Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing characteristics effectively. This study proposes leveraging quantum-inspired computing to improve KNN classifiers for printer source identification, offering better accuracy even with noisy or variable printing conditions. The proposed approach uses the Gray Level Co-occurrence Matrix (GLCM) for feature extraction, which is resilient to changes in rotation and scale, making it well-suited for texture analysis. Experimental results show that the quantum-inspired KNN classifier captures subtle printing artifacts, leading to improved classification accuracy despite noise and variability.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreAn optical video communication system is designed and constructed using pulse frequency modulation (PFM) technique. In this work PFM pulses are generated at the transmitter using voltage control oscillator (VCO) of width 50 ns for each pulse. Double frequency, equal width and narrow pulses are produced in the receiver be for demodulation. The use of the frequency doubling technique in such a system results in a narrow transmission bandwidth (25 ns) and high receiver sensitivity.
Due to the intensity of competition between economic units that run the trade in durable goods had to pay a lot of these companies to follow the new selling methods aimed at attracting customers to be able to increase its sales and thereby increase their profits , these methods are installment sales, which had been in great demand by the customers with limited income, who provides them with the possibility of possession and use of such goods and to postpone the full amount of the payment to the seller, This transaction sales have grown even became installment sales system at the present time of the common types of sales transactions and deployed a lot in our environment and in many sectors of the market, and in some cases m
... Show MoreThe basic idea of the Main Outfall Drain, MOD, was to construct a main channel to collect saline drained water of the irrigation projects within central and southern parts of Iraq and discharge it down to the Arabian Gulf. The MOD has a navigation lock structures near Addalmage Lake at station 299.4km. This structure is designed to ensure navigation within the MOD. The water level difference upstream the cross regulator and the downstream conjugation structure is about 9m. This head difference can be used to generate electrical power by constricting a low head power plant. This study aimed to utilize the head difference in navigation lock structures for power generation. Different operation condition an
... Show MoreA study has been done to find the optimum separators pressures of separation stations. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid discharged from a higher pressure separator into the lower pressure separator. The set of working separators pressures which yield maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures which is the target of this work.
Computer model is used to find the optimum separators pressures. The model employs the Peng-Robinson equation of state for volatile oil. Application of this model shows good improvement of al
In this paper, we have examined the effectiveness exchange of optical vorticity via three-wave mixing (TWM) technique in a four-level quantum dot (QD) molecule by means of the electron tunneling effect. Our analytical analysis demonstrates that the TWM procedure can result in the production of a new weak signal beam that may be absorbed or amplified within the QD molecule. We have taken into account the electron tunneling as well as the relative phase of the applied lights to assess the absorption and dispersion characteristics of the newly generated light. We have discovered that the slow light propagation and signal amplification can be achieved. Our results show that the exchange o
The equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show More