Preferred Language
Articles
/
bsj-6117
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signature samples collected from 200 individuals. This database is publicly distributed under the name of SIGMA for Malaysian individuals. The experimental results are reported as both error forms, namely False Accept Rate (FAR) and False Reject Rate (FRR), which achieved up to 4.15% and 1.65% respectively. The overall successful accuracy is up to 97.1%. A comparison is also made that the proposed methodology outperforms the state-of-the-art works that are using the same SIGMA database.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The application target cost technique by using reverse engineering: An application study in the general company for vegetable oils industry
...Show More Authors

The Purpose of this study is mainly to improve the competitive position of products economic units using technique target cost and method reverse engineering and through the application of technique and style on one of the public sector companies (general company for vegetable oils) which are important in the detection of prices accepted in the market for items similar products and processing the problem of high cost which attract managerial and technical leadership to the weakness that need to be improved through the introduction of new innovative solutions which make appropriate change to satisfy the needs of consumers in a cheaper way to affect the decisions of private customer to buy , especially of purchase private economic units to

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Detecting DNA of multispecies dinoflagellate cysts in the sediment from three estuaries of Makassar strait and fishing port using CO1 primer: Is it CO1 primer suitable for detecting DNA dinoflagellate?
...Show More Authors

Most dinoflagellate had a resting cyst in their life cycle.  This cyst was developed in unfavorable environmental condition. The conventional method for identifying dinoflagellate cyst in natural sediment requires morphological observation, isolating, germinating and cultivating the cysts.  PCR is a highly sensitive method for detecting dinoflagellate cyst in the sediment.  The aim of this study is to examine whether CO1 primer could detect DNA of multispecies dinoflagellate cysts in the sediment from our sampling sites. Dinoflagellate cyst DNA was extracted from 16 sediment samples. PCR method using COI primer was running. The sequencing of dinoflagellate cyst DNA was using BLAST. Results showed that there were two clades of dinoflag

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 21 2019
Journal Name
Al-khwarizmi Engineering Journal
Design and Optimization of a Surface-Mounted Permanent-Magnet Linear Synchronous Motor with Maxwell ANSYS
...Show More Authors

Linear motor offers several features in many applications that require linear motion. Nevertheless, the presence of cogging force can deteriorate the thrust of a permanent magnet linear motor. Using several methodologies, a design of synchronous single sided linear iron-core motor was proposed. According to exact formulas with surface-mounted magnets and concentrated winding specification, which are relying on geometrical parameters. Two-dimensional performance analysis of the designed model and its multi-objective optimization were accomplished as a method to reduce the motor cogging force using MAXWELL ANSYS. The optimum model design results showed that the maximum force ripple was approximatrly reduced by 81.24%compared to the origina

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Removal of Congo Red Dye From Aqueous Solution Using Eco-Friendly Adsorbent of Nanosilica
...Show More Authors

            The development of a new, cheap, efficient, and ecofriendly adsorbents has become an important demand for the treatment of waste water, so nano silica is considered a good choice. A sample of nanosilica (NS) was prepared from sodium silicate as precursor and the nonionic surfactant Tween 20 as a template. The prepared sample was characterized using various characterization techniques such as FT-IR, AFM, SEM and EDX analysis. The spectrum of FTIR confirms the presence of silica in the sample, while SEM analysis of sample shows nanostructures with pore ranging (2-100nm).The adsorptive properties of this sample were studied by removing Congo red dye (CR) from aqueous solution. Batch experimental methods were carried o

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Dynamic algorithm (DRBLTS) and potentially weighted (WBP) to estimate hippocampal regression parameters using a techniqueBootstrap (comparative study)
...Show More Authors

Bootstrap is one of an important re-sampling technique which has given the attention of  researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such  Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Land Use/Cover Change Analysis Using Remote Sensing Data: A Case Study, Zhengzhou Area, Henan Province, China
...Show More Authors

In the last two decades, arid and semi-arid regions of China suffered rapid changes in the Land Use/Cover Change (LUCC) due to increasing demand on food, resulting from growing population. In the process of this study, we established the land use/cover classification in addition to remote sensing characteristics. This was done by analysis of the dynamics of (LUCC) in Zhengzhou area for the period 1988-2006. Interpretation of a laminar extraction technique was implied in the identification of typical attributes of land use/cover types. A prominent result of the study indicates a gradual development in urbanization giving a gradual reduction in crop field area, due to the progressive economy in Zhengzhou. The results also reflect degradati

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2003
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
OCCURRENCE OF SOME FISH PARASITES IN AL-MADAEN DRAINAGE NETWORK, SOUTH OF BAGHDAD
...Show More Authors

Seven fish species were collected from the drainage network at Al-Madaen region, south of
Baghdad with the aid of a cast net during the period from March to August 1993. These fishes
were infected with 22 parasite species (seven sporozoans, three ciliated protozoans, seven
monogeneans, two nematodes, one acanthocephalan and two crustaceans) and one fungus
species. Among such parasites, Chloromyxum wardi and Cystidicola sp. are reported here for
the first time in Iraq. In addition, 11 new host records are added to the list of parasites of
fishes of Iraq.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref