Preferred Language
Articles
/
BBdbVZEBVTCNdQwCwpXz
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures, it will be more difficult to attain greater verification accuracy. On the other hand, the characteristics of Arabic signatures are not very clear and are subject to a great deal of variation (features’ uncertainty). To address this issue, the suggested work offers a novel method of verifying offline Arabic signatures that employs two layers of verification, as opposed to the one level employed by prior attempts or the many classifiers based on statistical learning theory. A static set of signature features is used for layer one verification. The output of a neutrosophic logic module is used for layer two verification, with the accuracy depending on the signature characteristics used in the training dataset and on three membership functions that are unique to each signer based on the degree of truthiness, indeterminacy, and falsity of the signature features. The three memberships of the neutrosophic set are more expressive for decision-making than those of the fuzzy sets. The purpose of the developed model is to account for several kinds of uncertainty in describing Arabic signatures, including ambiguity, inconsistency, redundancy, and incompleteness. The experimental results show that the verification system works as intended and can successfully reduce the FAR and FRR.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 04 2021
Journal Name
Medico-legal Update
Saliva of Tobacco Smokers a Profile of C3, IgA, Amylase and Total protein
...Show More Authors

Objective: The present study aimed to shed light on the role of narghileh and cigarette smoking on immunity status of oral cavity by assess (C3 complement component, Immunoglobulin A, Total protein, α-Amylase and EBV IgG antibody). Method: Saliva levels in two smokers groups the first include 28 narghileh smokers and the second include 32 narghileh and cigarette smokers as well as 30 non-smokers consider as control. Results: As compared control, the levels of C3, IgA and total protein were significantly decreased, and the highest decreased was observed in saliva of narghileh and cigarette smokers, the result was (C3= 0.400±0.194 µg vs. 9.728±3.561 µg; IgA= 2.460±0.492 mg/dl vs. 5.048±0.937 mg/dl; Total protein= 170.20±45.93 mg% vs.

... Show More
View Publication
Crossref
Publication Date
Mon Jul 04 2022
Journal Name
Al Mustansiriyah Journal Of Pharmaceutical Sciences
Bis-Schiff Bases of Isatin Derivatives Synthesis, and their Biological Activities: A Review
...Show More Authors

Isatin is a heterocyclic molecule that belongs to one of the most important classes of organic compounds known as indolines. Isatin, isatin analogs, and their Schiff bases have recently attracted a lot of attention in medicinal chemistry. Isatin, itself, shows various biological activities such as antiviral, anticancer, antimicrobial, anti-inflammatory, analgesic, antioxidant, and anticonvulsant. Bis- Schiff bases containing isatin moiety have been known to possess a wide spectrum of pharmacological activities. This review offers up-to-date information on the most active isatin bis-Schiff bases, which would include anticancer, antimicrobial, antiviral, anticonvulsant, anti-inflammatory, and analgesic activities. These observations c

... Show More
Crossref (9)
Crossref
Publication Date
Thu Jan 01 2026
Journal Name
South African Journal Of Chemical Engineering
Photoelectrocatalytic degradation of tetracycline by a novel Gr /Ni-Sb-SnO2 photo-anode
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Dec 04 2013
Journal Name
Proceedings Of Nuclei Of Seyfert Galaxies And Qsos - Central Engine & Conditions Of Star Formation — Pos(seyfert 2012)
Are Narrow Line Seyfert 1 galaxies a special class of Active Galactic Nuclei?
...Show More Authors

No. Due to their apparently extreme optical to X-ray properties, Narrow Line Seyfert 1s (NLSy1s) have been considered a special class of active galactic nuclei (AGN). Here, we summarize observational results from different groups to conclude that none of the characteristics that are typically used to define the NLSy1s as a distinct group – from the, nowadays called, Broad Line Seyfert 1s (BLSy1s) – is unique, nor ubiquitous of these particular sources, but shared by the whole Type 1 AGN. Historically, the NLSy1s have been distinguished from the BLSy1s by the narrow width of the broad Hb emission line. The upper limit on the full width at half maximum of this line is 2000kms−1 for NLSy1s, while in BLSy1s it can be of several thousands

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-ustath Journal For Human And Social Sciences
Landscape as History: A Postcolonial Ecopoetic Study of the Poetry of Derek Walcott
...Show More Authors

Abstract: As human history is implicated in landscape or the natural history, it can be stated that the origins of the Caribbean writers' conflict, in general, are the colonial history of West India. That history which tells the story behind not only their fragmented identity, but also the problems connected to their language as well. Building on the arguments of the prominent Postcolonial ecoccritics such as Elizabeth DeLoughrey, George Handley, Helen Tiffin, and Graham Huggan, this research analyzes selected poems by Derek Walcott's which are bounded in his volume, Collected Poems. It shows how the Caribbean history has been erased due to the brutality of colonization offering landscape as a reliable source which has recorded that history

... Show More
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Mechanical Science And Technology
Optimization of a rectangular pin fin using elliptical perforations with different inclination angles
...Show More Authors

View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Diyala Agricultural Sciences Journal
A Study of Some Biological Aspects of Pacu Piaractus Brachypomus (G. Cuvier, 1818)
...Show More Authors

The present study attempts to shed light on some biological aspects and characteristics of Piaractus brachypomus, including some biometrics, phenotypic and feeding pattern that characterizes this species. Besides, the study touches upon the body shape and the Otolith. These fish species have recently been seen frozen in the Iraqi local market. The standard length of fish specimens in this study reach 26.55cm it exceeded the specimens of Pacu fish collected from other studies from other countries, As well the specimens weight was 632gm it exceeded other studies mentioned in this manuscript. As the irregularity in the distribution of teeth rows, especially in the lower jaw was clear in our specimens. The average weight of some skull b

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Bandwidth Improvement of a Cone-Inverted Cylindrical and Cross Hybrids Dielectric Resonator Antennas
...Show More Authors

In this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Removal of Cadmium from Simulated Wastewaters Using a Fixed Bed Bio-electrochemical Reactor
...Show More Authors

In this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption.  No significant effect of initial Cd concentration on the removal efficiency of cadmium b

... Show More
View Publication
Crossref (8)
Crossref