Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.
The effect of using different R -molar ratio under variable reaction conditions (acidic as well as basic environment and reaction temperature) have been studied. The overall experiments are driven with open and closed systems. The study shows that there is an optimum value for a minimum gelling time at R equal 2. The gelling time for all studied open system found to be shorter than in closed system. In acidic environment and when R value increased from 2 to 10, the gelling time of closed systems has increased four times than open systems at T=30 ?C and fourteen times when temperature reaction increased to 60 ?C. While in basic environment the influence of increasing R value was limited.
In this research, the structural behavior of reinforced concrete columns made of normal and hybrid reactive powder concrete (hybrid by steel and polypropylene fibers) subjected to chloride salts with concentration was 8341.6 mg/l. The study consists of two parts, the first one is experimental study and the second one is theoretical analysis. Three main variables were adopted in the experimental program; concrete type, curing type and loading arrangement. Twenty (120x120x1200) mm columns were cast and tested depending on these variables. The samples were reinforced using two different bars; Ø8 for ties and Ø12 with minimum longitudinal reinforcement (0.01Ag). The specimens were divided into two main groups based o
... Show MoreIntroduction: Although it is discouraged, community pharmacy customers can obtain oral corticosteroids (OCSs) without prescriptions from some community pharmacies in Iraq. Medication abuse is defined as the use of medication for non-medical reasons. Objectives: The study aimed to determine demographics, beliefs, and perceptions associated with the abuse of oral corticosteroids for non-illness reasons among community pharmacy customers. Methods: This cross-sectional study was conducted in fall 2018 in four provinces in Iraq. Customers of 19 community pharmacies asking for OCSs for themselves without a prescription were administered a paper survey. This study used the Theory of Reasoned Action (TRA) to measure the relation
... Show MoreThis study aimed to evaluate the effectiveness of a novel concrete-encased column (CE) using small circular steel tubes filled with cementitious grouting material (GFST) as the primary reinforcement instead of traditional steel bars. The research involved three different types of reinforcement: conventional steel bars, concrete-filled steel tubes with 30% of the reinforcement ratio of steel bars, and concrete-filled steel tubes with the same reinforcement ratio as steel bars. Twenty-four circular concrete columns were tested and categorized into six groups based on the type of reinforcement employed. Each group comprised four columns, with one subjected to concentric axial load, two subjected to eccentric axial load (with eccentrici
... Show MoreThis article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show MoreIn this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communic
... Show MoreIntroduction: Attention is a fundamental cognitive function in sports, particularly in volleyball, where players must process multiple stimuli and make rapid decisions. Effective attentional control can enhance an athlete’s ability to react to dynamic game situations. The nomination of ideas strategy. Objective: This study aims to examine the effectiveness of the nomination of ideas strategy in enhancing divided and selective attention and its subsequent impact on volleyball skill performance. Methodology: A controlled experimental design was employed, involving volleyball players divided into an experimental group and a control group. The experimental group integrated the nomination of ideas strategy into their training sessions,
... Show MoreThe budget represents a critical accounting tool used for planning and control. It is considered a measure of the results expected to occur.
This study aims to identify the impact of the Kaizen Budget in reducing costs and continuous improvement on the General Company's operations for Light Industries. The research idea is based on the fact that preparing the budget based on constant improvement supports the higher management of people, processes, materials, and production methods, thus enabling them to manage and reduce their costs.
Research results that the prepared budget suffers from many shortages that limit the materials' usefulness for management
Abstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show More