Preferred Language
Articles
/
mRfmPo8BVTCNdQwC_2Wt
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You only look once”) neural network algorithm, which is an efficient real-time object identification algorithm, an intelligent system was developed in this thesis to distinguish which faces are wearing a mask and who is not wearing a wrong mask. The proposed system was developed based on data preparation, preprocessing, and adding a multi-layer neural network, followed by extracting the detection algorithm to improve the accuracy of the system. Two global data sets were used to train and test the proposed system and worked on it in three models, where the first contains the AIZOO data set, the second contains the MoLa RGB CovSurv data set, and the third model contains a combined data set for the two in order to provide cases that are difficult to identify and the accuracy results that were obtained. obtained from the merging datasets showed that the face mask (0.953) and the face recognition system were the most accurate in detecting them (0.916).

Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Managing risk and its impact in the face of accidents and work injuries in industrial organizations
...Show More Authors

The industrial sector of the important drivers of economic activity sectors due to having the capabilities and the potential to qualify biggest contribution to the economic development of the country, which requires the availability of a higher degree of safety in industrial organizations, and the preservation of the lives of employees and workers in emergency situations, and that all the work is not without its dangers, which produces in a year of uncertainty in the possible events get in the future, therefore, reduce the dangers that could be exposed to industrial organizations and management are at the heart of the strategic direction which works to stimulate thinking about the future and respond to the changes that occur in theextern

... Show More
View Publication
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Cranio-maxillofacial Surgery
Assessment of regional asymmetry of the face before and after surgical correction of unilateral cleft lip
...Show More Authors

View Publication
Scopus (25)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Oct 21 2018
Journal Name
Al–bahith Al–a'alami
Ways to face rumors in the social networking site Facebook: Research thesis from the PhD thesis
...Show More Authors

The research deals with the subject of «ways to face rumors in the site of social networking Facebook», a research based on a doctoral thesis, as the research dealt with rumors in the most dangerous type of new media, which sites of social communication with the global community as spreading rumors of all kinds and afflicts everyone who has eyes on him Of the audience of these sites, and aims to identify the rumors on Facebook because it is one of the most popular sites in the world and the strategy of combating the rumors published by Facebook users in their personal pages and groups that organize them, as well as identify methods and methods that can be During which the face of the rumors in the said site and eliminate them t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Mon Mar 02 2026
Journal Name
International Journal Of Inventions In Engineering & Science Technology
A Review: Campus Violence Detection Using Deep Learning Models
...Show More Authors

This paper offers a systemic review of the deep learning methods to detect violence on campus, which is a critical issue in intelligent surveillance to improve the student safety and prompt cut off of violent accidents. The review reviews studies published 2018-2025, concentrating on model structure to detect fights, bullying, vandalism, and aggressive behavior on problematic campuses due to occlusion and light variations and complicated human interactions. The research design includes a comparative study of different deep learning networks, such as CNNs, RNNs, 3D CNNs, attention-based networks, transformers, graph neural networks, neuro-fuzzy, and multimodal systems and federated learning methods. The paper also assesses benchmark

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Iraqi Journal Of Science
RETRIEVING DOCUMENT WITH COMPACT GENETIC ALGORITHM(CGA)
...Show More Authors

Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Fri Jan 16 2026
Journal Name
F1000research
Update Quasi-Newton Algorithm for Training ANN
...Show More Authors

The proposed design of neural network in this article is based on new accurate approach for training by unconstrained optimization, especially update quasi-Newton methods are perhaps the most popular general-purpose algorithms. A limited memory BFGS algorithm is presented for solving large-scale symmetric nonlinear equations, where a line search technique without derivative information is used. On each iteration, the updated approximations of Hessian matrix satisfy the quasi-Newton form, which traditionally served as the basis for quasi-Newton methods. On the basis of the quadratic model used in this article, we add a new update of quasi-Newton form. One innovative features of this form's is its ability to estimate the energy functio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More