During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieved lower computational complexity and number of layers, while being more reliable compared with other algorithms applied to recognize face masks. The findings reveal that the model's validation accuracy reaches 97.55% to 98.43% at different learning rates and different values of features vector in the dense layer, which represents a neural network layer that is connected deeply of the CNN proposed model training. Finally, the suggested model enhances recognition performance parameters such as precision, recall, and area under the curve (AUC).
This study was aimed to use plant tissue culture technique to induce callus formation of Aloe vera on MS. Medium supplied with 10 mg/l NAA and 5 mg/l BA that exhibit the best results even with subculturing. As the method of [1] 1g. dru weight of callus induced from A. vera crown and in vivo crown were extracted then injected in HPLC using the standards of Ascorbic acid (vit. C), Salysilic acid and Nicotenic acid (vit. B5) to compare with the plant extracts. Results showed high potential of increasing some secondary products using the crown callus culture of A. vera as compared with in vivo crown, Ascorbic acid was 1.829 ?g/l in in vivo crown and increased to 3.905 ?g/l crown callus culture . Salysilic acid raised from 3.54 ?g/l in in vivo c
... Show MoreThe behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u
... Show MoreData scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreMagnetic Resonance Imaging (MRI) is one of the most important diagnostic tool. There are many methods to segment the
tumor of human brain. One of these, the conventional method that uses pure image processing techniques that are not preferred because they need human interaction for accurate segmentation. But unsupervised methods do not require any human interference and can segment the brain with high precision. In this project, the unsupervised classification methods have been used in order to detect the tumor disease from MRI images. These metho
... Show MoreVehicle detection (VD) plays a very essential role in Intelligent Transportation Systems (ITS) that have been intensively studied within the past years. The need for intelligent facilities expanded because the total number of vehicles is increasing rapidly in urban zones. Trafï¬c monitoring is an important element in the intelligent transportation system, which involves the detection, classification, tracking, and counting of vehicles. One of the key advantages of traffic video detection is that it provides traffic supervisors with the means to decrease congestion and improve highway planning. Vehicle detection in videos combines image processing in real-time with computerized pattern recognition in flexible stages. The real-time pro
... Show MoreProduction sites suffer from idle in marketing of their products because of the lack in the efficient systems that analyze and track the evaluation of customers to products; therefore some products remain untargeted despite their good quality. This research aims to build a modest model intended to take two aspects into considerations. The first aspect is diagnosing dependable users on the site depending on the number of products evaluated and the user's positive impact on rating. The second aspect is diagnosing products with low weights (unknown) to be generated and recommended to users depending on logarithm equation and the number of co-rated users. Collaborative filtering is one of the most knowledge discovery techniques used positive
... Show MoreText documents are unstructured and high dimensional. Effective feature selection is required to select the most important and significant feature from the sparse feature space. Thus, this paper proposed an embedded feature selection technique based on Term Frequency-Inverse Document Frequency (TF-IDF) and Support Vector Machine-Recursive Feature Elimination (SVM-RFE) for unstructured and high dimensional text classificationhis technique has the ability to measure the feature’s importance in a high-dimensional text document. In addition, it aims to increase the efficiency of the feature selection. Hence, obtaining a promising text classification accuracy. TF-IDF act as a filter approach which measures features importance of the te
... Show MoreSmishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show More