Preferred Language
Articles
/
QBcMXJIBVTCNdQwCCK3j
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieved lower computational complexity and number of layers, while being more reliable compared with other algorithms applied to recognize face masks. The findings reveal that the model's validation accuracy reaches 97.55% to 98.43% at different learning rates and different values of features vector in the dense layer, which represents a neural network layer that is connected deeply of the CNN proposed model training. Finally, the suggested model enhances recognition performance parameters such as precision, recall, and area under the curve (AUC).

Scopus Crossref
View Publication
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Spotlight on the Experience of E-learning as a Learning Method for the Undergraduate Pediatric Nursing Students in Iraq during the COVID-19 Pandemic
...Show More Authors

    The emergence of COVID-19 has resulted in an unprecedented escalation in different aspects of human activities, including medical education. Students and educators across academic institutions have confronted various challenges in following the guidelines of protection against the disease on one hand and accomplishing learning curricula on the other hand. In this short view, we presented our experience in implementing e-learning to the undergraduate nursing students during the present COVID-19 pandemic emphasizing the learning content, barriers, and feedback of students and educators. We hope that this view will trigger the preparedness of nursing faculties in Iraq to deal with this new modality of learning and improve it should t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
Biological versus Topological Domains in Improving the Reliability of Evolutionary-Based Protein Complex Detection Algorithms
...Show More Authors

     By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb

... Show More
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 03 2021
Journal Name
021 8th International Conference On Computing For Sustainable Global Development (indiacom)
Tilting-rotors Quadcopters: A New Dynamics Modelling and Simulation based on the Newton-Euler Method with Lead Compensator Control
...Show More Authors

Publication Date
Tue Nov 27 2018
Journal Name
The Iraqi Geological Journal
CHRONOSTRATIGRAPHICALLY BASED RESERVOIR MODEL FOR CENOMANIAN CARBONATES, SOUTHEASTERN IRAQ OILFIELDS
...Show More Authors

The Cenomanian – Turronian sedimentary succession in the south Iraq oil fields, including Ahmadi, Rumaila, Mishrif and Khasib formations have undergone into high-resolution reservoir-scale genetic sequence stratigraphic analysis. Some oil-wells from Majnoon and West-Qurna oil fields were selected as a representative case for the regional sequence stratigraphic analysis. The south Iraqi Albian – Cenomanian – Turronian succession of 2nd-order depositional super-sequence has been analyzed based on the Arabian Plate chronosequence stratigraphic context, properly distinguished by three main chrono-markers (The maximum flooding surface, MFS-K100 of the upper shale member of Nahr Umr Formation, MFS-K140 of the upper Mishrif carbonate

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Sumer 3
Treatment of shallow and deep white spot lesions with three different mouthwashes evaluated by laser fluorescence (an in vitro study)
...Show More Authors

This research aims to find how three different types of mouthwashes affect the depth of artificial white spot lesions. Teeth with various depths of white spot lesions were immersed in either splat mouthwash, Biorepair mouthwash, Sensodyne mouthwash, or artificial saliva (control)twice daily for one minute for 4 weeks and 8 weeks at 37°C. After this immersion procedure, lesion depth was measured using a diagnosed pen score. A one-way analysis of variance, Dunnett T3 and Tukey's post hoc α = .05 were used to analyze the testing data. Splat mouthwash enhanced the WSL remineralization and made the lowest ΔF compared with other mouthwashes in shallow and deep enamel after 4 and 8 weeks of treatment. In the repair groups, after 4 weeks

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Civil And Environmental Engineering
Developing A Mathematical Model for Planning Repetitive Construction Projects By Using Support Vector Machine Technique
...Show More Authors
Abstract<p>Each project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent</p> ... Show More
View Publication
Crossref (3)
Clarivate Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun May 22 2022
Journal Name
International Journal Of Early Childhood Special Education
The impact of using learning acceleration model on the achievement of mathematics for third intermediate grade students
...Show More Authors

The current study aims at identifying the impact of using learning acceleration model on the achievement of mathematics for third intermediategrade students. Forachieving this, the researchers chose the School (Al-Kholood Secondary School for Girls) affiliated to the General Directorate of Babylon Education / Hashemite Education Department for the academic year (2021/2021), The sample reached to (70) female students from the third intermediate grade, with (35) female students for each of the two research groups. The two researchers prepared an achievement test consisting of (25) objective items of multiple choice type, The psychometric properties of the test were confirmed, and after the completion of the experiment, the achievement test wa

... Show More
Publication Date
Sat Feb 24 2024
Journal Name
Journal Of Studies And Researches Of Sport Education
The effect of the use of the Colb model according to the two forms (adaptive, ascending) in learning some of the technical skills of women
...Show More Authors

The objective of the study was to identify the effect of the use of the Colb model for the students of the third stage in the College of Physical Education and Sports Sciences, University of Baghdad,As well as to identify the differences between the research groups in the remote tests in learning skills using the model Colb.The researcher used the experimental method and included the sample of the research on the students of the third stage in the College of Physical Education and Sports Science / University of Baghdad by drawing lots, the third division (j) was chosen to represent the experimental group,And the third division (c) to represent the control groupafter the distribution of the sample splitting measure according to the Colb mode

... Show More
Preview PDF