In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.
Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
Criticism is inherently impolite and a face-threatening act generally leading to conflicts among interlocutors. It is equally challenging for both native and non-native speakers, and needs pre-planning before performing it. The current research examines the production of non-institutional criticism by Iraqi EFL university learners and American native speakers. More specifically, it explores to what extent Iraqi EFL learners and American native speakers vary in (i) performing criticism, (ii) mitigating criticism, and (iii) their pragmatic choices according to the contextual variables of power and distance. To collect data, a discourse-completion task was used to elicit written data from 20 Iraqi EFL learners and 20 American native speaker
... Show MoreThe present paper applies Fanon Psychological reading of the problem of the Black introduced in his book Black Skin White Mask to Crooks, The black Character in John Steinbeck’s Of Mice and Men. The analysis of this character infers three essential points regarding the artistic achievement of the author. First, he uses a fictional character that offers a psychological interpretation of the black problem of alienation and loneliness in a way that does not disgrace the black. Second, he applies Fanon’s way of showing the various attitudes that the black adopts in contact with the white society. Third, he affirms that the black inferiority complex comes as a result of double proc
... Show MoreThe natural polyphenolic compound that cinnamon contains is well known for its various biological activities, a broad variety of pharmacological and therapeutic properties. Diversified biomedical and pharmacological applications benefit from organic nanoparticles with controlled properties. Bioactive and non-toxic, cinnamon nanoparticles (CNPs) can be effective antibacterial agents. Driven by this idea, we prepared spherical CNPs using liquid (PLAL) pulse laser ablation technique and defined those NPs. Using Q-switched Nd : YAG With a wavelength of 1064 nm pulse laser of constant energy 500 mj , And different laser pulses ( 250 , 500 , 750 , 1000 ) pulse /sec a pure cinnamon target submerged in
... Show MoreThe enhancement of heat exchanger performance was investigated using dimpled tubes tested at different Reynolds numbers, in the present work four types of dimpled tubes with a specified configuration manufactured, tested and then compared performance with the smooth tube and other passive techniques performance. Two dimpled arrangements along the tube were investigated, these are inline and staggered at constant pitch ratio X/d=4, the test results showed that Nusselts number (heat transfer) of the staggered array is higher than the inline array by 13%. The effect of different depths of the dimple (14.5 mm and 18.5 mm) has been also investigated; a tube with large dimple diameter enhanced the Nusselts number by about 25% for the ran
... Show More