Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face mask detection software based on AI and image processing techniques. For face detection, helmet detection, and mask detection, the approaches mentioned in the article utilize Machine learning, Deep learning, and many other approaches. It will be simple to distinguish between persons having masks and those who are not having masks using all of these ways. The effectiveness of mask detectors must be improved immediately. In this article, we will explain the techniques for face mask detection with a literature review and drawbacks for each technique.
The study included the investigation of fungi which associated with heavy animal's leather (Cows and Buffalos) and light (Sheep’s and Goats )through different processing stages (raw hides ,dehairing ,pickling,chrome tanned and stainning or finished stages)there were 10 genera and 25 species in addition to sterile fungi associated with animal leathers which included Alternaria ,Aspergillus,Cladosporium,Fusarium, Mucor , Penicillium , Rhizopus , and Trichoderma .Aspergillus and Penicillium have observed in all leather samples and different processing stages, and that the first time isolate two genera Helminthosporium , Stemphylium form leather for staining stage.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
A general and accurate morphological study was carried out for the species Calotropis procera which belongs to the family Asclepiadaceae. The research included the phenotypic characteristics of the root, stem and leaves the leaves were studied morphologically and anatomically, Flowers, fruits and seeds, as well as the geographical distribution of the genus were studied also. In general, there are no previous taxonomic study of this genus under consideration, according to the available sources and it is the first one has been done in Iraq, perhaps Because of its low prevalence previously, where it was recently noticed its spread in last two to three years ago. Keywords: Apocynaceae, Apple Sodom, Poisonous Plant, Anatomy
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreInvestigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016. the researcher setup two scales based on the previous studies: one to measure the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data