Preferred Language
Articles
/
BBdbVZEBVTCNdQwCwpXz
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures, it will be more difficult to attain greater verification accuracy. On the other hand, the characteristics of Arabic signatures are not very clear and are subject to a great deal of variation (features’ uncertainty). To address this issue, the suggested work offers a novel method of verifying offline Arabic signatures that employs two layers of verification, as opposed to the one level employed by prior attempts or the many classifiers based on statistical learning theory. A static set of signature features is used for layer one verification. The output of a neutrosophic logic module is used for layer two verification, with the accuracy depending on the signature characteristics used in the training dataset and on three membership functions that are unique to each signer based on the degree of truthiness, indeterminacy, and falsity of the signature features. The three memberships of the neutrosophic set are more expressive for decision-making than those of the fuzzy sets. The purpose of the developed model is to account for several kinds of uncertainty in describing Arabic signatures, including ambiguity, inconsistency, redundancy, and incompleteness. The experimental results show that the verification system works as intended and can successfully reduce the FAR and FRR.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Motives of Voluntary Work Among A Sample Of Volunteers
...Show More Authors

    This study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age,  job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).

The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Science And Research
How Do You Treat a Severely Resorbed Mandibular Ridge?
...Show More Authors

Abstract: Residual ridge resorption is chronic, progressive, irreversible and cumulative condition associated with teeth loss. Management of a residual ridge with severe resorption to fulfill the patient’s esthetic and functional requirements is quite difficult for the practitioner and also in the construction of an acceptable appliance. As the height of the edentulous ridge reduces the mandibular denture will be improperly function. Severe resorption of the mandibular alveolar ridge may cause instability and discomfort of the convention acrylic resin denture. Dealing with this condition requires clinical skills and knowledge. Treating the severely resorbed mandibular ridge is a challenging effort for prosthodontics. This research present

... Show More
Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Bas.j
PARATHYROID GLAND, ANATOM, HISTOLOGY, AND PHYSIOLOGY (A SHORT REVIEW)
...Show More Authors

Publication Date
Wed Sep 11 2024
Journal Name
International Journal Of Multidisciplinary Science And Advanced Technology
Superbugs (Multi Drug Resistant Bacteria to antibiotics): A Review
...Show More Authors

Preview PDF
Publication Date
Mon May 02 2022
Journal Name
Lark Journal
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Factors Affecting the Operation of a Fire Tube Boiler
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Negative skin friction evaluation and mitigation: A review study
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
The Fourth International Conference Of Linguistic Studies
A pragmatic study of refusals among Iraqi EFL learners
...Show More Authors

The speech act of refusals has been studied widely either alone or in relation to such areas as apology, requests, promotion, and invitation. The present study aims to investigate the strategies employed by Iraqi females in refusing marriage proposals. It attempts to explore their preferences to respond directly or indirectly in relation to their ages and educational background of the parents. The sample of the study consists of 25 participants; they are learners of English as a foreign language (EFL) at the College of Education for Women/ University of Baghdad. The data are collected by using a discourse completion task (DCT) followed by a follow up interview. The researchers used a Google form shared via emails to get responses from the p

... Show More