Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various degrees of uncertainty. The proposed work explores the type-2 neutrosophic logic to enable additional flexibility and granularity in handling ambiguity, indeterminacy, and uncertainty, hence improving the accuracy of signature verification systems. Because type-2 neutrosophic logic allows the assessment of many sources of ambiguity and conflicting information, decision-making is more flexible. These experimental results show the possible benefits of using a type-2 neutrosophic engine for signature verification by demonstrating its superior handling of uncertainty and variability over type-1, which eventually results in more accurate False Rejection Rate (FRR) and False Acceptance Rate (FAR) verification results. In a comparison analysis using a benchmark dataset of handwritten signatures, the type-2 neutrosophic similarity measure yields a better accuracy rate of 98% than the type-1 95%.
In this research, a new 1, 3, 4-Thiadiazole derivatives have been synthesized by many heterocyclic reactions. Starting from (2, 5 – dimercapto -1, 3, 4-Thiadiazole) a variety of derivatives have been synthesis. Compound (1) was synthesized by the reaction of hydrazine hydrate with carbon disulphide in absolute ethanol. The compound (1) was reacted with 1, 2-dibromoethane in presence of alkali ethanol to give the compound (2). The compound (3) was formed from the reaction of compound (2) with hydrazine hydrate. Schiff base (4) was obtained by reacting of compound (3) with the compound (p-hydroxybenzaldehyde) in absolute ethanol. A variety of phenolic Schiff base (Methylolic, Etheric, and Epoxy) derivatives have been synthesized. Methylol
... Show MoreMedulloblastomas and ependymomas are the most common malignant brain tumors in children. However genetic abnormalities associated with their development and prognosis remain unclear. Recently two gene fusions, KIAA1549–BRAF and SRGAP3–RAF1 have been detected in a number of brain tumours. We report here our development and validation of RT-RQPCR assays to detect various isoforms of these two fusion genes in formalin fixed paraffin embedded (FFPE) tissues of medulloblastoma and ependymoma. We examined these fusion genes in 44 paediatric brain tumours, 33 medulloblastomas and 11 ependymomas. We detected both fusion transcripts in 8/33, 5/33 SRGAP3 ex10/RAF1 ex10, and 3/33 KIAA1549 ex16/BRAF ex9, meduloblastomas but none in the 11 ep
... Show MoreThe new complexes including Cu(II), Co(II), Ni(II), Pt(IV), and Pd(II) metals with 4,4'-(((1E,1'E)-1,4-phenylenebis(methaneylylidene))bis(azaneylylidene))bis(5-(4-chlorophenyl)-4H-1,2,4-triazole-3-thione) have been synthesized of utilizing us polystyrene (PS) photostability. The supplement (0,5 w / v%) was for the production of polystyrene ( PS) in the form of tetrahydrofuran (THF). Polystyrene films were exposing irradiation (250 – 380 nm) absorption light intensity of 6.02 x 10-9 ein dm-3 s-1 at room temperature, through the changes that occur to each of viscosity average molecular weight (Mv), main chain scission (S), degree of polymerization (DPn), weight loss %, hydroxyl index (lOH), carbonyl index (ICo) determined the photo stabiliz
... Show MoreAbstract The avulsion of the flexor digitorum profundus, also known as the jersey finger, is a well-known injury that can be treated surgically. It has been classified into four types, among them type IV which involves tendon avulsion from an associated bony fragment with subsequent retraction to the palm or proximal interphalangeal joint is very rare. We present a case of type IV injury in a 45-year-old man with a pulling-on injury. The repair followed a pull-out technique (reinserting the tendon into the avulsed fragment); the entire reduction was tied over a button on the dorsal aspect of the nail and was augmented with a volar plate. The case was reported due to its rarity. We found that early surgical management of this problem greatly
... Show MoreBack ground: Diabetic nephropathy is rapidly becoming the leading cause of end-stage renal disease (ESRD). The onset and course of DN can be ameliorated to a very significant degree if intervention institutes at a point very early in the course of the development of this complication.
Objective: The aim of this study was to characterize risk factors associated with nephropathy in type I diabetes and construct a module for early prediction of diabetic nephropathy (DN) by analyzing their risk factors.
Methods: Case control design of 400 patients with type I diabetes mellitus (IDDM), aged 19-45 years. The cases were 200 diabetic patients with overt protein urea while the controls were 200 diabetic patients with no protein urea or micr
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.
This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.
The findi
The work includes synthesis of 1,2,3-triazoles via click conditions and using the microwave irradiation starting from two synthesized azides: 2,3,4,6-tetra-O-acetyl-β-D-glucopyranosyl azide (5) and perfluorobutylethyl azide (10) and different terminal alkynes. It also includes microwave enhanced synthesis of tetrazoles via the reaction of two synthesized azides i.e., perfluorobutylethyl azide (10) and 1,5-diazidopentane (13) with benzoyl cyanide. Most of the prepared compounds have been characterized by: TLC, FT-IR, 1H NMR, 13C NMR, LC-MS and microelemental analysis
Abstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show More