Preferred Language
Articles
/
bsj-5716
Constructing a Software Tool for Detecting Face Mask-wearing by Machine Learning
...Show More Authors

       In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific public area by using CCTV (closed-circuit television). The problem also occurs in case the software tool is inaccurate. The technique of this notion is to use large data of face images, some faces are wearing masks, and others are not wearing masks. The methodology is by using machine learning, which is characterized by a HOG (histogram orientation gradient) for extraction of features, then an SVM(support vector machine) for classification, as it can contribute to the literature and enhance mask detection accuracy. Several public datasets for masked and unmasked face images have been used in the experiments. The findings for accuracy are as follows: 97.00%, 100.0%, 97.50%, 95.0% for RWMFD (Real-world Masked Face Dataset)& GENK14k, SMFDB (Simulated Masked Face Recognition Dataset), MFRD (Masked Face Recognition Dataset), and MAFA (MAsked FAces)& GENK14k for databases, respectively. The results are promising as a comparison of this work has been made with the state-of-the-art. The workstation of this research used a webcam programmed by Matlab for real-time testing.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 01 2025
Journal Name
دراسات الاديان
The role of the economy in building confidence and strengthening National identity
...Show More Authors

The research reviews how the national economy contributes to building community confidence and strengthening national identity, explaining that sustainable economic development leads to improving the standard of living and creating job opportunities, which enhances citizens ' sense of stability and belonging. The research indicates that state investments in infrastructure and public services contribute to strengthening trust between individuals and state institutions. The research discusses the interactive relationship between economic stability and national identity, and how economic policies can strengthen this relationship, drawing on local and international examples to support development strategies . In Iraq, attempts to develop agricu

... Show More
Preview PDF
Publication Date
Mon Oct 01 2007
Journal Name
Journal Of Educational And Psychological Researches
بناء وتطبيق مقياس مفهوم المواطنة لدى طلبة الجامعة
...Show More Authors

تعد المواطنة مبدأ ومرجعية دستورية وسياسية لا تلغي عملية التدافع والتنافس في الفضاء الاجتماعي ، نضبطها بضوابط الوطن ووحدته القائمة على احترام التنوع وليس على نفيه ، والساعية بوسائل قانونية وسلمية للافادة من هذا التنوع في تمتين قاعدة الوحدة الوطنية ، بحيث يشعر الجميع بان مستقبلهم مرهون بها ، وانها لاتشكل نفيا لمحو حياتهم ، وانما مجالا للتعبير عنها بوسائل منسجمة وناموس الاختلاف وافاق العصر ومكتسبات الح

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The aesthetic effect of vocal recitation in building the theatrical image
...Show More Authors

Between the duality of sound and image, the completeness of the actor’s personality at the director comes to announce the birth of the appropriate theatrical role for that character as the basic and inherent element of the artwork, within his working system in the pattern of vocal behavior as well as motor/signal behavior as he searches for aesthetic and skill proficiency at the same time.
This is done through the viewer’s relationship with the theatrical event, which the director considers as an area of active creative activity in relation to (the work of the actor) through vocal recitation and the signs it broadcasts in order to fulfill the requirements of the dramatic situation and what it requires of a visual vision drawn in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Political Sciences Journal
دور الحكومات في بناء الدولة ضمن اطار الدستور
...Show More Authors

دور الحكومات في بناء الدولة ضمن اطار الدستور

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
DEVELOP SCALE OF SELECTIV MUTISM WITH PUPILS OF PRIMARY SCHOOLS
...Show More Authors

This study aimed to develop scale of Selectiv Mutism with pupils of primary schools  according to their teachers' view in Baghdad city (Karh and Resaf(.

Children might choose the mutism as the solution to avoid some psychological and social problems that surrounded them. Furthermore, this could consider as a disorder that could effect the child and led him to use the Selected Mutism.

This is supported by the pilot study which was conducted by the researcher on 150 teachers in different primary schools in Baghdad. The results revealed some symptoms were found with children who have selected mutism.

Because of there was no scale was found to measure the Selected Mutism, a scale was develop in order to measure t

... Show More
View Publication Preview PDF
Publication Date
Thu May 15 2025
Journal Name
Route Educational And Social Science Journal
A PSYCHOSOCIAL ANALYSIS OF APPROACHING ZANZIBAR BY TINA HOWE
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Salt Distribution in a Soil Irrigated by Subsurface Emitter
...Show More Authors

The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The Epistemological The Epistemological Foundations for Comparison of Religions by al-Amiri: The Epistemological Foundations for Comparison of Religions by al-Amiri
...Show More Authors

 

 Research topic: (The Epistemological Foundations for Comparison of Religions by al-Amiri)

The research sought to study the topic with: a descriptive methodology by investigating the components of al-Amiri's approach to the interfaith comparison. And analytical, by showing the applied perception of an objective model in the comparison of religions to answer two questions: What are the cognitive foundations of al-Amiri? And what is his approach to establishing an objective comparison between religions?

The research started by introducing Abu al-Hassan al-Amiri, and then presented four topics: An introduction to al-Amiri's efforts in the interfaith comparison, his knowledge foundations, an applied model

... Show More
View Publication Preview PDF