Preferred Language
Articles
/
bsj-8546
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Determination the Concentration of the Radon in some Drinking Bottled Water in Baghdad using LR-115 Detector
...Show More Authors

In the present study ten samples of bottled water from Baghdad conservative were taken to measure the concentration of radon gas by using nuclear track detector LR-115.The result obtained are varying from(0.033)to(0.007)pCi.l-1and these values are very low than the allowed limits (5) pCi.l-1, and specific activity from bottled water has been calculated which was vary from (0.00027)to(0.00126) Bq.l-1 and these values are very low than allowed limits (0.0123) Bq.l-1 that mean the bottled water was treated with good treatment to decrease the side effect of radon

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education
Evaluating the performance of project management using network diagrams methods: A case study in the Ramadi Municipality
...Show More Authors

This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the applica

... Show More
Scopus (1)
Scopus
Publication Date
Mon Aug 18 2025
Journal Name
Soil And Sediment Contamination: An International Journal
Remediation Prediction of Contaminated Soil with Crude Oil Using the Optimized Remediation Method for the Iraqi Environment
...Show More Authors

Large quantities of petroleum-contaminated soil are generated with increased global energy consumption and crude oil production. This theoretical study evaluates the treatment of 1 ton of petroleum-contaminated soil using seven methods: incineration, physical washing, chemical washing, thermal pyrolysis, Fenton-oxidation-pyrolysis, the biological treatment, and asphaltenes. Data were based on experimental results from the Nahran Bin Omar oil lake in Basra Governorate, Iraq, (2019–2021). The methods were compared by waste generation, treatment cost, and duration. Results indicate that using petroleum-contaminated soil as a raw material for asphalt manufacturing is most beneficial since it is sold as a raw material. Incineration is faster a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Urology Annals
Modified snodgrass hypospadias repair using the lembert suturing technique
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
The Landsat Imagery Gap Filling using Median Filter Method
...Show More Authors

The Enhanced Thematic Mapper Plus (ETM+) that loaded onboard the Landsat-7 satellite was launched on 15 April 1999. After 4 years, the image collected by this sensor was greatly impacted by the failure of the system’s Scan Line Corrector (SLC), a radiometry error.The median filter is one of the basic building blocks in many image processing situations. Digital images are often distorted by impulse noise due to errors generated by the noise sensor, errors that occur during the conversion of signals from analog-to-digital, as well as errors generated in communication channels. This error inevitably leads to a change in the intensity of some pixels, while some pixels remain unchanged. To remove impulse noise and improve the quality of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Mothers Knowledge and Practices with Hemophilic Children type A at Azadi Teaching Hospital in Kirkuk City
...Show More Authors

Objective: The study aims to assess the knowledge and practices of mothers with hemophilia children type - A - ,
socio-economic status and association between mother demographic information with their knowledge and practices
toward their children in Azadi Teaching Hospital in Kirkuk.
Methodology: Descriptive study no probability (purposive) sample. Selected Fifty-five of mothers having hemophilia
children, started from November 2012 to May 2013. Study was carried out in the Azadi teaching hospital in
Kirkuk. By using questionnaire which consists from five parts include demographic characteristics for mother and
children, socio-economic, Knowledge and practices data gathered, by direct interview with the mothers in the

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 13 2024
Journal Name
مجلة واسط للعلوم الریاضیة
The development of the leading Arab scouting movements and their role in the development of youth and society
...Show More Authors

the history of the Scouting movement reflects the global social cultural and technological change over more than a century. scouting aims to develop young people worldwide through educational programs based on specific principles and values. in arab countries, the scouting movement is considered one of the most important platforms contributing to developing young people and enhancing their rule. positive in society, began with the establishment of the first Scout camp in the region and witnessed great growth and prosperity over the decades the research reveals the historical roots and development of the scout movement in the leading arab countries and analyzes the positive impact of scout movement in the leading arab countries on the develo

... Show More
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref