Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signature samples collected from 200 individuals. This database is publicly distributed under the name of SIGMA for Malaysian individuals. The experimental results are reported as both error forms, namely False Accept Rate (FAR) and False Reject Rate (FRR), which achieved up to 4.15% and 1.65% respectively. The overall successful accuracy is up to 97.1%. A comparison is also made that the proposed methodology outperforms the state-of-the-art works that are using the same SIGMA database.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand
Software Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreSeven fish species were collected from the drainage network at Al-Madaen region, south of
Baghdad with the aid of a cast net during the period from March to August 1993. These fishes
were infected with 22 parasite species (seven sporozoans, three ciliated protozoans, seven
monogeneans, two nematodes, one acanthocephalan and two crustaceans) and one fungus
species. Among such parasites, Chloromyxum wardi and Cystidicola sp. are reported here for
the first time in Iraq. In addition, 11 new host records are added to the list of parasites of
fishes of Iraq.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreAbstract
The prevention of bankruptcy not only prolongs the economic life of the company and increases its financial performance, but also helps to improve the general economic well-being of the country. Therefore, forecasting the financial shortfall can affect various factors and affect different aspects of the company, including dividends. In this regard, this study examines the prediction of the financial deficit of companies that use the logistic regression method and its impact on the earnings per share of companies listed on the Iraqi Stock Exchange. The time period of the research is from 2015 to 2020, where 33 companies that were accepted in the Iraqi Stock Exchange were selected as a sample, and the res
... Show MoreMicrobial Desalination Cell (MDC) is capable of desalinating seawater, producing electrical power and treating wastewater. Previously, chemical cathodes were used, which were application restrictions due to operational expenses are quite high, low levels of long-term viability and high toxicity. A pure oxygen cathode was using, external resistance 50 and 150 k Ω were studied with two concentrations of NaCl in the desalination chamber 15-25 g/L which represents the concentration of brackish water and sea water. The highest energy productivity was obtained, which amounted to 44 and 46 mW/m3, and the maximum limit for desalination of saline water was (31% and 26%) for each of 25 g / L and 15 g / L, respectively, when using an ex
... Show MoreMost vegetation’s are Land cover (LC) for the globe, and there is an increased attention to plants since they represent an element of balance to natural ecology and maintain the natural balance of rapid changes due to systematic and random human uses, including the subject of the current study (Bassia eriophora ) Which represent an essential part of the United Nations system for land cover classification (LCCS), developed by the World Food Organization (FAO) and the world Organization for environmental program (UNEP), to observe basic environmental elements with modern techniques. Although this plant is distributed all over Iraq, we found that this plant exists primarily in the middle
... Show MoreReview of the research and the reality of the costs of the survey and exploration in the oil exploration company The study showed the effect of the application of standard financial reporting (6) "mineral resources exploration and evaluation" on the financial statements, have touched on a range of problems, the most important deficiencies in the disclosure of information relating to expenses of research and exploration that must be show Kmugod and which should be recognized as an expense in the financial statements of the company based on the international standard (6) for the purpose of knowing the financial situation of the company, and to find solutions presented researcher hypothesis is the following: that the Company's application s
... Show More