The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreWhen sites of new communication occurs which represents the merit of the development of communication technology which is characterized by the services of ( facebook-twiter-corapora-youtube-mass space-friendster-flicker-willnecked in addition to the direct services for viber-whatsup-telgram-and chat on) play important role in changing the infrastructure of Arabic societies which are consideredas closed and not changeable societies during near period and the significance of this study comes from the importounce of this subject which is considered as anew trend of the age on the field of media and public response and acceptance inspite of what is known about Arabic society-it doesn’t accept change-this occurance is associated with terms
... Show MoreThis article discusses the change of values in urban family, because of various communication media and modern technologies as one of the most important factors affecting the changing family values in urban areas, this means becoming part of urban life. And focuses on the family in urban areas, for the privacy of the social, economic, demographic and cultural help to this effect, and because cities are the most friction and interaction with modern technologies.
Background: Piezosurgery improved the split approach by making it safer, easier, and less prone to complications when treating extremely atrophic crests. Densah drills, with their unique design, expand the ridge by densifying bone in a reverse, non-cutting mode. Objective: To assess the effectiveness of sagittal piezosurgery, which involves cutting bone to the full implant depth and then expanding it using osseodensification drills. We use this technique to expand narrow alveolar bones and simultaneously place dental implants in the maxillary and mandibular arches. Methods: Fourteen patients received 31 dental implants. The maxillary arch received 19, and the mandible received 12 dental implants. This study will include patients who
... Show More
An automatic text summarization system mimics how humans summarize by picking the most significant sentences in a source text. However, the complexities of the Arabic language have become challenging to obtain information quickly and effectively. The main disadvantage of the traditional approaches is that they are strictly constrained (especially for the Arabic language) by the accuracy of sentence feature functions, weighting schemes, and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha
... Show MoreA method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreWith the increase of the huge developments that the world witnesses day after day, the contemporary designer tried to reveal his abilities in development and coping with transitions in all types of design discourses such as the functional and technical discourses, and the numerous means of communications included in these discourses and their influence over the recipient, because they carry perceptible, tangible or implicit vocabulary that influences the recipient's relation with the circulation of the industrial product through the effectiveness of numerous means of communication contained in the design products represented by the functional, formal, aesthetic, and technical communication. In order to highlight the importance of
... Show More