Preferred Language
Articles
/
9xfLZZIBVTCNdQwCnq7U
Model based smooth super-twisting control of cancer chemotherapy treatment
...Show More Authors

Chemotherapy is one of the most efficient methods for treating cancer patients. Chemotherapy aims to eliminate cancer cells as thoroughly as possible. Delivering medications to patients’ bodies through various methods, either oral or intravenous is part of the chemotherapy process. Different cell-kill hypotheses take into account the interactions of the expansion of the tumor volume, external drugs, and the rate of their eradication. For the control of drug usage and tumor volume, a model based smooth super-twisting control (MBSSTC) is proposed in this paper. Firstly, three nonlinear cell-kill mathematical models are considered in this work, including the log-kill, Norton-Simon, and hypotheses subject to parametric uncertainties and exogenous perturbations. In accordance with clinical recommendations, the tumor volume follows a predefined trajectory after chemotherapy. Secondly, the MBSSTC is applied for the three cell-kill models to attain accurate trajectory tracking even in the presence of uncertainties and disturbances. Compared to conventional super-twisting control (STC), the non-smooth term is introduced in the proposed control to enhance the anti-disturbance capability. Finally, simulation comparisons are performed across the proposed MBSSTC, conventional STC, and proportional–integral (PI) control methods to show the effectiveness and merits of our designed control method.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Materials Research And Technology
Immobilization of l-asparaginase on gold nanoparticles for novel drug delivery approach as anti-cancer agent against human breast carcinoma cells
...Show More Authors

View Publication
Scopus (60)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Dynamical Behavior of an eco-epidemiological Model involving Disease in predator and stage structure in prey
...Show More Authors

An eco-epidemic model is proposed in this paper. It is assumed that there is a stage structure in prey and disease in predator. Existence, uniqueness and bounded-ness of the solution for the system are studied. The existence of each possible steady state points is discussed. The local condition for stability near each steady state point is investigated. Finally, global dynamics of the proposed model is studied numerically.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of Barman model in acquiring the historical concepts among fourth-grade literary students
...Show More Authors

The researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data.    &

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Electronic Security And Digital Forensics
LSB based audio steganography preserving minimum sample SNR
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Science And Research (ijsr)
Color-based for tree yield fruits image counting
...Show More Authors

Identifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit

... Show More
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno

... Show More
View Publication Preview PDF