Classifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area. The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and overlapping kitchen utensils from internet were used as base benchmark objects. The evaluation and training/validation sets are set at 20% and 80% respectively. This project evaluated the performance of these techniques and analyzed their strengths and speeds based on accuracy, precision and F1 score. The analysis results in this project concluded that the YOLOv5 produces accurate bounding boxes whereas the Faster R-CNN detects more objects. In an identical testing environment, YOLOv5 shows the better performance than Faster R-CNN algorithm. After running in the same environment, this project gained the accuracy of 0.8912(89.12%) for YOLOv5 and 0.8392 (83.92%) for Faster R-CNN, while the loss value was 0.1852 for YOLOv5 and 0.2166 for Faster R-CNN. The comparison of these two methods is most current and never been applied in overlapping objects, especially kitchen utensils.
The aim of the research was to identify On the effect of the learning-by-play strategy on learning some handball skills among second-stage female students,Comparing the results of students' performance before and after implementing the learning by playing strategy,Providing development proposals for teaching handball skills in light of the research results.,I dependresearcherCurriculumexperimentalIn research procedures as an appropriate approach to achieving research objectives,For two groups, one experimental and the other control,Community of female studentsSecondFor the academic year 2024-2025, consisting of (4Female people (numbering)151) StudentChosen.Research sample30 female students from Section (B) were selected and (4) fe
... Show MoreFinancial inclusion refers to the access of financial services at low cost and high-quality from the formal financial sector to all segments of society, especially marginalized groups, and then use and benefit from them. Financial inclusion is also associated with banking stability, as well as with financial integrity and financial protection for the consumer, therefore, it achieves a number of objectives, the most important of which is to support and enhance banking stability. This is what made it attract the attention of many countries and central banks recently.
The study aims to show the impact of financial inclusion indicators on ban
... Show MoreThe electrochemical behavior of Al-17%Si alloy is investigated in 3.5wt% NaCl solution. Many alloys with addition of the different wt% magnesium metal of 1wt%, 2%, 3wt% ,4.5wt% ,and 9wt% were prepared by gravity die casting . The microstructures of prepared alloys were examined by optical and SEM microscopes. Corrosion behavior was investigated by using potentiostat instrument under static potentials test and corrosion current was recorded to determine corrosion resistance of all prepared samples. It was found that the addition of Mg metal improves the corrosion resistance of Al-17%Si alloy in 3.5%NaCl solution. The alloy containing 1%Mg shows less corrosion rate than the others while the alloys containing 4.5%Mg, 9%Mg content have
... Show MoreThis research investigates the impact of Iraqi politicians' utilization of Twitter as an interactive media tool to communicate their positions and perspectives on political events. Twitter has become a significant platform for dialogue and interactive discussions. The survey method, specifically the descriptive approach, was employed to answer research questions and achieve objectives. A sample of 100 Iraqi Twitter users was selected, considering demographic variables such as gender, age, and educational background, during the period from September 15 to October 1, 2022.
In this research, (MOORA) approach based– Taguchi design was used to convert the multi-performance problem into a single-performance problem for nine experiments which built (Taguchi (L9) orthogonal array) for carburization operation. The main variables that had a great effect on carburizing operation are carburization temperature (oC), carburization time (hrs.) and tempering temperature (oC). This study was also focused on calculating the amount of carbon penetration, the value of hardness and optimal values obtained during the optimization by Taguchi approach and MOORA method for multiple parameters. In this study, the carburization process was done in temperature between (850 to 950 ᵒC) for 2 to 6
... Show MoreAt the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreThe aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca
... Show MoreThe research aimed to identify the effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry at the fifth scientific students at a secondary school of the General Directorate for Educational in Diyala / Baladruz in Iraq. The research sample Consisted of (57 student, (29) students as experimental group studied according to instructional design strategies for whole brain theory of Herrmann and (28) a student as a control group studied by the usual way for two semesters, a prepared achievement test as article and objective type of multiple choice, the coefficient stability of alpha-Cronbach equation reached (0.86). The research Results showed the presence of a statistically significant d
... Show More