In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.
In this work, a new development of predictive voltage-tracking control algorithm for Proton Exchange Membrane Fuel Cell (PEMFCs) model, using a neural network technique based on-line auto-tuning intelligent algorithm was proposed. The aim of proposed robust feedback nonlinear neural predictive voltage controller is to find precisely and quickly the optimal hydrogen partial pressure action to control the stack terminal voltage of the (PEMFC) model for N-step ahead prediction. The Chaotic Particle Swarm Optimization (CPSO) implemented as a stable and robust on-line auto-tune algorithm to find the optimal weights for the proposed predictive neural network controller to improve system performance in terms of fast-tracking de
... Show MoreThree-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc
... Show MoreThe current study was conducted to find out the effect of zinc (Zn) on the liver tissue of adult male white mouse, Mus musculus at concentrations (50 and 100 mg/kg/day) and for (30) days.(30) mice were used, divided into three groups of (10) mice, represented by control group, group of (50) mg/kg/day and (100) mg/kg/day. Histopathological changes appeared in the liver of male mice treated with zinc in concentration (50 and 100 mg/kg/day) for 30 days, including deformation and damage to Glisson's capsule, epithelial separation of capsule, in addition to cellular changes represented by hypertrophy of hepatocytes, as seen a swelling necrosis, hypertrophy of nuclei, thickening and degeneration in some hepatocytes, as well as the observed scatte
... Show MoreIn this research the change in the distance of the two stars in two binary star systems (13.6+8)M8and (13+10)M8 was studied, through the calculations the value (rate of mass transfer) of the two phases of dynamical stages of mass which are mass loss and mass transfer has been extracted in its own way ,by extracting the value of the value of (the distance variation between the two stars) has been found only in the mass transfer stage by using mathematical model ,in mass loss stage and were calculated from the change and the difference between the values of each at different times of binary star system evolution ,it was found that the maximum values of and are in ma
... Show MoreHistorical scripts and Academic studies have bestrewed almost all the events of the movement of march 1941 . Yet the need was present to shine more light on important sides . These important sides were neglected due to some reasons among which came the absence of the historical material which can make a new historical detection. Then there were historical topics concerning our research which comes within context of sanitarily conditions , rarely seizes the attention of the researchers for many reasons some of them were not subjective.
The spread of Malaria among the British force was one of the sanitarily conditions that were related to the movement of march since their arrival to Basra city and its continuous spread after the second
This century is witnessing changes in various fields,which have become a challenge to the enterprises in the contemporary business environment, the most important of which is the importance of measurement and disclosure of the role of knowledge capital in the transition to the knowledge economy, which is no longer the land and labor and physical capital resources the basic. Knowledge-based capital has emerged that provides the enterprise with an area of excellence and enhances its position to achieve competitive advantage. The research tackled the concept, objectives, components and importance of knowledge capital, which is fundamental in knowledge management, creating value added and enhancing competitiveness, as well as an
... Show MoreIn modern hydraulic control systems, the trend in hydraulic power applications is to improve efficiency and performance. “Proportional valve” is generally applied to pressure, flow and directional-control valves which continuously convert a variable input signal into a smooth and proportional hydraulic output signal. It creates a variable resistance (orifice) upstream and downstream of a hydraulic actuator, and is meter in/meter out circuit and hence pressure drop, and power losses are inevitable. If velocity (position) feedback is used, flow pattern control is possible. Without aforementioned flow pattern, control is very “loose” and relies on “visual” feed back by the operator. At this point, we should examine how this valv
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreAbstract
Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More