Optical Mark Recognition (OMR) is the technology of electronically extracting intended data from marked fields, such as squareand bubbles fields, on printed forms. OMR technology is particularly useful for applications in which large numbers of hand-filled forms need to be processed quickly and with a great degree of accuracy. The technique is particularly popular with schools and universities for the reading in of multiple choice exam papers. This paper proposed OMRbased on Modify Multi-Connect Architecture (MMCA) associative memory, its work in two phases: training phase and recognition phase. The proposed method was also able to detect more than one or no selected choice. Among 800 test samples with 8 types of grid answer sheets and total 58000 questions, the system exhibits an accuracy is 99.96% in the recognition of marked, thus making it suitable for real world applications.
Spray pyrolysis technique was used to make Carbon60-Zinc oxide (C60-ZnO) thin films, and chemical, structural, antibacterial, and optical characterizations regarding such nanocomposite have been done prior to and following treatment. Fullerene peaks in C60-ZnO thin films are identical and appear at the same angles. Following the treatment of the plasma, the existence regarding fullerene peaks in the thin films investigated suggests that the crystallographic quality related to C60-ZnO thin films has enhanced. Following plasma treatment, field emission scanning electron microscopy (FESEM) images regarding a C60-ZnO thin film indicate that both zinc oxide and fullerene particles had shrunk in the size and have an even distribution. In addition
... Show MoreIn this research, optical absorption data (the imaginary part of the dielectric function Ɛ2 as a function of photon energy E) were re-analyzed for three samples of a-Si:H thin films using derivative methods trying to investigate the ambiguity that accompany the interpretation of the optical data of these film in order to obtainm the optical energy gap (Eg) and the factor (r) which in concerned with the density of state distribution near the mobility edge directly without the need for a pre- assumption for the factor r usually followed in traditional methods such as the Tauc plot. The derivative method was used for two choices for the factor q (which in connected with the dependence of the dipole matrix element on the photon energy ) for
... Show Morein this paper copper oxide (cuO thin films were prepared by the method of vacum thermal evaporation a pressure.
Positive and negative parity states for 114Te have been studied applying the vibration al limit U(5) of Interacting boson model (IBM- 1 ) . The present results have shown their good agreement with experimental data in addition to the determination of the spin/parity of new energy levels are not assigned experimentally as the levels 0+2 and 5+1 and the levels 3"1 and 5-1 . Then back propagation multiLayer neural network used for positive and negative parity states for 114Te and shown their membership to the Vibration limit U(5) the network implemented by MATLAB system.
Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing
... Show MoreThe development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.