Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different resolutions. By considering features from multiple levels, the detection algorithm can better capture both global and local characteristics of the manipulated regions, enhancing the accuracy of forgery detection. To achieve a high accuracy rate, this paper presents a variety of scenarios based on a machine-learning approach. In Copy-Move detection, artifacts and their properties are used as image features and support Vector Machine (SVM) to determine whether an image is tampered with. The dataset is manipulated to train and test each classifier; the target is to learn the discriminative patterns that detect instances of copy-move forgery. Media Integration and Call Center Forgery (MICC-F2000) were utilized in this paper. Experimental evaluations demonstrate the effectiveness of the proposed methodology in detecting copy-move. The implementation phases in the proposed work have produced encouraging outcomes. In the case of the best-implemented scenario involving multiple trials, the detection stage achieved a copy-move accuracy of 97.8 %.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis effort is related to describe and assess the performance of the Iraqi cement sample planned for oil well-cementing jobs in Iraq. In this paper, major cementing properties which are thickening time, compressive strength, and free water in addition to the rheological properties and filtration of cement slurry underneath definite circumstances are experimentally tested. The consequences point to that the Iraqi cement after special additives encounter the requests of the API standards and can consequently is used in cementing jobs for oil wells. At this research, there is a comparative investigation established on experimental work on the effectiveness of some additives that considered as waste materials which are silica fume, baux
... Show MoreThis effort is related to describe and assess the performance of the Iraqi cement sample planned for oil well-cementing jobs in Iraq. In this paper, major cementing properties which are thickening time, compressive strength, and free water in addition to the rheological properties and filtration of cement slurry underneath definite circumstances are experimentally tested. The consequences point to that the Iraqi cement after special additives encounter the requests of the API standards and can consequently is used in cementing jobs for oil wells. At this research, there is a comparative investigation established on experimental work on the effectiveness of some additives that considered as waste materials which are silica fume, bauxite,
... Show MoreIn multivariate survival analysis, estimating the multivariate distribution functions and then measuring the association between survival times are of great interest. Copula functions, such as Archimedean Copulas, are commonly used to estimate the unknown bivariate distributions based on known marginal functions. In this paper the feasibility of using the idea of local dependence to identify the most efficient copula model, which is used to construct a bivariate Weibull distribution for bivariate Survival times, among some Archimedean copulas is explored. Furthermore, to evaluate the efficiency of the proposed procedure, a simulation study is implemented. It is shown that this approach is useful for practical situations and applicable fo
... Show MoreBackground: Antibiotics are among the most commonly used medicine, in both community and hospital setting, all over the world especially in countries where no strict guideline to regulate their use. In Iraq, only a few studies conducted to describe the antibiotic prescription pattern in general hospitalsand even less in pediatric hospital.
Objective: To describe the patterns for antibiotics used in Elwia pediatric teaching hospital in Baghdad, Iraq
Type of the study: Descriptive cross sectional study.
.Methodology: The study was conducted at AL-Elwia Pediatric Teaching Hospitalduring the year 2016. A random sample from all the prescriptions sheets
... Show More
Concentrated research topic in addressing variable vital to the work of offices of inspectors general, construction and scale effectiveness and efficiency is the organizational structure, which are important as is obvious to any researcher in the management and organization and this variable would affect the exercise task supervision and inspection of financial and administrative corruption and combat efficiently, Thus this effect will be placed in the fold ability to achieve goals. That the creation of the organizational structure and requirements to achieve harmony between its properties is creating step towards success. This research aims to analyze the characteristics and style o