Preferred Language
Articles
/
ijs-7715
Constructing a Digital Certificate Authentication System for Classified Documents
...Show More Authors

             In this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
Proceedings Of The Future Technologies Conference (ftc) 2018
Using Mouse Dynamics for Continuous User Authentication
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
symmetric analysis of multiple variables classified ranked orthogonal polynomials
...Show More Authors

MCA has gained a reputation for being a very useful statistical method for determining the association between two or more categorical variables and their graphical description. For performance this method, we must calculate the singular vectors through (SVD). Which is an important primary tool that allows user to construct a low-dimensional space to describe the association between the variables categories. As an alternative procedure to use (SVD), we can use the (BMD) method, which involves using orthogonal polynomials to reflect the structure of ordered categorical responses. When the features of BMD are combined with SVD, the (HD) is formed. The aim of study is to use alternative method of (MCA) that is appropriate with order

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Constructing a Software Tool for Detecting Face Mask-wearing by Machine Learning
...Show More Authors

       In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Student Conference On Research And Development
Feature extraction for co-occurrence-based cosine similarity score of text documents
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Constructing and Solving the System of Linear Equations Produced From LFSR Generators
...Show More Authors

 

Linear Feedback Shift Register (LFSR) systems are used  widely in stream cipher systems field. Any system of LFSR's which wauldn't be attacked must first construct the system of linear equations of the LFSR unit. In this paper methods are developed to construct a system of linear/nonlinear equations of key generator (a LFSR's system) where the effect of combining (Boolean) function of LFSR is obvious. Before solving the system of linear/nonlinear equations by using one of the known classical methods, we have to test the uniqueness of the solution. Finding the solution to these systems mean finding the initial values of the LFSR's of the generator. Two known generators are used to test and apply the ideas of the paper,

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 22 2021
Journal Name
Samarra Journal Of Pure And Applied Science
Toward Constructing a Balanced Intrusion Detection Dataset
...Show More Authors

Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Constructing a Scale of Emotional Adjustment among Kindergarten Children
...Show More Authors

The aim of the current research is to construct a scale of emotional adjustment for kindergarten children and to set a standard for its evaluation. To achieve this, a scale consisting of (19) items was prepared. The mother of the child answered by adopting the method of self-report, which is expressed in the form of reporting terms, as each item represents a situation in the child's life and each situation has three alternatives to answer that represent various responses to the mentioned situation. One of the alternatives represents the emotionally adaptive response, which is given a degree (3), the second response expresses the emotional adjustment partly that took the degree of (2), and the third response expresses the weakness of emot

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
The Inauguration of Faisal Bin Al -husain as Iraq King (A Study of British Documents)
...Show More Authors

Husain as a king of Iraq.
This paper deals with the British communication with faisel . then Winston Churchill's speech in British common house .then fodlowed by arriving faisal to Iraq after that the referend um faisel .
The his claims of British maneuver lastly coronation on faisal & his inauguration as a king of Iraq.

View Publication Preview PDF
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus