Preferred Language
Articles
/
7Rej5I8BVTCNdQwC6n8V
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various methodologies in the field was created. Unlike previous studies that focused on picture splicing or copy-move detection, this study intends to investigate the universal type-independent strategies required to identify image tampering. The work provided analyses and evaluates several universal techniques based on resampling, compression, and inconsistency-based detection. Journals and datasets are two examples of resources beneficial to the academic community. Finally, a future reinforcement learning model is proposed.

Scopus Crossref
View Publication
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
New Method for the Determination of DL-Histidine by FIA and Chemiluminometric Detection
...Show More Authors

This paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Early detection of first degree relatives to type-II diabetes mellitus
...Show More Authors

Objective(s): The study aims to assess the early detection of early detection of first degree relatives to type-II
diabetes mellitus throughout the diagnostic tests of Glycated Hemoglobin A1C. (HgbA1C), Oral Glucose Tolerance
Test (OGTT) and to find out the relationship between demographic data and early detection of first degree
relatives to type-II diabetes mellitus.
Methodology: A purposive "non-probability" sample of (200) subjects first degree relatives to type-II diabetes
mellitus was selected from National Center for Diabetes Mellitus/Al-Mustansria University and Specialist Center
for Diabetes Mellitus and Endocrine Diseases/Al-kindy. These related persons have presented the age of (40-70)
years old. A questio

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 09 2016
Journal Name
Advances In Environmental Biology
A study effect Histological changes
...Show More Authors

Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
Politeness: A Socio- Pragmatic Study
...Show More Authors

The most influential theory of ‘Politeness’ was formulated in 1978 and revised in 1987 by Brown and Levinson. ‘Politeness’, which represents the interlocutors’ desire to be pleasant to each other through a positive manner of addressing, was claimed to be a universal phenomenon. The gist of the theory is the intention to mitigate ‘Face’ threats carried by certain ‘Face’ threatening acts towards others.

            ‘Politeness Theory’ is based on the concept that interlocutors have ‘Face’ (i.e., self and public – image) which they consciously project, try to protect and to preserve. The theory holds that various politeness strategies are used to prot

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
(دراسة تحليلية): ( A field study )
...Show More Authors

The research aimed to identify the effects of the modern of technology on translating the media term from English language to Arabic. and try to identify the use of the impact of foreign media terminologies on the Arabic media term, and to know the effect of the translation process on Arabic media terminologies.

This research is considered an analytical study by using survey study for 111 items and the results for the study as following:

1.High percentage of the (use of foreign terms work to low the level of production) was (68.13%) and average 3.55

2.The percentage of (The multiplicity of translation of the foreign term into Arabic effects on the opinions and cognitive ideas of the Arab researcher and affects the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model for Using a Students Attendance Management Information Systems/ A Case Study In Lebanese French University/ Erbil
...Show More Authors

This study aims to design unified  electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed  the acceptable limit of being absent, and by that we can replace the traditional way of  using papers to count absence,  with  a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.

            In order to achieve the study's objectives, we designed an information syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
Employment and Labor Union Laws in Japan between the 1889 and 1946 Constitutions: A Comparative Study: أفراح محمد علي
...Show More Authors

This research is based on the descriptive and analytical methodology. The importance of studying labor laws and labor unions in Japan between 1889 and 1946 constitutions is because Japan was out of a feudal phase, and had no idea about the factory system and industrialization in their modern sense before the Meiji era. Generally, its labor system used to be mostly familial, and the economic system was based on agriculture. This called for the enactment of legislations and laws appropriate for the coming phase in Meiji era. Thus, this paper examines the role of Meiji government in enacting labor legislations and laws when he came to power in 1896, and his new constitution in 1889 and the civil code of 1896. It further examines the way Mei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Indian Journal Of Public Health Research & Development
A Comparative Study of Vitamin D Levels and Some Biochemical Parameters between Healthy and Breast Cancer in Iraqi Females.
...Show More Authors

Breast cancer is one of the most widespread cancers,depending on World Health Organization, cancer calculated for approximately 7.6 million incidences in 2008, whoever expected elevation in incidence is about 13.1 million in 2030. So that the current research investigates vitamin D role in the occurrence of this disease and explains if vitamin D has a positive effect on the incidence of disease, as well as measuring parathyroid hormone and estrogen levels. Three groups were included in this analysis: control healthy women, benign and malignant breast tumor women. All cases that were selected at the beginning of the disease diagnosis. According to statistical values vitamin D showed highly significant (P<0.001) decrease in benign (3.74±2.33

... Show More
Preview PDF