One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreObjective: Synthesized a series of new thiourea (TU) derivatives, tested their antioxidant activity, and investigated their expected biological activity by theoretical study (computational methods). Methods: The derivatives were made using a one-pot reaction with two steps. Initially, succinyl chloride was mixed with KSCN to make succinyl isothiocyanate. Then, primary and secondary amines were used to make TU derivatives. The theoretical studies were done by Swiss ADME and molecular docking via Genetic Optimization of Linkage Docking (GOLD). Then evaluate antioxidant activity using the DPPH scavenging method. Results: FT-IR, 1H NMR, and 13C NMR spectroscopy show the verification of all the prepared derivatives. Compounds (II), (VIII),
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreIntroduction/Aim. Rhabdomyosarcoma (RMS) is the most common soft tissue sarcoma in pediatric population and adolescents. Limited data is available on the characteristics of RMS in Iraqi pediatric patients. The aim of the study was to examine the clinical and histological aspects of RMS in Iraqi children, with a focus on their response to treatment, prognosis, and survival. Methods. A retrospective cohort study was conducted at the Oncology Unit of Children's Welfare Teaching Hospital, Medical City, Baghdad, Iraq and included patients who were newly diagnosed with RMS and received treatment during the period between January 1, 2015, and December 31, 2019. The patients were followed up from the time of diagnosis until October 1, 2020.
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, Muhammad, and upon God
The evil of the scholars of jurisprudence is that the reciter and the reciter must have attained the aspects of good grammar and morphology so that he does not make mistakes in the matters of jurisprudence according to the seven readers and others, and they require phonetic, morphological, and grammatical explanations, and this is called aqeed.
Our ancient scholars are known for knowledge and it is linked to narration, and our topic is studied from both sides of narration and knowledge, as it is one of the topics of fundamentals.
The seven readers and others, and his relationship is clear and close
... Show MoreThe psychological pollution term comes from the realism that we live in its world. This
realism threatens our privet and the identity of our civilization. There is complete believe that
the literature of psychological pollution is insufficient to cover the whole horizons of this
term.
The psychological pollution has its root in the theories of the development of humanities
within the organization of the history. Some of these theories are the exceptional cultural
theory, the faithfulness theory and the integration theory and the identity losing.
The psychological pollution handles several concepts such as the engagement, the social
decay and the concept of cultural invasion.
Education by lectures has been standard for 100 years or more. Given the 21st century technology, people can connect with others around the world instantly, electronically. With the pandemic, teaching changed to one-way information transfer with the loss of interpersonal learning experience. SNI® and now SNI Digital™ have been experimenting with different forms of communication to transfer information.
Using an interactive education model, a meeting for neurosurgeons in Baghdad was held for students, residents, and neurosurgeons
Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show More