The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessing stage is accomplished by removing some artifacts in order to ensure high identification rates. The extracted features are collected as a feature vector; then they are used to distinguish different individuals. In the matching stage, the nearest neighbor classifier is used to make recognition decisions. The results for identification of the proposed system indicate high identification performance reach to 100%, while the verification test results indicate error rate 99.88% using FVC2004 databases.
The laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreDocument clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor
... Show MoreBackground: Fertility plays great role in animal reproduction since high quality semen improves sheep industry reproduction. The current worldwide data revealed the closely related of CNP to reproductive function of rams. Aims: Evaluation the effect of CNP on cooled sperms using the traditional and molecular assays. Methods: Totally, 20 testicular samples were collected, processed to obtain the semen samples and divided into two parts; one treated with the suitable dose of CNP and the otherserved as a control. Sperm samples of both groups were cooled for 3 days and tested at 0 0h, 24h, 48h and 72h. Results: The findings revealed that the suitable dose of CNP-treated sperms was 0.0110-13. Values individual motility, live sperm
... Show MoreThis study was carried out to investigate the effect of dietary supplementation with different levels of parsley on semen quality of local Iraqi ganders. A total of thirty-two local ganders were used in this study during the period from the beginning of February to the end of April. The ganders were allocated for 4 treatment groups containing 8 ganders each. The treatment groups were as follows: Control diet (free from parsley); T1: Control diet + 80 g/d parsley; T2: Control diet + 160 g/d parsley; T3: Control diet + 240 g/d parsley. Semen samples were collected twice a week, fortnightly, from each gander by the dorsal-abdominal message method. The first semen collection was used to evaluate semen volume, sperm concentration, live in total
... Show MoreIn this paper a prey - predator model with harvesting on predator species with infectious disease in prey population only has been proposed and analyzed. Further, in this model, Holling type-IV functional response for the predation of susceptible prey and Lotka-Volterra functional response for the predation of infected prey as well as linear incidence rate for describing the transition of disease are used. Our aim is to study the effect of harvesting and disease on the dynamics of this model.
The aim of this research was to indicate the opinion of the Iraqi consumer about the quality and safety of local food products, the questionnaire was included 19 questions for product quality, price, distribution and promotion as a tool to survey the opinions of 128 consumers in Baghdad, the data was analyzed by using percentage, weighted mean, and weight percent, the results obtained showed that the Iraqi consumer prefer local food products for their high quality and appropriate price, however they need attention to packaging, promotion and distribution.
The Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More