Preferred Language
Articles
/
7Rej5I8BVTCNdQwC6n8V
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various methodologies in the field was created. Unlike previous studies that focused on picture splicing or copy-move detection, this study intends to investigate the universal type-independent strategies required to identify image tampering. The work provided analyses and evaluates several universal techniques based on resampling, compression, and inconsistency-based detection. Journals and datasets are two examples of resources beneficial to the academic community. Finally, a future reinforcement learning model is proposed.

Scopus Crossref
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
studies of human interferon a B and Y activities on diffrent cell
...Show More Authors

Human interferon as is the case in all kinds of interferon has complex effects but all share their impact on preventing the proliferation of viruses and preventing or reducing human Alantervjørn conversion occurs if the cell is in preventing the growth of the virus when interferon Balnmstqubl connects

View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Accounting Thought Direction of Fair value on the Relevance: An Applied Study of a Sample of the Listed Banks Listed in the Iraqi Stock Exchange
...Show More Authors

In accounting studies, more than one method is used to measure income and balance sheets elements. One of these methods is called the fair value, which use to determine the assets and liabilities ad it includes the benefits or self-satisfaction ability. This paper aims to focus on the importance of fair value as a basis of accounting measurement and its effects to achieve the relevant characteristics by using the equation is used by (Kythreotis) in his research, And Also , Editing this equation depending on the financial data and information of Iraqi Banks as a case.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 07 2024
Journal Name
Medicine
Impact of TYMS gene polymorphism on the outcome of methotrexate treatment in a sample of Iraqi rheumatoid arthritis patients – identification of novel single nucleotide polymorphism: Cross-sectional study
...Show More Authors

The current work aims to evaluate the association between genetic mutations in thymidylate synthetase (TYMS gene in exon1 and partial regions of promotor and intron 1 [877 bp, 657,220–658,096 bp]) and the therapeutic outcomes for rheumatoid arthritis (RA) Iraqi patients. An observational cross-sectional study involving 95 RA patients with established RA patients based on their methotrexate treatment responsiveness. Genetic sequencing of the TYMS gene was performed for all patients according to the instruction manuals of the sequencing company (Macrogen Inc. Geumchen, South Korea). Four polymorphisms were identified by sequencing 95 randomly selected patients in the noncoding region of TYMS

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Bionatura
The role of ferric citrate in a sample of Iraqi patients on hemodialysis- A randomized controlled clinical trial
...Show More Authors

Background: Uncontrolled hyperphosphatemia is the main difficulty facing staff treating patients with end-stage renal disease on hemodialysis. Sevelamer and calcium-containing phosphate binders have been associated with cost burden and tissue calcification, respectively. Therefore, the current trial was targeted to investigate the efficacy of a new phosphate binder, ferric citrate, in a sample of Iraqi patients with end-stage renal disease on hemodialysis. Keywords: Ferric citrate, Hemodialysis Phosphate binder

Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The role of sports marketing in achieving the competitive superiority of the organization: a case study in a sample of the Iraqi Premier League clubs
...Show More Authors

 

The organization of sporting activities at the local and international levels requires a lot of money, which has increased interest in marketing in the sports field, as it is one of the modern topics that represent the basic knowledge needed by the sports marketer and which represents one of the basic concepts to enhance the benefits and returns of sports clubs. The research problem was the weak awareness of the members of the administrative body of Iraqi sports clubs of the role of sports marketing in the dimensions of competitive superiority and not exploiting them in the optimal way that enables clubs to achieve competitive superiority. The research aims to know the role of sports marketing in competitive superi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging
...Show More Authors

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Computer Science (icecos)
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref