Preferred Language
Articles
/
IRc2Po8BVTCNdQwCNGVd
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face mask detection software based on AI and image processing techniques. For face detection, helmet detection, and mask detection, the approaches mentioned in the article utilize Machine learning, Deep learning, and many other approaches. It will be simple to distinguish between persons having masks and those who are not having masks using all of these ways. The effectiveness of mask detectors must be improved immediately. In this article, we will explain the techniques for face mask detection with a literature review and drawbacks for each technique.

View Publication
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of BASE methods with other methods for estimating the measurement parameter for WEBB distribution using simulations
...Show More Authors

  Weibull distribution is considered as one of the most widely  distribution applied in real life, Its similar to normal distribution in the way of applications, it's also considered as one of the distributions that can applied in many fields such as industrial engineering to represent replaced and manufacturing time ,weather forecasting, and other scientific uses in reliability studies and survival function in medical and communication engineering fields.

   In this paper, The scale parameter has been estimated for weibull distribution using Bayesian method based on Jeffery prior information as a first method , then enhanced by improving Jeffery prior information and then used as a se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Detection of Hypertension among Cardiac Diseases Inpatients at Kirkuk City Hospitals
...Show More Authors

Objectives of the study: The main objective of the study is to assess the prevalence of hypertension among
cardiac diseases patients and to fiend out relation ship between hypertension and cardiovascular diseases.
Methodology: A descriptive study, using interviewer and questionnaire technique was conducted on cardiac
diseases inpatients of clinic unite at Kirkuk and Azady hospitals from 17th ,June ,2012 to 1st, March , 2013.
Non – probability (purposive) sample of (148) adult patients, (81) females and (67) males with heart disease are
selected from inpatients of clinic unite at Kirkuk and Azady hospitals at kirkuk city. Questionnaire was
developed to assess the items which are related to heart disease patient's (Dise

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of New Theory
Brief review of soft sets and its application in coding theory
...Show More Authors

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Review on Heat Transfer Process Inside Open and Closed Porous Cavity
...Show More Authors

Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 10 2024
Journal Name
The American Journal Of Interdisciplinary Innovation And
SUBJECT REVIEW PHASES OF SUGAR METABOLISM AND THE EFFECT OF HORMONES
...Show More Authors

Publication Date
Sat Dec 01 2018
Journal Name
Swarm And Evolutionary Computation
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
...Show More Authors

View Publication
Scopus (187)
Crossref (167)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
World Neurosurgery
Orbital Rhabdomyosarcoma: Comprehensive Review of Epidemiology, Clinical Staging, and Treatment Outcomes
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Basrah Researches Sciences
Review article: Biodegradation of Pharmaceutical Pollutants: Challenges, Mechanisms, and Environmental Implications
...Show More Authors

The emergence of such widespread pharmaceuticals as a pollutant has become one of the world's critical environmental problems that may lead to both the public's health and biodiversity deterioration. This article provides an exhaustive account of the current understanding of the environmental persistence of pharmaceutical contaminants following in-depth analysis of the additive effects of existing natural biodegradation pathways on the human health impact of these drugs. Paying special attention to biodegradation decomposing agents such as bacteria, fungi, and algae the paper estimates their ability to convert drug ingredients to compound that is eventually less toxic. Although these biologic systems contain an enormous potential fo

... Show More
View Publication Preview PDF
Crossref