The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimizing deep learning models to operate efficiently on mobile devices, (2) ensuring real-time inference without compromising accuracy, (3) maintaining user privacy when processing sensitive facial data, and (4) addressing the variability in mobile phone cameras, input resolution, and platform limitations across Android and iOS. Furthermore, the increasing sophistication of identity spoofing attacks—such as 3D masks and AI-generated faces—demands more sophisticated, robust, and multimodal detection technologies. The research findings provide a clear roadmap toward practical solutions. By evaluating the latest deep learning architectures, datasets, and anti-spoofing metrics, the study proposes a comprehensive React Native deployment path using TensorFlow Lite and TensorFlow.js to ensure cross-platform compatibility. The proposed system offers a unified classification of identity spoofing attacks and defense mechanisms, along with a structured evaluation framework that compares on-device processing with server-side detection. The results demonstrate that optimized models can achieve high accuracy, low false accept/rejection rates, and sub-second processing speeds on mobile devices. Ultimately, the study provides practical design guidelines for building robust, privacy-preserving, efficient, and real-world consumer-grade fake face detection systems.
Many studies have focused on identifying and classifying freshwater fishes in Iraq, concerned with describing, organizing, and drawing up a list of freshwater fishes in Iraq or the Tigris and Euphrates rivers. Within the most recent updates at the beginning of 2023, 53 native freshwater and 20 exotic (alien or introduced) fish species are recorded and described. This study reviewed the database of morphology and molecular studies of freshwater fish in Iraq and reported species while surveying the fish fauna at different water bodies of the country from 2010 to the beginning of 2023. In conclusion, 29 species (about 40.3%) of all 72 fish species in Iraq still need to be available information on their molecular data.
The limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show MoreObjective: To examined the common frequency of cervical cancer in Iraqi women. Study Design: Descriptive study Place and Duration of Study: This study was conducted at the Iraqi Cancer Agency and the Cancer Registry data from the Iraqi Ministry of Health provided assistance in data gathering from 1st April 2020 to 31st December 2021. Methods: The study examined 504 women diagnosed with cervical cancer. Their ages ranged from 20 to over 80 years. The data analysis employed descriptive statistics to determine the frequency, proportion, and incidence of cervical cancer. Results: The cervical cancer was predominantly caused by human papillomavirus in women in 2020 (1.29%) and 2021 (2.1%). In 2020, the number of cases of cervical can
... Show Moreالنظام السياسي في كوريا الشمالة
Background: Ameloblastoma is the most common clinically significant odontogenic tumor, known for its locally invasive potential and frequent recurrences unless treated radically. Endocan is a soluble proteoglycan which is reported to have prognostic implications in multiple human diseases and tumors. This study aims to describe the expression of endocan in ameloblastoma. Materials and methods: With immunoperoxidase method; tissue sections of formalin fixed- paraffin embedded blocks for ameloblastomas were stained with monoclonal antibodies to endocan, the localization of the endocan expression was examined and the resulting scores of the tissue sections were analyzed according to age, sex, site and tumor subtype. Results: endocan was found
... Show MoreThe objective of drilling parameters optimization in Majnoon oilfield is to arrive for a methodology that considers the past drilling data for five directional wells at 35 degree of inclination as a baseline for new wells to be drilled. Also, to predicts drilling performance by selecting the applied drilling parameters generated the highest rate of penetration (ROP) at each section. The focal point of the optimization process is to reduce drilling time and associated cost per each well. The results of this study show that the maximum ROP could not be achieved without sufficient flow rate to cool and clean the bit in clay intervals (36" and 24") hole sections. Although the influence of combination of Weight on Bit (WOB), Round per mi
... Show MoreCreativity, imagination, and ingenuity are connected with instructing students in literary tasks. The purpose of the study is to determine what teaching activities are most Productive in helping students to comprehend literature. The research design used in the study is descriptive one. The researcher created a survey questionnaire that teachers could complete. It includes twelve learning activities related to teaching literature, such as: conceptual mapping of a poem, short story, or novel; observing and analyzing videos; collaborative discussions about the chosen text; and topical discussions with a partner ,composition of a poem ,analytic writings; playing a role; narrating stories with visual assistance, teacher-student exchanges; atten
... Show MoreReduction represents a form of artistic abstraction to express things with formal symbols that suggest the content of the idea, as the beauty of the design artwork cannot be unique in the form only, but in revealing its meaning as well. He resorts to shorthand to express the content of his idea related to design necessities and needs to achieve a specific function whose role is crystallized through the form that follows the function. The importance of the research was also represented in: Benefiting workers and scholars in the field of design with regard to shorthand and implicit in graphic design. The aim of the research: to identify the relationship between implicit meaning and reduced forms in graphic design. And the aesthetic of fo
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show More