DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detection in all previous studies was less than what this paper achieved, especially with the benchmark Flickr faces high-quality dataset (FFHQ). This study proposed, a new, simple, but powerful method called image Re-representation by combining the local binary pattern of multiple-channel (IR-CLBP-MC) color space as an image re-representation technique improved DeepFake detection accuracy. The IRCLBP- MC is produced using the fundamental concept of the multiple-channel of the local binary pattern (MCLBP), an extension of the original LBP. The primary distinction is that in our method, the LBP decimal value is calculated in each local patch channel, merging them to re-represent the image and producing a new image with three color channels. A pretrained convolutional neural network (CNN) was utilized to extract the deep textural features from twelve sets of a dataset of IR-CLBP-MC images made from different color spaces: RGB, XYZ, HLS, HSV, YCbCr, and LAB. Other than that, the experimental results by applying the overlap and non-overlap techniques showed that the first technique was better with the IR-CLBP-MC, and the YCbCr image color space is the most accurate when used with the model and for both datasets. Extensive experimentation is done, and the high accuracy obtained are 99.4% in the FFHQ and 99.8% in the CelebFaces Attributes dataset (Celeb-A).
Purpose: As a result of the sudden and ill-considered trade openness of Iraq after 2003 to the countries of the world in general and the neighboring countries in particular, and in the absence of the necessary support for the national productive forces and the lack of effective standardization and quality control devices, this led to the exposure of most local products, especially agricultural ones, to decline and inability On the competition and thus dumping the Iraqi market, especially the agricultural products, with imported products, this study came to find out the effect that dumping has on the local production of chicken meat and the impact of that impact on the size of the food gap, and whether the results of the practica
... Show MorePredicting the network traffic of web pages is one of the areas that has increased focus in recent years. Modeling traffic helps find strategies for distributing network loads, identifying user behaviors and malicious traffic, and predicting future trends. Many statistical and intelligent methods have been studied to predict web traffic using time series of network traffic. In this paper, the use of machine learning algorithms to model Wikipedia traffic using Google's time series dataset is studied. Two data sets were used for time series, data generalization, building a set of machine learning models (XGboost, Logistic Regression, Linear Regression, and Random Forest), and comparing the performance of the models using (SMAPE) and
... Show MoreThe goal of the research is to introduce new types of maps called semi totally Bc-continuous map and totally Bc-continuous map furthermore, study its properties. Additionally, we study the relationship of these functions and other known mappings are discussed.
Background: Postoperative pain is one of the main complications following impacted mandibular third molar (IMTM) surgery. Objectives: The aim of this study was to assess the effect of the local application of bupivacaine on reducing early postoperative pain following IMTM surgery. Material and methods: A prospective, single-blinded, randomized controlled study was conducted on 40 patients who had undergone the surgical removal of an IMTM under local anesthesia. In the study group (n = 20), absorbable gelatin sponge (AGS) soaked in 3 mL of 0.5% plain bupivacaine hydrochloride was locally applied in the post-extraction socket. In the control group (n = 20), AGS soaked in 3 mL of normal saline was used. Pain intensity was assessed using a pa
... Show MoreKS Ismaeil, BR Jawad, Journal of Physical Education, 2023
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More