The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow management at international airports. The implementation of this method has shown superior performance to previous methods in terms of reducing errors, delays and associated costs
Expected to The organizational commitment by employees increases their loyalty towards their organization and thus contribute to enhancing their performance , therefore this study aimed to discover the relationship and the impact between the organizational commitment (emotional commitment, standard commitment, continuous commitment) and the performance of employees in the company researched, additional to know the available organizational commitment levels of employees in the company researched and its impact on the performance of employees, Research was conducted at the General Company for products in the dairy to achieve the goals of research has been developed questionnaire conation (22 ) items to collect data from the study s
... Show MoreA great abbey in the Shari'a, and is therefore destined to be preserved in many texts and by methods
There are many prayers in the Qur'an and Sunnah to encourage them
They have a clear relationship with the preservation of the purposes of the Sharia in general, and with a purpose
Save the mind in particular, but the scholars - the mercy of God - when they declare that the costs of Sharia
Due to the preservation of my intentions in the creature, they limit their words to orders and intentions, and are not exposed
In particular,
If they were included in the texts of the Shariah and Tawjiyatiya,
To be related to the preservation of the purposes of the law, which confirms the words of the former leaders, and light the li
Most of us are tired of the circumstances that surround us because of their deficiency, deprivation, and sullenness, even though troubles and pains are the soil in which the seeds of strong personality sprout.
The content of the research is summed up in the fact that there is no need to frown, so let our face be free, and our word good and tolerant, so that we can be the most loving people of those who give them, and the Messenger of God (may God’s prayers and peace be upon him and his family) was known to be the heaviest concerns of people, but he was most smiling of people, by smiling, we buy lives, so we should get used to it, because that gives us hope and finds the world in our hands, an
... Show MoreWith the twenty - First century, It becomes clear to us that for 110 years the Japanese - Chinese relations have been witnessing big radical events and developments. ( we take the year of 1949 as the starting date for this relations). In order to prove hypothesis the study divided in to four chapters. - The first chapter deals with explaining the factors of the subject of the Japanese - Chinese relations which described as Indirect threat and aggressive relations from Japan to China after the Second World War by Japanese entering in the American world strategy, in order to destroy the communist china's system which decleard in 1949, because the united states understood that the new system in Beijing could threat American's Interest
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More