SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
COVID-19
FACEMASK
DETECTION
BY:
• EL ASRI ZAKARIA
• ELMOURABITI ADNANE
• CHTITEH ACHRAF
INTRODUCTION
 The trend of wearing face masks in public is rising due
to the COVID- 19 corona virus epidemic all over the world.
Before Covid-19, People used to wear masks to protect
their health from air pollution. While other people are self-
conscious about their looks, they hide their emotions from
the public by hiding their faces. Scientists proofed that
wearing face masks works on impeding COVID-19
transmission.The corona virus epidemic has given rise to an
extraordinary degree of worldwide scientific cooperation.
Artificial Intelligence (AI) based on Machine learning and
Deep Learning can help to fight Covid-19 in many ways.
 Here we introduce a mask face detection model that is
based on computer vision and deep learning. The
proposed model can be integrated with surveillance
cameras to impede the COVID-19 transmission by allowing
the detection of people who are wearing masks not
wearing face masks. The model is integration between
deep learning and classical machine learning techniques
with TENSORFLOW. We have used deep transfer leering for
feature extractions and combined it with three classical
machine learning algorithms. We introduced a comparison
between them to find the most suitable algorithm that
achieved the highest accuracy and consumed the least
time in the process of training and detection.
MACHINE LEARNING
 Machine learning (ML)is the study of
computer algorithms thatimprove
automatically through experience. Itis
seen as a subset of artificial
intelligence. Machine learning
algorithms build a mathematical
model based on sample data, known
as "training data", in order to make
predictions or decisions without being
explicitly programmed to do so.
Computer Vision
 Computer vision is concerned with the
automatic extraction,analysis and
understanding of useful information
from a single image or a sequence of
images. It involves the development
of a theoretical and algorithmic basis
to achieve automatic visual
understanding. As a scientific
discipline, computer vision is
concerned with the theory behind
artificial systems that extract
information from images.
 The image data can take many forms,
such as video sequences, views from
multiple cameras, or multidimensional
DEEP LEARNING
 Deep learning methods aim at learning
feature hierarchies with features from higher
levels of the hierarchy formed by the
composition of lower level features.
Automatically learning features at multiple
levels of abstraction allow a system to learn
complex functions mapping the input to the
output directly from data, without depending
completely on human-crafted features. Deep
learning algorithms seek to exploit the
unknown structure in the input distribution in
order to discover good representations.
TENSORFLOW
 TensorFlow is a free and open-source software
library for dataflow and differentiable programming
across a range of tasks. It is a symbolic math library,
and is also used for machine learning applications
such as neural networks. Itis used for both research
and production at Google, TensorFlow is Google
Brain's second-generation system. Version 1.0.0 was
released on February 11, While the reference
implementation runs on single devices, TensorFlow
can run on multiple CPUs and GPUs (with optional
CUDA and SYCL extensions for general-purpose
computing on graphics processing units).
PROPOSED
SYSTEM
 The proposed system
focuses on how to
identify the person on
image/video stream
wearing face mask with
the help of computer
vision and deep learning
algorithm Tensor flow
library.
 Approach
1. Train Deep learning
model (MobileNetV2)
2. Apply mask detector
over images / live video
stream
Deep Learning
Frameworks
 To implement this deep learning network we
have the following options.
1. Tensor Flow
2.Keras
3.PyTorch
4.Caffee
5.MxNet
6.Microsoft Cognitive Tool Kit
▪ We are using the Tensor Flow
because it runs on Python,
▪ TensorFlow provides a better
way of visualizing data with its
graphical approach. It also
allows easy debugging of
nodes with the help of
TensorBoard. This reduces the
effort of visiting the whole
code and effectively resolves
the neural network.
Image Annotation
 The Data labelling is an necessary step in a supervised machine
learning task. we all comprehend that the quality of the training
data determines the quality of the model. The same is true for
annotations used for data labelling... for a machine learning model
learns by the similar way that we teach a child how to distinguish
between objects by looking at examples, so the result of the model
depends on the labels we feed in during its training phase.
 Speaking of annotation for images , there are multiple types such as
bounding boxes (which we will use and talk about below) ,
Polygonal Segmentation ( to define the shape and location of the
object in a much precise way), Semantic Segmentation (used in
self-driving cars and robotics to see the envirement much better) ,
Key-Point and Landmark( used for human body parts and
poses)…etc
 In our case we are using bounding boxes annotation which is the
most commonly used type of annotation in computer vision . it
works as an imaginary rectangle that serves as a point of reference
for object detection and creates a collision box for that object.
Data annotators draw these rectangles over images, outlining the
object of interest within each image by defining its X and Y
coordinates
CONCLUSION
 As the technology are blooming with emerging trends the availability so
we have novel face mask detector which can possibly contribute to
public healthcare. The architecture consists of MobileNet as the
backbone it can be used for high and low computation scenarios. In
order to extract more robust features, we utilize transfer learning to
adoptweights from a similar task face detection, which is trained on a
very large dataset.
 We used tensor flow to detect whether people were wearing face
masks or not. Themodels were tested with images and real-time video
streams. The accuracy of the model is achieved and, the optimization
ofthe model is a continuous process andwe are building a highly
accurate solution by tuning the hyper parameters. This specific model
could be used as a use case for edge analytics. Furthermore, the
proposed method achieves state-of-the-art results on a public face
mask dataset. By the development of face mask detection we can
detect if the person is wearing a face mask and allow their entry would
be of great help to the society.

Contenu connexe

Similaire à COVID-19 FACEMASK DETECTION-converti (1).pdf

Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piIRJET Journal
 
Image Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningImage Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningPRATHAMESH REGE
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...IRJET Journal
 
Synopsis of Facial Emotion Recognition to Emoji Conversion
Synopsis of Facial Emotion Recognition to Emoji ConversionSynopsis of Facial Emotion Recognition to Emoji Conversion
Synopsis of Facial Emotion Recognition to Emoji ConversionIRJET Journal
 
Analysis of student sentiment during video class with multi-layer deep learni...
Analysis of student sentiment during video class with multi-layer deep learni...Analysis of student sentiment during video class with multi-layer deep learni...
Analysis of student sentiment during video class with multi-layer deep learni...IJECEIAES
 
Everything You Need to Know About Computer Vision
Everything You Need to Know About Computer VisionEverything You Need to Know About Computer Vision
Everything You Need to Know About Computer VisionKavika Roy
 
Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxShakas Technologies
 
Real Time Sign Language Detection
Real Time Sign Language DetectionReal Time Sign Language Detection
Real Time Sign Language DetectionIRJET Journal
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningIRJET Journal
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learningIJECEIAES
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionIRJET Journal
 
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSINGFACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSINGIRJET Journal
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemIRJET Journal
 
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUEFACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUEIRJET Journal
 
How is a Vision Transformer (ViT) model built and implemented?
How is a Vision Transformer (ViT) model built and implemented?How is a Vision Transformer (ViT) model built and implemented?
How is a Vision Transformer (ViT) model built and implemented?Benjaminlapid1
 
Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4IRJET Journal
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learningijtsrd
 

Similaire à COVID-19 FACEMASK DETECTION-converti (1).pdf (20)

Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry pi
 
Image Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningImage Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learning
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
 
Synopsis of Facial Emotion Recognition to Emoji Conversion
Synopsis of Facial Emotion Recognition to Emoji ConversionSynopsis of Facial Emotion Recognition to Emoji Conversion
Synopsis of Facial Emotion Recognition to Emoji Conversion
 
Analysis of student sentiment during video class with multi-layer deep learni...
Analysis of student sentiment during video class with multi-layer deep learni...Analysis of student sentiment during video class with multi-layer deep learni...
Analysis of student sentiment during video class with multi-layer deep learni...
 
Everything You Need to Know About Computer Vision
Everything You Need to Know About Computer VisionEverything You Need to Know About Computer Vision
Everything You Need to Know About Computer Vision
 
Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docx
 
Real Time Sign Language Detection
Real Time Sign Language DetectionReal Time Sign Language Detection
Real Time Sign Language Detection
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine Learning
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learning
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action Recognition
 
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSINGFACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection System
 
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUEFACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
 
How is a Vision Transformer (ViT) model built and implemented?
How is a Vision Transformer (ViT) model built and implemented?How is a Vision Transformer (ViT) model built and implemented?
How is a Vision Transformer (ViT) model built and implemented?
 
Fake News Detection using Deep Learning
Fake News Detection using Deep LearningFake News Detection using Deep Learning
Fake News Detection using Deep Learning
 
Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4
 
Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
 
Waymo Essay
Waymo EssayWaymo Essay
Waymo Essay
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
 

Dernier

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

COVID-19 FACEMASK DETECTION-converti (1).pdf

  • 1. COVID-19 FACEMASK DETECTION BY: • EL ASRI ZAKARIA • ELMOURABITI ADNANE • CHTITEH ACHRAF
  • 2. INTRODUCTION  The trend of wearing face masks in public is rising due to the COVID- 19 corona virus epidemic all over the world. Before Covid-19, People used to wear masks to protect their health from air pollution. While other people are self- conscious about their looks, they hide their emotions from the public by hiding their faces. Scientists proofed that wearing face masks works on impeding COVID-19 transmission.The corona virus epidemic has given rise to an extraordinary degree of worldwide scientific cooperation. Artificial Intelligence (AI) based on Machine learning and Deep Learning can help to fight Covid-19 in many ways.  Here we introduce a mask face detection model that is based on computer vision and deep learning. The proposed model can be integrated with surveillance cameras to impede the COVID-19 transmission by allowing the detection of people who are wearing masks not wearing face masks. The model is integration between deep learning and classical machine learning techniques with TENSORFLOW. We have used deep transfer leering for feature extractions and combined it with three classical machine learning algorithms. We introduced a comparison between them to find the most suitable algorithm that achieved the highest accuracy and consumed the least time in the process of training and detection.
  • 3. MACHINE LEARNING  Machine learning (ML)is the study of computer algorithms thatimprove automatically through experience. Itis seen as a subset of artificial intelligence. Machine learning algorithms build a mathematical model based on sample data, known as "training data", in order to make predictions or decisions without being explicitly programmed to do so.
  • 4. Computer Vision  Computer vision is concerned with the automatic extraction,analysis and understanding of useful information from a single image or a sequence of images. It involves the development of a theoretical and algorithmic basis to achieve automatic visual understanding. As a scientific discipline, computer vision is concerned with the theory behind artificial systems that extract information from images.  The image data can take many forms, such as video sequences, views from multiple cameras, or multidimensional
  • 5. DEEP LEARNING  Deep learning methods aim at learning feature hierarchies with features from higher levels of the hierarchy formed by the composition of lower level features. Automatically learning features at multiple levels of abstraction allow a system to learn complex functions mapping the input to the output directly from data, without depending completely on human-crafted features. Deep learning algorithms seek to exploit the unknown structure in the input distribution in order to discover good representations.
  • 6. TENSORFLOW  TensorFlow is a free and open-source software library for dataflow and differentiable programming across a range of tasks. It is a symbolic math library, and is also used for machine learning applications such as neural networks. Itis used for both research and production at Google, TensorFlow is Google Brain's second-generation system. Version 1.0.0 was released on February 11, While the reference implementation runs on single devices, TensorFlow can run on multiple CPUs and GPUs (with optional CUDA and SYCL extensions for general-purpose computing on graphics processing units).
  • 7. PROPOSED SYSTEM  The proposed system focuses on how to identify the person on image/video stream wearing face mask with the help of computer vision and deep learning algorithm Tensor flow library.  Approach 1. Train Deep learning model (MobileNetV2) 2. Apply mask detector over images / live video stream
  • 8. Deep Learning Frameworks  To implement this deep learning network we have the following options. 1. Tensor Flow 2.Keras 3.PyTorch 4.Caffee 5.MxNet 6.Microsoft Cognitive Tool Kit
  • 9. ▪ We are using the Tensor Flow because it runs on Python, ▪ TensorFlow provides a better way of visualizing data with its graphical approach. It also allows easy debugging of nodes with the help of TensorBoard. This reduces the effort of visiting the whole code and effectively resolves the neural network.
  • 10. Image Annotation  The Data labelling is an necessary step in a supervised machine learning task. we all comprehend that the quality of the training data determines the quality of the model. The same is true for annotations used for data labelling... for a machine learning model learns by the similar way that we teach a child how to distinguish between objects by looking at examples, so the result of the model depends on the labels we feed in during its training phase.  Speaking of annotation for images , there are multiple types such as bounding boxes (which we will use and talk about below) , Polygonal Segmentation ( to define the shape and location of the object in a much precise way), Semantic Segmentation (used in self-driving cars and robotics to see the envirement much better) , Key-Point and Landmark( used for human body parts and poses)…etc  In our case we are using bounding boxes annotation which is the most commonly used type of annotation in computer vision . it works as an imaginary rectangle that serves as a point of reference for object detection and creates a collision box for that object. Data annotators draw these rectangles over images, outlining the object of interest within each image by defining its X and Y coordinates
  • 11. CONCLUSION  As the technology are blooming with emerging trends the availability so we have novel face mask detector which can possibly contribute to public healthcare. The architecture consists of MobileNet as the backbone it can be used for high and low computation scenarios. In order to extract more robust features, we utilize transfer learning to adoptweights from a similar task face detection, which is trained on a very large dataset.  We used tensor flow to detect whether people were wearing face masks or not. Themodels were tested with images and real-time video streams. The accuracy of the model is achieved and, the optimization ofthe model is a continuous process andwe are building a highly accurate solution by tuning the hyper parameters. This specific model could be used as a use case for edge analytics. Furthermore, the proposed method achieves state-of-the-art results on a public face mask dataset. By the development of face mask detection we can detect if the person is wearing a face mask and allow their entry would be of great help to the society.