The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
Objective(s): The study aims Finding relationship between UTI and demographic variable include: child's age, child's gender, if males are circumcised or not, child's order in his family, father's level of education, mother's level of education, place of residence and family socioeconomic status. Methodology: A descriptive study was conducted on students of primary schools for both sexes, for the period from 19th. February 2014 through to 4th March 2014. A selected sample from two steps the first stage is to choose a school by a stratified- cluster sample, getting schools that have been selected (12) sch
A paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho
... Show MoreIn the present work, the magnetic dipole and electric quadrupole moments for some sodium isotopes have been calculated using the shell model, considering the effect of the two-body effective interactions and the single-particle potentials. These isotopes are; 21Na (3/2+), 23Na (3/2+), 25Na (5/2+), 26Na (3+), 27Na (5/2+), 28Na (1+) and, 29Na (3/2+). The one-body transition density matrix elements (OBDM) have been calculated using the (USDA, USDB, HBUMSD and W) two-body effective interactions carried out in the sd-shell model space. The sd shell model space consists of the active 2s1/2, 1d5/2,
... Show MoreThe design of fabrics and fashion is manifested by aesthetic advantages betting with the movement of society in its quest to develop as an independent art in itself that is linked to the values and aesthetic concepts of other arts and what appears in them of intellectual systems calling for renewal and modernity. Which brought about a wide change in public taste, as well as a desire for innovation . Which made fashion an interesting aesthetic phenomenon and taste is always subject to change constantly to comply with the social variables that occur in human life, as the fashion that appears in a certain era of time and takes a great distance from spreading as something new and out of the ordinary is in fact the fruit of the development of
... Show MoreThe development that solar energy will have in the next years needs a reliable estimation of available solar energy resources. Several empirical models have been developed to calculate global solar radiation using various parameters such as extraterrestrial radiation, sunshine hours, albedo, maximum temperature, mean temperature, soil temperature, relative humidity, cloudiness, evaporation, total perceptible water, number of rainy days, and altitude and latitude. In present work i) First part has been calculated solar radiation from the daily values of the hours of sun duration using Angstrom model over the Iraq for at July 2017. The second part has been mapping the distribution of so
This survey investigates the thermal evaporation of Ag2Se on glass substrates at various thermal annealing temperatures (300, 348, 398, and 448) °K. To ascertain the effect of annealing temperature on the structural, surface morphology, and optical properties of Ag2Se films, investigations and research were carried out. The crystal structure of the film was described by Xray diffraction and other methods.The physical structure and characteristics of the Ag2Se thin films were examined using X-ray and atomic force microscopy (AFM) based techniques. The Ag2Se films surface morphology was examined by AFM techniques; the investigation gave average diameter, surface roughness, and grain size mutation values with increasing annealing temperature
... Show MoreThe research involved attempt to inhibit the corrosion of Al-Si-Cu alloy in 2.5x10-3 mol.dm-3 NaOH solution (pH=11.4) by addition of six different inhibitors with three concentrations (1x10-3, 1x10-2, and 0.1 mol.dm-3). These inhibitors include three organic materials (sodium acetate, sodium benzoate, and sodium oxalate) and three inorganic materials (sodium chromate, disodium phosphate, and sodium sulphate). The data that concerning polarization behaviour are calculates which include the corrosion potential (Ecorr) and current density (icorr), cathodic and anodic Tafel slopes (bc & ba), and polarization resistance (Rp). Protection efficiency (P%) and activation energy (Ea) values were calculated for inhibition by the six inhibitors. The
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreAbstract
The research stems from the problem that focuses on a number of questions. They are as follows: What is the extent of interest in the topic of efficiency by the banks and their role in raising the efficiency of the banking business and its development? Is the banking efficiency used in Iraqi banks clear and specific for the Iraqi banking sector? How the banking sector efficiency is measured and what are the approaches adopted in determining the banking inputs and outputs? What is the level of efficiency in the research sample of the banks and what are the causes of its decline or rise in private banks individually and in the Iraqi banking sector in general?
The re
... Show More