Preferred Language
Articles
/
7Rej5I8BVTCNdQwC6n8V
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various methodologies in the field was created. Unlike previous studies that focused on picture splicing or copy-move detection, this study intends to investigate the universal type-independent strategies required to identify image tampering. The work provided analyses and evaluates several universal techniques based on resampling, compression, and inconsistency-based detection. Journals and datasets are two examples of resources beneficial to the academic community. Finally, a future reinforcement learning model is proposed.

Scopus Crossref
View Publication
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
What Bukhari shortened to a bug in its attribution: (Applied study in the correct mosque)
...Show More Authors

This study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.

View Publication Preview PDF
Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
Spectrum of central nervous system infections in neurosciences hospital in two years : a retrospective study
...Show More Authors

Background :Infectious disorders in general have high morbidity and mortality.. CNS infections include many disorders like bacterial meningitis, tuberculous and other subacute and chronic meningitis, viral meningitis, cerebral abscess, spinal cord infections, and others.
Objective: To assess our locality about prevalence of CNS infections , to have more awareness regarding CNS infections, and to try to find the proper way to reduce their prevalence and to treat them in appropriate way.
Method :We revised the records of all the cases of CNS infections excluding cases of spinal cord infections who were admitted in the wards of neuroscience hospital over the previous two years ( from July/2010 to June 2012 ),those were 132 cases.Seaso

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The role of TNF-? in the pathogenesis of multiple myeloma “a study in Iraqi patients”
...Show More Authors

During recent years, there has been an increasing interest in the investigation of the cytokines roles in pathogenesis of cancer, thus the study aimed at evaluating the level of tumor necrosis factor-alpha(TNF-?) in sera of Iraqi multiple myeloma (MM) patients. Beta 2-microglobulion (?2-m) was assessed to determine if there was any association between this cytokine and the level of ?2- m, as the latter is related to the stage of the disease. In addition, the age and gender were also taken into consideration. Furthermore, we investigated the relationship between IgG and TNF-? in sera of patients. 49 Iraqi patients (27 males and 22 females).The patients were also divided into two groups: the first group included (17) patients who were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
British Journal Of Neurosurgery
An enemy hides in the ceiling; pediatric traumatic brain injury caused by metallic ceiling fan: Case series and literature review
...Show More Authors

Purpose: We report a series of 29 pediatric patients who sustained head injuries due to metallic ceiling fans. They all were admitted to the Emergency Department of Neurosurgery Teaching Hospital in Baghdad, Iraq, during January 2015 to January 2017. Results: Pediatric ceiling fan head injuries are characterized by four traits which distinguish them from other types of head injuries; 1- Most of them were because of climbing on or jumping from furniture between the ages of two and five. 2- Most of them sustained compound depressed skull fracture which associated with intracranial lesions and pneumocephalus. 3- The most common indication for surgical intervention was because of dirty wound which mixed with hairs. 4- These variables were stati

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2023
Journal Name
3 Biotech
Detection of orthodontically induced inflammatory root resorption-associated biomarkers from the gingival crevicular fluid by proteomics analysis: a randomized-controlled clinical trial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Nano Fluid Detection for HPHE System Using Different Lasers
...Show More Authors

Among the different passive techniques heat pipe heat exchanger (HPHE) seems to be the most effective one for energy saving in heating ventilation and air conditioning system (HVAC). The applications for nanofluids with high conductivity are favorable to increase the thermal performance in HPHE. Even though the nanofluid has the higher heat conduction coefficient that dispels more heat theoretically but the higher concentration will make clustering .Clustering is a problem that must be solved before nanofluids can be considered for long-term practical uses. Results showed that the maximum value of relative power is 0.13 mW at nanofluid compared with other concentrations due to the low density of nanofluid at this concentration. For highe

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 05 2021
Journal Name
Semiconductor Science And Information Devices
Cladding Modified Fiber Bragg Grating for Copper Ions Detection
...Show More Authors

This paper reports a fiber Bragg grating (FBG) as a biosensor. The FBGs were etched using a chemical agent,namely,hydrofluoric acid (HF). This implies the removal of some part of the cladding layer. Consequently, the evanescent field propagating out of the core will be closer to the environment and become more sensitive to the change in the surrounding. The proposed FBG sensor was utilized to detect toxic heavy metal ions aqueous medium namely, copper ions (Cu2+). Two FBG sensors were etched with 20 and 40 μm diameters and fabricated. The sensors were studied towards Cu2+ with different concentrations using wavelength shift as a result of the interaction between the evanescent field and copper ions. The FBG sensors showed

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 17 2017
Journal Name
International Journal Of Science And Research (ijsr)
Detection System of Varicose Disease using Probabilistic Neural Network
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Credit Card Fraud Detection Using Improved Deep Learning Models
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Crossref