Goto

Collaborating Authors

 Sulaymaniyah


Video Forgery Detection for Surveillance Cameras: A Review

Tayfor, Noor B., Rashid, Tarik A., Qader, Shko M., Hassan, Bryar A., Abdalla, Mohammed H., Majidpour, Jafar, Ahmed, Aram M., Ali, Hussein M., Aladdin, Aso M., Abdullah, Abdulhady A., Shamsaldin, Ahmed S., Sidqi, Haval M., Salih, Abdulrahman, Yaseen, Zaher M., Ameen, Azad A., Nayak, Janmenjoy, Hamza, Mahmood Yashar

arXiv.org Artificial Intelligence

The widespread availability of video recording through smartphones and digital devices has made video-based evidence more accessible than ever. Surveillance footage plays a crucial role in security, law enforcement, and judicial processes. However, with the rise of advanced video editing tools, tampering with digital recordings has become increasingly easy, raising concerns about their authenticity. Ensuring the integrity of surveillance videos is essential, as manipulated footage can lead to misinformation and undermine judicial decisions. This paper provides a comprehensive review of existing forensic techniques used to detect video forgery, focusing on their effectiveness in verifying the authenticity of surveillance recordings. Various methods, including compression-based analysis, frame duplication detection, and machine learning-based approaches, are explored. The findings highlight the growing necessity for more robust forensic techniques to counteract evolving forgery methods. Strengthening video forensic capabilities will ensure that surveillance recordings remain credible and admissible as legal evidence.


Advancing Offline Handwritten Text Recognition: A Systematic Review of Data Augmentation and Generation Techniques

Rassul, Yassin Hussein, Ahmed, Aram M., Fattah, Polla, Hassan, Bryar A., Abdulkareem, Arwaa W., Rashid, Tarik A., Lu, Joan

arXiv.org Artificial Intelligence

Offline Handwritten Text Recognition (HTR) systems play a crucial role in applications such as historical document digitization, automatic form processing, and biometric authentication. However, their performance is often hindered by the limited availability of annotated training data, particularly for low-resource languages and complex scripts. This paper presents a comprehensive survey of offline handwritten data augmentation and generation techniques designed to improve the accuracy and robustness of HTR systems. We systematically examine traditional augmentation methods alongside recent advances in deep learning, including Generative Adversarial Networks (GANs), diffusion models, and transformer-based approaches. Furthermore, we explore the challenges associated with generating diverse and realistic handwriting samples, particularly in preserving script authenticity and addressing data scarcity. This survey follows the PRISMA methodology, ensuring a structured and rigorous selection process. Our analysis began with 1,302 primary studies, which were filtered down to 848 after removing duplicates, drawing from key academic sources such as IEEE Digital Library, Springer Link, Science Direct, and ACM Digital Library. By evaluating existing datasets, assessment metrics, and state-of-the-art methodologies, this survey identifies key research gaps and proposes future directions to advance the field of handwritten text generation across diverse linguistic and stylistic landscapes.


A Comprehensive Part-of-Speech Tagging to Standardize Central-Kurdish Language: A Research Guide for Kurdish Natural Language Processing Tasks

Sabr, Shadan Shukr, Mustafa, Nazira Sabr, Omar, Talar Sabah, Rasool, Salah Hwayyiz, Omer, Nawzad Anwer, Hamad, Darya Sabir, Shams, Hemin Abdulhameed, Kareem, Omer Mahmood, Abdullah, Rozhan Noori, Abdullah, Khabat Atar, Mohammad, Mahabad Azad, Al-Raghefy, Haneen, Asaad, Safar M., Mohammed, Sara Jamal, Ali, Twana Saeed, Shawrow, Fazil, Maghdid, Halgurd S.

arXiv.org Artificial Intelligence

- The field of natural language processing (NLP) has dramatically expanded within the last decade. Many human-being applications are conducted daily via NLP tasks, starting from machine translation, speech recognition, text generation and recommendations, Part-of-Speech tagging (POS), and Named-Entity Recognition (NER). However, low-resourced languages, such as the Central-Kurdish language (CKL), mainly remain unexamined due to shortage of necessary resources to support their development. The POS tagging task is the base of other NLP tasks; for example, the POS tag set has been used to standardized languages to provide the relationship between words among the sentences, followed by machine translation and text recommendation. Specifically, for the CKL, most of the utilized or provided POS tagsets are neither standardized nor comprehensive. To this end, this study presented an accurate and comprehensive POS tagset for the CKL to provide better performance of the Kurdish NLP tasks. The article also collected most of the POS tags from different studies as well as from Kurdish linguistic experts to standardized part-of-speech tags. The proposed POS tagset is designed to annotate a large CKL corpus and support Kurdish NLP tasks. The initial investigations of this study via comparison with the Universal Dependencies framework for standard languages, show that the proposed POS tagset can streamline or correct sentences more accurately for Kurdish NLP tasks.


Reducing Formal Context Extraction: A Newly Proposed Framework from Big Corpora

Hassan, Bryar A., Qader, Shko M., Hassan, Alla A., Lu, Joan, Ahmed, Aram M., Majidpour, Jafar, Rashid, Tarik A.

arXiv.org Artificial Intelligence

Automating the extraction of concept hierarchies from free text is advantageous because manual generation is frequently labor- and resource-intensive. Free result, the whole procedure for concept hierarchy learning from free text entails several phases, including sentence-level text processing, sentence splitting, and tokenization. Lemmatization is after formal context analysis (FCA) to derive the pairings. Nevertheless, there could be a few uninteresting and incorrect pairings in the formal context. It may take a while to generate formal context; thus, size reduction formal context is necessary to weed out irrelevant and incorrect pairings to extract the concept lattice and hierarchies more quickly. This study aims to propose a framework for reducing formal context in extracting concept hierarchies from free text to reduce the ambiguity of the formal context. We achieve this by reducing the size of the formal context using a hybrid of a WordNet-based method and a frequency-based technique. Using 385 samples from the Wikipedia corpus and the suggested framework, tests are carried out to examine the reduced size of formal context, leading to concept lattice and concept hierarchy. With the help of concept lattice-invariants, the generated formal context lattice is compared to the normal one. In contrast to basic ones, the homomorphic between the resultant lattices retains up to 98% of the quality of the generating concept hierarchies, and the reduced concept lattice receives the structural connection of the standard one. Additionally, the new framework is compared to five baseline techniques to calculate the running time on random datasets with various densities. The findings demonstrate that, in various fill ratios, hybrid approaches of the proposed method outperform other indicated competing strategies in concept lattice performance.


Multi-objective Cat Swarm Optimization Algorithm based on a Grid System

Ahmed, Aram M., Hassan, Bryar A., Rashid, Tarik A., Noori, Kaniaw A., Saeed, Soran Ab. M., Ahmed, Omed H., Umar, Shahla U.

arXiv.org Artificial Intelligence

This paper presents a multi-objective version of the Cat Swarm Optimization Algorithm called the Grid-based Multi-objective Cat Swarm Optimization Algorithm (GMOCSO). Convergence and diversity preservation are the two main goals pursued by modern multi-objective algorithms to yield robust results. To achieve these goals, we first replace the roulette wheel method of the original CSO algorithm with a greedy method. Then, two key concepts from Pareto Archived Evolution Strategy Algorithm (PAES) are adopted: the grid system and double archive strategy. Several test functions and a real-world scenario called the Pressure vessel design problem are used to evaluate the proposed algorithm's performance. In the experiment, the proposed algorithm is compared with other well-known algorithms using different metrics such as Reversed Generational Distance, Spacing metric, and Spread metric. The optimization results show the robustness of the proposed algorithm, and the results are further confirmed using statistical methods and graphs. Finally, conclusions and future directions were presented..


NER- RoBERTa: Fine-Tuning RoBERTa for Named Entity Recognition (NER) within low-resource languages

Abdullah, Abdulhady Abas, Abdulla, Srwa Hasan, Toufiq, Dalia Mohammad, Maghdid, Halgurd S., Rashid, Tarik A., Farho, Pakshan F., Sabr, Shadan Sh., Taher, Akar H., Hamad, Darya S., Veisi, Hadi, Asaad, Aras T.

arXiv.org Artificial Intelligence

Nowadays, Natural Language Processing (NLP) is an important tool for most people's daily life routines, ranging from understanding speech, translation, named entity recognition (NER), and text categorization, to generative text models such as ChatGPT. Due to the existence of big data and consequently large corpora for widely used languages like English, Spanish, Turkish, Persian, and many more, these applications have been developed accurately. However, the Kurdish language still requires more corpora and large datasets to be included in NLP applications. This is because Kurdish has a rich linguistic structure, varied dialects, and a limited dataset, which poses unique challenges for Kurdish NLP (KNLP) application development. While several studies have been conducted in KNLP for various applications, Kurdish NER (KNER) remains a challenge for many KNLP tasks, including text analysis and classification. In this work, we address this limitation by proposing a methodology for fine-tuning the pre-trained RoBERTa model for KNER. To this end, we first create a Kurdish corpus, followed by designing a modified model architecture and implementing the training procedures. To evaluate the trained model, a set of experiments is conducted to demonstrate the performance of the KNER model using different tokenization methods and trained models. The experimental results show that fine-tuned RoBERTa with the SentencePiece tokenization method substantially improves KNER performance, achieving a 12.8% improvement in F1-score compared to traditional models, and consequently establishes a new benchmark for KNLP.


Decoding Drug Discovery: Exploring A-to-Z In silico Methods for Beginners

Rasul, Hezha O., Ghafour, Dlzar D., Aziz, Bakhtyar K., Hassan, Bryar A., Rashid, Tarik A., Kivrak, Arif

arXiv.org Artificial Intelligence

The drug development process is a critical challenge in the pharmaceutical industry due to its time-consuming nature and the need to discover new drug potentials to address various ailments. The initial step in drug development, drug target identification, often consumes considerable time. While valid, traditional methods such as in vivo and in vitro approaches are limited in their ability to analyze vast amounts of data efficiently, leading to wasteful outcomes. To expedite and streamline drug development, an increasing reliance on computer-aided drug design (CADD) approaches has merged. These sophisticated in silico methods offer a promising avenue for efficiently identifying viable drug candidates, thus providing pharmaceutical firms with significant opportunities to uncover new prospective drug targets. The main goal of this work is to review in silico methods used in the drug development process with a focus on identifying therapeutic targets linked to specific diseases at the genetic or protein level. This article thoroughly discusses A-to-Z in silico techniques, which are essential for identifying the targets of bioactive compounds and their potential therapeutic effects. This review intends to improve drug discovery processes by illuminating the state of these cutting-edge approaches, thereby maximizing the effectiveness and duration of clinical trials for novel drug target investigation.


Authorities in northern Iraq report casualties from Turkish drone strike

Al Jazeera

Local authorities and news outlets in northern Iraq's semi-autonomous Kurdish region have said that several people were killed in a Turkish drone strike on Friday, including two journalists. In an initial statement on Friday, the regional authorities said that a car belonging to the Kurdistan Workers' Party (PKK) was struck near the city of Sulaymaniyah, killing a senior PKK official, his guard and his driver. However, a later statement by the Kurdistan regional government's Deputy Prime Minister Qubad Talabani said that the attack targeted a group of journalists, two of whom were killed. "They were two women journalists, not members of an armed force to be a threat to the security and stability of any country or region," Talabani said in a statement. Reporters Without Borders (RSF), a press advocacy organisation, also released a statement denouncing the deaths of the two journalists, identified as 27-year-old Hero Baha'uddin and 40-year-old Golestan Tara from Sterk TV.


From A-to-Z Review of Clustering Validation Indices

Hassan, Bryar A., Tayfor, Noor Bahjat, Hassan, Alla A., Ahmed, Aram M., Rashid, Tarik A., Abdalla, Naz N.

arXiv.org Artificial Intelligence

Data clustering involves identifying latent similarities within a dataset and organizing them into clusters or groups. The outcomes of various clustering algorithms differ as they are susceptible to the intrinsic characteristics of the original dataset, including noise and dimensionality. The effectiveness of such clustering procedures directly impacts the homogeneity of clusters, underscoring the significance of evaluating algorithmic outcomes. Consequently, the assessment of clustering quality presents a significant and complex endeavor. A pivotal aspect affecting clustering validation is the cluster validity metric, which aids in determining the optimal number of clusters. The main goal of this study is to comprehensively review and explain the mathematical operation of internal and external cluster validity indices, but not all, to categorize these indices and to brainstorm suggestions for future advancement of clustering validation research. In addition, we review and evaluate the performance of internal and external clustering validation indices on the most common clustering algorithms, such as the evolutionary clustering algorithm star (ECA*). Finally, we suggest a classification framework for examining the functionality of both internal and external clustering validation measures regarding their ideal values, user-friendliness, responsiveness to input data, and appropriateness across various fields. This classification aids researchers in selecting the appropriate clustering validation measure to suit their specific requirements.


Airport in Iraq's Kurdish region hit by deadly drone attack

Al Jazeera

At least six people have been killed in a suspected drone attack on an airport near the city of Sulaymaniyah in the semi-autonomous Kurdish region in northern Iraq, official sources have told Al Jazeera. Al Jazeera's Mahmoud Abdelwahed, reporting from the Iraqi capital Baghdad, said that the Arbat airport, located 50km (30 miles) to the east of Sulaimaniya, has been used by the "anti-terrorism" combat apparatus that is part of Sulaymaniyah security forces. "Whether all the victims are from the anti-terrorism apparatus remains to be known," he said. The airport was used for agricultural purposes in the past. Two members of the Kurdish security forces were wounded in the attack and were rushed to a military hospital in Sulaimaniya under tight security, a police source told Reuters.