Preferred Language
Articles
/
bsj-8362
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Journal Of Legal Sciences
Infringement of Phonogram Producers’ Rights (Piracy)
...Show More Authors

Piracy is one of the most important problems faced by sound record producers, because it is a problem that technology, evolves with the development of time and and although piracy is not a new problem, it has received great attention in recent years, because of the means by which (the Internet) and its size result from it, even In many of the ruler, describing it as (the crime of nd she participated in the great the electronic age) aharm it causes to all the groups involved in it producing the sound recording, because there are three categories that contribute to the production of the sound recording, which is (the author of the recorded work, the st who performs the work and the producer who artiperforms an operation Performance recording

... Show More
View Publication
Publication Date
Wed Jan 02 2008
Journal Name
Political Sciences Journal
الطائفية وتداعياتها على بناء الدولة العراقية المعاصرة
...Show More Authors

الطائفية وتداعياتها على بناء الدولة العراقية المعاصرة

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Microcontroller – Based Spectrum Analyzer
...Show More Authors

This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.

... Show More
View Publication
Publication Date
Sun Mar 15 2026
Journal Name
Al–bahith Al–a'alami
The Impact of Financial Financing on the Future of the Iraqi Print Press, A Survey Study by the Contactor
...Show More Authors

The objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper.
This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call).
The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
" The Effect of the Auditor's Experience on the Quality of Internal Audit "
...Show More Authors

The importance of internal audit in the growing demand for services in the public and private economic units, and in the rapid growth of its systems professional, has also been recognition of the importance of internal audit quality and the quality of information provided in a long time, as well as the importance of achieving the greatest possible quality in his work to reduce accounting risks of financial reports misleading or fraudulent, which is one of the important features of the audit.

The internal audit quality are linked with the ability of auditors to detect errors in the financial statements, and their willingness to express an opinion technical neutral and non-aligned based on the results of th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The use of two indicators of market value-added and return on capital invested in measuring the performance of the Iraqi banking sector
...Show More Authors

For a long time, the intensification of profit represented a major goal for the company management ,but this goal confirmed a series of restrictions such the constriction on short period, the time rather than on long and medium strategic goal, the relationships with customers ,the supplies, employees , This goal is replaced by another one (intensification of the company's value) ,and the fortune of the share holders itself ,for the purpose  of creating value, the company must generate  great outcomes to cover the operating expense and to insure the a suitable compensation to the invested capital (the market value added) is  the indication used to estimate the company ability to create value –added the development

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
The Significance of the Folk Symbols and Their Influence on The National Identity (Chosen samples from the Contemporary Iraqi Pottery): زينب كاظم صالح
...Show More Authors

The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Engineering
CURVATURE DUCTILITYOF REINFORCED CONCRETE BEAMSECTIONS STIFFENED WITH STEEL PLATES
...Show More Authors

Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
On Skew Left n-Derivations with Lie Ideal Structure
...Show More Authors

In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and  the commutativity of Lie ideal under certain conditions were proved.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref