The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital media. Our investigation rigorously assesses the capabilities of these advanced LLMs in identifying and differentiating manipulated imagery. We explore how these models process visual data, their effectiveness in recognizing subtle alterations, and their potential in safeguarding against misleading representations. The implications of our findings are far-reaching, impacting areas such as security, media integrity, and the trustworthiness of information in digital platforms. Moreover, the study sheds light on the limitations and strengths of current LLMs in handling complex tasks like image verification, thereby contributing valuable insights to the ongoing discourse on AI ethics and digital media reliability.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreNewly 4-amino-1,2,4-triazole-3-thione ring 2 was formed at position six of 2-methylphenol from the reaction of 6-(5-thio1,3,4-oxadiazol-2-yl)-2-methylphenol 1 with hydrazine hydrochloride in the presence of anhydrase sodium acetate. Seven newly fused heterocyclic compounds were synthesized from compound 2. First fused heterocyclic was 6-(6-(3,5-di-tertbutyl-4-hydroxyphenyl)-[1,2,4]triazolo[3,4-b][1,3,4]thiadiazol-3-yl)-2-methylphenol 3 synthesized from reaction compound 2 with 3,5-di-tert-butyl-4-hydroxybenzoic acid in POCl3. Reaction compound 2 with bromophencylbromide afford 6-(6-(4-bromophenyl)-5H-[1,2,4]triazolo[3,4-b][1,3,4]-thiadiazin-3-yl)-2-methylphenol 4. 6-(6-thio-1,7a-dihydro-[1,2,4] triazolo[3,4-b][1,3,4]-thiadiazol-3-yl)-2
... Show MoreNatural Bauxite (BXT) mineral clay was modified with a cationic surfactant (hexadecy ltrimethy lammonium bromide (BXT-HDTMA)) and characterized with different techniques: FTIR spectroscopy, X-ray powder diffraction (XRD) and scanning electron microscopy (SEM). The modified and natural bauxite (BXT) were used as adsorbents for the adsorption of 4- Chlorophenol (4-CP) from aqueous solutions. The adsorption study was carried out at different conditions and parameters: contact time, pH value, adsorbent dosage and ionic strength. The adsorption kinetic (described by a pseudo-first order and a pseudo-second order), equilibrium experimental data (analyzed by Langmuir, Freundlich and Temkin isotherm models) and thermodynamic parameters (change in s
... Show MoreAll new compounds synthesized by many reactions starting from a product the compounds [I]a,b from reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride, then the compounds [I]a,b reacted with potassium thiocyanate to yield compounds [II]a,b. While the compounds[III]a,b yield from reacted the compounds [I]a,b with sodium azide then the compounds [III]a,b reacted 1,3-dipolar cycloaddition reaction with acrylic acid to give compounds [IV]a,b and the later compounds reacted with phenylene diamine to product benzimidazole compounds [V]a,b . In addition to synthesized acid chloride compounds [VI]a,b by reacted the compounds [IV]a,b with thionyl chloride .Finally reacted the compounds [VI]a,b with different aromatic amine
... Show MoreThe study focuses on assessment of the quality of some image enhancement methods which were implemented on renal X-ray images. The enhancement methods included Imadjust, Histogram Equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE). The images qualities were calculated to compare input images with output images from these three enhancement techniques. An eight renal x-ray images are collected to perform these methods. Generally, the x-ray images are lack of contrast and low in radiation dosage. This lack of image quality can be amended by enhancement process. Three quality image factors were done to assess the resulted images involved (Naturalness Image Quality Evaluator (NIQE), Perception based Image Qual
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show More