The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimizing deep learning models to operate efficiently on mobile devices, (2) ensuring real-time inference without compromising accuracy, (3) maintaining user privacy when processing sensitive facial data, and (4) addressing the variability in mobile phone cameras, input resolution, and platform limitations across Android and iOS. Furthermore, the increasing sophistication of identity spoofing attacks—such as 3D masks and AI-generated faces—demands more sophisticated, robust, and multimodal detection technologies. The research findings provide a clear roadmap toward practical solutions. By evaluating the latest deep learning architectures, datasets, and anti-spoofing metrics, the study proposes a comprehensive React Native deployment path using TensorFlow Lite and TensorFlow.js to ensure cross-platform compatibility. The proposed system offers a unified classification of identity spoofing attacks and defense mechanisms, along with a structured evaluation framework that compares on-device processing with server-side detection. The results demonstrate that optimized models can achieve high accuracy, low false accept/rejection rates, and sub-second processing speeds on mobile devices. Ultimately, the study provides practical design guidelines for building robust, privacy-preserving, efficient, and real-world consumer-grade fake face detection systems.
Objective: To determine the prevalence of bullying among primary schools’ children with some associated factors, and resultant effects. Methodology: This cross-sectional study with analytic elements was carried out from February through April 2022. It included a sample of 410 students from six governmental primary schools from both sides of Baghdad city. A self-constructed questionnaire was used. It comprised the following parts: Part (1): socio-demographic data, Part (2): questions that review the students’ exposure to bullying, and Part (3) entails the effects of bullying on those children. Results: The total sample was composed of 410 students; their mean age was 9.51±1.94 years. The prevalence of bullying was 56.34%. Studen
... Show MoreUltrasound is a mechanical energy which can generate altering zones of compression and rarefaction along its path in the tissues. Ultrasound imaging can provide a real time screening for blood and multiple organs to aiding the diagnostic and treatment. However, ultrasound has the potential to deposit energy in the blood and tissues causing bio effects which is depending on ultrasound characteristics that including frequency and the amount of intensity. These bio effects include either a stable cavitation presented non thermal effects or inertial cavitation of harmful effect on the tissues. The non-thermal cavitation can add features in diagnostic imaging and treatment more than the inertial cavitation. Ultrasound Contrast agents are a micro
... Show MoreIn recent years, the linguo-philosophical studies of metaphor have tended to define metaphor as an interaction of the object, that is the referent of conceptualization and some features that are associated with sensual manner realities, whose name is used when resolving the conceptual problem-nominative situation, namely the situation of the formation of a new concept and its verbalization. The objective of this term paper lies in the phenomenon of metaphors used in modern political discourse. In our understanding a metaphor is not only of a linguistic nature, but also political. This paper approaches the subject of conceptual metaphor and political argumentation through the prism of synergies of the political topic, affirmative or negative
... Show MoreThe current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreThe Collapse of the Dreams in Ayad Akhtar’s Disgraced (2012) is a study that examines the theme of shattered dreams within the context of the play. Focusing on the protagonist Amir Kapoor, a successful Pakistani-American lawyer, and his journey from assimilation to self-discovery. This study explores the consequences of denying one's cultural heritage and the disintegration of personal aspirations. Through a close analysis of Amir's interactions with his wife, friends, and colleagues. This research investigates the underlying factors that contribute to the collapse of dreams and the unraveling of identity. By employing literary analysis and cultural criticism, the research sheds light on the complexities of cultural assimilation, racial i
... Show MoreTennessee Williams' The Glass Menagerie is peopled with powerless and defenseless characters. These characters are hypersensitive and in a constant search for protection. They are highly pressurized by life and its bitter reality. Adding to that they are haunted by their fear from the future. They are escapist who try their best to hide behind a protective shield. Their tireless search for security is never smothering. Their only possible defensive mechanism is to flee from their immediate hostile and aggressive surrounding. To achieve this aim, each character has improvised a method that suits him / her best. For example, one of the characters (Tom) sought refuge in alcohol and late night shows. While the other (Amanda) chose to re-live th
... Show MoreDomestic violence, or as sometimes known as family abuse, is usually related to a domestic or local setting as in cohabitation or in marriage. It can take the forms of being physical, verbal, economic or emotional. Globally, most of the domestic violence is overwhelmingly directed to females as they tend to experience and receive severe forms of violence, most likely because they do not involve their intimate, or sometimes even non-intimate partners, in the process of mental and physical self-defense.
Sometimes countries justify domestic violence directed to females, they may be leg
... Show Moreلقد تسبب انتشار الإرهاب في العالم وكذلك الحروب الأهلية والصراعات في أوائل القرن الحادي والعشرين في جميع أنحاء العالم في الكثير من الأضرار وخلفت ضحايا جسيمة. أدت الهجمات الإرهابية على النساء، مثل اختطاف بوكو حرام لأكثر من 270 تلميذة في نيجيريا وتقارير عن انتشار الاغتصاب والاعتداء الجنسي في المناطق التي مزقتها الحرب، إلى إنتاج العديد من العروض المسرحية في الولايات المتحدة التي تصور خواص الجناة وكذلك الضحا
... Show More