In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.
Background: Colorectal cancer (CRC) is one of the top ten most common cancers worldwide. There are multiple risk factors for CRC, one of which is aging. However, in recent years, CRC has been reported in children. Objective: To describe the main characteristics and symptoms of CRC as well as highlight pathologic data for early-onset CRC. Methods: 79 CRC patients were recruited from the Oncology Teaching Hospital in the period February–December 2022. A questionnaire was used to collect demographic and clinical data. Results: 25 (31.6%) of patients were below 50 years of age. 52 (65.8%) patients had tumors in the colon. The most common symptom is bleeding per rectum in both age groups. There was no significant difference in patholog
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreThe treatment of migraine headache targets the neurovascular mechanism and involves the use of serotonin receptor antagonists. Some of these drugs are used for the treatment of acute attacks; while others are effective as prophylactic measures to decrease the duration and frequency of attacks. Pizotifen, a 5-HTA antagonist, is one of the prophylactic drugs for which the clinical use resulted in low outcomes in reducing migraine symptoms. Melatonin, a serotonin derived neurohormone, was reported to exert many functions like sleep induction, anti-inflammatory, neurovascular regulation, cytoprotection and modulation of neurotransmitter release. In the view of the involvement of serotonin in the pathophysiology of migraine a
... Show MoreThe aim of the present study is to investigate and compare the efficacy of L-carnitine, multivitamins and their combination therapies on semen characteristics in idiopathic male infertility. Idiophathic infertile patients were randomly divided into three groups who had received three different treatment regimens for three months: group A (45 patients) has received 2 grams daily of L-carnitine alone; group B (55 patients) had received the combination of L-carnitine (2 grams daily) plus one tablet daily of multivitamins (Stresstabs®); and group C (29 patients) had received one tablet daily of multivitamins alone. The study was started on 1/11/2009 and completed on 31/3/2010 and performed at Rizgari Teaching Hospital in
... Show MoreIn this study, the optimum conditions for COD removal from petroleum refinery wastewater by using a combined electrocoagulation- electro-oxidation system were attained by Taguchi method. An orthogonal array experimental design (L18) which is of four controllable parameters including NaCl concentration, C.D. (current density), PH, and time (time of electrolysis) was employed. Chemical oxygen demand (COD) removal percentage was considered as the quality characteristics to be enhanced. Also, the value of turbidity and TDS (total dissolved solid) were estimated. The optimum levels of the studied parameters were determined precisely by implementing S/N analysis and analysis of variance (ANOVA). The optimum conditions were found to be NaCl = 2.5
... Show MoreThe present work was done in an attempt to build systematic procedures for treating warts by 810 nm diode laser regarding dose parameters, application parameters and laser safety. The study was done in Al- Kindy Teaching Hospital in Baghdad, Iraq during the period from 1st October 2003 till 1st April 2004. Fifteen patients completed the treatment and they were followed for the period of 3 months. Recalcitrant and extensive warts were selected for the study. Patients were randomly divided into 3 groups to be treated by different laser powers 9, 12 and 15 W, power density of 286 W/cm2, 381W/cm2, 477 W/cm2 pulse duration of 0.2 s, interval of 0.2 s and repeated pulses were used. The mode of application was either circular or radial. Pain oc
... Show MoreThe Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr