In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific public area by using CCTV (closed-circuit television). The problem also occurs in case the software tool is inaccurate. The technique of this notion is to use large data of face images, some faces are wearing masks, and others are not wearing masks. The methodology is by using machine learning, which is characterized by a HOG (histogram orientation gradient) for extraction of features, then an SVM(support vector machine) for classification, as it can contribute to the literature and enhance mask detection accuracy. Several public datasets for masked and unmasked face images have been used in the experiments. The findings for accuracy are as follows: 97.00%, 100.0%, 97.50%, 95.0% for RWMFD (Real-world Masked Face Dataset)& GENK14k, SMFDB (Simulated Masked Face Recognition Dataset), MFRD (Masked Face Recognition Dataset), and MAFA (MAsked FAces)& GENK14k for databases, respectively. The results are promising as a comparison of this work has been made with the state-of-the-art. The workstation of this research used a webcam programmed by Matlab for real-time testing.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
يتناول البحث تعليم اللغة العربية وما لها من أثر بين التراث والمعاصرة إذ يعُد مقياس رقي أي مجتمع من المجتمعات مقدار عنايته بلغته القومية ، فهي وسيلته واداته للتفاهم في مواجهة المواقف المختلفة التي تتطلب الكلام ، والاستماع ، والقراءة ، والكتابة ، هي دلالة تحضره وتقدمه في احواله المختلفة ، وهي الشرط الاساس في بقائه ونمائه ، فبدونها يغيب موضوع الحديث عن مفهوم المجتمع القومي لاي شعب من الشعوب ..
الإسھام في عَ وْ د محمود إلی علم المعاني لیحل ّ محلّھ الصحیح في أذھان المتعلّمین وفي الدراسات النقدیة والبلاغیة .وعلم المعاني یرتكز على طورین لا یمكن مفارقة أوّ لھما إذا بقیت الضبابیّة تلفّھ ،لأنھ مفتاح مغالیق الطور الثاني الأھم ، والطوران ھما ) القواعد والأصول ( و)التحلیلاتُ إلى والرؤى البلاغیة (، وقواعد علم المعاني یفارقھا الفھم في أحیان كثیرة ، لذا وجّ ھتقصد المشاع والبسیط من المخزون النحوي لتنحیة خفائھا وف
... Show MoreEl tema de esta investigación está directamente relacionado con el papel del léxico en la enseñanza-aprendizaje del español como segunda lengua en el sistema de enseñanza universitariairaquí, donde se llevó a cabo la investigación empírica y la propuesta de criterios de la selección de léxico español.
Este estudio se ha centrado concretamente en los alumnos irakíes de nivel elemental que estudian elespañol como segunda lengua extranjera. Con el fin de conocer los estilos de enseñanza-aprendizaje del vocabulario practicado en las aulas, de determinar las faltas en la selección léxica y realizar propuestas de mejorar la competencia léxica, hemos efectuado el an
... Show MoreSingle-photon detection concept is the most crucial factor that determines the performance of quantum key distribution (QKD) systems. In this paper, a simulator with time domain visualizers and configurable parameters using continuous time simulation approach is presented for modeling and investigating the performance of single-photon detectors operating in Gieger mode at the wavelength of 830 nm. The widely used C30921S silicon avalanche photodiode was modeled in terms of avalanche pulse, the effect of experiment conditions such as excess voltage, temperature and average photon number on the photon detection efficiency, dark count rate and afterpulse probability. This work shows a general repeatable modeling process for significant perform
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreIncremental forming is a flexible sheet metal forming process which is performed by utilizing simple tools to locally deform a sheet of metal along a predefined tool path without using of dies. This work presents the single point incremental forming process for producing pyramid geometry and studies the effect of tool geometry, tool diameter, and spindle speed on the residual stresses. The residual stresses were measured by ORIONRKS 6000 test measuring instrument. This instrument was used with four angles of (0º,15º,30º, and 45º) and the average value of residual stresses was determined, the value of the residual stress in the original blanks was (10.626 MPa). The X-ray diffraction technology was used to measure the residual stresses
... Show More