During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreHybrid architecture of ZnO nanorods/graphene oxide ZnO-NRs@GO synthesized by electrostatic self-assembly methods. The morphological, optical and luminescence characteristics of ZnO-NRs@GO and ZnO-NRs thin films have been described by FESEM, TEM, HRTEM, and AFM, which refers to graphene oxide have been coated ZnO-NRs with five layers. Here we synthesis ZnO-NRs@GO by simple, cheap and environmentally friendly method, which made it favorable for huge -scale preparation in many applications such as photocatalyst. ZnO-NRs@GO was applied as a photocatalyst Rodamin 6 G (R6G) dye from water using 532 nm diode laser-induced photocatalytic process. Overall degradation of R6G/ ZnO-NRs@GO was achieved after 90 minutes of laser irradiation while it ne
... Show MoreObjectives: To determine the effectiveness of the instructional program on patients’ knowledge about home safety while receiving anti-cancer treatment at Al- Karama Teaching Hospital in Al-Kut City.
Methodology: A quasi-experimental design is conducted through the application of a pre-test and post-test approach for the study and control groups from February 5th, 2020 to April 25th, 2020. A non–probability (purposive) sample of (50) patients treated at the Blood Disease and Oncology Center is selected and divided into two groups. Each group contains (25) patients as control and study groups. An instrument is constructed that is comprised of two parts; t
... Show MoreThe education sector suffers from many problems, including the scarcity of schools that can absorb the increasing number of students in light of the increasing population growth rate, as some regions suffer from a lack of opening of new schools or the expansion of existing schools to increase their capacity so that attention is required. The research sought to identify the level of maturity of project management at the research site (Building Department in Al-Karkh I/ Ministry of Education) Being responsible for educational projects and their implementation and to know that, the ten areas of the knowledge guide to project management PMBOK have been adopted according to the PM3 model (one of the models of maturity
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreBackground: Toxin-producing Shiga Escherichia coli has been identified as a new foodborne pathogen that poses a significant health risk to humans. Shiga toxin-producing Escherichia coli can be found in raw cow milk and its derivatives. A small number of Escherichia coli strains that produce shiga toxin are pathogenic. Aim of study: The study aimed to see if there were any virulence genes in 50 milk samples that were typical of Entero-haemorrhagic E. coli and evaluate the Myrtus communis effects on these bacteria. Materials and Method: Milk samples were used to isolate E. coli bacteria (n= 27), biochemically analyzed, and genetically screened for virulence genes using a multiplex (PCR). The hydro-alcoholic extraction of Myrtus communis leave
... Show MoreComplexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4-thiadiazole-2-yl)phenyl) thiourea have been prepared and characteizedby elemental analysis, Ff-[R, and u.v./ visible spectra moreover,determination of metal content M%o by flame atomic absorptionspectroscopy, molar conductance in DMSO solution and magneticmoments (peffl.The result showed that the ligand (L) was coordinated to Mn+2, Ni+2,Ct+2,2n+2,Cd+2, and Hg+2 ions through the nitrogen atoms and sulpheratoms.From the result obtained, rhe following general formula [MLCl2] hasbeen given for the prepared complexes with an octahedral geometryaround the metal ions for all complexes.where M= Mn+2, Ni+2, cu+2, zn+2, cd+2, and Hg+2 l= l-phenyl-3-(2-(5-(phenyl amino
... Show MoreThis work involves the calculation of the cooling load in Iraqi building constructions taking in account the effect of the convective heat transfer inside the buildings. ASHRAE assumptions are compared with the Fisher and Pedersen model of estimation of internal convective heat transfer coefficient when the high rate of ventilation from ceiling inlet configuration is used. Theoretical calculation of cooling load using the Radiant Time Series Method (RTSM) is implemented on the actual tested spaces. Also the theoretical calculated cooling loads are experimentally compared by measuring the cooling load in these tested spaces. The comparison appears that using the modified Fisher and Pedersen model when large ventilation ra
... Show More