Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various methodologies in the field was created. Unlike previous studies that focused on picture splicing or copy-move detection, this study intends to investigate the universal type-independent strategies required to identify image tampering. The work provided analyses and evaluates several universal techniques based on resampling, compression, and inconsistency-based detection. Journals and datasets are two examples of resources beneficial to the academic community. Finally, a future reinforcement learning model is proposed.
Objective: To evaluate nurses' practices concerning isolation techniques for Adult Leukemic Patients (ALP).
Methodology: A descriptive study was carried out at the isolation rooms at leukemic wards in Baghdad Teaching
Hospitals, starting from Jan. 27th 2008 up to the 27th of Apr. 2008. To achieve the objectives of study, a non-probability
"purposive" sample of (50) nurse was selected out of four Teaching Hospitals in Baghdad city were selected according
to the criteria of the study sample.
The study instrument consisted of two major parts. It is based on the review of literature. First is concerned with
demographic data for nurses; and the second part is observational tool (checklist) is composed of (83) item. The conte
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show MoreThe main objective of this study is to experimentally investigate the effect of the CMC polymeric drag reducer on the pressure drop occurred along the annulus of the wellbore in drilling operation and investigate the optimum polymer concentration that give the minimum pressure drop. A flow loop was designed for this purpose consist from 14 m long with transparent test section and differential pressure transmitter that allows to sense and measure the pressure losses along the test section. The results from the experimental work show that increasing in polymer concentration help to reduce the pressure drop in annulus and the optimum polymer concentration with the maximum drag reducing is 0.8 kg/m3. Also increasing in flow rate a
... Show MoreThe Noble Qur’an is the book of God, the Blessed and Exalted, in which is the teachings of God Almighty’s religion, which is Islam, in order for people to unite it and establish servitude to it. The individual and the society alike saw it appropriate to make my opinion alerting the seriousness of this matter, so the research was entitled (The Impact of Sins and Disobedience on the Individual and Society in the Holy Qur’an - Objective Study), knowing that we touched upon some of the effects, which we found it appropriate to mention in this research in the service of the good. Its details came in the Holy Qur’an without referring to others, noting their arrangement in the Holy Qur’an..
Background: Obesity typically results from a variety of causes and factors which contribute, genetics included, and style of living choices, and described as excessive body fat accumulation of body fat lead to excessive body, is a chronic disorder that combines pathogenic environmental and genetic factors. So, the current study objective was to investigate the of the FTO gene rs9939609 polymorphism and the obesity risk. Explaining the relationship between fat mass and obesity-associated gene (FTO) rs9939609 polymorphism and obesity in adults. Methods: Identify research exploring the association between the obesity risk and the variation polymorphisms of FTO gene rs9939609. We combined the modified odds ratios (OR) as total groups and subgro
... Show MoreTo determine the relationship between herpes simplex virus 1, 2 and neurological disorders, sixty samples from patients with neurological diseases were collected (40 patients with Multiple sclerosis and 20 patients with Parkinson’s disease) all of whom attended both the Neurological science Hospital as well as the Neuropathology consultation Department in Baghdad Hospital In Iraq. The samples were collected in the time frame between November 2017 and April 2018. The ages of the patients that were investigated were between (17-76) years and compared to a control group consisting of 25 samples collected from apparently healthy individuals. All the studied groups were subjected to the measurement of anti-HSV 1, 2 IgG antibodies by the means
... Show MoreThe capital banking foundation stone upon which the bank in the practice of business activities, the more capital a good financial adequacy of the increased bank's ability to grant credit and expand the various activities and provide a safety element for depositors and other sources of funding to achieve profits and increase the trading volume of the shares, causing the rise the rate of return for the shares of banks and have the Central Bank as head of the banking system by issuing instructions capital increase banking, according to the requirements of economic development and increase gross domestic product by supporting investment projects that are financed through banks, the research aims to show the extent of the banks commitment to
... Show More