Preferred Language
Articles
/
4eZIF5wBmraWrQ4drkZy
Deep Spoof Face Detection Techniques in React Native
...Show More Authors

The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimizing deep learning models to operate efficiently on mobile devices, (2) ensuring real-time inference without compromising accuracy, (3) maintaining user privacy when processing sensitive facial data, and (4) addressing the variability in mobile phone cameras, input resolution, and platform limitations across Android and iOS. Furthermore, the increasing sophistication of identity spoofing attacks—such as 3D masks and AI-generated faces—demands more sophisticated, robust, and multimodal detection technologies. The research findings provide a clear roadmap toward practical solutions. By evaluating the latest deep learning architectures, datasets, and anti-spoofing metrics, the study proposes a comprehensive React Native deployment path using TensorFlow Lite and TensorFlow.js to ensure cross-platform compatibility. The proposed system offers a unified classification of identity spoofing attacks and defense mechanisms, along with a structured evaluation framework that compares on-device processing with server-side detection. The results demonstrate that optimized models can achieve high accuracy, low false accept/rejection rates, and sub-second processing speeds on mobile devices. Ultimately, the study provides practical design guidelines for building robust, privacy-preserving, efficient, and real-world consumer-grade fake face detection systems.

Crossref
View Publication
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Analytical And Bioanalytical Electrochemistry
New Electrochemical Sensors for Determination of Tamoxifen Based on Enhanced Polymer Nano Composite Deep Eutectic Solvent and Water Mixture as Ionophores
...Show More Authors

Scopus (4)
Scopus
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Making use of economical design techniques and materials in implementing cosmetic supplements to the interior spaces of the dwelling: رانيه علي احمد عبد الرحمن
...Show More Authors

  This research aims to identify the economic design techniques and materials that can be used in the implementation of cosmetic supplements to the spaces of the dwelling. The research relied on the descriptive and analytical approach by describing and analyzing models of design techniques and materials that can be used in the production of cosmetic supplements in the interior spaces of the dwelling.
The results of the research concluded that the beautification of the spaces of the dwelling is one of the necessary and important pieces to add aesthetic touches to the internal spaces, and that the use of economic design techniques and materials contributes to the implementation of many pieces of complementary beautification of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 04 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The possibility of adopting strategic management accounting techniques to increase competitiveness Iraqi economic units in light of the variables of the contemporary business environment.
...Show More Authors

The accession of countries to the World Trade Agreement and the openness of markets to each other without restrictions led to the emergence of the philosophy of "a world without borders and business units without countries", which required adapting the modern business environment to that philosophy, which is considered as objectives for the activities of the units that must be implemented in order to achieve competition. The objective of the units has changed from making profit to meeting the desires of customers, which is what imposed a new role for management accounting as a field of knowledge renewed in it visions of competitiveness between units. Because of the increasing needs for information in light of environmental change

... Show More
View Publication Preview PDF
Publication Date
Sun May 11 2025
Journal Name
Journal Of Information Systems Engineering And Management
The Effect of the Learning Mastery Strategy using Interactive Learning Techniques as a Therapeutic Method on the Achievement of Secondary School Students in Mathematics
...Show More Authors

  The current research aims to identify the effect of the learning mastery strategy using interactive learning as a therapeutic method on the achievement of secondary school students in mathematics. To achieve the research objective, the researcher selected second-grade middle school students at Al-Haybah Intermediate School for Boys and determined his research sample, which consisted of (77) students distributed into two sections: Section (A) the experimental group, with (38) students, and Section (B) the control group, with (39) students. The statistical equivalence of the two research sample groups was confirmed in the variables (intelligence test, previous achievement, and previous knowledge test). The researchers chose the par

... Show More
View Publication
Crossref
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Evaluation the efficiency of different techniques for extraction and purification of Tomato yellow leaf curl virus (TYLCV)
...Show More Authors

This study was conducted to evaluate the efficacy of different techniques for extraction and purification of Tomato yellow leaf curl virus (TYLCV). An isolate of the virus free of possible contamination with other viruses infecting the same host and transmitted by the same vector Bemisia tabaci Genn. was obtained. This was realized by indicator plants and incubation period in the vector. Results obtained revealed that the virus infect Nicotiana glutinosa without visible symptoms, while Nicotiana tabaccum var. White Burley was not susceptible to the virus. The incubation period of the virus in the vector was found to be 21 hrs. These results indicate that the virus is TYLCV. Results showed that Butanol was more effective in clarification the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref