Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreBackground: Parvovirus B19 is a human pathogenic virus associated with a wide range of clinical conditions. During pregnancy congenital infection with parvovirus B19 can be associated with poor outcome, including miscarriage, fetal anemia and non-immune hydrops.
Objective: The study aimed to determine the prevalenceof Parvovirus B19 DNA in pregnant women attending the Military hospital in Khartoum, demonstrating the association between the virus and poor pregnancy outcomes.
Subjects and methods: This study was a cross sectional study, testing pregnant Sudanese women whole blood samples (n= 97) for the presence of Parvovirus B1
... Show MoreThe research aims to measure the efficiency of health services Quality in the province of Karbala, using the Data Envelopment analysis Models in ( 2006). According to these models the degree of efficiency ranging between zero and unity. We estimate Scale efficiency for two types of orientation direction, which are input and output oriented direction.
The results showed, according Input-oriented efficiency that the levels of Scale efficiency on average is ( 0.975), in the province of Karbala. While the index of Output-oriented efficiency on average is (o.946).
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Objective(s): The aims of present study to findout the effect of aeromedical evacuation program on flight medics’ knowledge.
Methods: A pre-experimental design is carried in army aviation bases in Iraq, for the period of April 1st 2019 to October 25th 2019. Non-probability "purposive" sample of (30) flight medics are selected from army aviation bases. The questionnaire consisted of two main parts: the demographic characteristics of air paramedics, and the second part included five axes, which are (50) paragraphs related to the knowledge of air paramedics towards emergency injuries. The researcher used the statistical program version 20 to analyze the data, and the stability of the questionnaire was measured through the pre and post
Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThis research aims to study the methods of reduction of dimensions that overcome the problem curse of dimensionality when traditional methods fail to provide a good estimation of the parameters So this problem must be dealt with directly . Two methods were used to solve the problem of high dimensional data, The first method is the non-classical method Slice inverse regression ( SIR ) method and the proposed weight standard Sir (WSIR) method and principal components (PCA) which is the general method used in reducing dimensions, (SIR ) and (PCA) is based on the work of linear combinations of a subset of the original explanatory variables, which may suffer from the problem of heterogeneity and the problem of linear
... Show MoreMagnetic Resonance Imaging (MRI) is one of the most important diagnostic tool. There are many methods to segment the
tumor of human brain. One of these, the conventional method that uses pure image processing techniques that are not preferred because they need human interaction for accurate segmentation. But unsupervised methods do not require any human interference and can segment the brain with high precision. In this project, the unsupervised classification methods have been used in order to detect the tumor disease from MRI images. These metho
... Show More