Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreThis study was conducted to detect the concentration of lead and cadmium in baby foods, (18) samples were examined, which are the most available from various local markets in the city of Baghdad (at a rate of (9) samples of baby food consisting of cereals and (9) samples of baby foods consisting of vegetables). All samples were examined using an atomic flame absorptiometry (AAS-7000), all results showed the presence of lead and cadmium and the highest concentration value of lead in baby foods consisting of cereals (1.0986) and cadmium in baby foods consisting of vegetables (0.0015) ppm. Lead exceeded 100% limitations and cadmium did not exceed that. The results reported on the risks of contamination, as the mean daily intake (g/kg/d) for
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This study aimed to determine the optimal conditions for extracting basil seed gum in addition to determine the chemical components of basil seeds. Additionally, the study aimed to investigate the effect of the mixing ratio of gum to ethanol when deposited on the basis of the gum yield which was1:1, 1:2, 1:3 (v/v) respectively. The best mixing ratio was one size of gum to two sizes of ethanol, which recorded the highest yield. Based on the earlier, the optimal conditions for extracting basil seed gum in different levels which included pH, temperature, mixing ratio seeds: water and the soaking duration were studied. The optimal conditions were: pH 8, temperature of 60°C, mixing ratio seeds: water 1:65 (w/v) and soaking duration of 30 min
... Show MoreThe types of traditional houses vary from region to region according to physical and non-physical circumstances, and Sulaymaniyah city is characterized by a type of traditional houses that differ significantly from those in most cities and regions neighboring are always different from the general pattern that is prevalent in the region and the Muslim world.
The aim of this research is to study the cause of this difference or distinction in the traditional houses in Sulaimaniyah city, by comparing the most common models in these houses and comparing them with the general models of village houses that originally existed in the region to relaize the convergence and contrast between them. The research was based on a co
... Show MoreThe study problem is about the role of Shaqra University in building the mental image of the Kingdom’s 2030 vision among its female students. The study aims to examine the university’s role in providing information about the Kingdom’s 2030 vision, its role in shaping the vision’s image, the university’s role in the behavioral aspect of the vision, along with studying the extent of differences in answers of the sample individuals towards the study themes attributed to the personal variables. The researcher adopted the descriptive survey method. A sample of (1399) female students was used to achieve the study objectives. The results showed that university’s role in building the mental image of the Kingdom’s 2030 vision, among
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreAA wahid, journal mustansiriyah of sports science, 2023