Preferred Language
Articles
/
ijs-7451
The Defensive Methods Against Deepfake: Review

     Due to the spread of “Deepfake” in our society and the impact of this phenomenon on politicians, celebrities, and the privacy of individuals in particular, as well as, on the other hand, its impact on the electoral process as well as financial fraud, all these reasons prompted us to present a research paper dealing with this phenomenon. This paper presents a comprehensive review of Deepfake, how it is created, and who has produced it. This paper can be used as a reference and information source for the methods used to limit deepfake by detecting forgeries and minimizing its impact on society by preventing it. This paper reviews the results of much research in the field of deepfake, as well as the advantages of each method, as well as finding points of weakness such as complexity, time consumption, and the environment that is applied to it. Methods to avoid or reduce these obstacles are also suggested.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian methods to estimate sub - population

The aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.

Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Methods of Arab TV Programs Production

This research investigates the methods of producing Investigative Arabic Television Programs that are able to prove its existence during a short period of time as a form of Television programs on Arab satellite channels growing in number and varied in content. The research aims to present qualitative and quantitative descriptions of the methods used in tackling the topics discussed in the program, and knowing whether they satisfy the conditions and scientific foundations for the research, investigation, analysis, and interpretation. The researcher uses the survey method and uses the tool of content analysis including a set of methodological steps that seek to discover the implied meaning of the research sample represented by the program

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Simplification of new fashion design methods

Simplification of new fashion design methods

View Publication Preview PDF
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Impact beyond the knowledge when students of the Faculty of education in teaching methods

Research aims to know the impact beyond the defined in the collection. The research community is the second school students at Baghdad University and a research sample (63) students, the number of experimental group (27) students and a control group (30) students.  The researcher was rewarded in variable lifetime for students and educational attainment and educational level of the parents and the educational level of mothers. The researcher has developed a test took the number of paragraphs (20).  A test was true after it has been submitted to the Group of arbitrators. The test was consistent with test method used and the reliability coefficient (0, 88). Either the statistical methods used by the researcher are: Pearson correla

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Methods of forecasting demandOn the blood substanceApplied study at the National Blood Transfusion Center

The current research deals with short term forecasting of demand on Blood material, and its' problem represented by increasing of forecast' errors in The National Center for Blood Transfusion because using inappropriate method of forecasting by Centers' management, represented with Naive Model. The importance of research represented by the great affect for forecasts accuracy on operational performance for health care organizations, and necessity of providing blood material with desired quantity and in suitable time. The literatures deal with subject of short term forecasting of demand with using the time series models in order to getting of accuracy results, because depending these models on data of last demand, that is being sta

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Aesthetics third line of the Diversity of his methods in the architecture at Mosques

The Islamic Arts which include calligraphy and specifically the third line of the greatest
manifestation of Islamic civilization affair, and it was the mosques and mosques and holy
shrines scattered in the city of Baghdad, which had a deep impact in enhancing
communication
This means research study (third line aesthetics diversity of tactics in the architecture of
mosques) It is located in four seasons, which included the first chapter the research problem
represented by asking the following - :
-What are the methods of implementation of the third line in the architecture of mosques ?
And reflected the importance of research in it represents a serious attempt to investigate the
diversity in the organization des

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using Time Series Methods To Modify The Seasonal Variations in the Consumer Price Index

     As is  known that the consumer price index (CPI) is one of the most important  price indices because of its direct effect on the welfare of the individual and his living.

       We have been address the problem of Strongly  seasonal  commodities in calculating  (CPI) and identifying some of the solution.

   We have  used an actual data  for a set of commodities (including strongly seasonal commodities) to calculate the index price by using (Annual Basket With Carry Forward Prices method) . Although this method can be successfully used in the context of seasonal&nbs

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Risks That Facing Tourism And The Managing Methods In The contemporary Challenges Theoretical study

Tourist business organizations face a challenging and the risks dynamic environment reflected its impact on the community and generate extra under pressure in the responsibilities and burdens of exceptional and affected much of factors, accidents and risks as a result of the actions and attitudes of disasters variety may exceed the geography of States border, which requires the absorption of risks facing the tourism and how to manage and deal with them scientific and reasonable grounds for the diagnosis and treatment of risk and how to reduce the aggravation and the different kinds.

As risks affecting the most important and vital to organizations as a tourist aspects of the market share and styles tourist

... Show More
Crossref
View Publication Preview PDF