Preferred Language
Articles
/
qxiVVpUBVTCNdQwCGSy5
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing characteristics effectively. This study proposes leveraging quantum-inspired computing to improve KNN classifiers for printer source identification, offering better accuracy even with noisy or variable printing conditions. The proposed approach uses the Gray Level Co-occurrence Matrix (GLCM) for feature extraction, which is resilient to changes in rotation and scale, making it well-suited for texture analysis. Experimental results show that the quantum-inspired KNN classifier captures subtle printing artifacts, leading to improved classification accuracy despite noise and variability.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The History of Multi Parties and its Effect on Political System in India
...Show More Authors

The History of Multi Parties and its Effect on Political System in India

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Development of a Blueprint Impact System of the risks on construction projects Implementation
...Show More Authors

In Production and Operations Management the specialists  have  tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.

     The research aims to develop a blu

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The provisions of voluntary charity and some of its contemporary applications
...Show More Authors

Summary of the research in English:

the research seeks to define the provisions of voluntary charity and some of its contemporary applications, so the research is after the definition of charity and voluntary charity, define the provisions of the Most important thing charity, where the one who is given charity, in the introduction, he talked about the importance of charity in social solidarity,As for the first topic ,it deait with a statement and definition of charity in the Quran,sunnah and comparative juris prudence,whil the second topic was conducted with clarifying the provisions of the ratified, the ratified,while the third topic was concerned with clarifying the application of voluntary charity contemporary investing the Mo

... Show More
View Publication Preview PDF
Publication Date
Wed May 24 2023
Journal Name
College Of Islamic Sciences
Analyzing the likeness of fundamentalists and examples of its jurisprudential applications
...Show More Authors

The new events in every era are endless, and it is not required of the legal texts to pursue each event by itself and attach to it its ruling.
At the same time, every event or action must have a Shari’a ruling according to the wise Lawgiver, and our scholars have noted this in every event presented to them. ...etc.
It is well known that reaching the legal ruling on a matter, by examining the detailed evidence, is subject to following the path of the rules and regulations specific to the overall evidence, which we organize on the basis of the principles of jurisprudence.
Therefore, any disagreement about the manner or content of these rules will have an impact on the difference of jurists in partial issues, when examining the d

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Lecture Notes In Networks And Systems
Comparison Between the Performance of Human Translators and AI-Supported Applications
...Show More Authors

This study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
Effect of Bacterial Infections of The Respiratory Tract System on The Activity of Rheumatoid Arthritis
...Show More Authors

Background: Several infectious lung diseases often develop in patients with Rheumatoid arthritis (RA), especially during immunosuppressive medication, including disease-modifying anti-rheumatic drugs (DMARDs). The present study aimed to determine the role of respiratory tract bacterial infection in RA activity. Methods: Blood and sputum samples were collected from 31 patients with RA and 12 healthy subjects as control. The bacterial isolates were isolated and identified in collected sputum by biochemical tests and Vitec 2 system. Results: In the present study, thirty-one patients with RA were compared with 12 healthy subjects. Eight patients with RA were not infected with pathogenic bacteria (RA-NIPB) (25.8%). Twenty-three RA patients wer

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Synthesis, Spectral Identification, Antibacterial Evaluationand Theoretical Study of Co, Fe, Rh and Pd Complexes for 2-benzoylthiobenzimidazol
...Show More Authors

A new novel series of metalcomplexes are prepared from reactions between 2-benzoylthio- benzimidazole (L) with metal salts of Co (II) , Fe(III) and Rh (III) , while Pd(II) complex was obtained by mixing ligandsof 2-benzoylthiobenzimidazole (L) as primary ligand and bipyridine (L/)as secondary ligand as well as palladium chloride as metal salt in an ethanoic medium. The geometry of these compounds were identified using C.H.N.microanalysis, Ultraviolet–visible, Fourier transforms infrared, magnetic susceptibility, molar conductivity and flame atomic absorption (A.A). From the dataobtained by these spectral analyses, the molecular structures for Rh and Fe complexes were proposed to be octahedral geometry. A square planar const

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Russian Journal Of Bioorganic Chemistry
Synthesis, Identification, Antioxidant, Molecular Docking, and In Silico ADME Study for Some New Derivatives Containing Thiourea Moiety
...Show More Authors

Objective: Synthesized a series of new thiourea (TU) derivatives, tested their antioxidant activity, and investigated their expected biological activity by theoretical study (computational methods). Methods: The derivatives were made using a one-pot reaction with two steps. Initially, succinyl chloride was mixed with KSCN to make succinyl isothiocyanate. Then, primary and secondary amines were used to make TU derivatives. The theoretical studies were done by Swiss ADME and molecular docking via Genetic Optimization of Linkage Docking (GOLD). Then evaluate antioxidant activity using the DPPH scavenging method. Results: FT-IR, 1H NMR, and 13C NMR spectroscopy show the verification of all the prepared derivatives. Compounds (II), (VIII),

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 09 2022
Journal Name
Engineering, Technology & Applied Science Research
A Semi-Empirical Equation based on the Strut-and-Tie Model for the Shear Strength Prediction of Deep Beams with Multiple Large Web Openings
...Show More Authors

The behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u

... Show More
View Publication
Scopus (6)
Crossref (8)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref