In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.
To get access into the orbital floor 3 paths are commonly used which are transconjunctival, subciliary and subtarsal approaches. Each one of these approaches has its advantages and disadvantages. The study assessed the outcomes of the transconjunctival retroseptal approach, which reflects our experience in this type of surgery. Along 8 years, 26 patients received in the emergency room diagnosed with pure isolated orbital floor fractures, all of them admitted to the maxillofacial surgery department and approached by transconjunctival incision without lateral canthotomy. Three types of complications occurred: laceration of the lower eyelid, injury to the lacrimal system and entropion. All of these complications were managed accordingly with n
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreThe study of the language through the prophetic curriculum in general and the semantics in particular through the books of Professor Abdul Salam Yassin, may God have mercy on him and the most distinctive linguistic phenomena, and then study semantics and the most prominent methods that reveal the emotions dominated by this study to indicate the semantics of religious terms In this research we try to dive into the sea of significance to know the relationship between the words and their connotations, and to monitor aspects of semantic development, although we have left non-essential words in order to avoid lengthening. N or three and sometimes Aguetsarna on one example we thought it was enough to clarify the meaning.
This paper aims to evaluate the reliability analysis for steel beam which represented by the probability of Failure and reliability index. Monte Carlo Simulation Method (MCSM) and First Order Reliability Method (FORM) will be used to achieve this issue. These methods need two samples for each behavior that want to study; the first sample for resistance (carrying capacity R), and second for load effect (Q) which are parameters for a limit state function. Monte Carlo method has been adopted to generate these samples dependent on the randomness and uncertainties in variables. The variables that consider are beam cross-section dimensions, material property, beam length, yield stress, and applied loads. Matlab software has be
... Show MoreThis study seeks to highlights on the behavioral approach in organization theory as modern and effective entrance in constructing this theory and reflection extent on the behavior of both the product and the information user (accountant and financial information).
The study also focus on behavioral approach role in consolidating accounting concepts through making harmony between them so that the accountant can influence the user behavior with the concepts and principles of accounting in an effort to provide quality characteristic of accounting information produced by him in consistent with his behavior and information user and its impact on the decision making process by the latter.
... Show MoreThe minimum approaches distance of probing electrons in scanning electron microscope has investigated in accordance to mirror effect phenomenon. The analytical expression for such distance is decomposed using the binomial expansion. With aid of resulted expansion, the distribution of trapped electrons within the sample surface has explored. Results have shown that trapped electron distributes with various forms rather an individual one. The domination of any shape is mainly depend on the minimum approaches distance of probing electrons
Tremendous efforts have been exerted to understand first language acquisition to facilitate second language learning. The problem lies in the difficulty of mastering English language and adapting a theory that helps in overcoming the difficulties facing students. This study aims to apply Thomasello's theory of language mastery through usage. It assumes that adults can learn faster than children and can learn the language separately, and far from academic education. Tomasello (2003) studied the stages of language acquisition for children, and developed his theory accordingly. Some studies, such as: (Ghalebi and Sadighi, 2015, Arvidsson, 2019; Munoz, 2019; Verspoor and Hong, 2013) used this theory when examining language acquisition. Thus,
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show More