Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various
... Show MoreAutonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreThe co-occurrence of metabolic syndrome with type 2 diabetes mellitus (T2DM) will potentiate the morbidity and mortality that may be associated with each case. Fasting triglycerides-glucose index (TyG index) has been recommended as a useful marker to predict metabolic syndrome. Our study aimed to introduce gender-specific cut-off values of triglycerides- glucose index for diagnosing metabolic syndrome associated with type 2 diabetes mellitus. The data were collected from Baghdad hospitals between May - December 2019. The number of eligible participants was 424. National cholesterol education program, Adult Treatment Panel III criteria were used to define metabolic syndrome. Measurement of fasting blood glucose, lipid pro
... Show MoreObjective: Assess type 2 diabetic patients’ knowledge regarding preventive measures of diabetic foot. Find out the relationship between of type 2 diabetic patients’ knowledge regarding preventive measures of diabetic foot with certain sociodemographic characteristics
Methodology: A descriptive study was carried out from (2nd January 2022 to 26th March 2022). A non –probability (purposive) sample of (60) adult patients who are diagnosed with type2 diabetes mellitus these patients have met the study criteria which was selected from Imam AL-Hussein Medical-City. The study instrument consist of two section: (Demographic Information Sheet, and Foot Care Outcome Expectation
... Show MoreBladder dysfunction is one of the most common complications of diabetes, even exceeding nephropathy or peripheral neuropathy. Diabetic cystopathyaffects patients in both sexes, and its prevalence increases over time with diabetes; our concern is to evaluate the urodynamic findings of bladder dysfunction in diabetic patients.A cross sectional study conducted at Ghazi Al-Hariri Surgical specialized hospital during the period from the firsts of January 2018 to the end of Mar 2019, in which 118 diabetic patients (71 female and 47 male) with lower urinary tract symptoms were enrolled in the current study. The mean age (62±13) years old, 37.3% of patients presented with urgency as the main type of dysfunction. Diabetic cystopathy were fo
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More