Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing characteristics effectively. This study proposes leveraging quantum-inspired computing to improve KNN classifiers for printer source identification, offering better accuracy even with noisy or variable printing conditions. The proposed approach uses the Gray Level Co-occurrence Matrix (GLCM) for feature extraction, which is resilient to changes in rotation and scale, making it well-suited for texture analysis. Experimental results show that the quantum-inspired KNN classifier captures subtle printing artifacts, leading to improved classification accuracy despite noise and variability.
Abstract
The aim of this paper is to model and optimize the fatigue life and hardness of medium carbon steel CK35 subjected to dynamic buckling. Different ranges of shot peening time (STP) and critical points of slenderness ratio which is between the long and intermediate columns, as input factors, were used to obtain their influences on the fatigue life and hardness, as main responses. Experimental measurements of shot peening time and buckling were taken and analyzed using (DESIGN EXPERT 8) experimental design software which was used for modeling and optimization purposes. Mathematical models of responses were obtained and analyzed by ANOVA variance to verify the adequacy of the models. The resul
... Show MoreThe Coronavirus Disease (COVID-19) has recently emerged as a human pathogen caused by SARS-CoV-2 virus was first reported from Wuhan, China, on 31 December 2019. Upon study, it has been used molecular docking to binding affinity between COVID-19 protease enzyme and flavonoids with evaluations based on docking scores calculated by AutoDock Vina. Results showed that naringin suppressed COVID-19 protease, as it has the highest binding value than other flavonoids including quercetin, hesperetin, garcina and naringenin. An important finding in this study is that naringin with neighboring poly hydroxyl groups can serve as inhibitors of COVID-19 protease bind to the S pocket of protein, it is shown that residues His163, Glu166, Asn142, His41and
... Show MoreSimulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreUrban land uses of all kinds are the constituent elements of the urban spatial structure. Because of the influence of economic and social factors, cities in general are characterized by the dynamic state of their elements over time. Urban functions occur in a certain way with different spatial patterns. Hence, urban planners and the relevant urban management teams should understand the future spatial pattern of these changes by resorting to quantitative models in spatial planning. This is to ensure that future predictions are made with a high level of accuracy so that appropriate strategies can be used to address the problems arising from such changes. The Markov chain method is one of the quantitative models used in spatial planning to ana
... Show MoreArtificial Neural Network (ANN) model's application is widely increased for wastewater treatment plant (WWTP) variables prediction and forecasting which can enable the operators to take appropriate action and maintaining the norms. It is much easier modeling tool for dealing with complex nature WWTP modeling comparing with other traditional mathematical models. ANN technique significance has been considered at present study for the prediction of sequencing batch reactor (SBR) performance based on effluent's (BOD5/COD) ratio after collecting the required historical daily SBR data for two years operation (2015-2016) from Baghdad Mayoralty and Al-Rustamiya WWTP office, Iraq. The prediction was gotten by the application of a feed-forwa
... Show MoreIn the current endeavor, a new Schiff base of 14,15,34,35-tetrahydro-11H,31H-4,8-diaza-1,3(3,4)-ditriazola-2,6(1,4)-dibenzenacyclooctaphane-4,7-dien-15,35-dithione was synthesized. The new symmetrical Schiff base (Q) was employed as a ligand to produce new complexes comprising Co(II), Ni(II), Cu(II), Pd(II), and Pt(II) metal-ions at a ratio of 2:1 (Metal:ligand). There have been new ligands and their complexes validated by (FTIR), (UV-visible), 1H-NMR, 13C-NMR, CHNS, and FAA spectroscopy, Thermogravimetric analysis (TG), Molar conductivity, and Magnetic susceptibility. The photostabilization technique to enhance the polymer was also used. The ligand Q and its complexes were mixed in 0.5% w/w of polyvinyl chloride in tetrahydrofuran
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreToday’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin
... Show MoreBackground: Corona virus disease 2019 (COVID-19) is a communicable disease caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It was first identified in December 2019 in Wuhan, China, and has since spread globally, leading to an ongoing pandemic.
Aim of study: to review the clinical, lab investigation and imaging techniques, in pediatric age group affected COVID-19 to help medical experts better understand and supply timely diagnosis and treatment.
Subjects and methods: this study is a retrospective descriptive clinical study. The medical records of patients were analyzed. Information’s recorded include demographic data, exposure history, symptoms, signs, laboratory findin
... Show MoreThe study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course
... Show More