Preferred Language
Articles
/
vBcgm5IBVTCNdQwC4bm1
Fast discrimination of fake video manipulation
...Show More Authors

<span>Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian group operators, as a value, may be lower or higher in the fake video than its value in the real video, depending on the quality of the fake video, so we cannot use them for deepfake detection and ii) the gradient-based measure (GRA7) decreases its value in the fake video in all cases, whether the fake video is of high or low quality and can help detect deepfake.</span>

Scopus Crossref
View Publication
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management
...Show More Authors

Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Fast Shot Boundary Detection Based on Separable Moments and Support Vector Machine
...Show More Authors

View Publication
Scopus (29)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Fri Dec 23 2011
Journal Name
International Journal Of The Physical Sciences
Fast prediction of power transfer stability index based on radial basis function neural network
...Show More Authors

View Publication
Scopus (16)
Crossref (4)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Annales Pharmaceutiques Françaises
Adopting video assignments as a tool to improve first-year pharmacy students class engagement
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Aip Conference Proceedings
Physical properties of HgX Sb1-X Ba2Ca2Cu3O8+δ superconducting compound: Effect of fast neutrons irradiation
...Show More Authors

Applications of superconductor compounds were considered as modern and important topics, especially these which are exposures to one of the nuclear radiation kinds. So, we gone to investigate the influence of fast neutrons irradiation on electrical and structural characteristics of HgxSb1-xBa2Ca2Cu3O8+δ superconducting compound at (x = 0.7) in ratio. The superconducting specimens were synthesized using solid state technique. Specimens were exposure to the nuclear radiation using fast neutrons with doses (0, 9.06 x1010, 15.3 x 1010 and 18.17 x 1010) n/cm2 respectively. Electrical and X-ray diffraction properties of superconductor specimens before and after irradiation were investigated under standard conditions. Results of X-ray diffraction

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jul 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and Evaluation of Fast Dissolving Tablets of Taste-Masked Ondansetron Hydrochloride by Solid Dispersion
...Show More Authors

Ondansetron hydrochloride (ONH) is a very bitter, potent antiemetic drug used for the treatment and/or prophylaxis of chemotherapy or radiotherapy or postoperative induced emesis. The objective of this study is to formulate and evaluate of taste masked fast dissolving tablet (FDTs) of ONH to increase patient compliance.

 ONH taste masked granules were prepared by solid dispersion technique using Eudragit E100 polymer as an inert carrier. Solvent evaporation and fusion melting methods were used for such preparation.

Completely taste masking with zero release of drug in phosphate buffer pH 6.8was obtained from granules prepared by solvent evaporation method using drug: polymer ratio of 1:2, from which four formulas pas

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Nov 05 2015
Journal Name
Spectroscopy Europe
Fast and versatile ambient surface analysis by plasmaassisted desorption/ionisation mass spectrometry
...Show More Authors

has experienced a step-change since the inception of ambient mass spectrometry removed the requirement for samples to be investigated under vacuum conditions. Approaches based on surface– plasma interactions are especially promising, including PADI. Whilst the mechanisms involved in generating PADI spectra still need to be unravelled, PADI shows significant promise to become a valuable and versatile tool in the instrumental arsenal available to the surface analyst

Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref