Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face mask detection software based on AI and image processing techniques. For face detection, helmet detection, and mask detection, the approaches mentioned in the article utilize Machine learning, Deep learning, and many other approaches. It will be simple to distinguish between persons having masks and those who are not having masks using all of these ways. The effectiveness of mask detectors must be improved immediately. In this article, we will explain the techniques for face mask detection with a literature review and drawbacks for each technique.
Objective: Detection the presumptive prevalence of
silent celiac disease in patients with type 1 diabetes
mellitus with determination of which gender more
likely to be affected.
Methods: One hundred twenty asymptomatic patients
[75 male , 45 female] with type 1 diabetes mellitus
with mean age ± SD of 11.25 ± 2.85 year where
included in the study . All subjects were serologically
screened for the presence of anti-tissue transglutaminase
IgA antibodies (anti-tTG antibodies) by Enzyme-
Linked Immunosorbent Assay (ELISA) & total IgA
was also measured for all using radial
immunodiffusion plate . Anti-tissue transglutaminase
IgG was selectively done for patients who were
expressing negative anti-
Objective: Detection the presumptive prevalence of silent celiac disease in patients with type 1 diabetes mellitus with determination of which gender more likely to be affected.
Methods: One hundred twenty asymptomatic patients [75 male , 45 female] with type 1 diabetes mellitus with mean age ± SD of 11.25 ± 2.85 year where included in the study . All subjects were serologically screened for the presence of anti-tissue transglutaminase IgA antibodies (anti-tTG antibodies) by Enzyme-Linked Immunosorbent Assay (ELISA) & total IgA was also measured for all using radial immunodiffusion plate . Anti-tissue transglutaminase IgG was selectively done for patients who were expressing negative anti-tissue transglutaminase IgA with low tot
This study focuses on evaluating the suitability of three interpolation methods in terms of their accuracy at climate data for some provinces of south of Iraq. Two data sets of maximum and minimum temperature in February 2008 from nine meteorological stations located in the south of Iraq using three interpolation methods. ArcGIS is used to produce the spatially distributed temperature data by using IDW, ordinary kriging, and spline. Four statistical methods are applied to analyze the results obtained from three interpolation methods. These methods are RMSE, RMSE as a percentage of the mean, Model efficiency (E) and Bias, which showed that the ordinary krigingis the best for this data from other methods by the results that have b
... Show MoreThis research foxed on the effect of fire flame of different burning temperatures (300, 400 and 500)oC on the compressive strength of reactive powder concrete (RPC).The steady state duration of the burning test was (60)min. Local consuming material were used to mixed a RPC of compressive strength around (100) MPa. The tested specimens were reinforced by (3.0) cm hooked end steel fiber of (1100) MPa yield strength. Three steel fiber volume fraction were adopted in this study (0, 1.0and 1.5)% and two cooling process were included, gradual and sudden. It was concluding that increasing burning temperature decreases the residual compressive strength for RPC specimens of(0%) steel fiber volume fraction by (12.16, 19.46&24.49) and (18.20, 27.77 &3
... Show MoreMeasuring the level of communicative competence in news headlines and the level of stylistic and semantic processing in its formulation requires creating a quantitative scale based on the bases on building the scales and their standards. As judging by scientific of journalism studies lies in the possibility of quantifying the journalistic knowledge, i.e. the ability of this knowledge to shift from qualitative language to its equivalent in the language of numbers.
News headlines and editorial processing are one of the journalistic knowledges that should be studied, analyzed stylistically and semantically; their conclusions drawn and expressed in numbers. Press knowledge is divided into two types:<
... Show MoreIn this study used three methods such as Williamson-hall, size-strain Plot, and Halder-Wagner to analysis x-ray diffraction lines to determine the crystallite size and the lattice strain of the nickel oxide nanoparticles and then compare the results of these methods with two other methods. The results were calculated for each of these methods to the crystallite size are (0.42554) nm, (1.04462) nm, and (3.60880) nm, and lattice strain are (0.56603), (1.11978), and (0.64606) respectively were compared with the result of Scherrer method (0.29598) nm,(0.34245),and the Modified Scherrer (0.97497). The difference in calculated results Observed for each of these methods in this study.
Radiation therapy plays an important role in improving breast cancer cases, in order to obtain an appropriateestimate of radiation doses number given to the patient after tumor removal; some methods of nonparametric regression werecompared. The Kernel method was used by Nadaraya-Watson estimator to find the estimation regression function forsmoothing data based on the smoothing parameter h according to the Normal scale method (NSM), Least Squared CrossValidation method (LSCV) and Golden Rate Method (GRM). These methods were compared by simulation for samples ofthree sizes, the method (NSM) proved to be the best according to average of Mean Squares Error criterion and the method(LSCV) proved to be the best according to Average of Mean Absolu
... Show MoreThe construction of highly safe and durable buildings that can bear accident damage risks including fire, earthquake, impact, and more, can be considered to be the most important goal in civil engineering technology. An experimental investigation was prepared to study the influence of adding various percentages 0%, 1.0%, and 1.5% of micro steel fiber volume fraction (Vf) to reactive powder concrete (RPC)—whose properties are compressive strength, splitting tensile strength, flexural strength, and absorbed energy—after the exposure to fire flame of various burning temperatures 300, 400, and 500 °C using gradual-, foam-, and sudden-cooling methods. The outcomes of this research proved that the maximum reduction in mechanical prop
... Show Moreresearch aim :
- The research aimed to investigate the effect of two treatment
methods in the gaining of fourth grade students in geography
object.
- Research hypothesis
there are no statistically significant differences at the level of ( 0.05 )
in the average level of achievement in geography between the first
experimental group ( strengthening lessons ) and the second group
( re- teaching )
no individual differences statically significant at the level of ( 0.05 )
in the average level achievement in geography object of the second
experimental group ( re- teaching ) and the first experimental group
( strengthening lesson )
the research sample : the researcher selected randomly Baghdad
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More