The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group of signatures, numbering 70 images, were used. Image preprocessing steps were performed on them, and their features were extracted using the median filter. After that, the eigenvector and eigenvalue were calculated using the PCA algorithm. Then the backpropagation neural network algorithm was applied for training and testing where the performance reached 6.7995e−07 for 82 epochs and the accuracy was 99.98%.
Skin cancer is the most serious health problems in the globe because of its high occurrence compared to other types of cancer. Melanoma and non-melanoma are the two most common kinds of skin cancer. One of the most difficult problems in medical image processing is the automatic detection of skin cancer. Skin melanoma is classified as either benign or malignant based on the results of this test. Impediment due to artifacts in dermoscopic images impacts the analytic activity and decreases the precision level. In this research work, an automatic technique including segmentation and classification is proposed. Initially, pre-processing technique called DullRazor tool is used for hair removal process and semi-supervised mean-shift
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreSpeech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
Prenatal markers are commonly used in practice to screen for some foetal abnormalities. They can be biochemical or ultrasonic markers in addition to the newly used cell free Deoxyribonucleic Acid (DNA) estimation. This review aimed to illustrate the applications of the prenatal screening, and the reliability of these tests in detecting the presence of abnormal chromosomes such as trisomy-21, trisomy-18, and trisomy-13 in addition to neural tube defects. Prenatal markers can also be used in the anticipation of some obstetrical complications depending on levels of these markers in the mother’s circulation. In the developed countries, prenatal screening tests are regularly used during antenatal care period. Neural tube defects, numer
... Show MoreOver the past few decades, the surveying fieldworks were usually carried out based on classical positioning methods for establishing horizontal and vertical geodetic networks. However, these conventional positioning techniques have many drawbacks such as time-consuming, too costly, and require massive effort. Thus, the Global Navigation Satellite System (GNSS) has been invented to fulfill the quickness, increase the accuracy, and overcome all the difficulties inherent in almost every surveying fieldwork. This research assesses the accuracy of local geodetic networks using different Global Navigation Satellite System (GNSS) techniques, such as Static, Precise Point Positioning, Post Processing Kinematic, Session method, a
... Show More
Analyzing the size of the interrelationships between the main economic sectors in the Iraqi economy is an important necessity to know the impact of each sector on other economic sectors on the basis of the interrelationships and reciprocity between them, and what these relationships have achieved in terms of enhancing development and increasing the gross domestic product. To achieve the objectives of the study, we relied on mathematical (quantitative) analysis using user-product tables. Issued by the Ministry of Planning / Central Bureau of Statistics and Research (Directorate of National Accounts) for the economic sectors that make up the Iraqi economy. The study conc
... Show MoreMultimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreThe main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show More<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task
... Show MoreDue to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function. The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties. The modulari
... Show More