The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
Constructional Efficiency in architecture in general is one of the most important standard success for any structure and a measure of its continuity and relevance across time and space. Given the importance of Al-Ahwaar environment that owned the spatial, environmental, economic and social elements had a prominent impact in creation of architecture patterns form to create special architectural and structural environment, which had many qualities and ingredients that contributed to its continuity and existence over the years. From the premise that man and his environment is the main goal to any architectural style,
Thus the research problem focusing on the lack of clarity of the previous literatures in its st
... Show More The current research aims to: (know the effectiveness of the harvesting strategy in the achievement of the students of the Institute of Fine Arts in environmental art.
- In order to know this effectiveness, the researcher put a main zero hypothesis and derived six sub-hypotheses from it. the usual way; As the research community reached (120) male and female students of the Fine Arts Institutes for the morning study in Baghdad. As for the research sample, it was chosen by the simple random method, and the number was (75) male and female students for the year 2021-2022 AD. The researcher applied a pre-knowledge test for the four groups of research to find out the level of previous experiences of students in the subject of environmen
The most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreAnal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm
A mathematical model is developed which predicates the performance of cylindrical ion exchange bed involving comparing of axial dispersion model for cation exchange column with different assumption, this model permits the performance to predicate the residence time within the bed with the variance, axial dispersion and Pecklet No. to indicated deviation from plug flow model.
Two type of systems are chosen for positive ions first with divalent ions (Ca+2) to exchange with resin of Na+1form used as application in water softener units and second with monovalent ions (Na+1) to exchange with resin of H+1 form used as application in deionize water units &n
... Show MoreVariable selection in Poisson regression with high dimensional data has been widely used in recent years. we proposed in this paper using a penalty function that depends on a function named a penalty. An Atan estimator was compared with Lasso and adaptive lasso. A simulation and application show that an Atan estimator has the advantage in the estimation of coefficient and variables selection.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreStatistical studies are reported in this article for an active galactic nuclei sample of different type of active galaxies Seyferts 1, Seyferts 2, and Quasars. These sources have been selected from a Catalogue for bright X-ray galaxies. The name of this index is ROSAT Bright Source Catalogue (RBSC) and the NRAO VLA Sky Survey (NVSS). In this research, multi-wavelength observational bands Radio at 1.4 GHz, Optical at 4400 A0, and X-ray at energy 0.1-2.4 KeV have been adopted in this study. The behavior of flux density ratios has been studied , with respect to the absolute magnitude . Furthermore, the Seyfert1 and Seyfert 2 objects are combined in one group and the QSOs are collectest in another group. Also, it has been found that t
... Show More