In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.
This research aims to invest qur›anic words referring to lie in media language. The researcher has chosen a set of qur›anic words functioning as «lie».
It is an attempt to review the media language which is used to make use of repetition of terms and templated which make it weak and ineffective language. The use of qur›anic texts and terms according to the semantic field for each topic will give this media language an opportunity for growth, development and stability.
This researcher identifies a number of words to study them in the light of their lexical meaning using the Dictionary of Language Standards by Ibn Fares as it focuses on the general meaning of the root language. He also uses the Dictionary of the Basis of Rhe
Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi
... Show MoreThis work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreConcealment of the Offenders:
Its Conceptions, Evidence, Objectives, Criteria
This study discusses the concealment of the offenders, but also emphasize the importance of clarifying this concept. Furthermore, it differentiates between this concept and other relevant concepts. Moreover, this study explains that the ruling of the concealment of the offenders is required by sharia. This is evident by many proofs of the Quran and the Sunnah in addition to being in line with the sharia’s objectives.
Additionally, the study mentions several advantages to the concealment of an offender and the disadvantages of reporting an offender. Examples include ensuring the Islamic community cohesion, encouraging offe
... Show MoreThe globalization concept is regarded one of the modern concept which had seen in the last time while it hadn’t occur now only, but it had seen clearly with the technology &information revolution beside the quick development in the communication net which had made the world like a small village .
Since accounting is regarded business language based on integrated theoretical framework consists of many connected objective & rules which led to consistent accounting standards .
So with this development there is a clear need to consolidate the concepts , policies ,and applications which the companies use it in treating its financial events .
الطائفية وتداعياتها على بناء الدولة العراقية المعاصرة
In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, industry. This paper introduced the simulated model of a proposed self-balancing platform that described the self–balancing attitude in (X-axis, Y-axis, or both axis) under the influence of road disturbance. To simulate the self-balanced platform's performance during the tilt, an integration between Solidworks, Simscape, and Simulink toolboxes in MATLAB was used. The platform's dynamic model was drawn in SolidWorks and exported as a STEP file used in the Simscape Multibody environment. The system is controlled using the proportional-integral-deriva
... Show Moreافرض ان (X1, X2, …. , Xn) هي عينة عشوائية من توزيع له دالة احتمالية الكثافة . المثال المعتاد في مثل هكذا تقدير للامكان الاعظم (MLE) هو ليس وحيد باخذ ليكون كثافة منتظمة عليه، مثل .
انظر [Bicked and Doksum (1977, P111)] او [Hogg and Craig (1978, P(207)] بالاضافة الى احضار بعض الامور غير الطبيعية.
... Show Moreان التحول في الحياة الاقتصادية الناتج عن التقدم التكنولوجي وتقنية المعلومات في مجالات الفضاء والتقدم في الاتصالات السلكية واللاسلكية والالكترونيات الدقيقة مكنت الشركات من ارسال كميات هائلة من البيانات بتكاليف منخفضة.
وان انتشار الشركات متعددة الجنسبة والتي سعت لتحقيق السيطرة على اقتصاديات العالم من خلال فروعها المنتشرة فتحتاج الى نظم للانتاج والتكاليف ونظم للمعلومات الادارية والمحاس
... Show MoreThis study was designed to show the inhibitory effect of different concentrations of alcoholic extract of Borage officinalis on the Monoamine oxidase (MAO) and Acetylcholinesterase (AChE) enzymes in human serum. The results obtained from the study exhibited that alcoholic extract of Borage officinalis caused inhibition to enzymes activity with all concentrations of the extract. The results also showed that when the concentration of the extract was (0.001 mg/ml), the percentage of inhibition was (4.3% with MAO and 15.2% with AChE) and this percentage increases until reaching up to (74.7% with MAO and 84.18% with AChE) when the concentration of the extract was (0.1 mg/ml). From the kinetic parameters, studies found that alcoholic extract o
... Show More