One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures, it will be more difficult to attain greater verification accuracy. On the other hand, the characteristics of Arabic signatures are not very clear and are subject to a great deal of variation (features’ uncertainty). To address this issue, the suggested work offers a novel method of verifying offline Arabic signatures that employs two layers of verification, as opposed to the one level employed by prior attempts or the many classifiers based on statistical learning theory. A static set of signature features is used for layer one verification. The output of a neutrosophic logic module is used for layer two verification, with the accuracy depending on the signature characteristics used in the training dataset and on three membership functions that are unique to each signer based on the degree of truthiness, indeterminacy, and falsity of the signature features. The three memberships of the neutrosophic set are more expressive for decision-making than those of the fuzzy sets. The purpose of the developed model is to account for several kinds of uncertainty in describing Arabic signatures, including ambiguity, inconsistency, redundancy, and incompleteness. The experimental results show that the verification system works as intended and can successfully reduce the FAR and FRR.
A simple, environmentally benign, cost-effective, and sensitive colorimetric determination for the pharmaceutical drug dexamethasone sodium phosphate (DXP) has been developed by the formation of a colored complex with fluoranil. The process was sensitive and linear over the range 1 to 40 μg/mL, excellent correlation coefficient 0.9989, recovery% 99.80 ± 1.3, limit of detection (LOD) and limit of quantification (LOQ) were 0.23 and 0.9 μg/mL, respectively, and good RSD ~1.63%. The experimental conditions were optimized after an intensive study. The approach was validated statistically for the quantification of the analyte in its pure and/or pharmaceutical form. Despite the proposed approach is selective, it still can be applied for
... Show MoreThis paper aims at analyzing Terry Bisson’s short story Bears Discover Fire stylistically by following both Gerard Genette’s theory of narratology (1980) and Short and Leech (1981) strategy for analyzing fictional works. Also trying to examine to what extent these models are applicable in analyzing the selected story. Stylistic analysis procedures help the readers/researchers to identify specific linguistic features in order to support literary interpretation and appreciation of literary texts. Style in fiction concentrates not on what is written, but on how a text is written. Each writer has his own style and techniques which distinguish him from other writers
ABSTRACT: BACKGROUND: Trivial number of books, concerning traditional medicine, had mentioned a galactagogual role of Garden cress seeds. Others ignore that. This controversy, in addition to the steroid (family of sex hormones) contents of the seeds, directed us to evaluate the role of this herb in mammogenesis and lactogenesis. METHODS: Twelve parameters were used to assess the effect of Garden cress seeds on the mammary gland of young adult virgin rats. These parameters comprise gross assessment, histological examination (routine/ haematoxylin and eosin stain and special stain/ PAS), enzymatic histochemical study (alkaline phosphatase, acid phosphatase and lipoprotein lipase cytochemical localization), biochemical estimations (hor
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More