Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various methodologies in the field was created. Unlike previous studies that focused on picture splicing or copy-move detection, this study intends to investigate the universal type-independent strategies required to identify image tampering. The work provided analyses and evaluates several universal techniques based on resampling, compression, and inconsistency-based detection. Journals and datasets are two examples of resources beneficial to the academic community. Finally, a future reinforcement learning model is proposed.
This research aims at studying and analyzing the creative research thinking of the educational staffs in private universities and colleges, and also the role of incentives, in its materialistic and moral sides in the development of such thinking and the pack of restraints which cause decline in interest level of the scientificresearch, and its weak role in the development of universities in Iraq, despite the interest of the Ministry of Higher Education and Scientific Research in Iraq in scientific research as part ofits academic and humanitarian targets.Based on study and analysis, and the using if some of statistical methods such as the Alpha Chronobaghcoefficient and the (T. Test)(F. Test),the research reached a number of conclusions.
... Show MoreThe purpose of the research is to investigate the response of stock prices of companies that issued debt instruments (bonds) listed on the Abu Dhabi Securities Exchange for information content from the Moody's first credit rating announcements for the period 1 January 2005 - 30 May 2017. The study methodology was used to verify the existence of this response by the market and the Market efficiency of the Semi-strong shape. The research focused on testing the impact of the initial announcement.The research showed that there is an influential information content to announce credit ratings in stock prices, with different responses between negative and positive. It was also found that the industrial sectors sample research separately d
... Show More
The research aims to build an integrated frame of knowledge for the basic research topics, represented by (assimilation of knowledge, strategic clarity) and their basic variables, by examining the most important scientific propositions on these topics in administrative thought, and framing the knowledge contained in them, in a serious attempt to provide appropriate answers to questions The research dilemma, and the research was applied in the Iraqi Airways Company, whose number is (1200) employees, and the descriptive and analytical approach was adopted in conducting the research. A valid form for statistical analysis, i.e., with a retrieval rate of (92%). The two researchers used the (SPSS & AMOS) program for
... Show MoreABSTRACT Background: resin cement type and intraoral temperature fluctuations may affect the fracture performance of successful zirconia restorations. To fill this gap, the purpose of this study is to evaluate and compare the influence of thermocycling on fracture resistance and mode of failure of monolithic zirconia crowns luted with Rely X™ U200 and BreezeTMself-adhesive resin cements as well as imply the effect of adding 2 % of polylysine (PLS) to these cements. Materials: 64 maxillary premolars were milled out of zirconia blocks using CAD/CAM milling system. They were divided into four groups (n = 16) according to the cement type. Four different resin cements were used (RelyXTMU200, Breeze™, RelyX™ U200 with 2 % PLS
... Show MoreWater produced from power plants is one of the most important sources of water pollution, especially for areas like Baghdad, Contaminated industrial wastewater is a major environmental challenge due to the rapid growth of industries, leading to increased accumulation of harmful pollutants in water resources, the work is intended to study the impact of water generated from a power plant in the south on the level of heavy metals before and after the treatment process and after its discharge to the Tigris River. Objective is to determine the extent of heavy metals such as iron, copper, chromium, and zinc concentration in water extracted from various points and subsequently study the monthly variations of these elements with a view to assessmen
... Show Mores The study aims to identify the fairness in the distribution of municipal services between municipal districts and areas, from point of view of municipal chamber staff and from the point of view of the citizen. It also aims to identify factors affecting the fairness of the distribution of municipal services. Municipal services were being studied : hygiene and waste, water supply, sewer, creating gardens, and street paving .Factors which examined its impact on municipal services are: resources available to municipal chamber, the managerial process at municipal chamber, and factors in the external environment surrounding municipal chamber.The results of the study showed that level of the e
... Show MoreIn this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreThrough the early childhood and after the ablactating the child learns acquired food habbits that might studying with him throughout his life. Here the parents role arises: teaching the child the sound food habits and hygienic styles and whatever beneficial to the health and with the sufficient quantities for the body. In this way the experiences the child learns at home will be of great help in his future life in choosing the suitable food after becoming more dependent in making his decisions and choices away from his parents. The results in this study showed that the averages of the children’s consumption of the high energy foods in comparison with the other highest consumption average , after that comes the con sumption of soft drills
... Show More