Preferred Language
Articles
/
bsj-6117
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signature samples collected from 200 individuals. This database is publicly distributed under the name of SIGMA for Malaysian individuals. The experimental results are reported as both error forms, namely False Accept Rate (FAR) and False Reject Rate (FRR), which achieved up to 4.15% and 1.65% respectively. The overall successful accuracy is up to 97.1%. A comparison is also made that the proposed methodology outperforms the state-of-the-art works that are using the same SIGMA database.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Limit the auditor's personal judgment and its reflection on the quality of the audit report
...Show More Authors

The main objective of the audit is The asset is maintained and operated efficiently and is done through to detect fraud and errors in the financial statements and to verify the accuracy and accuracy of the information contained therein and to give a neutral technical opinion on the basis of that, thus the auditor has a professional responsibility in achieving this goal, and that the effects of issuing a wrong opinion works on The loading of the beneficiaries is significant damage, And therefore the presence of any error or bias of the auditor when taking personal judgments in relation to the determination of the relative importance and the selection of audit samples and determine the adequacy and validity of evidence and implemen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 29 2019
Journal Name
Journal Of Planner And Development
Evaluation the individual's share of urban land use for the holy city of Karbala
...Show More Authors

The research aims to analyze and evaluate the urban land use according to the needs of the current and future population by adopting the planning criteria for the holy city of Karbala. In the theoretical side, we discussed the most important concepts of urban land use planning. In the practical aspect of the study, field surveys were conducted to obtain the required information. Using the GIS program, the land uses were planned and executed, Analysis By comparing the per capita use of urban land with criteria and the production of maps.

The main findings of the study are that there is a large deficit in meeting some of the needs of the urban land uses and the basic services of the city. The research recommended that the needs of

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Arab Science Heritage Journal
المجتمع المدنـــــــي في العراق " إشكالية الارتقاء من المفهوم إلى الظاهرة "
...Show More Authors

يعتبر مفهوم المجتمع المدني من بين سلة المفاهيم التي حملت لوائها واعادت رفعها حركات الموجة الثالثة من الديمقراطية في العالم التي نادت بالتعددية والانتخابات الحرة ...الخ .

View Publication Preview PDF
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Pais estimator for the reliability function of the Pareto model of Type I failure
...Show More Authors

In this paper an estimator of reliability function for the pareto dist. Of the first kind has been derived and then a simulation approach by Monte-Calro method was made to compare the Bayers estimator of reliability function and the maximum likelihood estimator for this function. It has been found that the Bayes. estimator was better than maximum likelihood estimator for all sample sizes using Integral mean square error(IMSE).

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of Educational And Psychological Researches
مشكلات كبار السن (النفسية، الصحية، الاجتماعية، الاقتصادية) من وجهة نظرهم
...Show More Authors

هدفت هذه الدراسة إلى تحديد أهم المشكلات النفسية، الصحية، الاجتماعية، الاقتصادية، التي يعاني منها كبار السن في مجتمع الدراسة وقد انبثق عن هذا الهدف الرئيس أسئلة هي:

  • ما هي أهم المشكلات التي يعاني منها كبار السن في محافظة جرش /الكته من وجهة نظرهم؟
  • ما هي أهم العوامل التي قد تؤدي إلى ظهور مشكلات لدى كبار السن ؟
  • هل يعاني كبار السن من الأرامل والمطلقين (رجال ونساء

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The quality of the auditor's report in the local environment in compliance with the requirements of the ISA 701 standard
...Show More Authors

The research aims to demonstrate the quality of the auditor’s report by analyzing a number of models represented by the auditor’s report based on the Iraqi audit evidence and the auditor’s report in light of the application of international auditing standards for the report and the auditor’s report in light of the application of the International Auditing Standard 701, in addition to explaining the impact of applying the International Auditing Standard 701. International Auditing 701 in enhancing the quality of the auditor's report, and in order to reach these goals, a comparison was made on international experiences before and after the application of the standard in addition to the results of the questionnaire distribut

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Mothers’ Knowledge about Their Children with Sickle Cell Anemia and Non-Pharmacological Approaches to Pain Management in Basra Center for Hereditary Blood Diseases
...Show More Authors

Objective(s): To assess mothers’ knowledge about their children with sickle cell anemia and non-Pharmacological approaches to pain management and found some relationship between mothers knowledge and their demographic data of age, level of education, and occupation.
Methodology: A descriptive design used in the present study established was for a period from September 19th, 2020 to March 30th, 2021. The study was conducted on a non-probability (purposive) sample of (30) mother their children with sickle cell anemia was chosen. The data were analyzed through the application of descriptive and inferential statistical approaches which are applied by using SPSS version 22.0.
Results: The findings of the study indicated that moderate

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref