The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
The liver is one of the most prominent glands in the digestive system. It crosses vital organs with multiple functions, including the secretion of enzymes, digestion of fats, and secretion of bile. Through histological studies and those interested in them, the tissue structure of the liver is of interest to researchers, and the four samples of Guinea pig Cavia porcellus were taken in this study to know the histological structure and compare it with rodents in particular. and other animals in general. The results of the liver parenchyma were comparable to those of the studied mammals in periods of hepatocytes, Kupffer cells, and sinusoids surrounding the central vein, blood supply, and bile ducts. He did not record differences, eve
... Show MoreConventional concretes are almost unbending, and even a small amount of strain potential leaves them brittle. This lack of bendability is a major source of strain loss, and it has been the main goal behind the development of bendable concrete, often known with engineered ce ment composites, or ECC. This form of concrete has a lot more flexibility than regular concrete. Micromechanical polymer fibers are used to strengthen ECC. In most cases, ECC uses a 2% amount of thin, separated fibers. As a result, bendable concrete deforms but unlike traditional concrete, it does not crack. This study aims to include this kind of concrete, bendable concrete, which can be used to solve concrete problems. Karasta (CK) and Tasluja (CT) Portland Lime
... Show MoreBackground: Periodontal diseases (PD) are inflammatory conditions of the tissues supporting the teeth, most often gingivitis and periodontitis. Maxillary chronic rhinosinusitis (MCRS) is the inflammation of the maxillary sinuses which is last for at least 12 consecutive weeks duration. Aims of study: Distribution of periodontal diseases among patients with Maxillary chronic rhinosinusitis according to gender and age. Materials and methods: Males and females subjects (25-45 years), divided into two groups; 150 patients suffer from MCRS and 130 subjects without MCRS. Clinical periodontal parameters; Plaque Index (PL.I), Gingival Index (G.I), Probing Pocket Depth (PPD), Clinical Attachment Level (CAL) and Bleeding On Probing (BOP) recorded f
... Show More.
The performance of composite prestressed concrete beam topped with reinforced concrete flange structures in fire depends upon several factors, including the change in properties of the two different materials due to fire exposure and temperature distribution within the composition of the composite members of the structure. The present experimental work included casting of 12 identical simply supported prestressed concrete beams grouped into 3 categories, depending on the strength of the top reinforced concrete deck slab (20, 30, and 40 MPa). They were connected together by using shear connector reinforcements. To simulate the real practical fire disasters, 3 composite prestressed concrete beams from each group were exposed to high t
... Show MoreKE Sharquie, R Hayani, J Al-Rawi, A Noaimi, SH Radhy, CLINICAL AND EXPERIMENTAL RHEUMATOLOGY, 2010
BN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More