In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.
In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreIndustrial product is one of the things of daily use and direct interaction with the user, so the ranges of its association to the user, took a varied and multiple aspects. The user today sees the products as things have specifications related directly to the psychology of the user, so he can reflects his values, principles and ideas on the composition of the total structure of the product, making them a means by which manifested the internal entity's of the user took an external materiality. And then counting the products being things excite positive feelings among different user was a natural result given the complexity of the relationship between the user and the industrial product. So pleasure is one important effects that result fro
... Show MoreAbstract The research investigates in detail the fascinating story of its title character, which may work as an allegory for Africa itself in its past. Ama Ata Aidoo is miscellaneous writers who wrote in different literary genre like drama , short stories novel and , poetry and criticism . She is also an active feminist. Aidoo is against the colonial practice and its influence on African minds. Aidoo's play Anowa confronts painful issues in Africa's past, mostly those of the slave trade. She goes further to tackle issues of patriarchal domination and African feminism, like the relationships between individuals and society, women and motherhood, men and women, husbands and wives, mothers and daughters, and above all the future invasion
... Show MoreThe paper attempts to find out the elements of picaresque novel in selected English and Iraqi novels. It studies these elements in Henry Fielding’s Joseph Andrews and Adil Abduljabbar’s Arzal Hamad Al-Salim. The paper is divided into four sections. The first is an introduction to the picaresque novel. It gives a definition, a historical background, and the elements of the genre. The second section studies Fielding’s novel focusing on the elements of this type of novel and how it affects the story itself. The paper follows the novel from the beginning to the end showing these elements. The third is dedicated to Abduljabbar’s novel and how the elements of picaresque genre appear in the novel and play an important role in its developm
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreStrategies to reduce obesity have become main priority for many health institution and health staff around the world, as the prevalence of obesity has risen and exacerbated in most of the world mainly because of the modern life style which tend to be more sedentary with an increase eating unhealthy fast western food. Many years ago, the lipid-lowering drug simvastatin; and omega-3 were considered as a traditional lipid-lowering drug that have been well-documented to possess anti-inflammatory, cardioprotective and triglyceride-lowering properties; and their co-administration may demonstrate a complementary effect in lowering patients' triglycerides and total cholesterol to treat atherosclero
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper