Preferred Language
Articles
/
tRcJPo8BVTCNdQwCaGSe
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.

Publication Date
Mon Sep 07 2020
Journal Name
Environmental Science And Pollution Research
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

View Publication
Scopus (33)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Parametric Nonlinear Programming Approach with Fuzzy Queues Using Hexagonal Membership Functions
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
Online medical consultation: covid-19 system using software object-oriented approach
...Show More Authors

The internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. O

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 01 2025
Journal Name
Algorithms
Three-Dimensional Object Recognition Using Orthogonal Polynomials: An Embedded Kernel Approach
...Show More Authors

Computer vision seeks to mimic the human visual system and plays an essential role in artificial intelligence. It is based on different signal reprocessing techniques; therefore, developing efficient techniques becomes essential to achieving fast and reliable processing. Various signal preprocessing operations have been used for computer vision, including smoothing techniques, signal analyzing, resizing, sharpening, and enhancement, to reduce reluctant falsifications, segmentation, and image feature improvement. For example, to reduce the noise in a disturbed signal, smoothing kernels can be effectively used. This is achievedby convolving the distributed signal with smoothing kernels. In addition, orthogonal moments (OMs) are a cruc

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Separation And Purification Technology
Application of central composite design approach for optimisation of zinc removal from aqueous solution using a Flow-by fixed bed bioelectrochemical reactor
...Show More Authors

View Publication
Scopus (18)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Separation And Purification Technology
Application of central composite design approach for optimisation of zinc removal from aqueous solution using a Flow-by fixed bed bioelectrochemical reactor
...Show More Authors

View Publication
Scopus (18)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Sep 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Nugget mechanical properties of combination (rectangular and round) welded and soldered stainless steel wires
...Show More Authors

Background: This study aimed to compare the mechanical properties between four groups of newly fabricated combination wires according to their method of union, according to the gauges of wires and a comparison were made between them and their originals. Materials and method: A total of 60 stainless steel combination wires were fabricated , divided into four groups according to gauge of wires and their method of union, each of them with 15 samples, the groups were welded (0.016x0.022-0.016 and 0.016x0.022-0.018) and soldered (0.016x0.022-0.016 and 0.016x0.022-0.018), samples were made according to certain parameters which were : for the welded samples: length,weight, duration of pulsation and size of copper electrode tips used; for the sold

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Evaluation of Oroslippery Tablets Contain Irbesartan and Hydrochlorothiazide Combination for Dysphagia Patients
...Show More Authors

Oro slippery tablets (OSTs) is a technique used to improve swallowing of tablets for patients with dysphagia. The aim of this study was to formulate irbesartan and hydrochlorothiazide as Oroslippery tablets (OST) containing 150 mg irbesartan and 25 mg hydrochlorothiazide for dysphagia patients. A simple and rapid method of analysis was developed and validated according to the ICH guideline using HPLC with UV detector. Tablets were prepared by direct compression and then coated with the slippery coat of three different concentrations of the slippering substance “xanthan gum’ (2%, 3% and 4%) in Opadry Colorcone® and evaluated according to USP. Slipperiness test was performed using Albino rabbits. Results showed that 2% xanthan gum gav

... Show More
View Publication Preview PDF
Scopus Crossref