Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signature samples collected from 200 individuals. This database is publicly distributed under the name of SIGMA for Malaysian individuals. The experimental results are reported as both error forms, namely False Accept Rate (FAR) and False Reject Rate (FRR), which achieved up to 4.15% and 1.65% respectively. The overall successful accuracy is up to 97.1%. A comparison is also made that the proposed methodology outperforms the state-of-the-art works that are using the same SIGMA database.
Software Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreSeven fish species were collected from the drainage network at Al-Madaen region, south of
Baghdad with the aid of a cast net during the period from March to August 1993. These fishes
were infected with 22 parasite species (seven sporozoans, three ciliated protozoans, seven
monogeneans, two nematodes, one acanthocephalan and two crustaceans) and one fungus
species. Among such parasites, Chloromyxum wardi and Cystidicola sp. are reported here for
the first time in Iraq. In addition, 11 new host records are added to the list of parasites of
fishes of Iraq.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThis study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand
Virtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope. The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir
... Show MoreA spectrophotometric- reverse flow injection analysis (rFIA) method has been proposed for the determination of Nitrazepam (NIT) in pure and pharmaceutical preparations. The method is based upon the coupling reaction of NIT with a new reagent O-Coumaric acid (OCA) in the presence of sodium periodate in an aqueous solution. The blue color product was measured at 632 nm. The variation (chemical and physical parameters) related with reverse flow system were estimated. The linearity was over the range 15 - 450 µg/mL of NIT with detection limits and limit of quantification of 3.425 and 11.417 µg mL-1 NIT,respectively. The sample throughput of 28 samples
... Show MoreThe banking sector of all kinds is the backbone of the economy in all countries, as it is the main financier of most economic projects in order to achieve economic development and achieve stability, which contributes to providing the necessary resources in return for obtaining a profit margin in exchange for giving up his money and bearing credit risks. Among the aforementioned banking sectors are: Islamic banks that invest their capital in several forms in order to obtain profits that enable them to continue and grow, and the most important of these formulas is the Murabaha formula, which is summarized by the bank selling a commodity after owning it and then selling it to the applicant for this commodity based on a prior request
... Show MoreAbstract
In this study, modified organic solvent (organosolv) method was applied to remove high lignin content in the date palm fronds (type Al-Zahdi) which was taken from the Iraqi gardens. In modified organosolv, lignocellulosic material is fractionated into its constituents (lignin, cellulose and hemicellulose). In this process, solvent (organic)-water is brought into contact with the lignocellulosic biomass at high temperature, using stainless steel reactor (digester). Therefor; most of hemicellulose will remove from the biomass, while the solid residue (mainly cellulose) can be used in various industrial fields. Three variables were studied in this process: temperature, ratio of ethano
... Show More