This investigation proposed an identification system of offline signature by utilizing rotation compensation depending on the features that were saved in the database. The proposed system contains five principle stages, they are: (1) data acquisition, (2) signature data file loading, (3) signature preprocessing, (4) feature extraction, and (5) feature matching. The feature extraction includes determination of the center point coordinates, and the angle for rotation compensation (θ), implementation of rotation compensation, determination of discriminating features and statistical condition. During this work seven essential collections of features are utilized to acquire the characteristics: (i) density (D), (ii) average (A), (iii) standard deviation (S) and integrated between them (iv) density and average (DA), (v) density and standard deviation (DS), (vi) average and standard deviation (AS), and finally (vii) density with average and standard deviation (DAS). The determined values of features are assembled in a feature vector used to distinguish signatures belonging to different persons. The utilized two Euclidean distance measures for matching stage are: (i) normalized mean absolute distance (nMAD) (ii) normalized mean squared distance (nMSD). The suggested system is tested by a public dataset collect from 612 images of handwritten signatures. The best recognition rate (i.e., 98.9%) is achieved in the proposed system using number of blocks (21×21) in density feature set. With the same number of blocks (i.e., 21×21) the maximum verification accuracy obtained is (100%).
Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreMeasurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance pa
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreWe propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St
... Show MoreCrop production is reduced by insufficient and/or excess soil water, which can significantly decrease plant growth and development. Therefore, conservation management practices such as cover crops (CCs) are used to optimize soil water dynamics, since CCs can conserve soil water. The objective of this study was to determine the effects of CCs on soil water dynamics on a corn (
Sub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim
... Show MoreThis paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used.
Experimental results shows LPG-
... Show MoreAhmed ibn Imad ibn Yusuf al-Aqfhasi (808 AH / 1405 AD) is a small message that speaks about the Nile River in all its sides, despite its limited papers, but it is one of the manuscripts of the important geographical literature for its geographical, historical, religious and grammatical information. it was not limited to the information of the author alore, but taken from many sources below, which added to the importance of the fact that it has saved us the names of the sources that preceded him in mentioning this river with the names of its authors.The method of the Aqfhasi was characterized by scientific methodology in writing and clarity, with reference to some of the myths that people carried in their minds about the Nile River at tha
... Show More