Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreGlobal Navigation Satellite Systems (GNSS) have become an integral part of wide range of applications. One of these applications of GNSS is implementation of the cellular phone to locate the position of users and this technology has been employed in social media applications. Moreover, GNSS have been effectively employed in transportation, GIS, mobile satellite communications, and etc. On the other hand, the geomatics sciences use the GNSS for many practical and scientific applications such as surveying and mapping and monitoring, etc.
In this study, the GNSS raw data of ISER CORS, which is located in the North of Iraq, are processed and analyzed to build up coordinate time series for the purpose of detection the
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreThe aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca
... Show MoreAbstract: Background: Drug toxicity and chemotherapeutic side effects negatively impact the quality of life of breast cancer patients. Objectives: to evaluate the efficacy of pharmaceutical Interventions (PI) on quality of life (QOL)Among chemotherapy intake breast cancer women. Method: A pre-post interventional study was carried out at the chemotherapy ward of Alhabobi Hospital in Alnasiriyah City. Eligible patients received comprehensive pharmaceutical care and a self-compiled Breast Cancer Patients Medication Knowledge Guide pamphlet. Each patient received two sessions, the first at baseline and the second after 7, 14, or 21 days depending on the next taking dose of chemotherapy. Each session lasted for approximately 15-30 minutes. Par
... Show More