Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different resolutions. By considering features from multiple levels, the detection algorithm can better capture both global and local characteristics of the manipulated regions, enhancing the accuracy of forgery detection. To achieve a high accuracy rate, this paper presents a variety of scenarios based on a machine-learning approach. In Copy-Move detection, artifacts and their properties are used as image features and support Vector Machine (SVM) to determine whether an image is tampered with. The dataset is manipulated to train and test each classifier; the target is to learn the discriminative patterns that detect instances of copy-move forgery. Media Integration and Call Center Forgery (MICC-F2000) were utilized in this paper. Experimental evaluations demonstrate the effectiveness of the proposed methodology in detecting copy-move. The implementation phases in the proposed work have produced encouraging outcomes. In the case of the best-implemented scenario involving multiple trials, the detection stage achieved a copy-move accuracy of 97.8 %.
Ubikh is one of the most important tribes of the Northwest Caucasus and has a long history. Naturally, rebukes are an integral part of the Caucasus region. Their people were able to confront the Russian invasion of their lands like the rest of the Caucasus tribes to defend their existence, freedom and the right to build their independent state, but they were not able to resist the great Russian military progress they achieved on all sides. For the territory that belonged to Persia and the Ottoman Empire and ended the resistance of the Meridian movement in the Northeast Caucasus, the Russians left only the weak resistance of the tribes of the Northwest Caucasus led by the rebuke after Russia managed to eliminate all resistance movements i
... Show MoreThe optimum conditions for the production of neutral protease from local strain Aspergillus niger var carbonarius by solid – state fermentation system (Wheat bran) moisted with 0.2 M phosphate buffer (PH7.0) . the hydration ratio was 1:5 (V:W) . the concentration of inoculum was 1×106 spores per 10 gram of solid materials , initial P H 6.5 and 96 hours of incubation period at 30? C .the enzyme activity was 1300 unit / ml and specific activity was 1550 unit / mg protein .
The study seeks to analyze the perceptions of audience in UAE towards the performance of Emirates Satellite TV Channels. It analyzed the exposure motivations of audience to satellite TV channels, its positive and negative aspects and to what extent they abide by media ethics. A survey is conducted with a sample of four hundred. The study shows significant differences between male and female towards the characteristics of TV channels, its positive and negative aspects and its commitments to media ethics.
The study also shows that the expectancy value model and third person effect model are applicable in studying the perceptions of audience and media people in UAE t
... Show MoreHalobacterium saccharovorum was isolated from local highsalinity souls named Al-Massab Al-Aam. A growth curve was determined. The average generation time during logarith- mic phase was 17.80±0.62 hr. Bacteriorhodopsin was 1808 lated from the purple membrane, its concentration was 4.8 mg/ml and H.W was 26000. The pattern of other membrane Bpoteins was studied and compared with those of other Boletes. Several unique proteins were isolated and their molecular weights were determined.
Background: The present work investigated the profile and biodiversity of the pathogenic streptococci species isolated from local and imported mozzarella soft cheese in Baghdad City from October 2022 to January 2023. The study aimed to examine the molecular characterization of 16Sr RNA gene in some streptococcus species isolates from mozzarella soft cheese in Baghdad city Methods: From 50 samples, 8 isolates in all were found and identified based on the VITEK, molecular, and sequencing of the 16SrRNA gene. The eight isolates represented Lactococcus cremoris. Streptococcus alactolyticus, Streptococcus sanguinis, and Streptococcus thoraltensis. The isolates were subjected to conventional PCR and electrophoresis to detect the 16SrRNA gene usi
... Show MoreThe study aimed to assess Milk Thistle oi reducing the aflatoxin damage and improve the health status of local breed hens. The study was performed on 60 hens aged 35 weeks, weighing 2-2.5 kg of the body was obtained and housed on a private poultry farm in north of Baghdad (Altaji) for a period of 9 weeks from 22 October until 22 December 2020. Hens were divided to three treatments (20 hens). The first was fed a basal diet free of aflatoxin. The 2nd fed on a contaminated diet with aflatoxin (14.6 ppb) while the 3rd fed as in the 2nd with 0.5% of Milk Thistle oil /kg feed. A 5 hens from each group were slaughtered at the end of the trial for the histopathological inspection of liver, spleen and intestine tissues to evaluate the harmfu
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreOver the past few decades, the health benefits are under threat as many commonly used antibiotics have become less and less effective against certain illnesses not only because many of them produce toxic reactions but also due to the emergence of drug-resistant bacteria. The clinical use of a combination of antibiotic therapy for Pseudomonas aeruginosa infections is probably more effective than monotherapy. The present study aims to estimate the antibacterial and antibiofilm activity of Conocarpus erectus leaves extracts against multi-drug resistant P. aeruginosa isolated from different hospitals in Baghdad city. One hundred fifty different clinical specimens were collected from patients from September 2021 to January 2022. All samples were
... Show MoreCarbon nanotubes were prepared by an arc-discharge method,
under different values of pressure of oxygen gas. The structure of
multi-walled carbon nanotubes powders has been characterized by
low-angle X-ray diffraction .The morphology of carbon nanotube
powder was examined by transmission electron microscope. The
capacitance-voltage and current- voltage (dark and illumination
current) characterization were measured under different values of
pressure (10-3, 10-4, 10-5) mbar of oxygen gas