The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimizing deep learning models to operate efficiently on mobile devices, (2) ensuring real-time inference without compromising accuracy, (3) maintaining user privacy when processing sensitive facial data, and (4) addressing the variability in mobile phone cameras, input resolution, and platform limitations across Android and iOS. Furthermore, the increasing sophistication of identity spoofing attacks—such as 3D masks and AI-generated faces—demands more sophisticated, robust, and multimodal detection technologies. The research findings provide a clear roadmap toward practical solutions. By evaluating the latest deep learning architectures, datasets, and anti-spoofing metrics, the study proposes a comprehensive React Native deployment path using TensorFlow Lite and TensorFlow.js to ensure cross-platform compatibility. The proposed system offers a unified classification of identity spoofing attacks and defense mechanisms, along with a structured evaluation framework that compares on-device processing with server-side detection. The results demonstrate that optimized models can achieve high accuracy, low false accept/rejection rates, and sub-second processing speeds on mobile devices. Ultimately, the study provides practical design guidelines for building robust, privacy-preserving, efficient, and real-world consumer-grade fake face detection systems.
August Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreAN Salih, LO Hamza, Ann. For. Res, 2022 - Cited by 2
The artistic signature of calligraphers has been regarded as a significant aspect of Arabic calligraphy since its inception. As the art form evolved and acquired an aesthetic dimension, the artistic signature became an integral part of this dimension. The calligrapher failed to include his name on the frames, a practice that has become customary among calligraphers nowadays. This tradition allowed to trace the evolution of Arabic calligraphy and identify certain gaps in the calligraphy composition. Additionally, the inclusion of calligrapher's name contributes to the achievement of visual balance within the calligraphy composition, signifying consistency or formal separation. The current study concentrated to investigate the aesthet
... Show MoreMost statistical research generally relies on the study of the behaviour of different phenomena during specific time periods and the use of the results of these studies in the development of appropriate recommendations and decision-making and for the purpose of statistical inference on the parameters of the statistical distribution of life times in The technical staff of most of the manufacturers in the research units of these companies deals with censored data, the main objective of the study of survival is the need to provide information that is the basis for decision making and must clarify the problem and then the goals and limitations of this study and that It may have different possibilities to perform the
... Show MoreThe prophet was against the monopoly . He warned the monopolies with great punishment . inspite of the high price in his time, he did not price , so did the rightely guided caliphes and the ummayads . Umar b abid al-aziz had been asked to price but he refused and said ―the prophet said ― ― God grieves ,pleases and fixes price ―
The monopoly was declard announce in the third and the fourth centuries of A.H . because of the weakness of the Islamis State and it’s failure to find the real reasons of it’s existence. Besides that they used the guaranty system in collecting the money . The guaranted shared in monopoly the food-stuff and sold it in high price .Add to that the foreign control on the executive power ,not to be menti
Background: There are various secreted proteins affecting the prognosis of oral squamous cell carcinoma (OSCC) and one of them is Angiopoietin-2(Ang-2) which is thought to have an essential role in the development and progression of the tumor. Aim of the study: This study was conducted to determine the expression of (Ang-2) in (OSCC) to assess its correlations with clinicopathological parameters of the tumor. Material and Methods: 36 formalin- fixed, paraffin- embedded tissue blocks histologically diagnosed as OSCC were examined for Ang-2 immunohistochemical expression semi quantitively. Results: The expression of Ang-2 was significantly associated with histopathological grade (P value=0.023), while there is no significant association wi
... Show MoreObjective: This study aims to analyze the role of the People's Republic of China in the 1955 Bandung Conference and assess its contributions to international cooperation and peace. It specifically examines how China's participation aligns with the United Nations Sustainable Development Goals (SDGs), particularly Goal 16. Theoretical Framework: The research is grounded in a structuralist approach to international relations, focusing on the agency of developing nations in shaping a post-colonial global order. It considers concepts such as peaceful coexistence, national sovereignty, and South-South cooperation. Method: A historical-analytical method is employed, tracing China’s diplomatic trajectory from the 1954 Colombo and Bo
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The research aims to identify the role of community participation in achieving organizational distinction in the Dhulia's municipality, which is one of the formations of the Ministry of Construction, Housing, Municipalities and Public Works in Salah al-Din Governorate, which is one of the service organizations that have a fundamental role in providing service to the community, which has faced many administrative challenges and many problems caused by the rapid and continuous changes in the environment, therefore modern management concepts must be adopted, such as community participation and the knowledge of its role To achieve its goals, which helps it in facing changes as well as achieving organizational excelle
... Show MoreIt is estimated that over the next few decades, EOR will be used for the more than 50% of oil production in the US and worldwide. From these, in reservoir with viscositites ranging between 10 – 150 mPa.s, polymer flooding is suggsted as the EOR method. Therefore, there is an upper limit to the recommended range of reservoir oil viscosities for polymer flooding. To address the issue of this limitation of polymer injectivity and pumping efficiency, we propose a novel method. The method involves the use of Supramolecular Systems, which are composed of long-chain aminoacids and maleic acids post complexation. Their unique feature of resersible viscosities allows the operator to overcome