Preferred Language
Articles
/
sBcGPo8BVTCNdQwCJ2Rs
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identifies a user based on the analysis of his/her typing rhythm. This paper utilizes keystroke features including dwell time (DT), flight time (FT), up-up time (UUT), and a mixture of theses features as keystroke representation. The back propagation neural network is trained with the mean of keystroke timing information for each character of password. These times are used to discriminate between the authentic users and impostors. Results of the experiments demonstrate that the backpropagation network with UUT features comparable to combination of DT and FT. Also, the results of backpropagation with combination of DT, FT and UUT provide low False Alarm Rate (FAR) and False Reject Rate (FRR) and high accuracy.

Publication Date
Mon Sep 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimal Design of Cylinderical Ectrode Using Neural Network Modeling for Electrochemical Finishing
...Show More Authors

The finishing operation of the electrochemical finishing technology (ECF) for tube of steel was investigated In this study. Experimental procedures included qualitative
and quantitative analyses for surface roughness and material removal. Qualitative analyses utilized finishing optimization of a specific specimen in various design and operating conditions; value of gap from 0.2 to 10mm, flow rate of electrolytes from 5 to 15liter/min, finishing time from 1 to 4min and the applied voltage from 6 to 12v, to find out the value of surface roughness and material removal at each electrochemical state. From the measured material removal for each process state was used to verify the relationship with finishing time of work piece. Electrochemi

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Diagnosing COVID-19 Infection in Chest X-Ray Images Using Neural Network
...Show More Authors

With its rapid spread, the coronavirus infection shocked the world and had a huge effect on billions of peoples' lives. The problem is to find a safe method to diagnose the infections with fewer casualties. It has been shown that X-Ray images are an important method for the identification, quantification, and monitoring of diseases. Deep learning algorithms can be utilized to help analyze potentially huge numbers of X-Ray examinations. This research conducted a retrospective multi-test analysis system to detect suspicious COVID-19 performance, and use of chest X-Ray features to assess the progress of the illness in each patient, resulting in a "corona score." where the results were satisfactory compared to the benchmarked techniques.  T

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 06 2025
Journal Name
Aip Conference Proceedings
Solving 5th order nonlinear 4D-PDEs using efficient design of neural network
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Detection of Autism Spectrum Disorder Using A 1-Dimensional Convolutional Neural Network
...Show More Authors

Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (17)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Heliyon
A comprehensive review on modelling the adsorption process for heavy metal removal from waste water using artificial neural network technique
...Show More Authors

View Publication Preview PDF
Scopus (41)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (2)
Scopus
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Solution of the electromechanical machining problem using the collocation method based on Bernstein polynomials
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The classification of fetus gender based on fuzzy C-mean using a hybrid filter
...Show More Authors

This paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Approximate Solution of Delay Differential Equations Using the Collocation Method Based on Bernstien Polynomials???? ???????? ????????? ????????? ????????? ???????? ?????????? ???????? ??? ??????? ???? ?????????
...Show More Authors

In this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref