Preferred Language
Articles
/
VxelWJMBVTCNdQwCUtHe
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital media. Our investigation rigorously assesses the capabilities of these advanced LLMs in identifying and differentiating manipulated imagery. We explore how these models process visual data, their effectiveness in recognizing subtle alterations, and their potential in safeguarding against misleading representations. The implications of our findings are far-reaching, impacting areas such as security, media integrity, and the trustworthiness of information in digital platforms. Moreover, the study sheds light on the limitations and strengths of current LLMs in handling complex tasks like image verification, thereby contributing valuable insights to the ongoing discourse on AI ethics and digital media reliability.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Effect of Variable Parameters on Carbon Residue of Iraqi Vacuum Gas Oil using Ultrasound Techniques
...Show More Authors

An ultrasonic treatment was applied to the vacuum gas oil at intervals of 5 to 30 minutes, at 70°C.  In this work, the improvement of the important properties of Iraqi vacuum gas oil, such as carbon residue, was studied with several parameter conditions that affect vacuum efficiency, such as sonication time (5, 10, 15, 20, 25, and 30) min, power amplitude (10–50%). After ultrasonic treatment, the carbon residue of vacuum gas oil was evaluated using a Conradson carbon residue meter (ASTM D189). The experiment revealed that the oil's carbon residue had decreased by 16%. As a consequence of the experiment It was discovered that ultrasonic treatment might reduce the carbon residual and density of oil samples being studied. It also notice

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Al–bahith Al–a'alami
Dictionaries in the News.. In the light of Semiotic analysis,
...Show More Authors

We refer in this research into linguistic binaries, try rounding of simiaei news analysis. It is known that there are branches of Linguistics called social Linguistics, divided into communicative Linguistics and media. Perhaps the best justification for the inclusion of a new curriculum in media studies is a semiotic analysis of the news. I›ve turned the speech, language and communication studies in relation to different disciplines, many research projects, and returned only old curriculum, speed shift in thought, proportional to the revolution in information and communication technology, for reality imposed on the entire world, researchers are the first affected by this enormous humanitarian Almanza. Alsimiaaeon still shy away from an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Statistical Analysis of Duration of Hospitalization
...Show More Authors

      This research is mostly concerned of exploration analysis of a random sample of data from Al-sadder hospital.  We examine duration of hospital stay (DHS) and investigate any significant difference in duration between sex, age groups, occupation, patients’ condition at admission, and patients’ condition at discharge

View Publication
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Psychological analysis of the drawings of prisoners in the Kurdistan
...Show More Authors

The goal of current research to identify the implications of intellectual and psychological drawings of women in prison in Sulaimaniya province through her paint and collected through cooperation with the creativity of the development organization of women in Sulaimaniya, consisted search of five chapters, the first chapter contains the goals of the research and its problem and its significance in addition to its limits and determine the terminology, while the second chapter included the theoretical framework and the literature on the subject of the search, and in the third quarter where he explained the researchers research methodology and procedures, either in the fourth quarter may offer researchers graphics prisoners and then read th

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Vibration Analysis of Cross-Ply Plates Under Initial Stress Using Refined Theory
...Show More Authors

Natural frequency under initial stresses for simply supported cross-ply composite laminated plates (E glass- fiber) are obtained using Refind theory (RPT). This theory accounts for parabolic distribution of the transverse shear strain through the plate thickness and satisfies the zero traction boundary conditions on the surfaces of the plate without using shear correction factors. The governing equations for Eigen value problem under initial stress are derived using Hamilton’s principle and solved using Navier solution for simply supported cross-ply symmetric and antisymmetric laminated plates. The effect of many design factors such as modulus ratio, thickness ratio and number of laminates on the Natural frequency and buckling stresses

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Slab-beam Interaction in One-way Floor Systems
...Show More Authors

This study focuses on the slab-beam interaction in one-way systems. In the context of this study, slab-beam interaction means how beam deflection can affect moment distribution in one-way slabs. This interaction is usually neglected in the traditional approximate analysis that is adopted in engineering practice and design codes. Slab positive moments have been considered as indicators on the accuracy of approximate methods, as they overestimate negative moments while underestimating positive moments.

After proposing of effecting parameters in slab-beam interaction including of panel length and width, beam dimensions, and slab thickness, Buckingham’s  theorem has been adopted to transform the dimensional-mo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Research And Islamic Studies Journal
The artistic in the poetry of Kazem Jawad
...Show More Authors

the researchers pointed that the poet relied on several means in the form of poetic images, including analogy, and the metaphor with its various elements, The chromatic component has also been used in the formation of its poetic image,and resorted to the correspondence of the senses and the symbol of two types:Self-code, public code : And we find a variety of symbolic stems from different sources, from these symbols, what is religious, including what is historical and what is legendary, and such symbols, which resorted to the rare places of his poems confined to the myths contained in the Bible, His use of the general symbols was ineffective in the poetic picture, relying on the metaphor and metaphor.