Preferred Language
Articles
/
7Rej5I8BVTCNdQwC6n8V
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various methodologies in the field was created. Unlike previous studies that focused on picture splicing or copy-move detection, this study intends to investigate the universal type-independent strategies required to identify image tampering. The work provided analyses and evaluates several universal techniques based on resampling, compression, and inconsistency-based detection. Journals and datasets are two examples of resources beneficial to the academic community. Finally, a future reinforcement learning model is proposed.

Scopus Crossref
View Publication
Publication Date
Tue Nov 18 2014
Journal Name
Conference: First International Engineering Conference (iec2014)at: Ishik University, Erbil, Krg, Iraq
Visualization of People Attraction from Mobile Phone Trace Database: A Case study on Armada 2008 in French City of Rouen
...Show More Authors

The mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th

... Show More
Publication Date
Wed Oct 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of the Efficacy of Different Gingival Retraction Materials on the Gingival Tissue Displacement (A Comparative In Vivo Study)
...Show More Authors

Background: An accurate adaptation of the crown to the finish line is essential to minimize cement dissolution and to preserve periodontium in fixed partial denture cases. An accurate adaptation of crown is possible only when preparation details are captured adequately in the impression and transferred to cast. For these reasons, gingival displacement is necessary to capture subgingival preparation details.The aim of the present study is to measure in vivo the horizontal displacement of the gingival sulcus obtained by using three new cordless retraction materials (Magic Foam Cord®, Racegel and Astringent Retraction Paste) in comparison to medicated retraction cord. Materials and method: Thirty-two patients requiring porcelain fused to me

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study the effect of fish on the optical properties of CuO membranes prepared in a way that thermal spraying chemical
...Show More Authors

In this research study the effect of fish on the properties optical films thickness 1200-1800 and calculated energy gap Basra direct transport permitted and forbidden to membranes and urged decreasing values ??of Optical Energy Gap increase fish included accounts optical also calculate the constants visual as factories winding down and the refractive index and reflectivity membranes also by real part and imaginarythe dielectric constant

View Publication Preview PDF
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
The effect of technology on achieving contemporary levels in the space of Arab Islamic architecture “Mosques is a case study”
...Show More Authors

Arab-Islamic architecture has undergone a change at multiple levels affected by modern technology, so the research sought to address the role of contemporary technologies on a fundamental and fundamental component of architecture, which is the architectural space, what is known as the essence of architecture and its ultimate destination, with a focus on the architectural space in the architecture of the contemporary Arab Islamic mosque, because the mosque’s architecture is so important in Islamic law and the belief of the Muslim person himself, where the mosque is the functional style produced by the Islamic faith and embodied in it, whereas, knowing the levels of influence of contemporary technologies in the architectural spac

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
A Qualitative Study of Epiphytic Algae (Diatom) on Some Aquatic Plants in Al-Auda Marshes Within Maysan Province / Southern Iraq
...Show More Authors

The study conducted on the compositions of epiphytic diatoms on three taxa of aquatic plants were selected (Phragmites australis Trin ex stand , Ceratophyllum demersum L. and Typha domengensis Pers) in three sites within Al-Auda Marsh, from autumn 2013 to summer 2014 . The study was measured physical and chemical factors of all the study sites, such as: air temperature, power of hydrogen (pH), electrical conductivity (EC), salinity (S‰), total hardness(TH), dissolved oxygen (DO), and plant nutrient. The results showed that water of marsh was oxygenated and it was very hard. A total of 111 taxa of phytoplankton were identified, which belonged to 13 families and 26 genus (one family and two genus of centric diatoms, 12 families and 26 ge

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF Staphylococcus aureus CAUSED OF FOOD POISONING IN RED & WHITE MEAT OFFERED IN LOCAL MARKETS: DETECTION OF Staphylococcus aureus CAUSED OF FOOD POISONING IN RED & WHITE MEAT OFFERED IN LOCAL MARKETS
...Show More Authors

This study was conducted to investigate the presence of Staphylococcus aureus in the red and white meat available in local markets. They were selected ten samples of red and white meat randomly (Iraq, Saudi Arabia, Turkey, and Brazil) from different markets in Baghdad, and the results of reading the nutrition facts of media indication card showed that all models confirm to the Iraqi standard quality in terms of scanning all data of the media indication card, except for the birds of Bayader, where the date of expire & production date of the product was not mentioned. Also, the results of the study showed that there is no Staphylococcus aureus in local red and white meat as well as imported.

View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref