This investigation proposed an identification system of offline signature by utilizing rotation compensation depending on the features that were saved in the database. The proposed system contains five principle stages, they are: (1) data acquisition, (2) signature data file loading, (3) signature preprocessing, (4) feature extraction, and (5) feature matching. The feature extraction includes determination of the center point coordinates, and the angle for rotation compensation (θ), implementation of rotation compensation, determination of discriminating features and statistical condition. During this work seven essential collections of features are utilized to acquire the characteristics: (i) density (D), (ii) average (A), (iii) standard deviation (S) and integrated between them (iv) density and average (DA), (v) density and standard deviation (DS), (vi) average and standard deviation (AS), and finally (vii) density with average and standard deviation (DAS). The determined values of features are assembled in a feature vector used to distinguish signatures belonging to different persons. The utilized two Euclidean distance measures for matching stage are: (i) normalized mean absolute distance (nMAD) (ii) normalized mean squared distance (nMSD). The suggested system is tested by a public dataset collect from 612 images of handwritten signatures. The best recognition rate (i.e., 98.9%) is achieved in the proposed system using number of blocks (21×21) in density feature set. With the same number of blocks (i.e., 21×21) the maximum verification accuracy obtained is (100%).
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreNowadays, the worldwide issue of the environment occupies the minds not only of ecological experts and politicians but also is addressed in cultural fields and literature in particular. The conceptualization of ecocriticism, whether in the ecological field or cultural studies, has come as a response to the increasing public awareness of numerous environmental crises. Most ecocritics regard John Clare (1793-1864) as a 'proto-ecological' British poet since his poetry incorporates ecological issues which were not then categorized as they are now. The study offers a precise illustration of ecocriticism coupled with a number of the most significant ecological concepts proven in selected poems by John Clare. The ecocritical reading of Clare's po
... Show MoreThe construction process of reception containing rebuild educated new gloss within the context of real-time knowledge with previous experience and learning environment, accounting for all of the real experiences and information beside Education backbones structural climate (olive 0.2002: p. 212 .) Based on two basic principles - : I: - The natural science that we do know from our experiences, we can not say for sure Bhakaigah realism and clearly, but built by creative minds of certain interpretations be applicable in light of our expectations. Other: - The knowledge built effectively active learner who adapts new knowledge with the conceptual framework has, since everyone has a conceptual framework can break at any time and replaced by a ne
... Show MoreThe research aims to build a training program to develop the willpower in the kindergarten children. In order to achieve the objective of the research, the two researchers have developed a Training Program according to the following steps:
- Determining the general objective of the Training Program.
- Determining the behavioral objectives of the Training Program.
- Determining the content of the Training Program.
- Implementing the content of the Training Program sessions.
- Evaluating the Training Program.
The training program consisted of (15) sessions, each session included a set of parts (title, general objective, methods, time and place to implement the sessions, behavioral goals, tool
... Show Moreأثر تنوع الرؤى الاخراجية للاتجاهات والحركات المسرحية المعاصرة في أتساعالاشتراطات الجمالية لبنية الخطاب المسرحي + الامر الذي ادى الى انزياح مكوناتالعرض وعناصره ؛ ومنها المنظومة السردية للنص التي شكلت في بدايات المسرحجغرافية العرض المسرحي والمرتكز النظري والفكري الذي يمد العرض المسرحي أغلبتدفقه الجمالي وعنصر أستعلائي لعناصر العرض الاخرى ؛ وضمن التطورات اللاحقةأنسحب المخرج المسرحي من سطوة البنية النص
... Show MoreThe study aims at studying and analyzing the subject of marketing vigilance as it is one of the modern approaches in the marketing field that can be used to face changes in the competitive and strategic environment and that represents quick reactions on the part of the institution to ensure its survival and distinctiveness other aims are: Consolidating the strength of the marketing organization and its success continuously, represented by changes in the market share, awareness of the institution's position in the market and its relations with competing tourism companies, diversification of tourism services, as well as an analysis of the competitive strategic position of tourism institutions for the purpose of conducting a r
... Show MoreThe study aims to identify the colleges women in the USA where he was browsing the Internet for five universities and sixty-two women's college located these colleges in 25 states only three general and other civil 51% supported by the churches and religious associations of various began its founding in Alqrnn eighteenth and continued in the nineteenth and twentieth and to provide an opportunity for women to complete higher education, while most men's colleges opened their doors to the admission of women and turned it on coeducation
In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior
... Show More