Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face mask detection software based on AI and image processing techniques. For face detection, helmet detection, and mask detection, the approaches mentioned in the article utilize Machine learning, Deep learning, and many other approaches. It will be simple to distinguish between persons having masks and those who are not having masks using all of these ways. The effectiveness of mask detectors must be improved immediately. In this article, we will explain the techniques for face mask detection with a literature review and drawbacks for each technique.
The financial analysis of the published financial statements is the means that enables businessmen, financial institutions, financial analysts and others to conduct their studies and conclusions to obtain information that helps them in the decision-making process, including decisions related to investment. National in making the decision on the investment activity, for the period from 2012 to 2018, through the information provided by the annual financial statements, by selecting a set of indicators provided by the financial statements, namely (liquidity ratio, activity percentage, profitability ratios) to measure the extent of this ability Indicators in determining their role in making an investment decision.
Abstract:
The six Arab Gulf states (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, UAE) play a vital role, especially with its geographical location and natural resources (oil and gas) as well as other cultural and civilizational elements, in achieving global economic balance and more specifically global energy security, naturally because of these countries have a comparative advantage in the field of fossil energy (oil and gas), thus this sector becomes more attractive for local and international investments alike. Being the energy sector a leader sector in the economic development process, and the basic factor to achieve savings and financial surpluses in thes
... Show MoreThe research work involve preparation of activated carbon from Plant corn grain dry in the presence of some additive Residual of poly ethelenetereaphthalate.and the anather way Carbonization was conducted by mixing a known weight of the feedstock with variable quantity of the additive and fixed ratio of Potassium hydroxide. Carbonization completed using fusion in solid state in the absence of solvents. Feedstock and mainly Remnants of poly ethelenetereaphthalate were decompose thermally in a Small chains containing to naphthoxide radicals, these radicals can be connected with the Chains of activated carbon aiming to increase polarity ,This was found from the reaction it self . this research has been studying the product sample was eva
... Show MoreThe research aims to enrich the subject of marketing deception, which is still in the concept stage at the level of the research sample and to allow future researchers to contribute to addressing the concept of marketing deception and linking it with other variables. The research problem is that is there a correlation between marketing deception and organizational reputation in Baghdad assets. What is the reflection of marketing deception on the organizational reputation in the assets of Baghdad? The research is concerned with shedding light on the reputation of the organization in terms of frequency of purchase, place of purchase, brand loyalty, and knowing the impact of marketing deception on these fact
... Show MoreThe study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult
Interleukin -33 is a new member of the IL-1 superfamily of cytokines that is expressed mainly by stromal cells.Its expression is upregulated following pro-inflammatory stimulation.Aim of the present study was to assess the serum IL-33 level and its relationship with inflammatory biomarker CRP in Iraqi females patients with celiac disease. Thirty five patients with celiac disease (CD) and thirty healthy individuals as control group were enrolled in this study,their age ranged (20-35) year.Anti-Gliadin IgA ,IgG and Anti-Tissue IgA ,IgG were estimated in all subjects as diagnostic parameters .ESR and CRP were assayed as inflammatory biomarkers. IL-33 was determined in patients and control groups.The results of the present study revealed a hig
... Show MoreBanks face different types of banking risks that limit the performance of its functions and achieve its objectives, including the financial risk that is based on current research into two types including a credit and liquidity risks. And established credit risk due to the possibility of delaying the borrowers to fulfill their obligations to the bank when due or non-payments on according to the terms agreed upon, while liquidity risk arises as a result of the inability of the bank to fund the financial needs, any inability to provide cash to pay its obligations short on credit without achieving tangible loss or the inability to employ the funds properly and show the liquidity risk in the event of inadequate cash inflows to the bank for an
... Show MoreThe research is conducted on target of investigating the role of growth strategy via diversification in value maximization of a firm in terms of controversies literatures had witnessed. Using a descriptive approach for analyzing and verifying the harmony of variables of research and their conceptualized logic , it could be reached to many conclusions agreed in their essence upon that the related diversification has the major role in value maximization of a firm and the wealth of its owners .
This study was aimed to extract the effective material from the dry nests of termites and detect its antibacterial activity against some pathogenic bacterial isolates and inhibit synthesis of its biofilm. Termites dry nests were collected and the effective material was extracted then the antibacterial activity was detected using the disc diffusion assay. Results were showed that the extract have antibacterial material from the Termites dry nests, this extract showed antibacterial activity against Gram positive bacteria (Staphylococcus aureus) at (21.5mm) and Gram negative bacteria ( Enterobacter sp. and Pseudomonas aeruginosa) at (26 mm and 20 mm) respectively by inhibiting their growth, as well as its effect on biofilm production o
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More