The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimizing deep learning models to operate efficiently on mobile devices, (2) ensuring real-time inference without compromising accuracy, (3) maintaining user privacy when processing sensitive facial data, and (4) addressing the variability in mobile phone cameras, input resolution, and platform limitations across Android and iOS. Furthermore, the increasing sophistication of identity spoofing attacks—such as 3D masks and AI-generated faces—demands more sophisticated, robust, and multimodal detection technologies. The research findings provide a clear roadmap toward practical solutions. By evaluating the latest deep learning architectures, datasets, and anti-spoofing metrics, the study proposes a comprehensive React Native deployment path using TensorFlow Lite and TensorFlow.js to ensure cross-platform compatibility. The proposed system offers a unified classification of identity spoofing attacks and defense mechanisms, along with a structured evaluation framework that compares on-device processing with server-side detection. The results demonstrate that optimized models can achieve high accuracy, low false accept/rejection rates, and sub-second processing speeds on mobile devices. Ultimately, the study provides practical design guidelines for building robust, privacy-preserving, efficient, and real-world consumer-grade fake face detection systems.
The work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows: with
... Show MoreSarcasm is conceders one patterns of undesirable communication, which causes social problems in humans relationships because of the contradictory verbal and nonverbal expressions is known sarcasm may defined , statements with intent to belittle others in different situations, dealing with the individual deliberately, to diminish the will or overwhelmed by the recipe stupid, which generate a reaction when a person listener, raising the intentions of ridicule and undermine it, and this may happen is different from the irony interest increased in sarcasm since the development of scientists "Watzlawick '" and Bevin "Jackson's" in 1967 theory interactive and considered the sarcasm one interaction patterns in the social relationship, which use
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreSome new heterocyclic compounds containing, cyclohexenone, indazole, isoxazoline, pyrmidine and pyrazoline ring system were prepared from chalcones (1a,b). The starting chalcones (1a,b) were obtained by a base catalyzed condensation of appropriately substituted benzaldehydes and 2-acetylbenzofuran. The reaction of the prepared chalcones with ethylacetoacetate/hydrazine hydrate, hydroxylamine hydrochloride, urea, thiourea, hydrazine hydrate, phenyl hydrazine or hydrazide derivatives gave the mentioned heterocycles. All synthesized compounds have been characterized by physical and spectral methods.
Marriage is a holly secret in Christian religion .So it id natural that its ceremonies acquired religious form .In general the marriage is contracted by minister of religion in presence of the two parties or by a proxy or presence of parents if it is necessary . And to make the condition of publicity for the marriage ,its procedures must be made before witnesses .Also the minister of religionhave to confirm the agreement of the two parties before beginning the procedures.The marriage ceremonies are made.These procedures are religious traditions that includes praying and make blessings and putting the rings in fingers by thepriest . The marriage is a holly secret performed by the crown pray according to the church religious traditions
Gestational diabetes mellitus (GDM) is a complication of gestation that is characterized by impaired glucose tolerance with first recognition during gestation. It develops when ?- cell of pancreas fail to compensate the diminished insulin sensitivity during gestation. This study aims to investigate the relationship between mother adiponectin level and ?- cell dysfunction with development gestational diabetes mellitus (GDM) and other parameters in the last trimester of pregnancy. This study includes (80) subjects ( pregnant women) in the third trimester of pregnancy, (40) healthy pregnant individuals as control group aged between (17 - 42) years and (40) gestational diabetes mellitus patients with aged between (20 - 42) years. The f
... Show MoreAbstract
Drug information resources are the information that is used in medications discovery, utilization, and management. Little information about different types of resources used by Iraqi community pharmacists is known. Therefore, the objectives were to determine drug information resources' type do the pharmacists used and the common drug information questions they faced during their work in community pharmacy. A cross-sectional descriptive study was conducted in different Iraqi provinces and online self-reported survey was introduced through Google Form Software to an appropriate sample of graduated pharmacists who were working in a private community pharmacy and having at least one
... Show MoreTo study and understand the mechanism of living systems, and how it works, it is quite important to investigate it at molecular level (like genomic, proteomic) as well as the methodologies, and how to apply and imply it on different branch of sciences and how can use it in developing medical diagnosis, treatments, drugs, and increased it in the future. Additionally it can also be applied in forensic techniques, food production and agriculture, as well as genetic profiling. This can be well understand by interfering and combinations of all branches of life sciences such as chemistry, physics, biotechnology, genetic evolution, and minimize the gap between them, this
... Show MoreWhen industrial and constructional renaissance started in the world, the great interest was going on towards the equipment’s, which was the first mean for production. After industry was settled the interest was going on towards the men ship which manpower on which the production depends. It was approved that it represents the basic part in all of the processes and the protection of those individuals against dangers of these equipment’s, industry and its accidents was the basic things which was studied in many researches until it crystallized in general principles for all industries and other take care in each industry.
The professional safety is concerned as restrict which
... Show More