Preferred Language
Articles
/
ijs-6106
Multilevel Analysis to Recognize Original Voucher from Faked Voucher
...Show More Authors

Voucher documents have become a very important information carrier in daily lives to be used in many applications. A certain class of people could exploit the trust and indulge in forging or tampering for short or long term benefits unlawfully. This holds a serious threat to the economics and the system of a nation. The aim of this paper is to recognize original voucher document through its contents. Forgery of voucher document could have serious repercussions including financial losses, so the signature, logo and stamp that are used to determine being a genuine or not by using multilevel texture analysis. The proposed method consists of several operations. First, detection and extraction of signature, logo and stamp images from original voucher document by using auto crop method. Second, each image is processed in allotted level. Third, the voucher document is classified depending on a result of each level to determine being a genuine or not. Accuracy of 94% for identification process and 95% for verification process were achieved.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Fuel
Experimental influence assessments of water drive and gas breakthrough through the CO2-assisted gravity drainage process in reservoirs with strong aquifers
...Show More Authors

Mature oil reservoirs surrounded with strong edge and bottom water drive aquifers experience pressure depletion and water coning/cresting. This laboratory research investigated the effects of bottom water drive and gas breakthrough on immiscible CO2-Assisted Gravity Drainage (CO2-AGD), focusing on substantial bottom water drive. The CO2-AGD method vertically separates the injected CO2 to formulate a gas cap and Oil. Visual experimental evaluation of CO2-AGD process performance was performed using a Hele-Shaw model. Water-wet sand was used for the experiments. The gas used for injection was pure CO2, and the “oleic” phase was n-decane with a negative spreading coefficient. The aqueous phase was deionized water. To evaluate the feasibilit

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
AGENT BASED MONITORING FOR INVESTIGATION PROCESS AND MAINTENANCE IMPROVEMENT
...Show More Authors

Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Solid Waste Treatment Using Multi-Criteria Decision Support Methods Case Study Lattakia City
...Show More Authors

Lattakia city faces many problems related to the mismanagement of solid waste, as the disposal process is limited to the random Al-Bassa landfill without treatment. Therefore, solid waste management poses a special challenge to decision-makers by choosing the appropriate tool that supports strategic decisions in choosing municipal solid waste treatment methods and evaluating their management systems. As the human is primarily responsible for the formation of waste, this study aims to measure the degree of environmental awareness in the Lattakia Governorate from the point of view of the research sample members and to discuss the effect of the studied variables (place of residence, educational level, gender, age, and professional status) o

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 27 2023
Journal Name
Journal Of Planner And Development
Contemporary formation indicators of free zones cities -Public Free zones models-
...Show More Authors

The free zone or the free economy cities are cities with classification and functional specificity, although the history of  the concept of these areas has been It dates back to distant eras, but the intellectual and philosophical construction with the support of intellectual approaches, the most important of which is globalization contributed to its rapid spread globally and taking a variety of forms and models. With the diversity of its formulas and objectives countries have competed in adopting the establishment of these areas, meanwhile The influence of related trends affected the contemporary formation of these sites. Therefore ,the research was directed focus on the importance of adopting a set of common indicators (collection

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Doubly Type II Censoring of Two Stress-Strength System Reliability Estimation for Generalized Exponential-Poisson Distribution
...Show More Authors

 In this paper, a Bayesian analysis is made to estimate the Reliability of two stress-strength model systems. First: the reliability  of a one component strengths X under stress Y. Second, reliability  of one component strength under three stresses. Where X and Y are independent generalized exponential-Poison random variables with parameters (α,λ,θ) and (β,λ,θ) . The analysis is concerned with and based on doubly type II censored samples using gamma prior under four different loss functions, namely   quadratic loss function, weighted loss functions,  linear and non-linear exponential loss function. The estimators are compared by mean squared error criteria due to a simulation study. We also find that the mean square error is

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Predicting Social Security Fund compensation in Iraq using ARMAX Model
...Show More Authors

Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
The Effect of Classification Methods on Facial Emotion Recognition ‎Accuracy
...Show More Authors

The interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm

... Show More
View Publication Preview PDF
Crossref (2)
Crossref