Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different resolutions. By considering features from multiple levels, the detection algorithm can better capture both global and local characteristics of the manipulated regions, enhancing the accuracy of forgery detection. To achieve a high accuracy rate, this paper presents a variety of scenarios based on a machine-learning approach. In Copy-Move detection, artifacts and their properties are used as image features and support Vector Machine (SVM) to determine whether an image is tampered with. The dataset is manipulated to train and test each classifier; the target is to learn the discriminative patterns that detect instances of copy-move forgery. Media Integration and Call Center Forgery (MICC-F2000) were utilized in this paper. Experimental evaluations demonstrate the effectiveness of the proposed methodology in detecting copy-move. The implementation phases in the proposed work have produced encouraging outcomes. In the case of the best-implemented scenario involving multiple trials, the detection stage achieved a copy-move accuracy of 97.8 %.
Chest X-rays have long been used to diagnose pneumothorax. In trauma patients, chest ultrasonography combined with chest CT may be a safer, faster, and more accurate approach. This could lead to better and quicker management of traumatic pneumothorax, as well as enhanced patient safety and clinical results.
The purpose of this study was to assess the efficacy and utility of bedside US chest in identifying traumatic pneumothorax and also its capacity to estimate the extent of the lesion in comparison to the gold standard modality chest computed tomography.
Graphene oxide (GO) was prepared from graphite (GT) with Hammer method, the GO was reduced with hydrazine hydrate to produce a reduced graphene oxide (RGO). The RGO was reacted with thiocarbohydrazide (TCH) to functionalize the RGO with 4-amino-3-symbol-1h-1, 2, 4-triazol-5 (4H) –thion group and to obtain (RGOT). All the prepared nanomaterial and the product of the functionalization RGOT were characterized with Fourier transformer infrared (FT-IR) spectroscopy, X-ray diffraction (XRD) analysis. RGOT mixed with ultrasonic device at different pH values of phosphate buffer solution (PBS), the mixture used to modifying a screen printed carbon electrodes SPCE and with cyclic voltammetry the sensitivity of selectivity of the new modifying elect
... Show MoreBegomoviruses infecting zucchini squash were investigated. Leaf samples were collected from zucchini squash growing areas in Baghdad (Jhadryaa and Yusufiyah), Babylon (Jibela and Mahmudiyah) and Diyala (Khan Bani Saad) Provinces. Samples were screened for the presence of begomoviruses using polymerase chain reaction (PCR) and Deng genus specific primers. Sixteen out of 40 samples were begomovirus positive. Sequence analysis confirmed the detection of Tomato leaf curl Palampur virus (TLCPALV)
In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi
... Show MoreEchocardiography is a widely used imaging technique to examine various cardiac functions, especially to detect the left ventricular wall motion abnormality. Unfortunately the quality of echocardiograph images and complexities of underlying motion captured, makes it difficult for an in-experienced physicians/ radiologist to describe the motion abnormalities in a crisp way, leading to possible errors in diagnosis. In this study, we present a method to analyze left ventricular wall motion, by using optical flow to estimate velocities of the left ventricular wall segments and find relation between these segments motion. The proposed method will be able to present real clinical help to verify the left ventricular wall motion diagnosis.
This study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnet
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More|
The mechanism of hydrogen (H2) gas sensor in the range of 50-200 ppm of RF-sputtered annealed zinc oxide (ZnO) and without annealing was studied. The X-ray Diffraction( XRD) results showed that the Zn metal was completely converted to ZnO with a polycrystalline structure. The I–V characteristics of the device (PT/ZnO/Pt) measured at room temperature before and after annealing at 450 oC for4h, from which a linear relationship has been observed. The sensors had a maximum response to H2 at 350 oC for annealing ZnO and showed stable behavior for detecting H2 gases in the range of 50 to 200 ppm. The annealed film exhibited hig |