Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face mask detection software based on AI and image processing techniques. For face detection, helmet detection, and mask detection, the approaches mentioned in the article utilize Machine learning, Deep learning, and many other approaches. It will be simple to distinguish between persons having masks and those who are not having masks using all of these ways. The effectiveness of mask detectors must be improved immediately. In this article, we will explain the techniques for face mask detection with a literature review and drawbacks for each technique.
Low back pain a major causes of morbidity throughout the world and it is a most debilitating condition ,and can lead to decreased physical function ,compromised quality of life, and psychological distress.
Obesity is nowadays a pandemic condition. Obese subjects are commonly characterized by musculoskeletal disorders and particularly by non-specific LBP. However, the relationship between obesity and LBP remain to date unsupported by objective measurements of mechanical behavior of spine and it is morphology in obese subjects. &nb
... Show MoreLanguage mirrors understanding of the same or other culture. Meaning is hardly encoded in the world community. Some linguists cannot solve language problems because of its abstractedness. Language communicators learn the second or foreign language at schools for three reasons. First, English is not their first language. Second, they have little or no educational background in experiencing what they know in another language. Third, they have not improved their communication skills in English. Analyzing the language as a mean of communication would not be learned enough without its practice. This paper gives an exclusive preview of applied linguistics. It defines the conversion of different areas of the study of language with second o
... Show MoreThis paper aims to give an overview of acculturation in the literature by means of its explicit definitions, main characteristics, and categorical process. It also foreshadows the significance of acquiring novice culture with particular connection to second language acquisition. Schumann and John Berry underscored acculturation each with its own model of acculturation. In the case of this review, you will realize that Schumann's two main aspects are firmly rooted in berry's model of acculturation as an exclusive description in relation to second language acquisition. Steven Krashen outlined acquiring language from the intellectual and linguistic view of learning, whereas Micheal Long demanded for communication in social perspective. It has
... Show MoreVoice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show MoreBackground Bilateral cleft lip deformity is much more difficult to correct than unilateral cleft lip deformity. The complexity of the deformity and the sensitive relationships between the arrangement of the muscles and the characteristics of the external lip necessitate a comprehensive preoperative plan for management. The purpose of this study was to evaluate the repair of bilateral cleft lip using the Byrd modification of the traditional Millard and Manchester methods. A key component of this repair technique is focused on reconstruction of the central tubercle.
Methods Fourteen patients with mean age of 5.7 months presented with bilateral cleft lip deformity and were operated on using a mod
... Show MoreIn this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%
... Show MoreThe current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.