Preferred Language
Articles
/
YBcW7ZEBVTCNdQwC8ZxH
Fusion of Type-2 Neutrosophic Similarity Measure in Signatures Verification Systems: A New Forensic Document Analysis Paradigm
...Show More Authors

Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various degrees of uncertainty. The proposed work explores the type-2 neutrosophic logic to enable additional flexibility and granularity in handling ambiguity, indeterminacy, and uncertainty, hence improving the accuracy of signature verification systems. Because type-2 neutrosophic logic allows the assessment of many sources of ambiguity and conflicting information, decision-making is more flexible. These experimental results show the possible benefits of using a type-2 neutrosophic engine for signature verification by demonstrating its superior handling of uncertainty and variability over type-1, which eventually results in more accurate False Rejection Rate (FRR) and False Acceptance Rate (FAR) verification results. In a comparison analysis using a benchmark dataset of handwritten signatures, the type-2 neutrosophic similarity measure yields a better accuracy rate of 98% than the type-1 95%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Offline signatures matching using haar wavelet subbands
...Show More Authors

The complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems to satisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works tried to develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Verification and Parametric Analysis of Shear Behavior of Reinforced Concrete Beams using Non-linear Finite Element Analysis
...Show More Authors

Many researchers have tackled the shear behavior of Reinforced Concrete (RC) beams by using different kinds of strengthening in the shear regions and steel fibers. In the current paper, the effect of multiple parameters, such as using one percentage of Steel Fibers (SF) with and without stirrups, without stirrups and steel fibers, on the shear behavior of RC beams, has been studied and compared by using Finite Element analysis (FE). Three-dimensional (3D) models of (RC) beams are developed and analyzed using ABAQUS commercial software. The models were validated by comparing their results with the experimental test. The total number of beams that were modeled for validation purposes was four. Extensive pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Medicinal And Chemical Sciences
Synthesis, Characterization and Thermal Study of Some New Metal Ions Complexes with a New Azo 2-((2-(1H-Indol-2- yl)ethyl)diazinyl)-5-aminophenol
...Show More Authors

This research includes the preparation of a new azo 2-((2-(1H-indol-2- yl)ethyl)diazinyl)-5-aminophenol, in which the diazonium salt of 2(1H– Indole–3yl)- ethylamine reacts with a compound 3-aminophenol, and complexes have been prepared with the ions of Ni (II), Pd(II), Pt(IV), and Au(III). The characteristics of compounds include F.A.A, (C. H .N and O), 1H & 13C-NMR, IR, LC-Mass , UV-Vis spectral, DSC/TGA curve, the measurements of magnetic, and molar conductance. Each complex has an amount of [1:1] [M:L] and does not contain electrolytes. Based on the obtained results, molecular structural and geometry have been octahedral geometry suggest of Pt(IV) complex and tetrahedral of Ni (II)complex, the square planar of both Pd(II) and Au(III

... Show More
Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Coupled channels calculations of fusion reactions for 46Ti+64Ni, 40Ca+194Pt and 40Ar+148Sm systems
...Show More Authors

In this work, the fusion cross section ,  fusion barrier distribution  and the probability of fusion  have been investigated by coupled channel method  for the systems 46Ti+64Ni, 40Ca+194Pt and 40Ar+148Sm with semi-classical and quantum mechanical approach using SCF and CCFULL Fortran codes respectively. The results for these calculations are compared with available experimental data. The results show that the quantum calculations agree better with experimental data, especially bellow the Coulomb barrier, for the studied systems while above this barrier, the two codes reproduce the data.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
On New Algebraic Systems
...Show More Authors

The purpose of this paper is to give some results theorems , propositions and corollaries concerning new algebraic systems flower , garden and farm with accustomed algebraic systems groupoid , group and ring.

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 04 2022
Journal Name
International Journal Of Language And Literary Studies
Tracy Letts’ August: Osage County as a Paradigm of Bad Parenting
...Show More Authors

One’s character is shaped by the family he/she has and the way he/she is raised up. Bad parents affect their children tragically, and the later consequences, the parents are the ones who pay for being bad ones. Tracy Letts explores the dark side of family life in his domestic play August: Osage County (2007), one of the most well-known contemporary plays of American theatre in the twenty-first century. The playwright presents the Westons as an embodiment of the image of family disconnected relationships due to bad parenting. Violet is a model of a bad mother who plays a prominent role in destroying her family. The impact of bad parenting is revealed in the circle of the formerly abused children who turned to be abusers of their children o

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Study on Viral Infection and Related Parameters in A Sample of Diabetes Mellitus Type 2
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Medical Journal Of Babylon
Urokinase-type plasminogen activator receptor as a predictive marker for cardiac disease among type 2 diabetic patients
...Show More Authors
Abstract<sec> <title>Background:

Type 2 diabetes mellitus is a progressive and chronic disease manifested by β-cell dysfunction and improved insulin resistance. Higher levels of urokinase-type plasminogen activator receptors have been found to predict morbidity and mortality among diabetic patients with cardiac disease.

Objective:

This study aims to explore the role of serum urokinase-type plasminogen activator receptor levels as a prognostic marker among type 2 diabetic Iraqi patients.

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref