Preferred Language
Articles
/
txcem5IBVTCNdQwCk7lp
Detecting Deepfakes with Deep Learning and Gabor Filters
...Show More Authors

The proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue color information. The purpose of this paper is to give the reader a deeper view of (1) enhancing the efficiency of distinguishing fake facial images from real facial images by developing a novel model based on deep learning and Gabor filters and (2) how deep learning (CNN) if combined with forensic tools (Gabor filters) contributed to the detection of deepfakes. Our experiment shows that the training accuracy reaches about 98.06% and 97.50% validation. Likened to the state-of-the-art methods, the proposed model has higher efficiency.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jun 30 2023
Journal Name
The International Tinnitus Journal
Adenoidectomy and Endoscopic Myringotomy with and without ventilation tube insertion for Treatment of Otitis Media with Effusion in 6-12 years old Children
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Numerical Analysis of Fluid Flow and Heat Transfer by Forced Convection in Channel with one-sided Semicircular Sections and Filled with Porous Media
...Show More Authors

This research presents a numerical study to simulate the heat transfer by forced convection as a result of fluid flow inside channel’s with one-sided semicircular sections and fully filled with porous media. The study assumes that the fluid were Laminar , Steady , Incompressible and inlet Temperature was less than Isotherm temperature of a Semicircular sections .Finite difference techniques were used to present the governing equations (Momentum, Energy and Continuity). Elliptical Grid is Generated using Poisson’s equations . The Algebraic equations were solved numerically by using (LSOR (.This research studied the effect of changing the channel shapes on fluid flow and heat transfer  in two cases ,the first: cha

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Jordan Journal Of Biological Sciences
Comparison of the Folate and Homocysteine Levels with A80G -RFC1 Gene Polymorphism between the Sample of Iraqi Children with and without Down Syndrome
...Show More Authors

Many international studies indicated that the polymorphisms of some genes disturbed the folate homocysteine (Hcy) metabolism and increased the vulnerability to Down syndrome (DS). We aimed to measure the serum levels of folate and Hcy in DS children and compare the levels with age and sex-matched apparently normal healthy children. We also aimed to study the A80G polymorphism of the gene reduced folate carrier (RFC1) in the DS children as a risk factor. Forty children with DS (24 were boys, and 16 were girls) with the age range between 5-13 years, and 26 normal healthy children (16 boys and ten girls) were included in this study. The results show that the highest genotype in the control group was AG (53.85%) followed by AA and GG (30.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Immunoglobulins Levels and Complements in Patients with Brain Tumour (Meningioma and Glioma)
...Show More Authors

Objective(s): The present study aims at studying the relationship between immunoglobulin IgG, IgA,
IgM , as well as to C-3 and C-4 in brain tumours patients immunity (meningioms and gliomas).
Methodology: Forty sera of brain tumour patients were included 20 glioma and 20 meningioma was
tested to determine the levels of IgM, IgG IgA, C-3 and C-4 by using single radial immune-diffusion
technique and compared with 20 apparently healthy blood donors.
Results: The study revealed a significant decreasing in IgG levels in glioma as compare to meningioma
and control. The concentration of two other serum immunoglobulins and complement in both
meningioma and glioma show no significant differences with those in control group.

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 15 2008
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
riol] and its Complexes with Co", Ni 9, Cu º, and Znº.
...Show More Authors

The reaction of 2, 4, 6-trihydroxyactophenonemonohydrate with hydrazine monohydrate was realized under reflux in methanol and a few drops of glacial acetic acid were added to give the (intermediate) 2-(1-hydrazono-ethyl)-benzene-1, 3, 5-triol, which reacted with salicylaldehyde in methanol to give a new type (NO) ligand [HL][(2-1-[(2-hydroxy-benzyliidene)-hydrazono]-ethyl) benzene-1, 3, 5-triol. The ligand was reacted with Mcl.(where M-Co, Ni, Cu, and Zn) under reflux in methanol with (l: 1) ratio to give complexes of the general formula [M (HL)]. All compounds have been characterized by spectroscopic methods I" H NMR, IR. UV-Vis, HPLC, atomic absorption] microanalysis along with conductivity measurement. From the above data the proposed mo

... Show More
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Generalization of Gamma and Beta Functions with Certain Properties and Statistical Application
...Show More Authors

     This work is devoted to define new generalized gamma and beta functions involving the recently suggested seven-parameter Mittag-Leffler function, followed by a review of all related special cases. In addition, necessary investigations are affirmed for the new generalized beta function, including, Mellin transform, differential formulas, integral representations, and essential summation relations. Furthermore, crucial statistical application has been realized for the new generalized beta function.  

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
The effectiveness of the constructivist learning model in acquiring the Institute of Fine Arts' students of artistic analysis skills: اخلاص عبد القادر طاهر
...Show More Authors

The constructivist learning model is one of the models of constructivist theory in learning, as it generally emphasizes the active role of the learner during learning, in addition to that the intellectual and actual participation in the various activities to help students gain the skills of analyzing artistic works. The current research aims to know the effectiveness of the constructivist learning model in the acquisition of the skills of the Institute of Fine Arts for the skills of (technical work analysis). To achieve the goal, the researcher formulated the following hypothesis: There are no statistically significant differences between the average scores of the experimental group students in the skill test for analyzing artworks befor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program Based on Connectivism Theory in Developing E-Learning Competencies among Teachers of Islamic Education in Dhofar Governorate
...Show More Authors

Abstract

The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Crossref