Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face mask detection software based on AI and image processing techniques. For face detection, helmet detection, and mask detection, the approaches mentioned in the article utilize Machine learning, Deep learning, and many other approaches. It will be simple to distinguish between persons having masks and those who are not having masks using all of these ways. The effectiveness of mask detectors must be improved immediately. In this article, we will explain the techniques for face mask detection with a literature review and drawbacks for each technique.
The Log-Logistic distribution is one of the important statistical distributions as it can be applied in many fields and biological experiments and other experiments, and its importance comes from the importance of determining the survival function of those experiments. The research will be summarized in making a comparison between the method of maximum likelihood and the method of least squares and the method of weighted least squares to estimate the parameters and survival function of the log-logistic distribution using the comparison criteria MSE, MAPE, IMSE, and this research was applied to real data for breast cancer patients. The results showed that the method of Maximum likelihood best in the case of estimating the paramete
... Show MoreFace Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d
... Show MoreBackground: Prosthodontic services have changed markedly due to an introduction of new materials, techniques and treatment options. The aim of this study were to identify the type of materials and the methods used by dental practitioners in their clinics to construct conventional complete dentures and to specify the type and design for removable partial dentures (RPDs); and to then compare them with those taught in dental schools. Materials and methods: A total of 153 dental practitioners in Sulaimani city completed a written questionnaire. The questionnaire included 19 questions regarding complete and RPDs fabrication. Results: Most of the practitioners provide complete dentures (81.6%) and RPDs (95.3%) in their clinics. Polyvinyl silox
... Show MoreThe aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±
... Show MoreMannich base is a versatile compound that can be easily modified to introduce different functional groups, allowing for the creation diverse selection of items with varying features. Additionally, the Mannich reaction is a valuable tool in organic synthesis, due to the fact it provides an effortless and efficient approach for synthesizing C-N bonds. Overall, The Mannich base and even its derivatives are essential in many aspects of chemistry and its complexes are in the pharmaceutical industry. Studies have revealed that it shows good anti-cancer, anti-mycobacterial, remarkable anti-HIV, anti-tubercular, anti-convulsant, anti-fungal, antiviral, antitumor, cytotoxic activities and in industrial applications such as in the creation of polymer
... Show Moreالخلفية: العقدية المقيحة المعروفة أيضًا باسم ""(GAS) هي احدى مسببات الأمراض ذات الأهمية الصحية العامة، حيث تصيب 18.1 مليون شخص في جميع أنحاء العالم وتقتل 500000 شخص كل عام. الهدف: حددت هذه المراجعة المقالات المنشورة حول عوامل الخطر واستراتيجيات الوقاية والسيطرة لأمراض المكورات العقدية. المواد والأساليب: تم إجراء بحث منهجي لتحديد الأوراق المنشورة على قواعد البيانات الإلكترونية Web of Science و PubMed و Scopus و Google Scholar في مح
... Show MoreIsatin is a heterocyclic molecule that belongs to one of the most important classes of organic compounds known as indolines. Isatin, isatin analogs, and their Schiff bases have recently attracted a lot of attention in medicinal chemistry. Isatin, itself, shows various biological activities such as antiviral, anticancer, antimicrobial, anti-inflammatory, analgesic, antioxidant, and anticonvulsant. Bis- Schiff bases containing isatin moiety have been known to possess a wide spectrum of pharmacological activities. This review offers up-to-date information on the most active isatin bis-Schiff bases, which would include anticancer, antimicrobial, antiviral, anticonvulsant, anti-inflammatory, and analgesic activities. These observations c
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More