The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group of signatures, numbering 70 images, were used. Image preprocessing steps were performed on them, and their features were extracted using the median filter. After that, the eigenvector and eigenvalue were calculated using the PCA algorithm. Then the backpropagation neural network algorithm was applied for training and testing where the performance reached 6.7995e−07 for 82 epochs and the accuracy was 99.98%.
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreAbstract:
The aim of this research is to highlight the importance of reducing the cost of a flight ticket by using information technology and the Internet, in the process of purchasing tickets for electronic flights, and to shift from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchase process, as well as saving the cost Time, effort and money for the customer, and the researcher used the deductive approach in linking the variables (Internet of Things technology and reducing the costs of air tickets) wi
... Show MoreIt is necessary to examine the nature of the Turkish position and what Turkey seeks to achieve at the international, regional and Iraqi levels. Or is this external role an expression of foreign policy and has not yet reached the level of maturity that reaches the stage of strategy? The answer to this question is the essence of research in the Turkish role. The answer to this question requires the realization of the elements and pillars that guarantee Turkey's continuity and survival. Continuity is a cornerstone of the strategy. The continuity of the role and its interaction with the event and the ability to employ multiple alternatives are what qualify the state to describe its politics. The external strategy has evolved into. In order t
... Show MoreThe research aims to identify small and medium enterprises in accounting thought in terms of definition and concept, and this international financial reporting standard for small and medium-sized enterprises (SMEs) in the theoretical aspect. As for the practical aspect, the small and medium-sized enterprises standard has been applied to the financial statements of the company in question, the preparation of the opening entry on the date of the transition, the requirements of measurement and the accounting disclosure on the date following the application of the standard, and the preparation of the company's financial statements and the accompanying explanations according to the standard of small and medium-sized enterprises. The r
... Show MoreA Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe design fabrics of the most important episodes that are at the core process rhetorical communication, until they became these episodes ample room for research and investigation, and the issue of non-familiar formality is nothing but the result of those relationships Constructivism, which is the result of an effort builders coherent activate the shape and attributes of phenotypic, therefore it will cause him a lot of questions about his and founded the organization in order to activate the speech communication between the product(cloth)and the receiver .On this basis, the research problem identified on imposing the question follows:1. Does the non-familiar formal role in enriching communication discourse of women's fabric designs?2. Ar
... Show Moreالمستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة