Preferred Language
Articles
/
qxiVVpUBVTCNdQwCGSy5
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing characteristics effectively. This study proposes leveraging quantum-inspired computing to improve KNN classifiers for printer source identification, offering better accuracy even with noisy or variable printing conditions. The proposed approach uses the Gray Level Co-occurrence Matrix (GLCM) for feature extraction, which is resilient to changes in rotation and scale, making it well-suited for texture analysis. Experimental results show that the quantum-inspired KNN classifier captures subtle printing artifacts, leading to improved classification accuracy despite noise and variability.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 07 2018
Journal Name
Civil Engineering Journal
Ultimate Lateral Load Capacity of Piles in Soils Contaminated with Industrial Wastewater
...Show More Authors

The present study devoted to determine the ultimate lateral carrying capacity of piles foundation in contaminated clayey soils and subjected to lateral cyclical loading. Two methods have been used to calculate the lateral carrying capacity of piles foundation; the first one is two-line slopes intersection method (TLSI) and the second method is a modified model of soil degradation. The model proposed by Heerama and then developed by Smith has been modified to take into consideration the effects of heavy loads and soil contamination. The ultimate lateral carrying capacity of single pile and piles group (2×2) driven into samples of contaminated clayey soils have been calculated by using the two methods. Clayey soil samples are contami

... Show More
View Publication
Crossref (2)
Clarivate Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Modeling and Optimization of Fatigue Life and Hardness of Carbon Steel CK35 under Dynamic Buckling
...Show More Authors

Abstract

 

The aim of this paper is to model and optimize the fatigue life and hardness of medium carbon steel CK35 subjected to dynamic buckling. Different ranges of shot peening time (STP) and critical points of slenderness ratio which is between the long and intermediate columns, as input factors, were used to obtain their influences on the fatigue life and hardness, as main responses. Experimental measurements of shot peening time and buckling were taken and analyzed using (DESIGN EXPERT 8) experimental design software which was used for modeling and optimization purposes. Mathematical models of responses were obtained and analyzed by ANOVA variance to verify the adequacy of the models. The resul

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Facies Analysis and Geological modeling of Euphrates Formation in Ajeel Oil Field, Northern Iraq
...Show More Authors

The current study summarized the construction of a three-dimensional geological model of the Aquitanian sediments age, which represented by the Euphrates and Serikagni formation in Ajeel Oil Field, where Ajeel Oil Field has structural closure towards northwest - southeast. Sedimentary of the current study consist of limestone, dolomitic limestone, dolomite (compose of skeletal grains, non-skeletal grains and cement) and the appearance of some anhydrite rocks.

     The petrographic study of the Euphrates Formation were prepared using a thin section of wells (Aj-1, Aj-4, Aj-5, Aj-6 and Aj-7), Previous studies and geological reports, as well as use well logs data  in the statistical analysis by Petrel softwa

... Show More
View Publication Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Quantitative Interpretation of Gravity and Magnetic Anomalies in West of Tikrit City and Surroundings, Iraq
...Show More Authors

     A quantitative interpretation of gravity and magnetic anomalies in west of Tikrit city and surroundings, has been completed utilizing Grav2dc and Mag2dc (2D, 2.5D) forward techniques. The modeling has been carried out along four profiles, two NW-SE profiles along the distinct gravity residual anomalies and two NE-SW profiles along the magnetic residual anomalies. The most geologic plausible model that matches the data was picked. The model along the gravity profile (A-A') reveal faulting of the basement, whereas along the profiles B-B', C-C' and D-D' did not present faulting. The models comprise of two rock units, the first is the sedimentary cover and the second unit i

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 11 2022
Journal Name
Iraqi Journal Of Science
Methods and Simulations used to Detect Photons from Exoplanets of a Parent Star
...Show More Authors

The extrasolar planets in the vicinity of stars are expected to be bright enough
and are very difficult to be observed by direct detection. The problem is attributed to
the side loops of the star that created due to the telescope diffraction processing.
Several methods have been suggested in the literatures are being capable to detect
exoplanet at a separation angle of 4λ/D and at a contrast ratio of 10-10. These
methods are more than one parameter function and imposing limitations on the inner
working distance. New simple method based on a circular aperture combined with a
third power Gaussian function is suggested. The parameters of this function are then
optimized based on obtaining a minimum inner working dis

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Docking Study of Naringin Binding with COVID-19 Main Protease Enzyme
...Show More Authors

The Coronavirus Disease (COVID-19) has recently emerged as a human pathogen caused by SARS-CoV-2 virus was first reported from Wuhan, China, on 31 December 2019. Upon study, it has been used molecular docking to binding affinity between COVID-19 protease enzyme and flavonoids with evaluations based on docking scores calculated by AutoDock Vina. Results showed that naringin suppressed COVID-19 protease, as it has the highest binding value than other flavonoids including quercetin, hesperetin, garcina and naringenin. An important finding in this study is that naringin with neighboring poly hydroxyl groups can serve as inhibitors of COVID-19 protease bind to the S pocket of protein, it is shown that residues His163, Glu166, Asn142, His41and

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
International Journal Of Transportation Engineering And Traffic System, Ijtets
Comparative Modeling of Pavement Surface Texture Variables Using ANN and SPSS Software
...Show More Authors

The health of Roadway pavement surface is considered as one of the major issues for safe driving. Pavement surface condition is usually referred to micro and macro textures which enhances the friction between the pavement surface and vehicular tires, while it provides a proper drainage for heavy rainfall water. Measurement of the surface texture is not yet standardized, and many different techniques are implemented by various road agencies around the world based on the availability of equipment’s, skilled technicians’ and funds. An attempt has been made in this investigation to model the surface macro texture measured from sand patch method (SPM), and the surface micro texture measured from out flow time (OFT) and British pendul

... Show More
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Theoretical and Practical Investigation of Blood Flow through Stenosed Coronary Lad Artery
...Show More Authors

Atherosclerosis is the most common causes of vascular diseases and it is associated with a restriction in the lumen of blood vessels. So; the study of blood flow in arteries is very important to understand the relation between hemodynamic characteristics of blood flow and the occurrence of atherosclerosis.

looking for the physical factors and correlations that explain the phenomena of existence the atherosclerosis disease in the proximal site of LAD artery in some people rather than others is achieved in this study by analysis data from coronary angiography as well as estimating the blood velocity from coronary angiography scans without having a required data on velocity by using some mathematical equations and physical laws. Fif

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref