In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.
1-[4-(2-Hydroxy-4, 6-dimethyl-phenylazo)-phenol]-ethanone (HL1) and 2-(4-methoxy-phenylazo)-3, 5-dimethyl-phenol (HL2) were produced by combination the diazonium salts of amines with 3, 5-dimethylphenol. The geometry of azo compounds was resolved on the basis of (C.H.N) analyses, 1H and 13CNMR, FT-IR and UV-Vis spectroscopic mechanisms. Complexes of La (III) and Rh (III) have been performed and depicted. The formation of complexes has been identified by using elemental analysis, FT-IR and UV-Vis spectroscopic process as well, conductivity molar quantifications. Nature of complexes produced have been studied obeyed mole ratio and continuous alteration ways, Beer's law followed through a concentration scope (1×10-4 - 3×10-4 M). H
... Show MoreThe purpose of this study was to investigate the effect of a Cognitive- Behavioral Training Program in reducing Problems Solving among a sample of education university College Students, the study sample consisted of (50) students were randomly assigned to two groups: experimental, and control; (25) students per group, the results of (ANOVA) revealed that there were significant differences at (p < 0.05) between experimental and control group in Problems Solving level, while there were significant differences between both groups in achievement. The researchers recommended further studies on the other variables which after training students on the method of solving problems and techniques to reduce stress.<
... Show MoreAbstract:
The aim of the research is to demonstrate the impact of the salary localization service in enhancing banking competitive advantage. In order to achieve this goal, salary localization was chosen as an independent variable and its impact was studied on the dependent variable, which is the competitive advantage. The research problem lies in the fluctuation of the salary localization service from one bank to another and the impact of this on the competitive advantage. The study sample included five private Iraqi banks, namely (the National Bank of Iraq, the International Development Bank, Assyria International Bank, Al Khaleej Commercial Ban
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreProfit is a goal sought by all banks because it brings them income and guarantees them survival and continuity, and on the other hand, facing commitments without financial crisis. Hence the idea of research in his quest to build scientific tools and means that can help bank management in particular, investors, lenders and others to predict financial failure and to detect early financial failures. The research has produced a number of conclusions, the most important of which is that all Islamic banks sample a safe case of financial failure under the Altman model, while according to the Springate model all Islamic banks sample a search for a financial failure except the Islamic Bank of Noor Iraq for Investment and Finance )BINI(. A
... Show MoreResearch problem:
Problem of current research can determine the dimensions to answer the following question: The effect of teaching using the six thinking hats on academic achievement for students in the second grade average in the subject of Family Education. The importance of research: research is gaining importance in terms of:
1. That this research is the first of its kind in the researcher's knowledge _ which deals with the teaching of Family Education by using the six hats, the researcher hopes to fill a gap in the educational field and serve in other studies serve the materials home economics. 2. Keep pace with the new field of modern education and strategies. 3. Highlight on the educational strategy in the field of creative
Abstract
It is clear to everyone how important it is to implement transactions electronically, as it facilitates the provision of services to beneficiaries, whether individuals or institutions, to achieve many benefits that are not exclusive to the beneficiary or the applicant, but extends to the governmental and international bodies. And the number of users has reached millions since its emergence in 1995, because the concepts of electronic transactions have great advantages for the economy in general and the banking sector in particular, so cooperation in various fields with the aim of becoming an information society has become paramount, It allows customers to pay money to any company they want t
... Show MoreThe study of sex Structure and age characteristics of an important element of the
follow-up changes between different population groups, which are connected to a large degree
the demographic, social and economic characteristics, particularly since each population
group varying characteristics in terms of age, sex entail social, demographic, cultural and
economic implications, and from that the researcher has taken from Structure of sex and age
for population in the district of Tuz Khurmatu for (1997-2012 ) the subject of consideration
and maintain compared to see the contrast between them. Qualitative Research for installation
and the age of the urban and rural areas has touched the judiciary, as well as its respects