User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
Periodontal disease is typically treated with mechanical debridement of the tooth surface. It may, however, be insufficient to eradicate pathogenic microorganisms on its own. Because of the microbial etiology of periodontitis, systemic or local antibiotic therapy is used as an adjunct treatment. The present study aimed to determine the effects of curcumin gel on Porphyromonas gingivalis. Eleven patients with stage II and III periodontitis were registered in the study. A double-blinded split-mouth design followed. Periodontal pockets were distributed into 2 groups; the test group received scaling and root planing along with curcumin gel, while the control group received scaling and root planing along with a placebo gel. Plaque index,
... Show MoreThis research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.
Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f
... Show MoreWe have investigated twenty five patients with type-2 diabetes mellitus aged (35-60) years and fifteen healthy persons as control group to detect Anti-Helicobacter pylori IgG antibody. All studied groups were carried out to measure fasting blood sugar, anti- Glutamic acid decarboxylase (GAD), anti-? islets cells antibody by IFAT, Anti-H. pylori IgG antibody by ELISA technique. There was significant elevation in the concentration of fasting blood sugar than in control group (P < 0.05), the patients had negative results for anti-GAD antibody and anti- ? islets cells antibody, there were significant differences (P < 0.05) of anti-H. pylori IgG antibody in 28 % of patients had type-2 diabetes than control group. This lead to suggestion that typ
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MorePurpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq. Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021) Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark
... Show MoreThis paper reports an experimental study regarding the influence of vertical oscillations on the natural convection heat transfer from a vertical channel. An experimental set-up was constructed and calibrated; the vertical channel was tested in atmosphere at 25o
C. The channel-to-ambient temperature difference was varied with the power supply to the electrical heater ranging between
15W to 70W divided into five levels. Data sets were measured under different operating condition from a test rig under six vibrating velocities (VVs) levels ranging from (5-30 m/s) in addition to the stationary state. The results show that the maximum heat transfer enhancement factor (E) occurs at Rayleigh number (Ra=2.328×103 ) and vibrational Reynol