Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various methodologies in the field was created. Unlike previous studies that focused on picture splicing or copy-move detection, this study intends to investigate the universal type-independent strategies required to identify image tampering. The work provided analyses and evaluates several universal techniques based on resampling, compression, and inconsistency-based detection. Journals and datasets are two examples of resources beneficial to the academic community. Finally, a future reinforcement learning model is proposed.
Purpose A diagnosis of tuberculosis (TB) of the head and neck has been a dilemma for clinicians, because the clinical and pathologic features tend to mimic different pathologies. Our study aimed to identify the demographic, clinical, and pathologic features of head and neck TB to help healthcare providers in the early detection of the disease. Materials and Methods We performed a retrospective analysis using the medical archives at the pathology laboratory. Twenty-one patients with a clinical and pathologic diagnosis of head and neck TB were identified from 2010 to 2019. Results The age distribution was broad, with 28.5% of the patients younger than 15 years old. Seven patients had oral TB, with the most common sites affected the labial ves
... Show MoreNowadays, the use of natural bio-products in pharmaceuticals is gaining popularity as safe alternatives to chemicals and synthetic drugs. Algal products are offering a pure, healthy and sustainable choice for pharmaceutical applications. Algae are photosynthetic microorganisms that can survive in different environmental conditions. Algae have many outstanding properties that make them excellent candidate for use in therapeutics. Algae grow in fresh and marine waters and produce in their cells a wide range of biologically active chemical compounds. These bioactive compounds are offering a great source of highly economic bio-products. The prese
... Show More
The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe problem of divorce from the phenomena that characterized the nature of privacy,
although their impact beyond the individual to include the community as a whole, the parties
to the relationship affected by divorce caused them harm moral and material for a long time,
resulting imbalance in the personal relationship and family and social relations because of the
high divorce rates, particularly in Iraq high rates of 28690 thousand cases in 2004 to 59 515
thousand cases in 2011 and an increase of more than (100%) during the period above, and this
rise caused by aggravation of many of the problems led the reasons for social, economic and
incompatibility spouses, health and lack of reproduction, not spending The wife a