Fingerprint recognition is one among oldest procedures of identification. An important step in automatic fingerprint matching is to mechanically and dependably extract features. The quality of the input fingerprint image has a major impact on the performance of a feature extraction algorithm. The target of this paper is to present a fingerprint recognition technique that utilizes local features for fingerprint representation and matching. The adopted local features have determined: (i) the energy of Haar wavelet subbands, (ii) the normalized of Haar wavelet subbands. Experiments have been made on three completely different sets of features which are used when partitioning the fingerprint into overlapped blocks. Experiments are conducted on FVC2004 databases that have a four database; every database is eighty fingers and eight impressions per finger. The implemented recognition results of the proposed system show high recognition performance which is 100%.
The achievement of world peace is a humanitarian demand that humanity has sought since its existence. Despite the international and regional efforts to achieve this demand, it is still reaching its desired ambitions if conflicts, contradictions, and internal and external wars continue to justify us clearly in terms of ethnic, religious and sectarian conflict. The revolution of informatics and the impact of globalization opened a new era of communication and openness and the negative and positive impact of others, which re-published and distributed values, ideas and new cultures Some of them carries extremist ideas urging violence and destruction and other abolition, it became necessary to follow policies and reward The culture of peace,
... Show MoreJudaism followed the approach of monotheism after God Almighty sent Moses (peace be upon him) to convey to them the messages of their Lord, so that they might be on a right guidance and path, but the people did not follow that path.” Love of matter and faith in what is witnessed, so they portrayed the Lord in several images in line with what their souls drew upon them.
The propaganda discourse is the most widely circulated in the media and communication studies, where the interest of scholars and researchers in this field has become clear in the analysis and interpretation of the content of this discourse, to identify the intentions, purposes and objectives of the communicator activity, which exceeded the borders of states in the heated atmosphere of rivalries and political conflicts that characterize The countries of the world as a whole and for many years.
In particular, the economically and militarily developed countries (the Nordic capitalist countries) have exerted special efforts in the production of information and ideas, using advanced methods and means in all details of communication w
... Show MoreThe political participation of the Iraqi woman, gains a big importance equivalent to its role in all other fields. Therefore , it represents a higher value in the democratic orientation in addition to the importance of rising the reality of the woman specifically in the fields that are considered as a scale of the human development like the income, health, and education . The weakness of womenʹs political participation, is something that can't be ignored or neglected if we are looking forward to the rising of the country᾽s reality and achieving the required development in its all aspects. The woman is half of society or more than that due to the burden of raising the generations tasks. This can be achieved by taking part in th
... Show MoreAbstract
Experimental work from Magnetic Abrasive Finishing (MAF) tests was carried out design parameters (amplitude, and number of cycle which are formed the shape of electromagnetic pole), and technological parameters (current, cutting speed, working gap, and finishing time) all have an influence on the mechanical properties of the surface layer in MAF process. This research has made to study the effect of design and technological parameters on the surface roughness (Ra), micro hardness (Hv) and material removal (MR) in working zone. A set of experimental tests has been planned using response surface methodology according to Taguchi matrix (36) with three levels and six factors
... Show MoreThis research deals with the perceived and the imagined in the texts of Yusef Al-Sayegh, considering language as the most important source in literature and theatrical criticism, and given the importance of the subject, the researcher monitored many philosophical and psychological opinions and theories related to (the perceived and the imagined), and they were discussed and their compatibility with the Iraqi theatrical t As for the second chapter, where (the theoretical framework), it included two topics, and the first topic was about the concept of the perceived and the imagined, and the second topic was about Youssef Al-Sayegh and the structure of the theatrical text.
In the third chapter, where (research procedures), the research
The present study was conducted on the Iraqi Pin-tailed Sandgrouse (Pterocles alchata) to study the lung's morphological description and histological structure. This study was used 5 samples of adult male sandgrouse bird. The birds were dissected. The lungs were removed from the coelomic cavity, cleaned to remove impurities, and photographed to describe their morphological features. The samples were fixed using formalin (10%) solution for 36-48 hours and then preserved in alcohol (70%) to prepare the microscopic slides. The results showed that the lung of the Iraqi sandgrouse bird is red in color, has a trapezoidal shape and has three surfaces (costal, visceral, and vertebral). The costal surface shows ribs impressions that extend f
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More