The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
This research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa
... Show MoreNosocomial infections are one of the most important causes of mortality and morbidity in hospitals. These are major public health problems worldwide, but particularly in developing countries. The purpose of this research was to analyze the frequency of the microorganisms in the specimens taken from the surgical wounds, and to examine antimicrobial susceptibility for some isolates . Wound swabs were examined from June 2010 to January 2011. The isolates were identified by conventional methods, antimicrobial susceptibility testing was performed by Kirby-Bauer disc diffusion method as per NCCLS guidelines.A total of 102 wound swabs were examined 22(21.56%) swabs were sterile and 80(78.43%) were positive for microorganisms. The results showed
... Show MoreWe can summarize the main risk factors for type 2 diabetes mellitus (T2DM) by looking at our nutrition, age, and lifestyle. β-cell dysfunction and insulin resistance (IR) are outcomes of the pathophysiology of type 2 diabetes. As an indirect result of IR on important metabolic enzymes, lipid and lipoprotein abnormalities are also a factor in T2DM patients. Recent research has indicated that lipid fluctuation may be the cause of poor glucose metabolism as well as one of its effects. Fatty acids (FAs) affect cell membrane fluidity and permeability, insulin receptor binding and signaling, and the translocation of glucose transporters. Therefore, it is suggested that FAs might play a crucial part in the emergence of IR and T2DM. The cu
... Show MoreAs long as Islamic banks cannot operate in an environment that deals with traditional banking instruments based on the interest rate (bank interest) that is prohibited by Article No. (6) of the Islamic Banking Law No. (43) of 2015 which stipulates that (do not deal in any activity that carries Interest (neither taking nor giving)). Therefore it seeks to provide an alternative strategic solution within the framework of the provisions and rules of Islamic Sharia, on the basis of participating in profit and loss to avoid the method of interest taking and giving, to find investment methods to provide new financial products, such as Islamic certificates of deposit and investment funds according to the method Murabaha, speculation (Mudar
... Show MoreAbstract
Purpose: The research attempts to Stand on the reality of the effective application of of strategic information systems in telecommunications companies in the Kurdistan Region, and what is the amount of the impact of such systems on promoting of Strategic Intelligence.
Design/Methodology/Approach: The Applied method has been used, In order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then distributed to (11) Company of Iraqi communications operating in Kurdistan Region companies, it has been used questionnaire to collect data in order to develop
... Show MoreThis research aims to discuss an important issue because of its role in increasing the efficiency of financial markets and boost investor confidence by a insider trading, which arises as a result of leaking secret information to some investors and reliable in the process of trading shares in the Iraq Stock Exchange And thus obtain abnormal profits at the expense of other investors. Research was based on the assumption that " Where shortcomings in local regulations relating to disclosure and insider trading in accounting information leads to the activate the phenomenon of insider trading in accounting information in the Iraq Stock Exchange and including a negative impact on investors' decisions ". and Because of the difficulty the discove
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.