In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by increasing their detection rate and reducing their error rate compared to FT feature.
Background: Radiopacity is one of the prerequisites for dental materials, especially for composite restorations. It's essential for easy detection of secondary dental caries as well as observation of the radiographic interface between the materials and tooth structure. The aim of this study to assess the difference in radiopacity of different resin composites using a digital x-ray system. Materials and methods: Ten specimens (6mm diameter and 1mm thickness) of three types of composite resins (Evetric, Estelite Sigma Quick,and G-aenial) were fabricated using Teflon mold. The radiopacity was assessed using dental radiography equipment in combination with a phosphor plate digital system and a grey scale value aluminum step wedge with thickness
... Show MoreDevelopments are carried out to enhance the performance of vertical axis wind turbines (VAWT). This paper studies the performance of the ducted wind turbine with convergent duct (DAWT). Basically, the duct technique is utilized to provide the desired wind velocity facing the turbine. Methodology was developed to estimate the decisive performance parameter and to present the effect of the convergent duct with different inlet angles. The ducted wind turbine was analyzed and simulated using MATLAB software and numerically using ANSYS-Fluent 17.2. Result of both approaches were presented and showed good closeness for the two cases of covering angles 12 and 20 respectively. Results also showed that the convergent duct with an inlet angl
... Show MoreThe Cu(II) was found using a quick and uncomplicated procedure that involved reacting it with a freshly synthesized ligand to create an orange complex that had an absorbance peak of 481.5 nm in an acidic solution. The best conditions for the formation of the complex were studied from the concentration of the ligand, medium, the eff ect of the addition sequence, the eff ect of temperature, and the time of complex formation. The results obtained are scatter plot extending from 0.1–9 ppm and a linear range from 0.1–7 ppm. Relative standard deviation (RSD%) for n = 8 is less than 0.5, recovery % (R%) within acceptable values, correlation coeffi cient (r) equal 0.9986, coeffi cient of determination (r2) equal to 0.9973, and percentage capita
... Show MoreThis study concerns the removal of a trihydrate antibiotic (Amoxicillin) from synthetically contaminated water by adsorption on modified bentonite. The bentonite was modified using hexadecyl trimethyl ammonium bromide (HTAB), which turned it from a hydrophilic to a hydrophobic material. The effects of different parameters were studied in batch experiments. These parameters were contact time, solution pH, agitation speed, initial concentration (C0) of the contaminant, and adsorbent dosage. Maximum removal of amoxicillin (93 %) was achieved at contact time = 240 min, pH = 10, agitation speed = 200 rpm, initial concentration = 30 ppm, and adsorbent dosage = 3 g bentonite per 1L of pollutant solution. The characterization of the adsorbent, modi
... Show MoreIn this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption. No significant effect of initial Cd concentration on the removal efficiency of cadmium b
... Show MoreStatic Synchronous Series Compensator (SSSC) is a well known device for effectively regulating the active power flow in a power system. In this paper, the SSSC linearized power flow equations are incorporated into Newton-Raphson algorithm in a MATLAB written program to investigate the control of active poweer flow and the transient stability of a five bus and a thirty bus IEEE test systems, during abnormal conduction (three phase fault near buses). A comparison of the results obtained for the base case without SSSC and with it to investigate the effectiveness of the device on both of the active power flow and the transient stability.
An electrolytic process for the removal of Zn(II) from aqueous solution using a parallel amalgamated copper screens cathode operated in the flow through mode is proposed. The current-potential curves recorded at a rotating amalgamated copper disc electrode were used to determine diffusion coefficient of Zn(II). The performance of electrolytic reactor was investigated by using different flow rates at initial zinc ion concentration(48 mg/L). Taking into account the residential Zn(II) concentration, the best results were obtained for cathode potential of (-1.35 V vs. SCE) at flow rate (320 L/h). Zinc ion concentration was found to decrease from 48 mg/L to 1 mg/L during 120 min. of electrolysis. The experimental data are well correlate
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreIn this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q, this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo
... Show More