Reconstruction an object from its Fourier magnitude has taken a great deal in the literature and there is still no obvious solution for the failure of this algorithm. In this paper, the frequent failure of the phase retrieval is discussed in details and it has been shown that when the object is cento-symmetric, the object support is vital element to ensure uniqueness while for asymmetric object; the asymmetric support of the object is not enough to ensure uniqueness but the reconstruction appear to include most of the information of the original object. This is also true for the reconstruction of a complex function.
The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreThe research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta
... Show MoreIn present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.
Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronicall
... Show MoreThe recognition of handwritten numerals has many applications in automatic identification and cognition. This research contains three experimented scenarios to recognize the handwritten English (i.e. Arabic) numerals. In the first scenario the bilinear interpolation of the image is used, while in the second scenario and after the bilinear interpolation is being applied, the Sobel operators are applied on the resulted interpolated image. In the third scenario which represents the last one, the effect of normalization of image dimensions is tested. 550 images of handwritten numerals were tested. Three types of tests were conducted for each scenario namely: trained-set test, not-trained-set test and comprehensive-set test. Depending on the
... Show MoreThe problem of reconstruction of a timewise dependent coefficient and free boundary at once in a nonlocal diffusion equation under Stefan and heat Flux as nonlocal overdetermination conditions have been considered. A Crank–Nicolson finite difference method (FDM) combined with the trapezoidal rule quadrature is used for the direct problem. While the inverse problem is reformulated as a nonlinear regularized least-square optimization problem with simple bound and solved efficiently by MATLAB subroutine lsqnonlin from the optimization toolbox. Since the problem under investigation is generally ill-posed, a small error in the input data leads to a huge error in the output, then Tikhonov’s regularization technique is app
... Show MoreMB Mahmood, BN Dhannoon
The current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep
... Show More