Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.
The aim of this study is to highlight the relationship between competitive intelligence and Entrepreneurial Performance by centralizing the strategic vigilance of a sample of civil faculties in Baghdad. The sample of the study was targeted at 10 Iraqi civil colleges, which consisted of (133) members of the faculty council of the faculties, the search data was collected using the questionnaire form as the main research tool. The results showed that the correlation and influence of competitive intelligence and strategic vigilance in the Entrepreneurial Performance, as well as the role of strategic vigilance as an intermediate variable between competitive intelligence and Entrepreneurial Performance.
This study aims to examine the relationship between emotional intelligence and academic adaptation among a sample of gifted students in intermediate and high schools in Jeddah, Saudi Arabia. The study also seeks to examine the differences between group means in emotional intelligence and academic adaptation due to demographic variables (gender and school level). In addition, the study aims to examine the role of emotional intelligence in predicting the level of academic adaptation. The researcher performed the descriptive, correlational, predictive, and comparative approaches to collect the data from a sample comprised of (309) gifted students using the emotional intelligence scale developed by Bar-on (2000), whi
... Show MorePurpose: the purpose of this study is to investigate how managers working for the General Authority for Irrigation and Reclamation Projects react to the impact of Emotional Intelligence (EI) on their performance. Theoretical framework: The current study includes an intellectual framework on two variables, namely EI and Manager Performance (MP), because it is essential to investigate the relationship between these two variables and the impact of EI on MP. Design/methodology/approach: The research problem is that a manager's capacity to make wise decisions about their work or interactions with subordinates is diminished when they have inadequate EI. The questionnaire is used as a tool for gathering data for the study, and the st
... Show MoreThe image of television dominates the cognitive and artistic motivations. It is the formulation of ideas and visions along with its documentary ability. It is the main element in television work as it is a story that is narrated in pictures. Therefore, attention to image building is a major point of gravity in the work structure as a whole. On the image is the element carrying all aesthetic and expressive values of news and information directly to the hints that work to stimulate and stir the imagination of the recipient to evoke mental images added to the visual images to deepen the meanings.
All visual arts carry elements and components that follow in a particular pattern to give special meanings and specific connotations. However,
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe study introduces the twentieth century background where the image of teacher is shaped by various factors according to the wide emergence of new educational institutions in the aftermath of the Second World War. A group of writers mirrored the influence of the war on educational institutions and accordingly on the image of teacher in their novels whose main action is set in and around the campus of a university. The genre dates back to the nineteen forties. where they show the foibles of human nature and reactions to external pressures. One of the early examples of this genre is Lucky Jim (1954). The image of teacher is swinged in many shapes from the tyrant to the rebellion to the defiant. All is personified in the characters of these
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreGypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image
... Show MoreThe theatre is one of the main pillars of the human aesthetic thinking as it contains logical explanations for the public human life aspects outside time and environment. When we find that the directive philosophical thinking moving away from the stylistic constants and the virtual laws in taboos that control the accomplishment in terms of the traditional shapes, the employment and the theatrical reception. Some directors moved in post-modernism concepts in a perceptive that liberates thought from its natural context in thinking into an innovative perceptive. The aesthetic images are the basic premise in the prohibition of the philosophical thinking interpretation in order to move the directive thinking and this movement depends on the v
... Show More