Preferred Language
Articles
/
bsj-8362
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Trends of University Professors towards the Role of Social Networking Websites in Shaping Public Opinion about the Security Crises
...Show More Authors

Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Philosophical Framework To Intellectual Capital Readiness in Iraqi Organizations
...Show More Authors

           This research aim to present theoretical and philosophical framework regards topic of intellectual capital readiness in Iraqi universities. That is, by using strategic map in balanced score card of Norton and Kaplan (2004). This research discusses theoretical content for three main aspects reflect in its nature elements of intellectual capital readiness in organizations. This includes human capital readiness, information capital readiness and organizational capital readiness. To clear each element, the authors relay on mechanism to determine gape per element of intellectual capital elements.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 12 2019
Journal Name
Dirasat: Human And Social Sciences
Teaching by pause technique in the classroom
...Show More Authors

Communication represents the essence of language learning. Since the unspecified evolution of conveying information, human beings have been employing the main constituents of language with short pauses. Although the punctuation marks necessitate short expressions among thought group of words in writing, human language demand for understanding how and when to pause orally. This paper presents the pause technique in the classroom. It signifies the relation between pausing and lecturing in the class and determines its sufficient time-management to interact with college learners of different specializations. The conduct study reviewed teaching pause technique in the empirical studies at Special Education and Communication Disorders of Pennsylva

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Computer Networks And Wireless Communications
Performance Analysis of VoIP in Wireless Networks
...Show More Authors

Voice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator

... Show More
View Publication
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Partial substitution of Zn Effects on the Structural and Electrical Properties of High Temperature Hg<sub>0.95</sub>Ag<sub>0.05</sub>Ba<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>8+δ</sub> Superconductors
...Show More Authors

View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
The attitude of Imam Ibn Jarir al-Tabari to the occurrence of unanimous and its convening by statement of the majority in light of his interpretation - Jami` al-Bayan on the interpretation of the verse of the Qur’an -‘‘Applied Models’’
...Show More Authors

t

 

The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses in

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Role of Certain Figures of Emphasis in the Televised Debate between Macron and Le Pen on may 3, 2017».: Le rôle de certaines figures d’insistance utilisées dans le débat télévisé entre Macron et Le Pen le 3 mai 2017
...Show More Authors

      Political Discourse Analysis is an important linguistic study approach used by politicians to gain people support. The present paper sheds light on the figures of speech  of emphasis in the televised debate between the two presidential elections candidates, Emmanuel Macron and Marine Le Pen and the distinctive effect they add to the political discourse to win general public support as well as the presidential elections.

       The present paper provides a rudimentary definition and an analysis of the terms “discourse” and “political discourse” and traces the significant role played by politically directed televised Media and internet to support political pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 19 2024
Journal Name
Journal Of Metastable And Nanocrystalline Materials
The Structural, Magnetic, and Electrochemical Properties of Composite PAni/Co&lt;sub&gt;0.2&lt;/sub&gt;Mn&lt;sub&gt;0.8&lt;/sub&gt;Fe&lt;sub&gt;2&lt;/sub&gt;O&lt;sub&gt;4&lt;/sub&gt;
...Show More Authors

The current work concerns preparing cobalt manganese ferrite (Co0.2Mn0.8Fe2O4) and decorating it with polyaniline (PAni) for supercapacitor applications. The X-ray diffraction findings (XRD) manifested a broad peak of PAni and a cubic structure of cobalt manganese ferrite with crystal sizes between 21 nm. The pictures were taken with a field emission scanning electron microscope (FE-SEM), which evidenced that the PAni has nanofibers (NFs) structures, grain size 33 – 55 nm, according to the method of preparation, where the hydrothermal method was used. The magnetic measurements (VSM) that were conducted at room temperature showed that the samples had definite magnetic properties. Additionally, it was noted that the saturation magnetizatio

... Show More
View Publication
Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
الأساليب الحديثة في تدقيق ومراجعة نظم المعلومات
...Show More Authors

اتسعت دائرة استخدام نظم المعلومات بشكل كبير بحيث دخلت كل مفاصل حياة الانسان المختلفة مما جعل فرص انتهاك واختراق تلك الانظمة امراً لامناص منه. لذلك فان الحاجة تستدعي ايجاد وسائل تقنية واطر جوهرية للتصدي لظاهرة حدوث أي خلل في نظم المعلومات من خلال مراجعة وتدقيق دورة حياة النظام.

يتطرق البحث الى جملة ادوات واساليب تقنية تساعد المدققين والمراجعين من تحديد الخلل وطبيعته وايجاد حل له . كما توفر

... Show More
View Publication Preview PDF
Crossref