Preferred Language
Articles
/
ChhsOZUBVTCNdQwCJSsL
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group of signatures, numbering 70 images, were used. Image preprocessing steps were performed on them, and their features were extracted using the median filter. After that, the eigenvector and eigenvalue were calculated using the PCA algorithm. Then the backpropagation neural network algorithm was applied for training and testing where the performance reached 6.7995e−07 for 82 epochs and the accuracy was 99.98%.

Crossref
View Publication
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Wed Jan 23 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internal banking supervision requirements and their impact on the development of electronic accounting information systems: Applied research in a sample of Iraqi private banks
...Show More Authors

      Despite the availability of information technology banking features and benefits of the banking sector, they involve many risks and challenges and put in the face of the administrative authorities and regulatory institutions in the banking system, organizational matters and control sensitive and bear direct responsibility for conducting independent assessments of their regulatory and information and determine the degree of its durability and its ability to confront problems imposed by the technical challenges and technological .
And the success of the administrative authorities and regulatory institutions in achieving its objectives in the management of risks and threats oversight resulting from the act

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 12 2016
Journal Name
Wireless Networks
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
...Show More Authors

In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication

... Show More
View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Heat Transfer and Hydrodynamic in Internal Jacket Airlift Bioreactor with Microbubble Technology
...Show More Authors

   Integration of laminar bubbling flow with heat transfer equations in a novel internal jacket airlift bioreactor using microbubbles technology was examined in the present study. The investigation was accomplished via Multiphysics modelling to calculate the gas holdup, velocity of liquid recirculation, mixing time and volume dead zone for hydrodynamic aspect. The temperature and internal energy were determined for heat transfer aspect.

   The results showed that the concentration of microbubbles in the unsparged area is greater than the chance of large bubbles with no dead zones being observed in the proposed design.  In addition the pressure, due to the recirculation velocity of liquid around the draft

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the impact of interest rates on the movement of international financial flows (Japan case study) for the period 1985-2005
...Show More Authors

يعد الاقتصاد الياباني احد اكبر الاقتصادات الرأسمالية المتقدمة ويحتل المرتبة الثالثة بعد الاقتصاد الأمريكي واقتصاد الاتحاد الاوربي من حيث حجم الناتج المحلي الإجمالي والذي يكاد يقترب من (5) تريليون دولار سنويا.

لقد ادت التطورات المتلاحقة التي شهدها الاقتصاد العالمي وخاصة في حقل التمويل الدولي خلال العشرين سنة الاخيرة الى تصاعد وارتفاع في حجم وحركه رؤوس الاموال الدولية على اوسع نطاق بحيث ا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using financial and non-financial information ) SASB standards) to enhance investor confidence
...Show More Authors

Companies seek to enhance investor confidence by achieving the highest level of transparency in disclosure of financial and non-financial information (SASB standards) for Iraqi insurance companies listed on the financial market. The aim of the research is to identify the extent of the ability of financial and non-financial information to enhance transparency in reporting, which is reflected in Investor confidence. And the standards of sustainability development accounting issued by (SASB) through the electronic questionnaire that was distributed. Companies seek to achieve a set of goals, the most important of which is to enhance investor confidence by improving transparency in disclosure. Concerning the employment of financial an

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 20 2022
Journal Name
Journal Of Positive School Psychology
The Role Of Product Lifecycle Cost Technology And Cleaner Production Strategy In Reducing Costs
...Show More Authors

Reducing costs and protecting the environment surrounding economic unity has become the concern of many economic units and shifting their ideas towards preserving resources and protecting the environment by adopting strategies and techniques that take into account when applied reducing production costs and protecting the environment, including these strategies and techniques, the technical costs of the product life cycle and the strategy of cleaner production, as the application of the two concepts in local economic units helps to try to keep up with the countries that work to keep up with the success of their economic units by following the concepts that have been successful in  Developed countries by maintaining the sustainabilit

... Show More
View Publication Preview PDF