Preferred Language
Articles
/
ChhsOZUBVTCNdQwCJSsL
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group of signatures, numbering 70 images, were used. Image preprocessing steps were performed on them, and their features were extracted using the median filter. After that, the eigenvector and eigenvalue were calculated using the PCA algorithm. Then the backpropagation neural network algorithm was applied for training and testing where the performance reached 6.7995e−07 for 82 epochs and the accuracy was 99.98%.

Crossref
View Publication
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Forensic accounting role in governance and its impact on the quality of accounting information
...Show More Authors

That the structural changes in the environment, business and finance and the spread of business and the diversity of transactions between economic organizations and breadth of a commercial scale in the world have left their clear on the need to keep up with the accounting for these variables as one of the social sciences affect and are affected by the surrounding environment because of the various economic and social factors, technical, legal and others.

As a result of these variables emerged a new field of accounting called Forensic Accounting, which involves the use of expertise of multiple pour in the end to the accounting profession, where the Forensic Accounting cover a large area of ​​disciplines including strengthening

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Mechanical Engineering And Robotics Research
International Journal of Mechanical Engineering and Robotics Research
...Show More Authors

This paper proposes feedback linearization control (FBLC) based on function approximation technique (FAT) to regulate the vibrational motion of a smart thin plate considering the effect of axial stretching. The FBLC includes designing a nonlinear control law for the stabilization of the target dynamic system while the closed-loop dynamics are linear with ensured stability. The objective of the FAT is to estimate the cubic nonlinear restoring force vector using the linear parameterization of weighting and orthogonal basis function matrices. Orthogonal Chebyshev polynomials are used as strong approximators for adaptive schemes. The proposed control architecture is applied to a thin plate with a large deflection that stimulates the axial loadi

... Show More
View Publication Preview PDF
Crossref (37)
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Integration of international issues in Saudi social studies and citizenship books in the light of international education principles
...Show More Authors

The study aimed to reveal the level to which the international issues are integrated into the books of Saudi public education social studies and citizenship in the light of the principles of international education, and to know the level of continuity and integration of these issues in the books, to build a range and sequence matrix of international issues through it. The study followed the descriptive and analytical method that used the content analysis card as a tool for study when the tool achieved the necessary validity and reliability characteristics. The data of this study has been processed using the SPSS statistical program according to a set of appropriate methods of descriptive and inferential statistics.

 The resu

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
Interactivity on the Website of Monte Carlo International Radio Regarding Iraqi Topics
...Show More Authors

This research aims to identify the means and forms of interactive communication concerning Iraqi topics on the websites of global radio stations, namely Sawa and Monte Carlo. It also seeks to uncover the editorial and artistic interactions related to Iraqi topics on the selected websites chosen as the research sample, comparing them with the editorial interaction within the Iraqi context between the Radio Monte Carlo and Sawa websites.
The research yields several conclusions, including the following:
Iraqis focus their interaction with topics related to Iraq on Facebook for both Radio Monte Carlo and Sawa; Arabs show higher levels of interaction on Twitter with Radio Monte Carlo; Participants on the webs

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 02 2001
Journal Name
University Of Baghdad
Effect of Technology on the Relationship between Form and Structure in Contemporary Interior Space Language.
...Show More Authors

Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Mechanisms of Social Change in the Era of Digital Communication and its Effects on the Communicative Message
...Show More Authors

When sites of new communication occurs which represents the merit of the development of communication technology which is characterized by the services of ( facebook-twiter-corapora-youtube-mass space-friendster-flicker-willnecked in addition to the direct services for viber-whatsup-telgram-and chat on) play important role in changing the infrastructure of Arabic societies which are consideredas closed and not changeable societies during near period and the significance of this study comes from the importounce of this subject which is considered as anew trend of the age on the field of media and public response and acceptance inspite of what is known about Arabic society-it doesn’t accept change-this occurance is associated with terms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 15 2025
Journal Name
Journal Of Ecohumanism
International Funds for Compensation for Human Rights Violations in International Law
...Show More Authors

The establishment of international funds to compensate for human rights violations represents an important step towards achieving justice and equality between individuals and societies and solidarity among people, whether through providing financial assistance or by assuming legal and moral responsibility towards victims. With the development of international policies in recent decades, it has become necessary for states to assume their responsibilities in accordance with international law, not only in preventing and combating crimes, but also in providing means of redress for victims. Legislation in many countries has demonstrated the importance of fair compensation as part of criminal and social responsibility. Although traditiona

... Show More
View Publication
Crossref