Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to deception by morphed images. Finally, morph detection and classification are conducted using the proposed SNN framework, which incorporates a novel feature fusion strategy based on Canonical Correlation Analysis (CCA) to enhance discriminative power. The model is trained and evaluated using publicly available Face Recognition Technology (FERET) and Face Recognition Grand Challenge (FRGC) datasets, comprising 1,030 real and 2,000 morphed images. Experimental results demonstrate that the proposed method significantly strengthens the resilience of FRS to morphing attacks, achieving a high detection accuracy of 99.9%. This confirms the model’s effectiveness in distinguishing between real and manipulated images with minimal errors.
This investigation was carried out to estimate the antiparasitic potential of silver and Chitosan nanoparticles loaded with spiramycin against toxoplasmosis infected. After mice injected intraperitoneal in a dose 103viable tachyzoites for acute infection; then treated with spiramycin, chitosan nanoparticles and silver nanoparticles as a single or combined therapy given for seven days. Peritoneal fluid examination revealed a significant decrease in the number of
The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreIn the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific
... Show MoreMany managers in geometrical and technical organizations prefer to deal with quantitative values to choose between the available options and choose the best alternative to avoid randomization and bias in decision making. One of them Baghdad Water Department, which seeks to develop the quality of its product (drinking water) and achieve its objectives under increasing growing population and the demand for water, Some of TQM tools, especially the statistical, have this ability because there is chance to use historical data and experiment of employees in Application . Two statistical tools were applied: the nominal group technique, matrix data analysis technique as well as the brainstorming tool to search for the best o
... Show MoreThe current study aims to investigate the effect of strategic knowledge management practices on an excellent performance at the Institution of Industrial Development and Research- the Ministry of Iraqi Industry (IDRMII). The present research is designed according to the descriptive method. To achieve the mentioned research objective, the researchers used the questionnaire as the main data collection tool. The research sample was 150 managers who are working at the top and middle management levels. To analyses the data gathered and reaching the results, several statistical techniques were used within AMOS.V25, SPSS.V21Software, This study reached a set of results, the most important of which is the existence of a positive correlat
... Show MoreAbstract: This research was performed to study the effect of some amino acids and vitamins on the growth of bacteria Staphylococcus aureas and its sensitivity against UV light. The results showed low inhibition in bacterial growth because amino acids repairs the damges caused by UV light. Besides the effect of two groups of antibiotics (β-lactame and tetracycline) on the growth of S. aureus and the possible interference of amino acids and vitamins in the activity of the antibiotics against this bacteria in the presence of UV light were studied. The result show increase in the sensitivity towards these antibiotics and provided protection against the antibiotics.
In the present work the clathrate hydrate dissociation enthalpies of refrigerant R134a+ water system, and R134a + water + salt system were determined. The heat of dissociation of three types of aqueous salts solutions of NaCl, KBr and NaF at three concentrations (0.09, 0.17and 0.26) mol·kg−1 for each salt type, were enthalpy measured. The Clapeyron equation was used tocalculate heat of dissociation of experimental data for binary and ternary system.In order to find the effect of compressibility factor on heat dissociation enthalpy, the study was conducted by using equation of state proposed by Peng and Robinson Stryjek-Vera (PRSV). The obtained results of dissociation enthalpy for binary system were (143.8) kJ.mol-1
... Show MoreBackground: One effective second-generation triptan for migraine attacks is sumatriptan. Following oral use, it has a 40% restricted bioavailability because of the first-pass metabolism. Aim: To develop the best intranasal Solusomes formula as a substitute that delivers into the brain directly, improving its bioavailability, and removing the first-pass outcome was the aim of this effort. Methodology: We developed solute formulations based on the Box-Behnken design and subsequently produced them via thin-film hydration. The quality by design technique was used to establish a correlation between the formulation parameters (Soluplus® and phosphatidylcholine (PC) concentrations) and signif¬icant quality powers (entrapment efficiency (
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show More