Preferred Language
Articles
/
VxelWJMBVTCNdQwCUtHe
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital media. Our investigation rigorously assesses the capabilities of these advanced LLMs in identifying and differentiating manipulated imagery. We explore how these models process visual data, their effectiveness in recognizing subtle alterations, and their potential in safeguarding against misleading representations. The implications of our findings are far-reaching, impacting areas such as security, media integrity, and the trustworthiness of information in digital platforms. Moreover, the study sheds light on the limitations and strengths of current LLMs in handling complex tasks like image verification, thereby contributing valuable insights to the ongoing discourse on AI ethics and digital media reliability.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Sep 15 2025
Journal Name
Journal Of Physical Education
Body Image and Its Relationship With Self – Confidence In Female College of Physical Education and Sport Sciences Students
...Show More Authors

View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Ijddt
Synthesis, antioxidant activity and molecular docking study of 1, 2, 4-Triazole and their corresponding fused rings containing 2-Methylphenol
...Show More Authors

Newly 4-amino-1,2,4-triazole-3-thione ring 2 was formed at position six of 2-methylphenol from the reaction of 6-(5-thio1,3,4-oxadiazol-2-yl)-2-methylphenol 1 with hydrazine hydrochloride in the presence of anhydrase sodium acetate. Seven newly fused heterocyclic compounds were synthesized from compound 2. First fused heterocyclic was 6-(6-(3,5-di-tertbutyl-4-hydroxyphenyl)-[1,2,4]triazolo[3,4-b][1,3,4]thiadiazol-3-yl)-2-methylphenol 3 synthesized from reaction compound 2 with 3,5-di-tert-butyl-4-hydroxybenzoic acid in POCl3. Reaction compound 2 with bromophencylbromide afford 6-(6-(4-bromophenyl)-5H-[1,2,4]triazolo[3,4-b][1,3,4]-thiadiazin-3-yl)-2-methylphenol 4. 6-(6-thio-1,7a-dihydro-[1,2,4] triazolo[3,4-b][1,3,4]-thiadiazol-3-yl)-2

... Show More
Preview PDF
Publication Date
Sat Aug 05 2017
Journal Name
Oriental Journal Of Chemistry
Adsorption of 4-Chlorophenol from Aqueous Solution onto Iraqi Bauxite and Surfactant–modified Iraqi Bauxite: Equilibrium, Kinetic, and Thermodynamic Studies
...Show More Authors

Natural Bauxite (BXT) mineral clay was modified with a cationic surfactant (hexadecy ltrimethy lammonium bromide (BXT-HDTMA)) and characterized with different techniques: FTIR spectroscopy, X-ray powder diffraction (XRD) and scanning electron microscopy (SEM). The modified and natural bauxite (BXT) were used as adsorbents for the adsorption of 4- Chlorophenol (4-CP) from aqueous solutions. The adsorption study was carried out at different conditions and parameters: contact time, pH value, adsorbent dosage and ionic strength. The adsorption kinetic (described by a pseudo-first order and a pseudo-second order), equilibrium experimental data (analyzed by Langmuir, Freundlich and Temkin isotherm models) and thermodynamic parameters (change in s

... Show More
Publication Date
Mon Dec 25 2017
Journal Name
Oriental Journal Of Chemistry
Adsorption of 4-Chlorophenol from Aqueous Solution Onto Iraqi Bauxite and Surfactant–Modified Iraqi Bauxite: Equilibrium, Kinetic, and Thermodynamic Studies
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Global Pharma Technology
Synthesis ,Characterization and Study of Liquid Crystalline Behavior of New Compounds Containing thiazolidin-4-one,1,2,3-triazole and benzimidazol Rings
...Show More Authors

All new compounds synthesized by many reactions starting from a product the compounds [I]a,b from reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride, then the compounds [I]a,b reacted with potassium thiocyanate to yield compounds [II]a,b. While the compounds[III]a,b yield from reacted the compounds [I]a,b with sodium azide then the compounds [III]a,b reacted 1,3-dipolar cycloaddition reaction with acrylic acid to give compounds [IV]a,b and the later compounds reacted with phenylene diamine to product benzimidazole compounds [V]a,b . In addition to synthesized acid chloride compounds [VI]a,b by reacted the compounds [IV]a,b with thionyl chloride .Finally reacted the compounds [VI]a,b with different aromatic amine

... Show More
Publication Date
Thu Dec 31 2020
Journal Name
Neuroquantology
Assessment of Some Enhancement Methods of Renal X-ray Image
...Show More Authors

The study focuses on assessment of the quality of some image enhancement methods which were implemented on renal X-ray images. The enhancement methods included Imadjust, Histogram Equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE). The images qualities were calculated to compare input images with output images from these three enhancement techniques. An eight renal x-ray images are collected to perform these methods. Generally, the x-ray images are lack of contrast and low in radiation dosage. This lack of image quality can be amended by enhancement process. Three quality image factors were done to assess the resulted images involved (Naturalness Image Quality Evaluator (NIQE), Perception based Image Qual

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref