The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreLaboratory model tests were performed to investigate the behavior of shallow and inclined skirted foundations placed on sandy soil with R.D%=30 and the extent of the impact of the positive and negative eccentric-inclined loading effect on them. To achieve the experimental tests, it was used a box of (600×600) mm cross-sectional and 600mm in height and a square footing of (50*50) mm and 10 mm in thickness attached to the skirt with Ds=0.5B and various an angle of (10°, 20°, 30°). The results showed that using skirts leads to a significant improvement in load-carrying capacity and decreased settlement. In addition, when the skirt angle increased, the ultimate load improved. Load-carrying capacity decreased with increasing eccentri
... Show MoreResearchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The
... Show MoreThis research analyzes the level of the short circuit effect of the Iraqi super network and decides the suitable location for the High Voltage Direct Current (HVDC) connections in order to obtain the best short circuit reduction of the total currents of the buses in the network. The proposed method depends on choosing the transmission lines for Alternating current (AC) system that suffers from high Short Circuit Levels (SCLs) in order to reduce its impact on the transmission system and on the lines adjacent to it and this after replacing the alternating current (AC) line by direct current (DC) line. In this paper, Power System Simulator for Engineering (PSS/E) is used to model two types of HVDC lines in an effective regi
... Show MoreDBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
KA Hadi, AH Asma’a, IJONS, 2018 - Cited by 1
This research deals with the most important heritage in Iraq, which are the Iraqi marshes, especially Abu Zarag marsh in Al-Nasiriyah city south of Iraq. The research is divided into two parts. The first part deals with evaluating the water quality parameters of Abu Zarag marsh for the period from December 2018 to April 2019 which is the flooding season. The parameters are Temperature, pH, Electrical Conductivity, Total Dissolved Solids, Alkalinity, Total Hardness, Turbidity, Dissolved Oxygen, Sulfate, Nitrate. The second part is a comparison between the water quality parameters during the recent period with the same period during the previous years from 2014 to 2019. The results are
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.