Preferred Language
Articles
/
6RiDW5QBVTCNdQwCbBJn
Design and analysis of a dual-core PCF biosensor based on SPR for cancerous cells detection
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Thu Jan 25 2018
Journal Name
International Journal Of Current Engineering And Technology
Model-Based Design of Piezoelectric Patches used to Repair Damaged Beams under Static Load
...Show More Authors

Static loads exposing to mechanical components can cause cracks, which are lead to form stress concentration regions causing the failure of structure. Generally, from 80% to 90% of structure failure is due to initiation of the cracks. Therefore, it is necessary to repair the crack and reduce its effect on the structure where the effect of the crack is modelled as an additional flexibility to the structure. In the last few years, piezoelectric materials have been considered as one of the most favourable repairing techniques. The piezoelectric material converts the applied voltage on it to a bending moment to counter the bending moment caused by the external load on the beam at the crack location. In this study, the design of the piez

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Automated Deception Detection Systems, a Review
...Show More Authors

Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Stopping power of Hetero nuclear di-cluster ions from partial-wave analysis based on semi classical phase shifts
...Show More Authors

 

We apply a semi classical partial-wave scattering method based on the induced density approach (IDA) model. For ion electron scattering, the transport cross section is used to calculate the energy loss. This method yields a non-perturbative exemplification of energy loss, bridging the difference among classical and quantal representations. The focus of this work is the interaction of hetero nuclear di-cluster (He-H) ions with a free gas. The results show three kinds of stopping power in (a.u) (cluster stopping power, self-stopping power and correlated stopping power) of hetero nuclear di-cluster ions (He-H) with velocity at different atomic di-cluster distances at different densities and temperatures. We find that Bragg’

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Population based Study on Self Medication Practice in Pakistan
...Show More Authors

Background: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.

Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.

Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.

... Show More
View Publication Preview PDF
Crossref