One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures, it will be more difficult to attain greater verification accuracy. On the other hand, the characteristics of Arabic signatures are not very clear and are subject to a great deal of variation (features’ uncertainty). To address this issue, the suggested work offers a novel method of verifying offline Arabic signatures that employs two layers of verification, as opposed to the one level employed by prior attempts or the many classifiers based on statistical learning theory. A static set of signature features is used for layer one verification. The output of a neutrosophic logic module is used for layer two verification, with the accuracy depending on the signature characteristics used in the training dataset and on three membership functions that are unique to each signer based on the degree of truthiness, indeterminacy, and falsity of the signature features. The three memberships of the neutrosophic set are more expressive for decision-making than those of the fuzzy sets. The purpose of the developed model is to account for several kinds of uncertainty in describing Arabic signatures, including ambiguity, inconsistency, redundancy, and incompleteness. The experimental results show that the verification system works as intended and can successfully reduce the FAR and FRR.
The aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
Receipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. A
... Show MoreSummary
This research is included in the study of one of the most important rules of jurisprudence, which is (necessity descends the status of necessity, controls and applications) branching from the major rule (hardship brings facilitation) and since the jurisprudential rule is defined as knowledge of a total or majority rule that applies to all its parts. He has to know all the branches that fall under him, which leads to understanding Sharia, controlling jurisprudential issues and linking them to its rules, so that no contradiction occurs, and he has the jurisprudential faculty that he promotes in consideration and diligence. And what is meant by need: is what is lacking in terms of expansion and raising the distress that often lea
هدفت الدراسة الى التعرف على درجة اتخاذ القرار وعلاقتها ببعض المهارات الأساسية الهجومية بكرة السلة للطالبات ، اذ يعد اتخاذ القرار قدرة الفرد على التوصل لحل مشكلة اعتراضية أو موقف محير، وذلك باختيار حل من البدائل الموجودة أو المبتكرة، وهذا الاختيار يعتمد على المعلومات التي جمعها الفرد حول المشكلة وعلى القيم والعادات والخبرة والتعليم والمهارات الفردية وتمتاز لعبة كرة السلة بوجود الكثير من المواقف المتغ
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show More