Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face mask detection software based on AI and image processing techniques. For face detection, helmet detection, and mask detection, the approaches mentioned in the article utilize Machine learning, Deep learning, and many other approaches. It will be simple to distinguish between persons having masks and those who are not having masks using all of these ways. The effectiveness of mask detectors must be improved immediately. In this article, we will explain the techniques for face mask detection with a literature review and drawbacks for each technique.
Most statistical research generally relies on the study of the behaviour of different phenomena during specific time periods and the use of the results of these studies in the development of appropriate recommendations and decision-making and for the purpose of statistical inference on the parameters of the statistical distribution of life times in The technical staff of most of the manufacturers in the research units of these companies deals with censored data, the main objective of the study of survival is the need to provide information that is the basis for decision making and must clarify the problem and then the goals and limitations of this study and that It may have different possibilities to perform the
... Show MoreThe goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed
W Tarik A, AW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 2
The quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me
... Show MoreOur life is a test and the eternal life in the afterlife. So we must work well in our life even win paradise, must always remember the death and there is a life after this death and we will be responsible for everything we've done in our life. God did not create us vain but for reward, punishment, for this we must have to well prepare for this great day and we have to think about what to do in order to win the paradise.
Keywords: paradise, surat al-rahman, preparation.
The main purpose of this paper is to study feebly open and feebly closed mappings and we proved several results about that by using some concepts of topological feebly open and feebly closed sets , semi open (- closed ) set , gs-(sg-) closed set and composition of mappings.
A series of new 2-quinolone derivatives linked to benzene sulphonyl moieties were performed by many steps: the first step involved preparation of different coumarins (A1,A2) by condensation of different substituted phenols with ethyl acetoacetate. The compound A1 was treated with nitric acid to afford two isomers of nitrocoumarin derivatives (A3) and (A4). The prepared compounds (A2, A3) were treated with hydrazine hydrate to synthesize different 2-quinolone compounds (A5,A6) while the coumarin treated with different amines gave compounds (A7,A8). Then the synthesized 2-quinolone compounds (A5-A8) treated with benzene sulphonyl chloride to afford new sulfonamide derivatives (A9-A12). The synthesized compounds were characterized by FT-IR, 1H
... Show MoreA particulate composite material was prepared by adding the Titanium dioxide (TiO2) with a particle size of (75-150) µm to Epoxy resin at weight percentage of (10%,20%,30%,40%,50%).The following some mechanical properties were studied,fracture toughness, hardness.casting preparation methods were used in this study includes preparing plate of matrix and composites. specimens were prepared according to ASTM for the Mechanical properties tests. After that Another samples were heat treated for three and six hour at 65C?. Fracture toughness (Kic) represent for stress intensity factor results were showed that the curve of three hours aging increases in fracture toughness (Kic) for composites but for six hours aging increases fracture tough
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreUnited Arab of Emirates made efforts in developing workforce in the field of nuclear energy that it had a chance to attract specialized of this field that it reflect growth in every field of life through which it take special procedures to face casas as fokoshima .the state had started to apply the UAE peaceful nuclear program by opening (Baraka)station in 2010 as to be the first in the Arab world to aim to enhance and diversification energy sources of electricity there in addition to enhance the state’s efforts to achieve economic refreshing and environmental protect.