Preferred Language
Articles
/
PBfA2o0BVTCNdQwCYyea
Fabrics-Shear Strength Links of Silicon-Based Granular Assemblies
...Show More Authors
ABSTRACT<p>Silicon (Si)-based materials are sought in different engineering applications including Civil, Mechanical, Chemical, Materials, Energy and Minerals engineering. Silicon and Silicon dioxide are processed extensively in the industries in granular form, for example to develop durable concrete, shock and fracture resistant materials, biological, optical, mechanical and electronic devices which offer significant advantages over existing technologies. Here we focus on the constitutive behaviour of Si-based granular materials under mechanical shearing. In the recent times, it is widely recognised in the literature that the microscopic origin of shear strength in granular assemblies are associated with their ability to establish anisotropic networks (fabrics) comprising strong-force transmitting inter-particle contacts under shear loading. Strong contacts pertain to the relatively small number of contacts carrying greater than the average normal contact force. However, information on how such fabrics evolve in Si-based assemblies under mechanical loading, and their link to bulk shear strength of such assemblies are scarce in the literature. Using discrete element method (DEM), here we present results on how Si-based granular assemblies develop shear strength and their internal fabric structures under bi-axial quasi-static compression loading. Based on the analysis, a simple constitutive relation is presented for the bulk shear strength of the Si-based assemblies relating with their internal fabric anisotropy of the heavily loaded contacts. These findings could help to develop structure-processing property relations of Si-based materials in future, which originate at the microscale.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Jun 15 2023
Journal Name
International Journal On Engineering, Science And Technology
EEG Neuro-markers to Enhance BCI-based Stroke Patients Rehabilitation
...Show More Authors

Stroke is the second largest cause of death worldwide and one of the most common causes of disability. However, several approaches have been proposed to deal with stroke patient rehabilitation like robotic devices and virtual reality systems, researchers have found that the brain-computer interfaces (BCI) approaches can provide better results. In this study, the electroencephalography (EEG) dataset from post-stroke patients were investigated to identify the effects of the motor imagery (MI)-based BCI therapy by investigating sensorimotor areas using frequency and time-domain features and to select particular methods that help in enhancing the MI-based BCI systems for stroke patients using EEG signal processing. Therefore, to detect

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (17)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF