In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreObjective: Many studies focused on clinical cases such as ovariohysterectomy of bitches and scarcely mentioned the histological features. The present study describes the cytoarchitecture characteristics of a local dog’s mature adult reproductive tract. Materials and Methods: Sixteen samples of uterus and cervix were obtained from local breed bitches to conduct this study. The organs were processed according to routine histopathological protocol and stained with hematoxylin and eosin, Masson’s trichrome, and combined Alcian blue (2.5 pH) and PAS (AB-PAS) stains. Results: The mature endometrium formed numerous short epithelial folds and epithelial crypts composed of mucous cells and cuboidal cells. The core of the endometrium is c
... Show MoreFree radicals and oxidative damage caused by them have being suggested to be involved in the pathogenesis of migraine. These may result from distorted equilibrium of pro-oxidant/anti-oxidant system that continuously generates and detoxifies oxidants during normal aerobic metabolism. Escape of such system from equilibrium leads to damage of cellular elements with the depletion of cellular stores of anti-oxidants material such as glutathione and vitamin E. Therefore, free radical scavengers (vitamin E or melatonin) seems to be of potential benefit as prophylactic anti-migraine therapy by neutralizing free radicals overproduction and possibly preventing formation of highly toxic intermediates (such as nitric oxide). In addition of being pow
... Show MoreHypertension is a major health problem throughout the world because of its high prevalence and its association with increased risk of cardiovascular diseases. It is defined as systolic blood pressure ≥ 140 mmHg and/or diastolic blood pressure ≥ 90 mmHg. The aim of this study was to compare the efficacy, safety and cardiovascular disease risk lowering ability, of three antihypertensive drug regimens.
A retrospective study was carried out on 66 hypertensive patients, divided in to three groups based on their antihypertensive drug regimens (ACE inhibitors, β-blockers treated and combination antihypertensive therapy, the combination therapy consist of two or more of the following antihypertensive drugs ACE inhibitor di
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More1.Chapter I (systematic framework) which includes: the research problem and the importance of the research, the need for it, the goals of the research, the temporal &spatial boundaries, determine the terms and defined procedurally.2.Chapter II - the theoretical framework: It consists of three sections are:•The first topic:- the concept of references and experimentation in the theater. •The second topic:- the director of academic and experimentation in Iraq. Two paragraphs in this section came after the introduction, in first paragraph to talk about the Iraqi theater academic and experimentation, and in the second paragraph the researcher spoke about the academic director of the Iraqi and experimentation. 3.Chapter III - Actions -
... Show MoreTo translate sustainable concepts into sustainable structure, there is a require a collaborative work and technology to be innovated, such as BIM, to connect and organize different levels of industry e.g. decision-makers, contractors, economists, architects, urban planners, construction supplies and a series of urban planning and strategic infrastructure for operate, manage and maintain the facilities. This paper will investigate the BIM benefits as a project management tool, its effectiveness in sustainable decision making, also the benefit for the local industry key stakeholders by encouraging the BIM use as a project management tool to produce a sustainable building project. This p
A new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show More