Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resultant average accuracies of the iris technique and voice technique are 99.83% and 98%, respectively. Thus, the iris recognition technique provides higher accuracy and security than the voice recognition technique
This paper is concerned with the study of the T-norms and the quantum logic functions on BL-algebra, respectively, along with their association with the classical probability space. The proposed constructions depend on demonstrating each type of the T-norms with respect to the basic probability of binary operation. On the other hand, we showed each quantum logic function with respect to some binary operations in probability space, such as intersection, union, and symmetric difference. Finally, we demonstrated the main results that explain the relationships among the T-norms and quantum logic functions. In order to show those relations and their related properties, different examples were built.
An experimental and theoretical works were carried out to model the wire condenser in the domestic refrigerator by calculating the heat transfer coefficient and pressure drop and finding the optimum performance. The two methods were used for calculation, zone method, and an integral method. The work was conducted by using two wire condensers with equal length but different in tube diameters, two refrigerants, R-134a and R-600a, and two different compressors matching the refrigerant type. In the experimental work, the optimum charge was found for the refrigerator according to ASHRAE recommendation. Then, the tests were done at 32˚C ambient temperature in a closed room with dimension (2m*2m*3m). The results showed that th
... Show MorePreviously many properties of graphene oxide in the field of medicine, biological environment and in the field of energy have been studied. This diversity in properties is due to the possibility of modification on the composition of this Nano compound, where the Graphene oxide is capable of more modification via addition other functional groups on its surface or at the edges of the sheet. The reason for this modification possibility is that the Sp3 hybridization (tetrahedral structure) of the carbon atoms in graphene oxide, and it contains many oxygenic functional groups that are able to reac with other groups. In this research the effect of addition of some amine compounds on electrical properties of graphene oxide has been studied by the
... Show More Reaction of Na2PdCl4 with benz-1,3-imidazole-2-thione or (bzimtH) benz-1,3-thiazoline2-thione (bztztH) in ethanol / NE3 afford complexes of the type [Pd(bzimt)2](1) and [Pd(bztzt)2](2) respectively. Treatment of [Pd(L)2] L= bzimt or bztzt with bidentate ligands (N^N) where N^N= bipyridine (Bipy) , phenanthroline (Phen) , ethylene diamine , or N,N′dimethylethylene diamine afford mononuclear complexes of the type [PdL2(N^N)]. The bzimt and bztzt ligands are coordinated as bidentate chelating ligands through the S and N in (1) and (2) whereas bonded as a monodentate fashion via the sulfur atom in other complexes. The prepared complexes were characterized by elemental CHN analysis, ir and 1H nmr spectra.
New tetradentate Schiff base [H2L] namely [2,2׳ -(ethane-1,2- diylbis (azan-1-ylylidene) diacetic acid)] was prepared from condensation of ethylenediamine with glyoxylic acid in ethanol as a solvent in presence of drops of 48% HBr .The structure of ligand (H2L) was characterized by,F-IR, U.V-Vis.,1H-,13C-NMR, pectrophotometer,melting point and elemental microanalysis C.H.N. Metal complexes of the ligand (H2L) in general Molecular formula [M(L)(H2O)2], where M= Co(II), Ni(II), Cu(II), Mn(II) and Hg(II); L=(C6H8N2O4) were synthesized were characterized by, Atomic absorption, F-IR, U.V-Vis. spectra, molar conductivity and magnetic susceptibility.It was found that all the complexes showed octahedral geometries.And
... Show MoreHundreds of commensal bacteria are existed in the mouth and nose, and the interactions between these microbiotas and the Toll-like receptors (TLRs) in different parts of the upper respiratory tract, gastrointestinal tract, and immune cells maty assist to maintain the homeostasis of the immune system. Thus, it is important
to study the relationship between type one hypersensitivity and normal flora in the mouth and nose. Blood and saliva or sputum samples of seventy-one allergic patients were collected randomly in Baghdad/ Al- Zahraa center for asthma and allergies. Those patients were suffering from different types of hypersensitivity type1 such as skin and respiratory tract allergy (e.g, asthma and
Atherosclerosis is a condition of the hardening of a blood vessel via the development of plaques around the artery wall which causes the artery to narrow, leading to severe complications. Toxoplasmosis is an opportunistic parasitic infection that causes pathological complications in immunocompromised patients, which lead to increase the burden on the immune system in these patients. This study aims to assess the incidence rate of toxoplasmosis in atherosclerosis patients and its potential to change C - reactive protein (C-RP) and vitamin D3 levels. Serum samples (150) were tested for the positivity of anti-Toxoplasma IgG and IgM antibodies by means of Enzyme-linked immunosorbent assay (ELISA). In addition, C-RP was assessed in a
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show More