Face recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit images in a form of a document or via the Internet, and this allows applicants to manipulate the images to produce morphing images. These photos allow both beneficial and harmful partners to cross borders using the same passport. This is considered a major threat to the security systems that allow them to travel without revealing their true identity. This paper aims to provide a comprehensive overview of face morphing attacks and the development taking place in this specialty. This paper describes the techniques for generating metamorphic images and challenges they face, in addition to the advantages and disadvantages of these techniques. It also dealt with types of techniques used in detecting and determining the attack of mutant faces in the field of deep learning or machine learning, in addition to the laws and criteria for measuring the efficiency of the algorithms used. It provides a general summary of the work that has been produced in this field.
The research deals with an evolutionary-based mutation with functional annotation to identify protein complexes within PPI networks. An important field of research in computational biology is the difficult and fundamental challenge of revealing complexes in protein interaction networks. The complex detection models that have been developed to tackle challenges are mostly dependent on topological properties and rarely use the biological properties of PPI networks. This research aims to push the evolutionary algorithm to its maximum by employing gene ontology (GO) to communicate across proteins based on biological information similarity for direct genes. The outcomes show that the suggested method can be utilized to improve the
... Show MoreBuilding Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Cent
... Show MoreThe gravity and magnetic data of Tikrit-Kirkuk area in central Iraq were considered to study the tectonic situation in the area. The residual anomalies were separated from regional using space windows method with space of about 24, 12 and 10km to delineate the source level of the residual anomalies. The Total Horizontal Derivative (THD) is used to identify the fault trends in the basement and sedimentary rocks depending upon gravity and magnetic data. The identified faults in the study area show (NW-SE), less common (NE-SW) and rare (N-S) trends. Some of these faults extending from the basement to the upper most layer of the sedimentary rocks. It was found that the depth of some gravity and magnetic source range 12-13Km, which confirm th
... Show MoreThis research analyzes the level of the short circuit effect of the Iraqi super network and decides the suitable location for the High Voltage Direct Current (HVDC) connections in order to obtain the best short circuit reduction of the total currents of the buses in the network. The proposed method depends on choosing the transmission lines for Alternating current (AC) system that suffers from high Short Circuit Levels (SCLs) in order to reduce its impact on the transmission system and on the lines adjacent to it and this after replacing the alternating current (AC) line by direct current (DC) line. In this paper, Power System Simulator for Engineering (PSS/E) is used to model two types of HVDC lines in an effective regi
... Show MoreThe impact of COVID-19 pandemic on education models was mainly through the expansion of technology use in the different educational programs. Earlier impact of COVID-19 was manifested in the complete and sudden transition to distance education regardless of institution preparedness status. Gradually, many institutions are moving back to on-campus face-to-face education. However, others including all higher education institutions in Iraq are adopting the hybrid education model. This report presents part of the end of semester evaluation survey conducted at the University of Baghdad College of Pharmacy for the Spring 2021 semester. The survey aims to address points of strength and weakness associated with the hybrid education model and spe
... Show MoreRecognizing facial expressions and emotions is a basic skill that is learned at an early age and it is important for human social interaction. Facial expressions are one of the most powerful natural and immediate means that humans use to express their feelings and intentions. Therefore, automatic emotion recognition based on facial expressions become an interesting area in research, which had been introduced and applied in many areas such as security, safety health, and human machine interface (HMI). Facial expression recognition transition from controlled environmental conditions and their improvement and succession of recent deep learning approaches from different areas made facial expression representation mostly based on u
... Show MoreThe inefficient use of spectrum is the key subject to overcome the upcoming spectrum crunch issue. This paper presents a study of performance of cooperative cognitive network via hard combining of decision fusion schemes. Simulation results presented different cooperative hard decision fusion schemes for cognitive network. The hard-decision fusion schemes provided different discriminations for detection levels. They also produced small values of Miss-Detection Probability at different values of Probability of False Alarm and adaptive threshold levels. The sensing performance was investigated under the influence of channel condition for proper operating conditions. An increase in the detection performance was achi
... Show MoreAim: to determine the effectiveness of women's self-care instructions on their post cesarean section care in Baghdad
teaching hospital.
Methodology: The present study used quasi-experimental study design in maternity words in Baghdad teaching
hospital. The sample was collected and follow up for the period (15) January 2014 until 15 May 2014 Nonprobability
(purposive sample) of (100) women post cesarean section divided in to two groups (50) women post
cesarean section considered as a study group, and another (50) women post cesarean section considered as the
control one, A questionnaire designed as a tool to collect data fit the purpose of the study a questionnaire include
demographic variables, Reproductive variables
We will provide a new method in this study that integrates two types of applications, namely Graph Theory and Conjugate Young Diagram, the idea of combining the graph and the Young diagram is presented by Ali And Mahmood, which is primarily based on the idea of the e-abacus diagram, the new method is called GCYD, it directly applies to the English letter section, which will be a two-layer coding. It makes it difficult to detect the word or sentence.
Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and
... Show More