Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You only look once”) neural network algorithm, which is an efficient real-time object identification algorithm, an intelligent system was developed in this thesis to distinguish which faces are wearing a mask and who is not wearing a wrong mask. The proposed system was developed based on data preparation, preprocessing, and adding a multi-layer neural network, followed by extracting the detection algorithm to improve the accuracy of the system. Two global data sets were used to train and test the proposed system and worked on it in three models, where the first contains the AIZOO data set, the second contains the MoLa RGB CovSurv data set, and the third model contains a combined data set for the two in order to provide cases that are difficult to identify and the accuracy results that were obtained. obtained from the merging datasets showed that the face mask (0.953) and the face recognition system were the most accurate in detecting them (0.916).
Abstract.The goal of this article is to find the CEO of Iraqi companies that use strategic planning and determine if they are capable of diagnosing the traits of strategic planning systems that improve these companies' capacity to successfully address crisis-related needs. The capacity of the company to successfully react to crisis needs and demands is enhanced by the use of strategic planning, according to a review of data from 64 enterprises utilizing statistical analysis. Furthermore, top and division or unit managers must be involved and committed for strategic planning to be successful. It also has to be planned with an external orientation and get more than just lip service from top and unit or division level managers. In other words,
... Show MoreResearch summary
Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe Child's theatre was and still is the most investing art for masks of all kinds (partial and total) for suspense, aesthetic and artistic purposes that meet the requirements of those performances. Here the actor's performance is associated with two tools, i.e. the body and the mask, where it has become a must to search for the performance transformations required in order to achieve the highest level of the right performance through this dualism. This urged the researcher to address this problem. Thus, the researcher has put forward an objective to identify the transformations of the character's performance between the body and the mask in the child's theatre shows. The research consists of a methodological framework and a theoretical
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
A biconical antenna has been developed for ultra-wideband sensing. A wide impedance bandwidth of around 115% at bandwidth 3.73-14 GHz is achieved which shows that the proposed antenna exhibits a fairly sensitive sensor for microwave medical imaging applications. The sensor and instrumentation is used together with an improved version of delay and sum image reconstruction algorithm on both fatty and glandular breast phantoms. The relatively new imaging set-up provides robust reconstruction of complex permittivity profiles especially in glandular phantoms, producing results that are well matched to the geometries and composition of the tissues. Respectively, the signal-to-clutter and the signal-to-mean ratios of the improved method are consis
... Show MoreHypoxic training, which in turn is one of the methods adopted in sports training methods, especially in activities that depend on the aerobic system in its performance, which includes training with a lack of oxygen by reducing its molecular pressure, since this method targets functional organs and works temporary responses during training and permanent responses After training as an adaptation to these devices as a result of training in this way, the study aimed to identify the effect of hypoxic exercises using the training mask and the extent of the change in some biochemical indicators, in addition to that to identify the effect of these exercises on the indicator of energy expenditure and )VMA) and the achievement of the effectiveness of
... Show More