This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subjects and it achieved 94% recognition accuracy. A crypto-tool software was used to perform the randomness test on the proposed RSA and SHA256.
Paul Auster's City of Glass is here singled out as representative of the writer's The New
York Trilogy. All throughout his novelistic career, Auster has been working on a pseudothesis
that adheres to a certain aesthetic of disappearance. The study engages this Austerian
aesthetic apropos of certain theoretical stretches such as the Emersonian "Not Me", the
Thoreauvian "interval" or "nowhere", the Deleuzian "nomadic trajectory", the Derridian
"grammè" or "specter", and the Baudrillardian "disappearance". The city of the novel's titling
is here seen as the trope of all that which has already disappeared, and hence it is seen as the
space (mise en scène) where the perfect crime of the murder of the real is to be thoro
This study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show MoreThe study aims to identify the degree of appreciation for the level of digital citizenship of a sample of Palestinian university students in the governorates of Gaza, and its relationship to the level of health awareness about the emerging coronavirus (covid-19). To achieve the objectives of the study, the researcher followed a descriptive approach by applying two questionnaires; the first, which consists of 30 items, was used to measure the level of digital citizenship. The second, which consists of 19 items, was used to measure the level of health awareness. Both questionnaires were applied on a sample of 367 students who were electronically selected using the manner simple randomness. Results have shown that the degr
... Show MoreThe current research tries to identify the employment of the digital technology in the formation of the theatrical show space. The researcher started with the significant importance of the digital technology and its workings in the formation of the contemporary theatrical show being a modern, artistic, aesthetic, intellectual and technological means to convey the topic in an integrated manner, as well as its close connection with the creative directive vision and the creative designing vision. It provides a variety of models of numerous implications in terms of transmission and advancement of the relationships represented by clarifying the scenography and dramatic conflict forms according to the numerous motivations of the directo
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreThe research utilizes data produced by the Local Urban Management Directorate in Najaf and the imagery data from the Landsat 9 satellite, after being processed by the GIS tool. The research follows a descriptive and analytical approach; we integrated the Markov chain analysis and the cellular automation approach to predict transformations in city structure as a result of changes in land utilization. The research also aims to identify approaches to detect post-classification transformations in order to determine changes in land utilization. To predict the future land utilization in the city of Kufa, and to evaluate data accuracy, we used the Kappa Indicator to determine the potential applicability of the probability matrix that resulted from
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show More