Preferred Language
Articles
/
LBfwqZEBVTCNdQwCU5jB
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group of signatures, numbering 70 images, were used. Image preprocessing steps were performed on them, and their features were extracted using the median filter. After that, the eigenvector and eigenvalue were calculated using the PCA algorithm. Then the backpropagation neural network algorithm was applied for training and testing where the performance reached 6.7995e−07 for 82 epochs and the accuracy was 99.98%.

Publication Date
Wed May 08 2013
Journal Name
Iraqi Journal Of Science
On D- Compact Topological Groups
...Show More Authors

In the present paper, we have introduced some new definitions On D- compact topological group and D-L. compact topological group for the compactification in topological spaces and groups, we obtain some results related to D- compact topological group and D-L. compact topological group.

Publication Date
Sat Mar 06 2010
Journal Name
J. Of University Of Anbar For Pure Science
Some Results on Epiform Modules
...Show More Authors

The concept of epiform modules is a dual of the notion of monoform modules. In this work we give some properties of this class of modules. Also, we give conditions under which every hollow (copolyform) module is epiform.

Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
On Quasi-Small Prime Modules
...Show More Authors
Abstract<p>Let R be a commutative ring with identity, and W be a unital (left) R-module. In this paper we introduce and study the concept of a quasi-small prime modules as generalization of small prime modules.</p>
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 08 2021
Journal Name
Journal Of Interdisciplinary Mathematics
On regular δ-semi.open space
...Show More Authors

It is shown that if a subset of a topological space (χ, τ) is δ-semi.closed, then it is semi.closed. By use this fact, we introduce the concept regularity of a topological space (χ, τ) via δ-semi.open sets. Many properties and results were investigated and studied. In addition we study some maps that preserve the δ-semi.regularity of spaces.

View Publication Preview PDF
Scopus (9)
Scopus
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The tax planning and its effect on the investment: On sample of Iraqi Contribution Company
...Show More Authors

The importance of the current study  lies in the  importance of the  Tax policy that  being considered one of the most important tools working on fulfilling  the  social,  financial  and economic  goals  and improving  the investment environment  in the country  to become  having the ability to  activate the  national economy. The current study  has  referred  that  (  Has  the  tax planning  practiced by  the Iraqi  contribution  companies  led to increase  the  far-term tax  outcome through  getting  benefit of   the monetary  funds  and expansion in&nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The effect of managerial Process Reengineering on organizational citizenship Applied research on Electronic Industries Company
...Show More Authors

ABSTRACT

The research aims to know the reality of a two examined variables at the organization studied identifying the relationship between managerial processes reengineering and organizational citizenship behavior. The research applied on the Electronic Manufacturing Company encompassing a sample of managers and employees consisted of (100) individuals. A questionnaire is the main instrument for data gathering, which has been included (45) questions as well as personal interviews to support the questionnaire's questions and to achieve greater realism for collecting information.

Answers were analyzed to reach the final results through the use of a number of statistical methods via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 13 2009
Journal Name
Journal Of Planner And Development
Urban creep on the green areas and its environmental effects on the city of Baghdad
...Show More Authors

he planning process is generally aimed at developing the city and making it meet the needs of different citizens. The green areas constitute one of the basic needs of the city and with the rapid and unusual growth in the size of cities, especially in the third world countries, which is often embodied in capitals. Which was achieved as a result of many reasons, including political, economic and social and even enshrined through some of the decisions that were issued and the city of Baghdad, but a clear example of these cities. The city and the environment are inseparable terms. The city is where people spend their lives and their daily experiences, and the environment is the center in w

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator
...Show More Authors

The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref