One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures, it will be more difficult to attain greater verification accuracy. On the other hand, the characteristics of Arabic signatures are not very clear and are subject to a great deal of variation (features’ uncertainty). To address this issue, the suggested work offers a novel method of verifying offline Arabic signatures that employs two layers of verification, as opposed to the one level employed by prior attempts or the many classifiers based on statistical learning theory. A static set of signature features is used for layer one verification. The output of a neutrosophic logic module is used for layer two verification, with the accuracy depending on the signature characteristics used in the training dataset and on three membership functions that are unique to each signer based on the degree of truthiness, indeterminacy, and falsity of the signature features. The three memberships of the neutrosophic set are more expressive for decision-making than those of the fuzzy sets. The purpose of the developed model is to account for several kinds of uncertainty in describing Arabic signatures, including ambiguity, inconsistency, redundancy, and incompleteness. The experimental results show that the verification system works as intended and can successfully reduce the FAR and FRR.
The photostabilization? of poly vinyl chloride (PVC) ? films has been investigated by using diamine derivatives. The? (PVC) films were? contained 0.5% weight? of diamine derivatives which prepared by the method of casting. The photostabilizations? ?of these compounds were determined by monitoring the carbonyl index value with irradiation time. Also, the effect ?of concentrations of additives (range 0.1-0.5wt) on the rate of photostabilization? process was studied. Therefore we found? that a increased photostabilization rates was increase with increasing? concentrations of compound. Besides, the influence? on film thickness? of photostabilization process was also studied; ?and the results? showed that? the increasing of film thickness incr
... Show MoreIn this article, we will present a quasi-contraction mapping approach for D iteration, and we will prove that this iteration with modified SP iteration has the same convergence rate. At the other hand, we prove that the D iteration approach for quasi-contraction maps is faster than certain current leading iteration methods such as, Mann and Ishikawa. We are giving a numerical example, too.
Abstract
An optoelectronic system for fog detection and visibility technique is presented .The idea of this research is based on the measurement of the atmospheric visibility by using an infrared beam emitter from LED diode. The optical scattering is used as a method to calculate the visibility. This method is applied at forward scattering within a foggy atmosphere, which is modern and has great importance for measuring visibility in seaports, airports, public roads and highways. In this paper we focus on the description of the system, principles of its operation and some results of field tests.
Keywords: fog sensor, visibility sensor, backscattering, forward scattering.
Abstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the exp
... Show MoreCeramic art associated with urban growth in the cities, it overlapped with architectural construction, the increasing of population, urban growth, knowledge, and civilization was considered ceramic arts as an important aesthetically architecturally complement in the cities, including those in the squares and architectural institutions in the city of Baghdad .the title (Ceramic Art and Urban Planning in the City of Baghdad) the problem was its wonders : 1- Does ceramic monuments suited their locations in the city of Baghdad with the architectural planning urban of the city.2- Does the recipient interacted with these monuments and the reasons of their existence. Then the aim: knowing the relationship of the ceramic monuments with the urban
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach