Preferred Language
Articles
/
j4Y5M4YBIXToZYALx35A
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieved lower computational complexity and number of layers, while being more reliable compared with other algorithms applied to recognize face masks. The findings reveal that the model's validation accuracy reaches 97.55% to 98.43% at different learning rates and different values of features vector in the dense layer, which represents a neural network layer that is connected deeply of the CNN proposed model training. Finally, the suggested model enhances recognition performance parameters such as precision, recall, and area under the curve (AUC).

Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Combining Bourgoyne and Young Equations by Bagging Tree Regression to Predict Rate of Penetration in a Southern Iraqi Field, Case Study
...Show More Authors
Abstract<p>Achieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Sat Sep 28 2024
Journal Name
Asia-pacific Journal Of Molecular Biology And Biotechnology
A novel method for the degradation of human blood clot by immobilised bromelain using multi-walled carbon nanotube and polyphenol oxidase
...Show More Authors

Pathological blood clot in blood vessels, which often leads to cardiovascular diseases, are one of the most common causes of death in humans. Therefore, enzymatic therapy to degrade blood clots is vital. To achieve this goal, bromelain was immobilized and used for the biodegradation of blood clots. Bromelain was extracted from the pineapple fruit pulp (Ananas comosus) and purified by ion exchange chromatography after precipitation with ammonium sulphate (0-80 %), resulting in a yield of 70%, purification fold of 1.42, and a specific activity of 1175 U/mg. Bromelain was covalently immobilized on functionalized multi-walled carbon nanotubes (MWCNT), with an enzyme loading of 71.35%. The results of the characterization of free and immobilized

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 14 2023
Journal Name
Optical And Quantum Electronics
Enhancing response characteristics of palladium-doped vanadium pentoxide on a porous silicon substrate as gas sensor synthesized by pulsed laser deposition
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 28 2018
Journal Name
Advances In Language And Literary Studies
Simplification Strategies in the Production of English Word-final Obstruent Clusters by Iraqi EFL College Students from A Markedness Theory Perspective
...Show More Authors

This study investigates the phonotactics of English obstruent clusters in the word-final position from a markedness theory perspective among Iraqi EFL College Students whose native language, Arabic, prefers only two-member word-final obstruent cluster as a maximum. The markedness of clusters is measured depending on Iraqi EFL College Students’ utilization of the simplification strategies. This study tries to answer whether or not word-final obstruent clusters are marked or unmarked for Iraqi EFL College Students, and whether or not the markedness of the obstruent cluster increases as to its length. In order to answer these questions, a test has been distributed among 60 Iraqi EFL Fourth-Year College students, Department of English, Colleg

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Chemical-Free Greywater Treatment Using Aeration, Sedimentation, Followed by Granular Activated Carbon Filter (GAC) -A Case Study of Baghdad city household
...Show More Authors

Greywater is a possible water source that can be improved for meeting the quality required for irrigation. Treatment of greywater can range from uncomplicated coarse filtration to advanced biological treatment. This article presents a simple design of a small scale greywater treatment plant, which is a series of physical and natural processes including screening, aeration, sedimentation, and filtration using granular activated carbon filter and differentiates its performance with sand filter. The performance of these units with the dual filter media of (activated carbon with sand) in treatment of greywater from Iraqi house in Baghdad city during 2019 and that collected from several points including washbasins, kitchen si

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the performance of the structural capital according to standards of e-learning and its reflection on the performance of universities: applied research
...Show More Authors

The developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve thei

... Show More
View Publication Preview PDF
Publication Date
Sat May 29 2021
Journal Name
Journal Of Legal And Political Thought
The Possibility of Compensation for the Loss of View Caused by Public Projects – A Legal Study in Light of the Approach of U.S. Courts
...Show More Authors

Despite the great economic and commercial importance given to real estate by virtue of its view of the landscape or public roads, US courts have differed in their position on compensation for damages resulting from blocking that view or vision by public projects. Some courts compensated for such damages, other courts approved such compensation. Hence, this research came to shed light on the extent of the possibility of compensation for blocking the view or vision as a result of public projects, and the research has supported us with many judicial decisions.

View Publication