In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.
This study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study.
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreBackground: The problem of difficult gallbladder is not clearly defined and associated with real missing of therapeutic approaches that decreased morbidity. Moreover, the difficult gallbladder was reported as a contributing risk factor for biliary injury due to raised difficulty in surgical dissection within Calot’s triangle. The aim of this study is to determine the surgical outcomes of the open fundus-first cholecystectomy in lowering the rate of lethal intraoperative risks.
Subjects and Methods: Our prospective study conducted during the period of January 2019 to December 2022 at Ibn Sina specialized hospital, Khartoum, Sudan, for two hundred and fifty-three patients underw
... Show MoreArab translators have always paid great attention to the translation of the Persian literary genres, in particular, contemporary Iranian novels. They have always translated for the most prominent Iranian novelists such as Jalal Al Ahmad, Sadiq Hidayat, Mahmoud Dowlatabadi, Bozorg Alavi, Ismail Fasih, Houshang Golshiri, Gholam-Hossein Saedi, Simin Daneshvar, Sadiq Chubak, Samad Behrangi and others that have succeeded in perfectly picturing the Iranian society.
Within the perspectives of Arab translators and by using the descriptive - analytical approach, the present study provides an analytical study of the translation into Arabic some of the modern Persian novels. Moreove
... Show MoreVoice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator
... Show MoreThis research aim to present theoretical and philosophical framework regards topic of intellectual capital readiness in Iraqi universities. That is, by using strategic map in balanced score card of Norton and Kaplan (2004). This research discusses theoretical content for three main aspects reflect in its nature elements of intellectual capital readiness in organizations. This includes human capital readiness, information capital readiness and organizational capital readiness. To clear each element, the authors relay on mechanism to determine gape per element of intellectual capital elements.
Communication represents the essence of language learning. Since the unspecified evolution of conveying information, human beings have been employing the main constituents of language with short pauses. Although the punctuation marks necessitate short expressions among thought group of words in writing, human language demand for understanding how and when to pause orally. This paper presents the pause technique in the classroom. It signifies the relation between pausing and lecturing in the class and determines its sufficient time-management to interact with college learners of different specializations. The conduct study reviewed teaching pause technique in the empirical studies at Special Education and Communication Disorders of Pennsylva
... Show Moreدور مكننة المعلومات المحاسبي في اتخاذ القرارات
اتسعت دائرة استخدام نظم المعلومات بشكل كبير بحيث دخلت كل مفاصل حياة الانسان المختلفة مما جعل فرص انتهاك واختراق تلك الانظمة امراً لامناص منه. لذلك فان الحاجة تستدعي ايجاد وسائل تقنية واطر جوهرية للتصدي لظاهرة حدوث أي خلل في نظم المعلومات من خلال مراجعة وتدقيق دورة حياة النظام.
يتطرق البحث الى جملة ادوات واساليب تقنية تساعد المدققين والمراجعين من تحديد الخلل وطبيعته وايجاد حل له . كما توفر
... Show More