One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures, it will be more difficult to attain greater verification accuracy. On the other hand, the characteristics of Arabic signatures are not very clear and are subject to a great deal of variation (features’ uncertainty). To address this issue, the suggested work offers a novel method of verifying offline Arabic signatures that employs two layers of verification, as opposed to the one level employed by prior attempts or the many classifiers based on statistical learning theory. A static set of signature features is used for layer one verification. The output of a neutrosophic logic module is used for layer two verification, with the accuracy depending on the signature characteristics used in the training dataset and on three membership functions that are unique to each signer based on the degree of truthiness, indeterminacy, and falsity of the signature features. The three memberships of the neutrosophic set are more expressive for decision-making than those of the fuzzy sets. The purpose of the developed model is to account for several kinds of uncertainty in describing Arabic signatures, including ambiguity, inconsistency, redundancy, and incompleteness. The experimental results show that the verification system works as intended and can successfully reduce the FAR and FRR.
In this paper, some Bayes estimators of the reliability function of Gompertz distribution have been derived based on generalized weighted loss function. In order to get a best understanding of the behaviour of Bayesian estimators, a non-informative prior as well as an informative prior represented by exponential distribution is considered. Monte-Carlo simulation have been employed to compare the performance of different estimates for the reliability function of Gompertz distribution based on Integrated mean squared errors. It was found that Bayes estimators with exponential prior information under the generalized weighted loss function were generally better than the estimators based o
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
dictates the need to study the cultural aspects of the context and the consequent relations between the person and the objective environment surrounding him, as the philosophical understanding of the role of culture has led to the emergence of new theoretical interpretations of design that are organically linked with the development of society, especially that the development of the human environment philosophically and culturally is linked to the philosophical perception of its role in Culture as a precondition for new theoretical interpretations of design.
From the above, this problem can be studied by defining the following question (What are the implications of the cultural context in graphic design)?
The research included
Been Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations
There are many methods of forecasting, and these methods take data only, analyze it, make a prediction by analyzing, neglect the prior information side and do not considering the fluctuations that occur overtime. The best way to forecast oil prices that takes the fluctuations that occur overtime and is updated by entering prior information is the Bayesian structural time series (BSTS) method. Oil prices fluctuations have an important role in economic so predictions of future oil prices that are crucial for many countries whose economies depend mainly on oil, such as Iraq. Oil prices directly affect the health of the economy. Thus, it is necessary to forecast future oil price with models adapted for emerging events. In this article, we st
... Show MoreThermal evaporation method has used for depositing CdTe films
on corning glass slides under vacuum of about 10-5mbar. The
thicknesses of the prepared films are400 and 1000 nm. The prepared
films annealed at 573 K. The structural of CdTe powder and prepared
films investigated. The hopping and thermal energies of as deposited
and annealed CdTe films studied as a function of thickness. A
polycrystalline structure observed for CdTe powder and prepared
films. All prepared films are p-type semiconductor. The hopping
energy decreased as thickness increased, while thermal energy
increased.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreThe thirties and the early forties and the at end of the World War II of the last century
witnessed several attempts carried out by the Public Health Directorate and by the Iraqi
Ministry of Foreign Affairs to persuade the Rockefeller Foundation to fund Iraq with its
health program which is carried out in several regions in the world to promote the health and
social situations since Iraq during that period in history was badly in need to such plans and
programs because of this lack of financial and technical possibilities necessary for the
advancement of health and social dire situation.
The details of these attempts are deposited in the documents of the diplomatic mail
records of the United States of America , an