The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
The agricultural activity has a great significance in the all four dimensions of sustainable development. Firstly, the economic dimension which it contributes with the GDP, as well as, it is considered as an important source to attract the investment. Secondly, the environmental dimension which also contributes with conserving of the biodiversity, combating the desertification, and increasing the farmlands. Thirdly, for its role in the social dimension to achieve the food security, to eradicate the poverty, and providing jobs. Fourthly, toward the institutional dimension as well it is considered as a source that allows all people to participate effectively, and to exchange of the local and universal experiences and perspectives. For conf
... Show MoreIn this work, the occurrence conditions of both local Bifurcation and persistence were studied, Saddle-node bifurcation appears near fourth point, near the first point, the second point and the third point a transcritical bifurcation occurred but no pitchfork bifurcation happened near any of the four equilibrium points. In addition to study conditions for Hopf-bifurcation near positive stable point that is the fourth point. Besides discuss persistence occurrence as globally property of the food chain of three species include prey, first predator and top predator with impact of toxin in all species and harvesting effect on the predator’s only. Numerical results for the set of hypothe
Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of dev
... Show MoreThis research after financial ratios in the detection of fraud to the financial statements published which enables specialists from the work of their studies and their conclusions to obtain the information they seek on the activities of the entity. Has provided researchers what these relics They then field study to test the validity and sincerity of the findings of the suggestions that have been upheld the need to study all financial ratios extracted in general, organized and used in decision-making processes necessary administrative.And that the financial management attention more financial analysis and extraction of financial ratios and compare them with industry standards taken from historical norms
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreResearch Summary
Praise be to God, and may blessings and peace be upon the Messenger of God. As for:
The Noble Qur’an is the constitution of life, and a comprehensive educational approach that deals with individuals comprehensively, as it organizes worldly and eschatological life, and it is a curriculum concerned with organizing life starting with individuals and the family until the establishment of states, and from its comprehensiveness is reform, guidance and establishing boundaries. They have a disease in their hearts. They are exposed to this and are trying, by falsehood, to subjugate the Islamic world with man-made laws set by the West. Their aim is to distance people from
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More