The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
In recent years, non-oil primary balance indicator has been given considerable financial important in rentier state. It highly depends on this indicator to afford a clear and proper picture of public finance situation in term of appropriate and sustainability in these countries, due to it excludes the effect of oil- rental from compound of financial accounts which provide sufficient information to economic policy makers of how economy is able to create potential added value and then changes by eliminating one sided shades of economy. In Iraq, since, 2004, the deficit in value of this indicator has increased, due to almost complete dependence on the revenues of the oil to finance the budget and the obvious decline of the non-oil s
... Show MoreAbstract
The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's management experience is how to achieve thes
... Show MoreKlebsilla pneumoniae is one of must opportunistic pathogens that causes nosocomial infection, UTI, respiratory tract infections and blood infections. ZrO2 nanoparticles have antimicrobial activity against some pathogenic bacteria and fungi. Ceftazidime is one of third generation cephalosporins groups of antibiotecs, characterized by its broad spectrum on bacteria in general and particularly on Enterobacteriaceae family like Klebsiella spp. Method: Diverse clinical samples of Klebsilla pneumoniae were isolated from several hospitals in Baghdad – Iraq and ZrO2 nanoparticles was investigated against it. Ceftazidime was also investigated against K. pneumoniae. Both of ZrO2 nanoparticles and ceftazidime were mixed together and investigated aga
... Show MoreThe current study has beenconduced to evaluate the effect of extracted crude terpens at the concentrations of 6,8% of seeds of Eucalyptuscamaldulensison the 4th larval instar oftheCallosobruchusmaculates and the percentage of the cowpea seed germination.The Results showed that the terpens extract of the concentration of 8% increases the mortality rate of the fourth larval instar and it reach to 63.3%, and then decrease of to 26.6,20% at concentration of 6%and forcontrol treatment respectively The percentage of adult emergence reduces to 0% at the concentration of 8% compared with control treatment in which it reach to 66.6%. The extraction atbothconcentrations 6,8% does not affect the germination rate
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreQuantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
The research aimed mainly to discover the effectiveness of the (PEOE) model in teaching science to develop the skills of generating and evaluating information and the emotional side of the scientific sense of the intermediate first grade students. An experimental approach with a quasi-experimental design called pre-test and post-test control design was used. The research sample consisted of (60) students, who were selected in a random cluster method, (30) students in the experimental group studied the unit "The Nature of Material" using the (PEOE) model, and (30) students in the control group studied according to the prevailing method of teaching. The research materials and tools were represented in: a teacher's guide for teaching the un
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreThis study focused on the role and importance of alkaloid compounds in Punica granatum peels which is one of many wide distribution medicinal fruits. Two kinds of pathogenic fungi were isolated from patients in Baghdad to be tested, also a type of extracts was prepared, alkaloids were isolated and partially purified and detected by two ways, a classic depended technique also used for determine these alkaloids, results showed an observed differences among extracts or treatments towards the fungi samples. So this study was one of the scientific applications to find natural alternative compounds that inhibit the growth of several pathogenic organisms that cause dangers and harms for human health.