Preferred Language
Articles
/
4eZIF5wBmraWrQ4drkZy
Deep Spoof Face Detection Techniques in React Native
...Show More Authors

The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimizing deep learning models to operate efficiently on mobile devices, (2) ensuring real-time inference without compromising accuracy, (3) maintaining user privacy when processing sensitive facial data, and (4) addressing the variability in mobile phone cameras, input resolution, and platform limitations across Android and iOS. Furthermore, the increasing sophistication of identity spoofing attacks—such as 3D masks and AI-generated faces—demands more sophisticated, robust, and multimodal detection technologies. The research findings provide a clear roadmap toward practical solutions. By evaluating the latest deep learning architectures, datasets, and anti-spoofing metrics, the study proposes a comprehensive React Native deployment path using TensorFlow Lite and TensorFlow.js to ensure cross-platform compatibility. The proposed system offers a unified classification of identity spoofing attacks and defense mechanisms, along with a structured evaluation framework that compares on-device processing with server-side detection. The results demonstrate that optimized models can achieve high accuracy, low false accept/rejection rates, and sub-second processing speeds on mobile devices. Ultimately, the study provides practical design guidelines for building robust, privacy-preserving, efficient, and real-world consumer-grade fake face detection systems.

Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Climate Action
Climate, Crop Production, and Water Resources in Western Asia
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jul 31 2018
Journal Name
The Open Electrical & Electronic Engineering Journal
Minimum Delay Congestion Control in Differentiated Service Communication Networks
...Show More Authors

This paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
The Iraqi Postgraduate Medical Journal
Extensive Versus Traditional Phototherapy in Treatment of Neonatal Jaundice
...Show More Authors

View Publication
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Theoretical And Applied Information Technology
Factors affecting global virtual teams’ performance in software projects
...Show More Authors

Scopus (24)
Scopus
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Bayes Estimators of Reliability in the Exponential Distribution
...Show More Authors

Abstract

           We produced a study in Estimation for Reliability of the Exponential distribution based on the Bayesian approach. These estimates are derived using Bayesian approaches. In the Bayesian approach, the parameter of the Exponential distribution is assumed to be random variable .we derived bayes estimators of reliability under four types when the prior distribution for the scale parameter of the Exponential distribution is: Inverse Chi-squar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Epidemiological Study of Keratinophilic Fungi in Baghdad Swimming Pools
...Show More Authors

The present study was included the isolation of Keratinophilic fungi from water samples taken from 19 indoor public swimming pools in Baghdad during four season (summer ,fall ,spring ,and winter). Isolation period was September 2011and September 2012 . Samples were collected from different places in swimming pool . Sixteen keratinophilic fungal species, belonging to twenty –one genera were isolated using Surface Dilution Plating (SDP) and Hair Bait Technique (HBT) . Aspergillus genus was the most frequent and occurrence (19.84%), followed by Trichophyton (11.60%) and Fusarium (7.59% ) . The most common fungal infection occurred in summer season (42.16%) , and the most frequent month manifestation of species occurred in August

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Building the Shape in Sharif Mohieddin Haider Musical Compositions
...Show More Authors

Sharif Mohieddin Haider worked on composing of musical compositions for the Oud different from the traditional forms known as (Peşrev, Sama'i, Longa… etc.), but they are not clear in building their musical form. This study tackles this issue by revealing the structure of the building of the musical form of these Musical compositions.

        The importance of this research lies in that it provides an academic scientific study on the important subject of Musical composition forms and the way of constructing them. It helps players and students in the study of Arab music, if they want to write according to their musical form.

This research dealt with two topics in its theoretical framewo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Optimization of Hole Cleaning In Iraqi Directional Oil Wells
...Show More Authors

Efficient cuttings transport and hole cleaning are very important factors for obtaining an effective drilling operation. In an inclined and horizontal drilling, hole cleaning issue is a common and complex problem.

   The scope of this research is to study the drilling parameters which affect hole cleaning in Iraqi directional wells through studying and analyzing some drilled wells ( vertical , directional (30 degree) , directional (60 degree) and horizontal ).An excel sheet is prepared to calculate carrying capacity index which represents an indicator for good hole cleaning in different sections. The study indicated through the field investigations, practical experiences and theoretical calculations tha

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 31 2024
Journal Name
International Journal Of Health & Medical Research
Review Article: Cupping Therapy in Treatment of Certain Diseases
...Show More Authors

The research undertaken has provided a comprehensive insight into the practice of cupping therapy, a traditional treatment modality that has seen resurgence in. modern complementary medicine. This exploration, focusing on a spectrum of. Conditions such as migraines, lower back pain, neck pain, knee osteoarthritis, and chronic urticaria, highlights the potential benefits and the necessity for a deeper. Scientific understanding of cupping therapy. Cupping therapy, with its roots deeply embedded in ancient medical practices, offers a unique approach to treatment by promoting healing through increased blood flow and the release of toxins from the body. The application of this therapy in treating migraines has shown promising results, su

... Show More
View Publication
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Pyogenic Discitis in Female after Delivery and Pelvic Surgery
...Show More Authors

Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy

... Show More
View Publication Preview PDF