The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
The main aim of this research to study and recognize the specifications and main concepts of (Fuzzy Logic) and its components and studying the practical experiments of the (Fuzzy Logic) techniques in the electrical engineering field through by using the (Fuzzy Logic) for controlling the three-phase AC induction motor by using (Matlab_ simulation_7) for modeling the system by using the computer
In this work, A new strategy for enhancing the efficiency of dye sensitized solar cells (DSSC) by doping foreign ion and co- doping TiO2 / Fe and Cu (38 nm ) was prepared by sol-gel method and successfully used as a photoanode for (DSSC). The samples were characterized by using X-ray diffraction ( XRD) is used to calculate grain size, before and after Fe, Cu- doping and co- doping. Glass coating process with a thin layer on (Fluorine doped tin oxide) FTO glass by using doctor Blade technique .The optimum thickness utilized for TiO2 paste is (15μm) on a conductive glass. The best experimental results for doping and co- doping TiO2 with additive Copper (II) nitrate Cu (NO3)2 as improved it was VOC=0.6 V, ISC=1.92 mA, Imax=1.8 mA and Vmax=
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreAbstract
The research examined with the importance banking merger to address the situation of Troubled banks in Iraq, Through The use of Logistic Regression Model. . The study attempted to present a conceptual aspect of banking merger and logistic regression, as well as the applied aspect which includes a sample consisting of six private Iraqi banks, and the hypothesis of the study is that the promotion of mergers among banks has positive impacts on improving the efficiency of performance of troubled banks, which contributes to the increase of banking services, raise of their financial indicators and the high liquidity and profits of the new banking entity as it is a way to overcome the prevailing banking crises.
... Show MoreThis research aims at calculating the optimum cutting condition for various types of machining methods, assisted by computers, (the computer program in this research is designed to solve linear programs; the program is written in v. basic language). The program obtains the results automatically, this occur through entering the preliminary information about the work piece and the operating condition, the program makes the calculation actually by solving a group of experimental relations, depending on the type of machining method (turning, milling, drilling). The program was transferred to package and group of windows to facilitate the use; it will automatically print the initial input and optimal solution, and thus reduce the effort and t
... Show Morethe bank sect for any country is very important because its represent a major nerve to feed a verity economic and finance activities .development any state measure by development banking sets and its represent important factor to investors attract . and because important of this subject ,teen accounting rule is a specialized for it .its related by Disclosures in the Financial Statements Of Banks and The Similar Institutions, its accredit by auditing and accounting standard consul in republic of Iraq.in date 10/28/1998. &
... Show MoreBackground: Ultrasound guided fine needle aspiration (FNA) is a quick nonmorbid method of staging disease in the axilla,Color doppler ultrasound is used to differentiate benign lymph node from node that bears metastasis.
Objective: To evaluate the utility of ultrasound guided (FNA) of the axillary L.N depending on the size of the primary tumor and the appearance of the lymph node by ultrasound , and to document the difference in color Doppler flow features between benign and malignant lymph node in women with primary breast cancer.
Patients and methods: The total number of the patient in the study is (60). Data were collected about tumor size, lymph node appearance and color-power Doppler sonography compared to the result of ultras
The aim of this research is controlling the amount of the robotic hand catching force using the artificial muscle wire as an actuator to achieve the desired response of the robotic hand in order to catch different things without destroying or dropping them; where the process is to be similar to that of human hand catching way. The proper selection of the amount of the catching force is achieved through out simulation using the fuzzy control technique. The mechanism of the arrangement of the muscle wires is proposed to achieve good force selections. The results indicate the feasibility of using this proposed technique which mimics human reasoning where as the weight of the caught peace increases, the force increases also with approximatel
... Show MoreRegarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra
... Show MoreThe State company for vegetable oils industry one of the most dynamic
companies in the Iraqi economy and is one of the companies manufacturing(food) that takes astrategic dimension and production within the concept of food security, this as well as to reduce dependence on imports and operation of national manpower.This study aims to describe the performance of the State company for vegetable oils industry for the period (2003-2007) which was characterized by economic and security instability of the country and give an accurate picture of their efficiency and their capacity to produce during this Period.