The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
This paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MV
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe individual average income is considered one of the most used criteria for the distinguishing between the developed and the developing countries, for this reason the efforts of economic development has been construed on increasing the average national income, the investment expenditures is considered one of the basic foundations for economic development operation which lead to the expanding the prodection power of the economy, and increasing the level of national income in an averages greaten than the primary expenditures due to the work and interaction between the multiplier and the accelerator. But the ability of the economic sectors in the generation of national income as a result of the primary expenditures is different fr
... Show MoreKA Hadi, AH Asma’a, IJONS, 2018 - Cited by 1
With the premise that effective use of online instructional practices is of vital importance in classrooms, the current study aimed to examine the effects of using Moodle applications to develop instructors’ skills in designing electronic tests at Dhofar University. The sample of this study consisted of (25) instructors participated in the experimental group. The researchers implemented a quasi-experimental design with one group pre- and post-test; in addition, an observation card was implemented to measure the target skills related to test design. The research instruments were subjected to validity and reliability measures to ensure valid and reliable data and results. The study results showed that those instructors who participated i
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreThis paper study two stratified quantile regression models of the marginal and the conditional varieties. We estimate the quantile functions of these models by using two nonparametric methods of smoothing spline (B-spline) and kernel regression (Nadaraya-Watson). The estimates can be obtained by solve nonparametric quantile regression problem which means minimizing the quantile regression objective functions and using the approach of varying coefficient models. The main goal is discussing the comparison between the estimators of the two nonparametric methods and adopting the best one between them
The expression is a prominent feature of the Arabic language, but it is one of the characteristics that are inseparable from it. The expressive aspects of each other.
The issue of Arab differences and their impact on the divergence of meaning is one of the issues that have preoccupied the minds of the Arabic language owners and their views went to various doctrines. Introduction: (Whenever I finished a question concluded with a verse related to any download, and followed by the need for expressing, interpretation and interpretation) I found him in some of the Aarabip more than the face of some of the vocabulary raised and erected and a jar, when the verses of the Koran, resulting in a research lies between Grammar and the Koran under