One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures, it will be more difficult to attain greater verification accuracy. On the other hand, the characteristics of Arabic signatures are not very clear and are subject to a great deal of variation (features’ uncertainty). To address this issue, the suggested work offers a novel method of verifying offline Arabic signatures that employs two layers of verification, as opposed to the one level employed by prior attempts or the many classifiers based on statistical learning theory. A static set of signature features is used for layer one verification. The output of a neutrosophic logic module is used for layer two verification, with the accuracy depending on the signature characteristics used in the training dataset and on three membership functions that are unique to each signer based on the degree of truthiness, indeterminacy, and falsity of the signature features. The three memberships of the neutrosophic set are more expressive for decision-making than those of the fuzzy sets. The purpose of the developed model is to account for several kinds of uncertainty in describing Arabic signatures, including ambiguity, inconsistency, redundancy, and incompleteness. The experimental results show that the verification system works as intended and can successfully reduce the FAR and FRR.
Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreAn anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored.A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure.Pharmacological s
... Show MoreBackground: Brain abscess is collection of pus in the brain parrynchima surrounded by a true capsule. Usually diagnosed by CT & MRI, & treated surgically by drainage by burr hole, or excision.
Objective: evaluate our work with brain abscess.
Patient& method: 74 Patients collected in the specialized surgical hospital neuro-surgical department, from Jan. 1995 till Jan. 2005 treated surgically, all cases fully evaluated clinically & radiologically & then evaluation of the surgical procedure.
Results: there is a slight male predominance & prevalence more in the 1st 2decades of life mostly in children with cong. heart disease, headache was the most common presenting feature, with other signs of infection diagn
The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.
This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.
The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged
... Show MoreThe term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.
A sensitive and environmentally benign spectrometric method was developed for quantifying Meprobamate (MEP). The analyzed MEP was derivatized into a colored complex and determined spectrometrically. The colorimetric analytical parameters were optimized and validated. Low limit of detection (LOD) was achieved down to 1.88×10-6 mol/l while the limit of quantification (LOQ) was extended over the range of 1.97×10-6 - 1.35×10-3 mol/l. The high precision has been denoted by the 1.54% value of the coefficient of variation. The recovery was 96.07%, while the RSD (n=3) was 1.05 - 1.19%. The apparent molar absorptivity (Æ) obtained within 1154.7 - 1691.9 L.mol-1.cm
... Show MoreIn this paper, we analyze several aspects of a hyperbolic univalent function related to convexity properties, by assuming to be the univalent holomorphic function maps of the unit disk onto the hyperbolic convex region ( is an open connected subset of). This assumption leads to the coverage of some of the findings that are started by seeking a convex univalent function distortion property to provide an approximation of the inequality and confirm the form of the lower bound for . A further result was reached by combining the distortion and growth properties for increasing inequality . From the last result, we wanted to demonstrate the effect of the unit disk image on the condition of convexity estimation
... Show MoreSummary:
OBJECTIVE Many associations have been found between specific HLA antigens and increased susceptibility to various diseases . So we tried to associate class I and class II antigens with acute lymphoblastic leukemia . We also demonstrate the presence of antibodies in serum of acute lymphoblastic leukemic patients against HLA class I.
DESIGN: Prospective study.
SETTING: Tissue typing and histocompatibility center at Al- Karamah Teaching Hospital. PATIENTS AND METHOD: 70 acute lymphoblastic leukemia patients from pediatric hospitals. HLA ( human leukocyte antigens) typing done for them by serological method and cross matching and blood grouping were also done for them.
RESULTS: there was significant difference between pa