Preferred Language
Articles
/
tRcJPo8BVTCNdQwCaGSe
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.

Publication Date
Fri Jul 01 2022
Journal Name
Nternational Journal Of Special Education
Comparative Study between a Combination of Plants Extracts and Drugs on Thyroid Hormones and Lipid Profile in Experimental Animals
...Show More Authors

The thyroid gland is a vital part of the overall endocrine system, which is regulated some of body function as oxygen use, basal metabolic rate, growth, cellular metabolism and development This study shed light on a number of extracts that have been shown to have beneficial effects on the thyroid and its function, as well as the various factors linked to thyroid dysfunction. The experiment was conducted to determine the effect of a mixture of two extracts of "Fucus vesiculosus (150 mg/ kg) with Coleus forskohlii (1000 mg/ kg) and Rosmarinus officinalis (220 mg/ kg) with Camellia sinensis (1.25 mg/ kg)" on thyroid hormones as well as lipids profile and tested the effectiveness of two drugs one of them stimulates the hormones of the thyroid (

... Show More
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Technical features of the Islamic and Chinese ceramics
...Show More Authors

Eat this research study features Technical Ceramics Islamic and Chinese The study of four chapters , such as the first chapter the general framework for research and containing the problem that put the following question: Mamdy effect features art on porcelain Islamic and Chinese ) , and whether there are dimensions of the aesthetic , intellectual and ideological in porcelain Islamic and Chinese with lies the importance of research in the promise of a qualitative study and add a scientific theme features art in porcelain Islamic and China , and the objectives of this study One was in the detection of features technical Ceramics Islamic and Chinese study examined the length of time the ninth century AD , and the tenth century AD , and in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Architectural and Planning Features of Derna (Central Region)
...Show More Authors

The city of Derna has distinctive architectural and architectural features, like other Arab and Islamic cities in the Arab West and North Africa. Its markets and shops have taken many different forms and structural forms within the urban fabric of the central commercial zone. The meeting between the various commercial and handicraft jobs and consumers within a spatial area starting with the old markets of the dark market and the agency of the harvest and vegetable market and the mosque of the old and the square of the mosque and the Red Square and the square Kharazin. It then grew linearly towards commercial hubs that were associated with the city's expansion axes. Old markets represent the architectural and planning heritage associated

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Evaluation of user interface designs in official websites "Fine Art Colleges Model"
...Show More Authors

I found that it does not meet some of the requirements, including browsing and organizing structural elements, which is something in which the researcher found a scope for research, and from here she can formulate the problem of her research with the following question: Is there an actual need to develop user interface designs in the websites of Iraqi colleges of fine arts? The research included four chapters (the first chapter - the research problem - the second chapter (theoretical framework), which included three sections, the first is to identify the user interface, the second topic is the structural elements, and the third topic includes the rules of interface design and the dimensions of interaction), as well as the third chapter i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
A Ranked-Aware GA with HoG Features for Infant Cry Classification
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Arab World English Journal
Aggressive Language in Literature: A Pragmatic Approach
...Show More Authors

Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Using a novel approach to determine the pore pressure of West Qurna 15 oil well in South of Iraq
...Show More Authors

Pore pressure means the pressure of the fluid filling the pore space of formations. When pore pressure is higher than hydrostatic pressure, it is named abnormal pore pressure or overpressure. When abnormal pressure occurred leads to many severe problems such as well kick, blowout during the drilling, then, prediction of this pressure is crucially essential to reduce cost and to avoid drilling problems that happened during drilling when this pressure occurred. The purpose of this paper is the determination of pore pressure in all layers, including the three formations (Yamama, Suliay, and Gotnia) in a deep exploration oil well in West Qurna field specifically well no. WQ-15 in the south of Iraq. In this study, a new appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
A Study the Effect of TiO2 Nanoparticles Combination with Antibiotics and Plant extracts Against Some Gram Negative Bacteria
...Show More Authors

Titanium dioxide TiO2 has been widely utilized in cleaning and sterilizing material for many clinical tools sanitary ware, food tableware and cooking and items for use in hospitals. Titanium dioxide TiO2 non toxicity and long term physical and chemical stability. It has been widely used decomposition of organic compounds and microbial organisms such as cancer cell, viruses and bacteria as well as its potential application in sterilization of medical devices. The aim of the study the effect of titanium dioxide TiO2 on some Gram negative bacteria and study their effects on some virulence factors and chromosomal DNA.In this study, we obtained (E. coli ? Proteus mirabilis, Proteus vulgaris ? Pseudomonas aeruginosa ? Klebsiella pneumonia and Ac

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 02 2020
Journal Name
Journal Of Applied Research In Higher Education
Proposal of a guide for talent evaluation and management based on a qualitative and three-staged approach
...Show More Authors
Purpose

The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.

Design/methodology/approach

The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty-three individuals from six Australian universities parti

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref