Preferred Language
Articles
/
bsj-8546
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
2022 4th International Conference On Current Research In Engineering And Science Applications (iccresa)
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Open Veterinary Journal
Efficiency of C-type natriuretic peptide on improvement of Iraqi local ram’s epididymal sperms
...Show More Authors

Background: Fertility plays great role in animal reproduction since high quality semen improves sheep industry reproduction. The current worldwide data revealed the closely related of CNP to reproductive function of rams. Aims: Evaluation the effect of CNP on cooled sperms using the traditional and molecular assays. Methods: Totally, 20 testicular samples were collected, processed to obtain the semen samples and divided into two parts; one treated with the suitable dose of CNP and the otherserved as a control. Sperm samples of both groups were cooled for 3 days and tested at 0 0h, 24h, 48h and 72h. Results: The findings revealed that the suitable dose of CNP-treated sperms was 0.0110-13. Values individual motility, live sperm

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
المجلة السياسية والدولية
تنفيذ مفهوم المسؤولية عن الحماية في ليبيا
...Show More Authors

بعد الاحتجاجات التي اندلعت في ليبيا في فبراير 3122 ،استند مجلس الأمن وهيئات الأمم المتحدة الأخرى على مفهوم المسئولية عن الحماية (R2P )(لمعالجة الأوضاع الإنسانية الناجمة عن تلك الاحتجاجات. وأصدر المجلس القرار 1970والذي فرض بموجبه حزمة من العقوبات على ليبيا، ثم أصدر القرار 1973 الذي سمح بالتدخل العسكري هناك. وبعد البدء بتنفيذ الحملة العسكرية تبين أن الناتو استغل هذه القرارات لتنفيذ أجندته الخاصة وعمل على الإطاحة بالن

... Show More
View Publication Preview PDF
Publication Date
Wed May 05 2021
Journal Name
Arab Science Heritage Journal
مؤلفات عن وباء الطاعون في الوباء الاسلامي
...Show More Authors

Throughout the ages, a number of natural and human disasters have
occurred in the Islamic world,

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
La voix de la mère dans À la Recherche du Temps perdu
...Show More Authors

 

Abstract

The twentieth century French novel had undergo a significant change that took the form of a radical move from the traditional son who follows his father to one who no way prevalent in the classical French novel. The new son in the 2Oth century novel finds himself emotionally attached which both became a new trend and approach in novel writing.

Marcel Proust's novel which can be considered a source of inspiration for most of 2Oth century novelists is a good example of the mother supremacy which is crystal clear from the first page through its parts and chapters till the last page. In fact, Proust had written a completely different novel from the Balzacian conventions. Unlike the latter's novels, Pro

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Conductometric Studies of Aqueous Solution of Thymine and Adenosine At Different Temperatures
...Show More Authors

Molar conductivity of different concentrations of thymine and adenosine in water , sodium acetate and ammonium chloride solution at different temperatures , 283. 15-323.15 K has been determined from direct conductivity measurements , examination of aqueous mixture of thymine and adenosine with Onsager equation reveal deviation from linearity at high concentration .This deviation was explained in term of molecular interaction . Ostwald dilution law also examined with the above mixtures lead to calculation of limiting molar conductivities and dissociation constants of both nucleic acid in water , sodium acetate and ammonium chloride. The agreement between the values obtained for Onsager equa

... Show More