Preferred Language
Articles
/
BBdbVZEBVTCNdQwCwpXz
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures, it will be more difficult to attain greater verification accuracy. On the other hand, the characteristics of Arabic signatures are not very clear and are subject to a great deal of variation (features’ uncertainty). To address this issue, the suggested work offers a novel method of verifying offline Arabic signatures that employs two layers of verification, as opposed to the one level employed by prior attempts or the many classifiers based on statistical learning theory. A static set of signature features is used for layer one verification. The output of a neutrosophic logic module is used for layer two verification, with the accuracy depending on the signature characteristics used in the training dataset and on three membership functions that are unique to each signer based on the degree of truthiness, indeterminacy, and falsity of the signature features. The three memberships of the neutrosophic set are more expressive for decision-making than those of the fuzzy sets. The purpose of the developed model is to account for several kinds of uncertainty in describing Arabic signatures, including ambiguity, inconsistency, redundancy, and incompleteness. The experimental results show that the verification system works as intended and can successfully reduce the FAR and FRR.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
25th Gis Research Uk Conference
VGI data collection for supplementing official land administration systems
...Show More Authors

This article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.

Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposed Audit Program for Automated Clearing House System (ACH)
...Show More Authors

إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة  بين  المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ

... Show More
View Publication
Crossref
Publication Date
Thu Mar 04 2021
Journal Name
Journal Of Craniofacial Surgery
Outcome Assessment for Surgical Reconstruction of Mandibular Continuity Defects
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Polar Gap Properties for Neutron StarWithin Light Cylinder Limits
...Show More Authors

The huge magnetic fields of neutron star cause the nuclei of the stellar surface to form a tightly bound condensed layer. In this research some characteristics of polar gap and magnetosphere enclosed the star according to Sturrock Model were illustrated, positrons move out along the open field lines, and electrons flow to the stellar surface as in the related to Sturrock model. The magnetic field within polar gap areas, which is defined by the Irvin Radius (RL) decreases due to the expansion of the polar, resulting from the physical motion of the accreted material. The values of height gap at different distances from the star were estimated. The obtained results improve the most energetic positrons those with E? Emax radiate away their ener

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Al-arbaeen Al-boldniy for Ibin Asker Historical Study
...Show More Authors

Fortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Iraqi Journal Of Physics
Toxic Gas Response for Nanostructured Cobalt Oxide Thin Films
...Show More Authors

 The gas sensing properties of undoped Co3O4 and doped with Y2O3 nanostructures were investigated. The films were synthesized using the hydrothermal method on a seeded layer. The XRD, SEM analysis and gas sensing properties were investigated for the prepared thin films. XRD analysis showed that all films were polycrystalline, of a cubic structure with crystallite size of (12.6) nm for cobalt oxide and (12.3) nm for the Co3O4:6% Y2O3. The SEM analysis of thin films indicated that all films undoped Co3O4 and doped possessed a nanosphere-like structure.

The sensi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 04 2014
Journal Name
International Journal Of Current Engineering And Technology
The Mechanisms of AC-conductivity for Ge0.4Te0.6 Thin Films
...Show More Authors

The Ge0.4Te0.6 alloy has been prepared. Thin films of Ge0.4Te0.6 has been prepared via a thermal evaporation method with 4000A thickness, and rate of deposition (4.2) A/sec at pressure 2x10-6 Torr. The A.C electrical conductivity of a-Ge0.4Te0.6 thin films has been studied as a function of frequency for annealing temperature within the range (423-623) K, the deduced exponent s values, was found to decrease with increasing of annealing temperature through the frequency of the range (102-106) Hz. It was found that, the correlated barrier hopping (CBH) is the dominant conduction mechanism. Values of dielectric constant ε1 and dielectric loss ε2 were found to decrease with frequency and increase with temperature. The activation energies have

... Show More
Preview PDF
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Interdisciplinary Mathematics
Enforcement for the partition (7, 7, 4; 0, 0)
...Show More Authors

View Publication
Scopus (17)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Quality of Life Assessment for Patients with Colorectal Cancer
...Show More Authors

Abstract A descriptive study to assess the quality of life (QOL) for patients with colorectal cancer. The study was conducted from Baghdad Teaching Hospital, Al-Yarmouk Teaching Hospital and Radiation Hospital and Nuclear medicine for the period from 1st July/2004 to 1st September/2004. The sample selected by purposive random of (50) patients diagnosed with colorectal cancer and all of them who were under chemotherapy treatment. A questionnaire was prepared for the purpose of the study and comprised of three parts including: 1- Socio-demographical characteristics. 2- Clinical characteristics. 3- and QOL

... Show More
View Publication Preview PDF