Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual information (MI), along with analysis of variance (ANOVA) for feature selection. Two iris classification systems were developed: one using LDA as an input for the OneR machine learning algorithm and another innovative hybrid model based on a One Dimensional Convolutional Neural Network (HM-1DCNN). The MMU database was employed, achieving a performance measure of 94.387% accuracy for the OneR model. Additionally, the HM-1DCNN model achieved 99.9% accuracy by integrating LDA with MI and ANOVA. Comparisons with previous studies show that the HM-1DCNN model performs exceptionally well, with at least 1.69% higher accuracy and lower processing time.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique, Omar Jihad Banawi*, Raghad
An application of neural network technique was introduced in modeling the point efficiency of sieve tray, based on a
data bank of around 33l data points collected from the open literature.Two models proposed,using back-propagation
algorithm, the first model network consists: volumetric liquid flow rate (QL), F foctor for gas (FS), liquid density (pL),
gas density (pg), liquid viscosity (pL), gas viscosity (pg), hole diameter (dH), weir height (hw), pressure (P) and surface
tension between liquid phase and gas phase (o). In the second network, there are six parameters as dimensionless
group: Flowfactor (F), Reynolds number for liquid (ReL), Reynolds number for gas through hole (Reg), ratio of weir
height to hole diqmeter
Artificial Neural Network (ANN) model's application is widely increased for wastewater treatment plant (WWTP) variables prediction and forecasting which can enable the operators to take appropriate action and maintaining the norms. It is much easier modeling tool for dealing with complex nature WWTP modeling comparing with other traditional mathematical models. ANN technique significance has been considered at present study for the prediction of sequencing batch reactor (SBR) performance based on effluent's (BOD5/COD) ratio after collecting the required historical daily SBR data for two years operation (2015-2016) from Baghdad Mayoralty and Al-Rustamiya WWTP office, Iraq. The prediction was gotten by the application of a feed-forwa
... Show MoreThe aim of this research is to demonstrate the nature of the interactive relationship between the dimensions of the requirements of economic intelligence Represented by(Administrative and regulatory requirements, human requirements, and technical requirements) The strategic success of banks is represented by (Customer satisfaction, customer confidence, quality of service, growth) In three of the Iraqi banks own bank(Middle East Iraqi Investment, Al Ahli Iraqi, Gulf Commercial), The questionnaire was adopted as a tool for collecting data and information Of the sample (85) Who are they(Director of the Commissioner, M. Director Plenipotentiary, Director of Department, Director of Section, M. Section Manager, Division Officer, Unit Officer),
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreEnergy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreSome maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.