In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific public area by using CCTV (closed-circuit television). The problem also occurs in case the software tool is inaccurate. The technique of this notion is to use large data of face images, some faces are wearing masks, and others are not wearing masks. The methodology is by using machine learning, which is characterized by a HOG (histogram orientation gradient) for extraction of features, then an SVM(support vector machine) for classification, as it can contribute to the literature and enhance mask detection accuracy. Several public datasets for masked and unmasked face images have been used in the experiments. The findings for accuracy are as follows: 97.00%, 100.0%, 97.50%, 95.0% for RWMFD (Real-world Masked Face Dataset)& GENK14k, SMFDB (Simulated Masked Face Recognition Dataset), MFRD (Masked Face Recognition Dataset), and MAFA (MAsked FAces)& GENK14k for databases, respectively. The results are promising as a comparison of this work has been made with the state-of-the-art. The workstation of this research used a webcam programmed by Matlab for real-time testing.
Modern trends have appeared recently in educational thought that call for the achievement of the outcomes of the educational process. Some of these trends are the development of individual thinking skills, considering the individual differences, and learning basic skills. The five-year learning cycle is one of these models. It is called as five-year learning cycle because it passes through five stages. These five stages are: (operate - discover - clarify - expand – Evaluate), which make the learner as the main axis for activating thinking processes. This can be done by organizing study materials through research, investigation, and identifying concepts by himself, as in learning sports skills that depend on motor performance and teamwork,
... Show MoreThe effect of compound machine on wheat "Tamuz cultivar" was studied based on some technical indicators which were tested under three practical speed (PS) of 2.015, 3.143, and 4.216 km.hr-1 and three tillage depth (TD) of 11, 13, and 15cm. The split-split plot arrangement in RCBD with three replications was used. The results showed that the PS of 2.015km.hr-1 was major best than other two speed in all studied conditions, physical properties (SBD and TSP), mechanical parameters (FD, (DP and LAS), and yield and growth parameters (PVI, BY and HI). The TD of 11cm was major effect to the other two levels TD of 13 and TD of 15cm in all studied conditions. All interactions were significant,
The effect of compound machine on wheat "Tamuz cultivar" was studied based on some technical indicators which were tested under three practical speed (PS) of 2.015, 3.143, and 4.216 km.hr-1 and three tillage depth (TD) of 11, 13, and 15cm. The split-split plot arrangement in RCBD with three replications was used. The results showed that the PS of 2.015km.hr-1 was major best than other two speed in all studied conditions, physical properties (SBD and TSP), mechanical parameters (FD, (DP and LAS), and yield and growth parameters (PVI, BY and HI). The TD of 11cm was major effect to the other two levels TD of 13 and TD of 15cm in all studied conditions. All interactions were significant,
Nathaniel Hawthorne (1804-1864) has been widely known for his special interest in the female characters. In many of his novels, he narrates the conditions, values, and the institutions that surround and control the life of women, leading them to be victims. In “Rappaccini’s Daughter” (1844), the heroine, Beatrice is created to be victimized by her loved ones (her father and lover). This paper focuses on the term “victim,” it shows its aspects through the development of Beatrice’s character. The paper also studies a female character in the male-dominated society, to show the cruelty done to her, and how she is considered to be a second rate person, who is unable to live normally, or at least to save herself from dea
... Show MoreThe research aims to build a communication apprehention scale for student (females) from preparatory schools .research sample included (400)students (females) were selected from the preparatory . to build a tool for the researchers are several steps , todetermine the meaning of communication apprehention and formulation of the items of the seale according to the linkert method .
This paper reflects the evidence of the Islamic Development Bank's role in building human and institutional capacities in Member States and assisting governments in achieving economic development. The Bank's activities in the area of capacity development are an important part in following up the economic developments, And help governments to build and formulate effective policies and institutions to implement more effective macro policies leading to better economic outcomes. It is therefore helpful to help Member States increase their resources, modernize their banking systems, establish effective legal frameworks and improve Reports on macroeconomic and financial statistics. The Bank has faced many challenges and risks tha
... Show MoreSharif Mohieddin Haider worked on composing of musical compositions for the Oud different from the traditional forms known as (Peşrev, Sama'i, Longa… etc.), but they are not clear in building their musical form. This study tackles this issue by revealing the structure of the building of the musical form of these Musical compositions.
The importance of this research lies in that it provides an academic scientific study on the important subject of Musical composition forms and the way of constructing them. It helps players and students in the study of Arab music, if they want to write according to their musical form.
This research dealt with two topics in its theoretical framewo
... Show MoreGiven the importance of basic education (primary) being longer pillar in the construction of the individual's personality, as well as the importance of language and its role in the learning of students and development of cognitive, emotional and self-dynamic; therefore current research focuses on the study of building a standard oral expression can researchers and teachers alike measurement of oral expression among students, researcher has used to achieve this goal descriptive approach, it included standard on (10) paragraphs evenly distributed on the (5) key areas, and given (4) progressive alternatives according to the quality of the performance of the student and reached the highest score (30) and the lowest score (0).
... Show MoreA procedure, depending on the derivatization and determination of aniline was depicted andvalidated in this study. 8-hydroxyquinoline (8-HQ) was used as the derivatizing agent for thedetermination of aniline. An optimization study was performed for the derivatization reaction, i.e.,the diazonium coupling reaction, the optimum parameters were as follows: 22 mM of hydrochloricacid, 54mM of sodium hydroxide, and 1.8mM of sodium nitrate. The optimization study of themethod of cloud point extraction (CPE) revealed that the extraction solvent was 0.5 ml of Triton X-100, the optimum temperature was 90 °C, and the incubation time was 25 min. The linearity,correlation coefficients, molar absorptivities, and limits of detection were improved using t
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More