Preferred Language
Articles
/
C0JT-JkBMeyNPGM3PLvD
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to deception by morphed images. Finally, morph detection and classification are conducted using the proposed SNN framework, which incorporates a novel feature fusion strategy based on Canonical Correlation Analysis (CCA) to enhance discriminative power. The model is trained and evaluated using publicly available Face Recognition Technology (FERET) and Face Recognition Grand Challenge (FRGC) datasets, comprising 1,030 real and 2,000 morphed images. Experimental results demonstrate that the proposed method significantly strengthens the resilience of FRS to morphing attacks, achieving a high detection accuracy of 99.9%. This confirms the model’s effectiveness in distinguishing between real and manipulated images with minimal errors.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
The Innovative Method for Vaccine Preparation Against Multidrug Resistant and Virulence Acinetobacter baumannii Iraqi Isolates
...Show More Authors

The expanding of the medically important diseases created by multidrug-resistant Acinetobacter baumannii warrants the evolve a new methodology for prevention includes vaccination and treatment. Totally of forty-five clinical isolates identified as A.baumannii were obtained from hospitalized patients from three hospital in Baghdad City during the period from February 2016 to August 2016. Followed by diagnosing using different methods. Every strain was tested for susceptibility testing also some important virulence factorswere detected. Two isolates were chosen for the immunization and vaccine model, the first one remittent for most antibiotics except one are too virulence (strong) and the second is less virulent and resistance (weak).Enzyme-

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Reliability and Failure Probability Functions of the m-Consecutive-k-out-of-n: F Linear and Circular Systems
...Show More Authors

The m-consecutive-k-out-of-n: F linear and circular system consists of n sequentially connected components; the components are ordered on a line or a circle; it fails if there are at least m non-overlapping runs of consecutive-k failed components. This paper proposes the reliability and failure probability functions for both linearly and circularly m-consecutive-k-out-of-n: F systems. More precisely, the failure states of the system components are separated into two collections (the working and the failure collections); where each one is defined as a collection of finite mutual disjoint classes of the system states. Illustrative example is provided.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of importance in the Intellectual Capital On Internal control Systems Analytical Research in A sample of general inspectors’ offices in Iraq
...Show More Authors

The research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Study The Lung-Protective Effects of Riboflavin and Cyanocobalamin Against Lung Toxicity-Induced by Cyclophosphamide in Rats
...Show More Authors

Cyclophosphamide (CP) is a cytotoxic alkylating agent it's used associated with different side effects including lung toxicity. Vitamin B2 and vitamin B12 have lung-protective effects. This study was designed to evaluate lung-protective effects of both vitamins against lung toxicity induced by cyclophosphamide. seventy healthy adult albino male and female rats divided into seven groups each group containing ten rats were used in the present study and treated for seven days. On day eight rats were sacrificed and serum was obtained for glutathione and total antioxidant capacity measurement and lung extracted for immunohistochemical study; both vitamins significantly (P<0.05) increased glutathione and total antioxidant capacity in compar

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Possible Cardio-Protective Effects of Ethanolic Artichoke Extract against 5- Fluorouracil Induced Cardiac Toxicity in Rats
...Show More Authors

Cardiac toxicity can occur during the therapy with several cytotoxic drugs, including 5- Fluorouracil (5- FU). It is an antimetabolite that acts during the S phase of the cell cycle and is activated by thymidine phosphorylase into fluorodeoxyuridylate (5 fluoro 2'deoxyuridine 5'monophosphate, 5-FdUMP) that inhibits thymidylate synthase, thus preventing DNA synthesis that leads to imbalanced cell growth and ultimately cell death. It is still a widely used anticancer drug, since 1957. The present study aimed to evaluate the possible cardio-protective effects of ethanolic artichoke extract (Cynara scolymus L.) against 5-fluorouracil (5-FU) induced cardio-toxicity in rats by evaluating serum levels of Alanine aminotransferase, aspartate amin

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Dec 23 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluate the Protective Effect of Lactobacillus against Collateral Damage Induced by Ciprofloxacin and Levofloxacin in Iraqi Patients
...Show More Authors

Abstract:                                                                                                                Fluoroquinolones drugs are an important class of wide

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Bionatura Journal. Ibero-american Journal Of Biotechnology And Life Sciences
Efficacy of the entomopathogenic fungus, Metarhizium anisoplae, against Khapra beetle Trogoderma granarium (Coleoptera: Dermestidae) under laboratory conditions
...Show More Authors

Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Bayesian methods to estimate the failure probability for electronic systems in case the life time data are not available
...Show More Authors

In this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company.  The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system.  This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system.  We calculate the range for each estimator by using the Maximum Likelihood estimator.  We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after  it checked by the

... Show More
View Publication Preview PDF
Crossref