In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreTo evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult
... Show MoreMassive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association
... Show MoreBackground: This in vitro study was carried out to evaluate the effect of various endodontic irrigants (sodium hypochlorite, ethylene diaminetetracetic acid and normal saline) on sealing ability of (Biodentine, mineral trioxide aggregate, and amalgam) used to repair furcal perforations. Material and methods: One hundred and twenty extracted human molars with divergent roots were used in this study. A standard root canal access cavity was prepared in each tooth and furcal perforation was made and was standardized by using k file size 100 instrument to get a perforation of (1.32mm) in diameter .The teeth were randomly divided in to three groups of 40 teeth according to the type of material used to repair the perforations (Group A: The furcal
... Show MoreThis research sheds light on the development that has occurred on the use of press pictures in the Iraqi press by analyzing the form and content of the images used in (Al-Sabaah) newspaper for the 2012 model. The researcher's interest in this topic for what represented by the press picture of a way to highlight and attract the reader's attention to the substance journalist who represents the goals behind the newspaper publishing.
This research is divided into three sections. The first one dealt with the methodological framework of the research, and the second part addressed the aspect of press pictures and its history and technological development, while the third section devoted to the study of the development of the form and co
... Show MoreThe research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show MoreThe UN plans to achieve several development objectives by 2030. These objectives address global warming, a major issue. This method aims to improve sustainable accounting performance (AP). In this circumstance, AI is being applied in various fields, notably in economic, social, and environmental (ESE) domains. This research investigates how sustainable development (SD) influences AI methodologies and AP improvement. The research examined a sample of Iraqi banks listed on the Iraq Stock Exchange from 2014 to 2022. AI was measured by ATM and POS prevalence. A three-dimensional approach examined economic, social, and environmental (ESE) sustainability. Meanwhile, the performance of sustainable accounting was measured through the return on asse
... Show More