Preferred Language
Articles
/
9Bew5I8BVTCNdQwCVn-K
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different resolutions. By considering features from multiple levels, the detection algorithm can better capture both global and local characteristics of the manipulated regions, enhancing the accuracy of forgery detection. To achieve a high accuracy rate, this paper presents a variety of scenarios based on a machine-learning approach. In Copy-Move detection, artifacts and their properties are used as image features and support Vector Machine (SVM) to determine whether an image is tampered with. The dataset is manipulated to train and test each classifier; the target is to learn the discriminative patterns that detect instances of copy-move forgery. Media Integration and Call Center Forgery (MICC-F2000) were utilized in this paper. Experimental evaluations demonstrate the effectiveness of the proposed methodology in detecting copy-move. The implementation phases in the proposed work have produced encouraging outcomes. In the case of the best-implemented scenario involving multiple trials, the detection stage achieved a copy-move accuracy of 97.8 %. 

Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Application of the Holonic Manufacturing System using the Genetic Algorithm : Case Study in Lab 7 of the General Company for the Leather Industry
...Show More Authors

The study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Aesthetic Preoccupations of the Implicit Pattern in the Discourse of the Theatre Show (Revelations Play) - A Model
...Show More Authors

The implicit pattern is one of the cultural patterns that are present in both the text and theatrical presentation and the reading of the implicit pattern cannot take place without cognitive references, whether audio or visual as well as historical references and the natural, social and psychological dimensions of communities and individuals.

         The researcher, in this study, attempted to focus on the axis of the aesthetic preoccupations of the implicit pattern in the theatrical presentation and the definition of the implicit pattern. Methodologically speaking, the research problem focused on revealing the outlines and the main features in the aesthetic preoccupations that shape the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 23 2026
Journal Name
Mustansiria Dental Journal
Soft tissue measurements of Iraqi individuals with Cl I and Cl III skeletal pattern: a comparative cephalometric study
...Show More Authors

View Publication
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparative Analysis of the Fatty Acid Pattern of Silybum marianum with Nigella sativa by Gas Chromatography-Mass Spectrometry
...Show More Authors

Many studied were conducted to evaluate the antihepatotoxic and antioxidant activities of Silybum marianum and proved these actions. The Naturally grown seed in Iraqi-Kurdistan Region also were studied for its chemical contents and biological activities. Vegetable oils occur in various plant parts mainly concentrated in the seeds.

In this study comparison was made between the fatty acid patterns of two plant seeds, Silybum marianum and Nigella sativa. Seed sample of Silybum marianum and Nigella sativa were exposed for extraction and isolation of the fatty acid contents using two different solvents (petroleum ether and n-hexane) at 60-80oC using soxhlet apparatus and the oily extract

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Aug 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Development Accounting Rule disclosure by accounting policies in the light of Islamic and electronic banking Activities: Proposal pattern
...Show More Authors

the bank sect for any country  is very important  because  its represent a major  nerve   to feed a verity economic and finance activities .development any state measure by development  banking  sets and its represent  important  factor to investors attract . and because  important  of this subject ,teen accounting rule is a specialized for it .its related by  Disclosures in the Financial Statements Of Banks and The Similar Institutions, its accredit  by auditing and accounting standard  consul in republic of Iraq.in date 10/28/1998.                      &

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 23 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of tongue space area in a sample of Iraqi adults with class I dental and skeletal pattern
...Show More Authors

Background: Lateral cephalometric radiography is commonly used as a standard tool in orthodontic assessment and treatment planning. This study aimed to determine the tongue and surrounding space area in a sample of Iraqi adults with class I dental and skeletal pattern. Materials and methods: The study included thirty healthy subjects (15 males and 15 females) with an age ranged between 23-34 years and class I dental and skeletal pattern with no history of any sleep related disorders. The assessed cephalometric measurement included length and height of the tongue and position of hyoid bone from cervical line. Descriptive statistics were obtained for the data. Genders difference was evaluated by independent sample t-test. Results: There wer

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Sep 30 2024
Journal Name
Al-mustansiriyah Journal Of Science
A Transfer Learning Approach for Arabic Image Captions
...Show More Authors

Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Science And Research (ijsr)
Color-based for tree yield fruits image counting
...Show More Authors

Identifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit

... Show More
View Publication