Preferred Language
Articles
/
IRc2Po8BVTCNdQwCNGVd
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face mask detection software based on AI and image processing techniques. For face detection, helmet detection, and mask detection, the approaches mentioned in the article utilize Machine learning, Deep learning, and many other approaches. It will be simple to distinguish between persons having masks and those who are not having masks using all of these ways. The effectiveness of mask detectors must be improved immediately. In this article, we will explain the techniques for face mask detection with a literature review and drawbacks for each technique.

View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Simplification of new fashion design methods
...Show More Authors

Simplification of new fashion design methods

View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Swab – Surge Pressure Investigation, and the Influence Factors, Prediction and Calculation (Review)
...Show More Authors

Surge pressure is supplemental pressure because of the movement of the pipes downward and the swab pressure is the pressure reduction as a result of the drill string's upward movement. Bottom hole pressure is reduced because of swabbing influence. An Investigation showed that the surge pressure has great importance for the circulation loss problem produced by unstable processes in the management pressure drilling (MPD) actions. Through Trip Margin there is an increase in the hydrostatic pressure of mud that compensates for the reduction of bottom pressure due to stop pumping and/or swabbing effect while pulling the pipe out of the hole. This overview shows suggested mathematical/numerical models for simulating surge pressure problems ins

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of BASE methods with other methods for estimating the measurement parameter for WEBB distribution using simulations
...Show More Authors

  Weibull distribution is considered as one of the most widely  distribution applied in real life, Its similar to normal distribution in the way of applications, it's also considered as one of the distributions that can applied in many fields such as industrial engineering to represent replaced and manufacturing time ,weather forecasting, and other scientific uses in reliability studies and survival function in medical and communication engineering fields.

   In this paper, The scale parameter has been estimated for weibull distribution using Bayesian method based on Jeffery prior information as a first method , then enhanced by improving Jeffery prior information and then used as a se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
Roller compacted concrete: Literature review
...Show More Authors

Roller compacted concrete (RCC) is a material with no slumps and is made from the same raw materials as conventional concrete. The roller compacted dam method, the high paste technique, the corps of engineers method, and the maximum density method are all ways of designing RCC. The evolution of RCC has resulted in a substantial change in construction projects, most notably in dams, because of the sluggish pace of conventional placement, consolidation, and compacting. The construction process was accelerated by incorporating RCC into dams, resulting in a shorter construction period. Research shows that the dams that used RCC had completed one to two years sooner than the dams that used regular concrete (Bagheri an

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Al-rafidain Journal Of Computer Sciences And Mathematics
Braille Character Recognition System: Review
...Show More Authors

The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell transcription and Braille cell recognition are the two basic phases that follow one another. The Braille Recognition System is a technique for locating and recognizing a Braille document stored as an image, such as a jpeg, jpg, tiff, or gif image, and converting the text into a machine-readable format, such as a text file. BCR translates an image's pixel representation into its character representation. As workers at visually impaired schools and institutes, we profit from Braille recognition in a variety of ways. The Braille Recognition S

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 07 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Review: Cancer Cells Resistance Strategies
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Design and Construction of a Dust Detection System using Infrared Laser: The Case of Dust Storms in Baghdad in the Summer 2022
...Show More Authors

Iraq suffers from serious pollution with harmful particles that have important direct and indirect effects on human activities and human health. In this research, a system for detecting pollutants in the air was designed and manufactured using infrared laser technology. This system was used to detect the presence of pollutants in the dust storms that swept the city of Baghdad which could have a negative impact on human health and living organisms.

The designed detection system based on the use of infrared laser (IR) with a wavelength of 1064 nm was used for the purposes of detecting pollutants based on the scattering of the laser beam from these pollutants. The system was aligned to obtain the best signal for the scattered rays, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 13 2019
Journal Name
Journal Of The College Of Languages (jcl)
Certains aspects techniques Chez Henri Barbusse dans L'ENFER
...Show More Authors

L’Enfer est un roman de chambre par excellence. Tous les événements s'y sont presque déroulés. Le sujet de ce roman se résume: un jeune homme quitte la campagne pour vivre à Paris .Il loue une chambre dans un hôtel. Il tombe, par un pur hasard, sur une fente dans le mur de sa par laquelle chambre il peut voir tout ce qui se passe dans la chambre voisine .L'histoire racontée par ce narrateur, est la vie intime des couples venant dans cette chambre. Il médite sur sa propre condition à la lumière de ce qui se déroule dans la chambre voisine .C'est pour cette raison,que le roman se caractérise par une stabilité.Quoi qu’elle soit manifeste, le héros démontre une mobilité à son niveau psychique. Car il y a une évolution

... Show More
View Publication Preview PDF