Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model was evaluated on the SDUMLA-HMT dataset, which contains a variety of biometric features from various individuals. The system outperformed existing techniques in the literature with an excellent recognition accuracy of 99.4%. Although this result is encouraging, further research on larger and more varied datasets is necessary to confirm its applicability across many circumstances. This study highlights how multimodal biometrics strengthened by metaheuristic algorithms can considerably increase biometric security against spoofing assaults, thereby opening a promising new direction for future development in the field.
This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show Moreإن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة بين المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ
... Show MoreIn this work the parameters of plasma (electron temperature Te,
electron density ne, electron velocity and ion velocity) have been
studied by using the spectrometer that collect the spectrum of
plasma. Two cathodes were used (Si:Si) P-type and deposited on
glass. In this research argon gas has been used at various values of
pressures (0.5, 0.4, 0.3, and 0.2 torr) with constant deposition time
4 hrs. The results of electron temperature were (31596.19, 31099.77,
26020.14 and 25372.64) kelvin, and electron density (7.60*1016,
8.16*1016, 6.82*1016 and 7.11*1016) m-3. Optical properties of Si
were determined through the optical transmission method using
ultraviolet visible spectrophotometer with in the range
(
In this paper the variable structure control theory is utilized to derive a discontinuous controller to the magnetic levitation system. The magnetic levitation system model is considered uncertain, which subjected to the uncertainty in system parameters, also it is open-loop unstable and strongly nonlinear. The proposed variable structure control to magnetic levitation system is proved, and the area of attraction is determined. Additionally, the chattering, which induced due to the discontinuity in control law, is attenuated by using a non-smooth approximate. With this approximation the resulted controller is a continuous variable structure controller with a determined steady state error according to the selected control
... Show MoreThis paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.
Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.
Construction is a complicated process that takes place in an almost uncontrollable environment. Although projects can be carefully planned in advance in principle, there is a chance that unforeseen events and crises can disrupt these plans, affecting project development. Because the initial investment expenditures in construction projects are so large, they may be quickly influenced by crises, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which significantly impacted various activities in general and the construction industry in particular. Despite the importance of crisis management systems, the researchers found a great lack of local studies looking at cr
... Show MoreConstruction is a complicated process that takes place in an almost uncontrollable environment. Although projects can be carefully planned in advance in principle, there is a chance that unforeseen events and crises can disrupt these plans, affecting project development. Because the initial investment expenditures in construction projects are so large, they may be quickly influenced by crises, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which significantly impacted various activities in general and the construction industry in particular. Despite the importance of crisis management systems, the researchers found a great lack of local studies l
... Show MoreIn this paper different channel coding and interleaving schemes in DS/CDMA system over multipath fading channel were used. Two types of serially concatenated coding were presented. The first one composed of Reed-Solomon as outer code, convolutional code as inner code and the interleaver between the outer and inner codes and the second consist of convolutional code as outer code, interleaved in the middle and differential code as an inner code. Bit error rate performance of different schemes in multipath fading channel was analyzed and compared. Rack receiver was used in DS/CDMA receiver to combine multipath components in order to enhance the signal to noise ratio at the receiver.
Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreThe objective of the current research was to develop the posaconazole (PCZ) loaded NS into the carbopol 934 polymeric gel for prolonged drug release and improved topical delivery; seven different nanosponge formulations of PCZ were formulated using the emulsion solvent diffusion method using various amounts of polymer (ethylcellulose, EC). The aqueous and dispersed phases were prepared using polyvinyl alcohol (PVA) and dichloromethane. The prepared nanosponges (NS) were studied for particle size, structural appearance, and in vitro drug release. Furthermore, the selected formula was formulated as hydrogel and was evaluated for physical characteristics, drug content, and in-vitro drug release. Morphological studies revealed irregular
... Show More