The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group of signatures, numbering 70 images, were used. Image preprocessing steps were performed on them, and their features were extracted using the median filter. After that, the eigenvector and eigenvalue were calculated using the PCA algorithm. Then the backpropagation neural network algorithm was applied for training and testing where the performance reached 6.7995e−07 for 82 epochs and the accuracy was 99.98%.
The removal of cadmium ions from simulated groundwater by zeolite permeable reactive barrier was investigated. Batch tests have been performed to characterize the equilibrium sorption properties of the zeolite in cadmium-containing aqueous solutions. Many operating parameters such as contact time, initial pH of solution, initial concentration, resin dosage and agitation speed were investigated. The best values of these parameters that will achieved removal efficiency of cadmium (=99.5%) were 60 min, 6.5, 50 mg/L, 0.25 g/100 ml and 270 rpm respectively. A 1D explicit finite difference model has been developed to describe pollutant transport within a groundwater taking the pollutant sorption on the permeable reactive barrier (PRB), which i
... Show MoreThe design of the interior spaces process the product of intellectual civilization expresses the prevailing thought, discoverers of principles and beliefs through the sheen reflects the present, and generating languages graphical variety caused a different revolution in design mounting structure, and because of the complex nature of the interior spaces were and we have to be a reflection of cultural reality of being a form of cultural expression and true embodiment of scientific developments prevailing for each stage where she was born, the changes occurring in human thought and then extremism and the discrepancy tastes among individuals all communities factors have caused a change in the design structure involving modernization an
... Show MoreThe concept of power despite its implications unclear and unknown was one of the most standards in international relations ambiguity and lack of clarity, however was more standards important and influential in the conduct of international relations, and since that time until today since that ambiguity in the meaning of power and use it as a factor of international relations factors and drive the engines were very different and irony from case to case and from researcher to another, but it may be classified force as the international status enjoyed by the state in the international ocean and here is a structure formed of forces posed by the state, such as economic and political nature of the political system and military power and concept
... Show MoreThe current environment is witnessing several developments as a result of the changes taking place in all areas of economic, social , political and legal that led to the transformation of the industrial economy , which depends based on quantitative production to a knowledge economy which relies based on information and knowledge , as the central pillar of this economy during the trading of these information and knowledge between all individuals in general and decision makers , in particular, through information and communication technology of computers and the Internet to achieve sustainable human development in the social dimension. &
... Show MoreMB Mahmood, BN Dhannoon
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreMost of the cinema and television production relies on the use of modern digital technologies, which today become the as ideal as the artistic expressive style that sends aesthetic values through the use of electronic elements of the language of cinema and television to achieve aesthetic dazzling, and design the digital production for the purpose of persuasion, as well as the use of digital effects and graphics to activate the aesthetic pleasure. The research tries to subject all these aspetcs to study and apply them to a modern sample in order to get the results that confirm this technical and artistic aesthetic synergy that leads to the emergence of a cinema and television achievement the leas
... Show More