the proposed exponential loss function in this study, based on different priors classified as the two different informative prior distributions represented by erlang and inverse levy prior distributions and non-informative prior for the shape parameter of Poisson distribution. The maximum likelihood estimator (MLE) of the Poisson distribution has also been derived. A simulation study has been fulfilled to compare the accuracy of the Bayes estimates with the corresponding maximum likelihood estimate (MLE) of the Poisson distribution based on the root mean squared error (RMSE) for different cases of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Mathematical Modelling of Gene Regulatory Networks
...Show More Authors

    This research includes the use of an artificial intelligence algorithm, which is one of the algorithms of biological systems which is the algorithm of genetic regulatory networks (GRNs), which is a dynamic system for a group of variables representing space within time. To construct this biological system, we use (ODEs) and to analyze the stationarity of the model we use Euler's method. And through the factors that affect the process of gene expression in terms of inhibition and activation of the transcription process on DNA, we will use TF transcription factors. The current research aims to use the latest methods of the artificial intelligence algorithm. To apply Gene Regulation Networks (GRNs), we used a progr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
New Operational Matrices of Seventh Degree Orthonormal Bernstein Polynomials
...Show More Authors

Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.

View Publication Preview PDF
Crossref