In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific public area by using CCTV (closed-circuit television). The problem also occurs in case the software tool is inaccurate. The technique of this notion is to use large data of face images, some faces are wearing masks, and others are not wearing masks. The methodology is by using machine learning, which is characterized by a HOG (histogram orientation gradient) for extraction of features, then an SVM(support vector machine) for classification, as it can contribute to the literature and enhance mask detection accuracy. Several public datasets for masked and unmasked face images have been used in the experiments. The findings for accuracy are as follows: 97.00%, 100.0%, 97.50%, 95.0% for RWMFD (Real-world Masked Face Dataset)& GENK14k, SMFDB (Simulated Masked Face Recognition Dataset), MFRD (Masked Face Recognition Dataset), and MAFA (MAsked FAces)& GENK14k for databases, respectively. The results are promising as a comparison of this work has been made with the state-of-the-art. The workstation of this research used a webcam programmed by Matlab for real-time testing.
The research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in
... Show MoreBackground: Acne is a common disorder experienced by adolescents and persists into adulthood in approximately 12%–14% of cases with psychological and social implications of high gravity. Fractional resurfacing employs a unique mechanism of action that repairs a fraction of skin at a time. The untreated healthy skin remains intact and actually aids the repair process, promoting rapid healing with only a day or two of downtime. Aims: This study, was designed to evaluate the safety and effectiveness of fractional photothermolysis (fractionated Er: YAG laser 2940nm) in treating atrophic acne scars. Methods: 7 females and 3 males with moderate to severe atrophic acne scarring were enrolled in this study that attained private clinic for Derm
... Show MoreEl tema de esta investigación está directamente relacionado con el papel del léxico en la enseñanza-aprendizaje del español como segunda lengua en el sistema de enseñanza universitariairaquí, donde se llevó a cabo la investigación empírica y la propuesta de criterios de la selección de léxico español.
Este estudio se ha centrado concretamente en los alumnos irakíes de nivel elemental que estudian elespañol como segunda lengua extranjera. Con el fin de conocer los estilos de enseñanza-aprendizaje del vocabulario practicado en las aulas, de determinar las faltas en la selección léxica y realizar propuestas de mejorar la competencia léxica, hemos efectuado el an
... Show Moreيتناول البحث تعليم اللغة العربية وما لها من أثر بين التراث والمعاصرة إذ يعُد مقياس رقي أي مجتمع من المجتمعات مقدار عنايته بلغته القومية ، فهي وسيلته واداته للتفاهم في مواجهة المواقف المختلفة التي تتطلب الكلام ، والاستماع ، والقراءة ، والكتابة ، هي دلالة تحضره وتقدمه في احواله المختلفة ، وهي الشرط الاساس في بقائه ونمائه ، فبدونها يغيب موضوع الحديث عن مفهوم المجتمع القومي لاي شعب من الشعوب ..
الإسھام في عَ وْ د محمود إلی علم المعاني لیحل ّ محلّھ الصحیح في أذھان المتعلّمین وفي الدراسات النقدیة والبلاغیة .وعلم المعاني یرتكز على طورین لا یمكن مفارقة أوّ لھما إذا بقیت الضبابیّة تلفّھ ،لأنھ مفتاح مغالیق الطور الثاني الأھم ، والطوران ھما ) القواعد والأصول ( و)التحلیلاتُ إلى والرؤى البلاغیة (، وقواعد علم المعاني یفارقھا الفھم في أحیان كثیرة ، لذا وجّ ھتقصد المشاع والبسیط من المخزون النحوي لتنحیة خفائھا وف
... Show MoreThe main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More
Linear Feedback Shift Register (LFSR) systems are used widely in stream cipher systems field. Any system of LFSR's which wauldn't be attacked must first construct the system of linear equations of the LFSR unit. In this paper methods are developed to construct a system of linear/nonlinear equations of key generator (a LFSR's system) where the effect of combining (Boolean) function of LFSR is obvious. Before solving the system of linear/nonlinear equations by using one of the known classical methods, we have to test the uniqueness of the solution. Finding the solution to these systems mean finding the initial values of the LFSR's of the generator. Two known generators are used to test and apply the ideas of the paper,
... Show More