Preferred Language
Articles
/
4eZIF5wBmraWrQ4drkZy
Deep Spoof Face Detection Techniques in React Native
...Show More Authors

The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimizing deep learning models to operate efficiently on mobile devices, (2) ensuring real-time inference without compromising accuracy, (3) maintaining user privacy when processing sensitive facial data, and (4) addressing the variability in mobile phone cameras, input resolution, and platform limitations across Android and iOS. Furthermore, the increasing sophistication of identity spoofing attacks—such as 3D masks and AI-generated faces—demands more sophisticated, robust, and multimodal detection technologies. The research findings provide a clear roadmap toward practical solutions. By evaluating the latest deep learning architectures, datasets, and anti-spoofing metrics, the study proposes a comprehensive React Native deployment path using TensorFlow Lite and TensorFlow.js to ensure cross-platform compatibility. The proposed system offers a unified classification of identity spoofing attacks and defense mechanisms, along with a structured evaluation framework that compares on-device processing with server-side detection. The results demonstrate that optimized models can achieve high accuracy, low false accept/rejection rates, and sub-second processing speeds on mobile devices. Ultimately, the study provides practical design guidelines for building robust, privacy-preserving, efficient, and real-world consumer-grade fake face detection systems.

Crossref
View Publication
Publication Date
Sun Mar 15 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Sublimation and the New Culture in August Wilson's Fences
...Show More Authors

August Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Annals Of Forest Research
Histological and histochemical study of stomach in neonatal Cats
...Show More Authors

AN Salih, LO Hamza, Ann. For. Res, 2022 - Cited by 2

View Publication
Publication Date
Wed Dec 06 2023
Journal Name
Journal Of Islamic Thought And Civilization
Artistic Signature's Aesthetic Consistency and Differentiation in Arabic Calligraphy
...Show More Authors

The artistic signature of calligraphers has been regarded as a significant aspect of Arabic calligraphy since its inception. As the art form evolved and acquired an aesthetic dimension, the artistic signature became an integral part of this dimension. The calligrapher failed to include his name on the frames, a practice that has become customary among calligraphers nowadays. This tradition allowed to trace the evolution of Arabic calligraphy and identify certain gaps in the calligraphy composition. Additionally, the inclusion of calligrapher's name contributes to the achievement of visual balance within the calligraphy composition, signifying consistency or formal separation. The current study concentrated to investigate the aesthet

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
NONPARAMETRIC And Semiparametric Bayesian Estimators in survival function analysis
...Show More Authors

 Most statistical research generally relies on the study of the behaviour of different phenomena during specific time periods and the use of the results of these studies in the development of appropriate recommendations and decision-making and for the purpose of statistical inference on the parameters of the statistical distribution of life times in  The technical staff of most of the manufacturers in the research units of these companies deals with censored data, the main objective of the study of survival is the need to provide information that is the basis for decision making and must clarify the problem and then the goals and limitations of this study and that  It may have different possibilities to perform the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The pricing of the general food–stuffs in Islam
...Show More Authors

The prophet was against the monopoly . He warned the monopolies with great punishment . inspite of the high price in his time, he did not price , so did the rightely guided caliphes and the ummayads . Umar b abid al-aziz had been asked to price but he refused and said ―the prophet said ― ― God grieves ,pleases and fixes price ―
The monopoly was declard announce in the third and the fourth centuries of A.H . because of the weakness of the Islamis State and it’s failure to find the real reasons of it’s existence. Besides that they used the guaranty system in collecting the money . The guaranted shared in monopoly the food-stuff and sold it in high price .Add to that the foreign control on the executive power ,not to be menti

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Angiopoietin-2 Immunohistochemical Expression in Oral Squamous cell Carcinoma
...Show More Authors

Background: There are various secreted proteins affecting the prognosis of oral squamous cell carcinoma (OSCC) and one of them is Angiopoietin-2(Ang-2) which is thought to have an essential role in the development and progression of the tumor. Aim of the study: This study was conducted to determine the expression of (Ang-2) in (OSCC) to assess its correlations with clinicopathological parameters of the tumor. Material and Methods: 36 formalin- fixed, paraffin- embedded tissue blocks histologically diagnosed as OSCC were examined for Ang-2 immunohistochemical expression semi quantitively. Results: The expression of Ang-2 was significantly associated with histopathological grade (P value=0.023), while there is no significant association wi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri May 16 2025
Journal Name
Journal Of Lifestyle And Sdgs Review
The Chinese Participation in the Bandung Conference of 1955
...Show More Authors

Objective: This study aims to analyze the role of the People's Republic of China in the 1955 Bandung Conference and assess its contributions to international cooperation and peace. It specifically examines how China's participation aligns with the United Nations Sustainable Development Goals (SDGs), particularly Goal 16.   Theoretical Framework: The research is grounded in a structuralist approach to international relations, focusing on the agency of developing nations in shaping a post-colonial global order. It considers concepts such as peaceful coexistence, national sovereignty, and South-South cooperation.   Method: A historical-analytical method is employed, tracing China’s diplomatic trajectory from the 1954 Colombo and Bo

... Show More
View Publication
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Reflection of the community participation in enhancing organizational excellence
...Show More Authors

The research aims to identify the role of community participation in achieving organizational distinction in the Dhulia's municipality, which is one of the formations of the Ministry of Construction, Housing, Municipalities and Public Works in Salah al-Din Governorate, which is one of the service organizations that have a fundamental role in providing service to the community, which has faced many administrative challenges and many problems caused by the rapid and continuous changes in the environment, therefore modern management concepts must be adopted, such as community participation and the knowledge of its role To achieve its goals, which helps it in facing changes as well as achieving organizational excelle

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 20 2018
Journal Name
Day 3 Thu, March 22, 2018
Economics of Supramolecular Assemblies as Displacement Fluids in EOR
...Show More Authors
Abstract<p>It is estimated that over the next few decades, EOR will be used for the more than 50% of oil production in the US and worldwide. From these, in reservoir with viscositites ranging between 10 – 150 mPa.s, polymer flooding is suggsted as the EOR method. Therefore, there is an upper limit to the recommended range of reservoir oil viscosities for polymer flooding. To address the issue of this limitation of polymer injectivity and pumping efficiency, we propose a novel method. The method involves the use of Supramolecular Systems, which are composed of long-chain aminoacids and maleic acids post complexation. Their unique feature of resersible viscosities allows the operator to overcome</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref