In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.
The importance of Baghdad city as the capital of Iraq and the center of the attention of delegations because of its long history is essential to preserve its environment. This is achieved through the integrated management of municipal solid waste since this is only possible by knowing the quantities produced by the population on a daily basis. This study focused to predicate the amount of municipal solid waste generated in Karkh and Rusafa separately, in addition to the quantity produced in Baghdad, using IBM SPSS 23 software. Results that showed the average generation rates of domestic solid waste in Rusafa side was higher than that of Al-Karkh side because Rusafa side has higher population density than Al-Karkh side. T
... Show MoreThis paper experimentally investigates the heating process of a hot water supply using a neural network implementation of a self-tuning PID controller on a microcontroller system. The Particle Swarm Optimization (PSO) algorithm employed in system tuning proved very effective, as it is simple and fast optimization algorithm. The PSO method for the PID parameters is executed on the Matlab platform in order to put these parameters in the real-time digital PID controller, which was experimented with in a pilot study on a microcontroller platform. Instead of the traditional phase angle power control (PAPC) method, the Cycle by Cycle Power Control (CBCPC) method is implemented because it yields better power factor and eliminates harmonics
... Show MoreThis paper presents a novel inverse kinematics solution for robotic arm based on artificial neural network (ANN) architecture. The motion of robotic arm is controlled by the kinematics of ANN. A new artificial neural network approach for inverse kinematics is proposed. The novelty of the proposed ANN is the inclusion of the feedback of current joint angles configuration of robotic arm as well as the desired position and orientation in the input pattern of neural network, while the traditional ANN has only the desired position and orientation of the end effector in the input pattern of neural network. In this paper, a six DOF Denso robotic arm with a gripper is controlled by ANN. The comprehensive experimental results proved the appl
... Show MoreSurvival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re
... Show MoreThe aim of the current research is to identify the personal distance between members of society, as well as, to identify the feelings of satisfaction and positivity from respecting the permissible personal distance. The study also aims to identify the feelings of annoyance and comfort from approaching and going beyond personal distance and not respecting it. To achieve these goals, the researchers reviewed previous literature, theories, and studies that dealt with personal distance. The researchers reached a number of results; first, personal distance is not a law but rather a cultural guiding principle for social and professional morals. Second, there are four distances (intimate distance, the distance between friends, social distance,
... Show MoreWhen optimizing the performance of neural network-based chatbots, determining the optimizer is one of the most important aspects. Optimizers primarily control the adjustment of model parameters such as weight and bias to minimize a loss function during training. Adaptive optimizers such as ADAM have become a standard choice and are widely used for their invariant parameter updates' magnitudes concerning gradient scale variations, but often pose generalization problems. Alternatively, Stochastic Gradient Descent (SGD) with Momentum and the extension of ADAM, the ADAMW, offers several advantages. This study aims to compare and examine the effects of these optimizers on the chatbot CST dataset. The effectiveness of each optimizer is evaluat
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject
... Show More