Preferred Language
Articles
/
TxetUJEBVTCNdQwCzZTJ
Private Backend Server Software-Based Telehealthcare Tracking and Monitoring System
...Show More Authors

In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosensors to detect multivital signs of an individual with an ESP32 microcontroller board and IoT cloud. The device displays the vital data, which is then uploaded to a cloud server for storage and analysis over an IoT network. Vital data is received from the cloud server and shown on the IoT medical client dashboard for remote monitoring. The proposed system allows users to ameliorate healthcare jeopardy and minify its costs by recording, gathering, sharing, and analyzing vast biodata streams such as Intensive Care Units (ICU) (i.e., temperature, heartbeat rate, Oxygen level (CO2), etc.), efficiently in real-time. In this proposal, the data will send from sensors fixed in the patient body to the Web and Mobile App continually in real time for collection and analysis.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (6)
Scopus
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (12)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
An Accurate Handwritten Digits Recognition system Based on DWT and FCT
...Show More Authors

In this paper an accurate Indian handwritten digits recognition system is
proposed. The system used three proposed method for extracting the most effecting
features to represent the characteristic of each digit. Discrete Wavelet Transform
(DWT) at level one and Fast Cosine Transform (FCT) is used for features extraction
from the thinned image. Besides that, the system used a standard database which is
ADBase database for evaluation. The extracted features were classified with KNearest
Neighbor (KNN) classifier based on cityblock distance function and the
experimental results show that the proposed system achieved 98.2% recognition
rate.

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Measurement: Sensors
Dynamic monitoring of saturated stiff clay soil foundation structure by falling weight deflectometer system under impact loads sensors effect
...Show More Authors

Experiments research is done to determine how saturated stiff clayey soil responds to a single impulsive load. Models made of saturated, stiff clay were investigated. To supply the single pulse energy, various falling weights from various heights were tested using the falling weight deflectometer (FWD). Dynamic effects can range from the major failure of a sensitive sensor or system to the apparent destruction of structures. This study examines the response of saturated stiff clay soil to a single impulsive load (vertical displacement at the soil surface below and beside the bearing plates). Such reactions consist of displacements, velocities, and accelerations caused by the impact occurring at the surface depth induced by the impact loads

... Show More
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Classification and monitoring of autism using svm and vmcm
...Show More Authors

Autism is a lifelong developmental deficit that affects how people perceive the world and interact with each others. An estimated one in more than 100 people has autism. Autism affects almost four times as many boys than girls. The commonly used tools for analyzing the dataset of autism are FMRI, EEG, and more recently "eye tracking". A preliminary study on eye tracking trajectories of patients studied, showed a rudimentary statistical analysis (principal component analysis) provides interesting results on the statistical parameters that are studied such as the time spent in a region of interest. Another study, involving tools from Euclidean geometry and non-Euclidean, the trajectory of eye patients also showed interesting results. In this

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Designing Educational Software Based on Web Quests and Its Effectiveness in Developing Information Search Skills among Students of the Department of Educational and Psychological Sciences
...Show More Authors

The aim of the research is to design educational software based on Web Quests and to measure its effectiveness in developing information search skills of students at the Department of Educational and Psychological Sciences. The research is experimental in nature using pre-post measurement. The research sample consisted of (91) male and female students from the second grade in the Department of Educational and Psychological Sciences, they were divided into two equal groups; the experimental group consisted of (47) students who adopted the educational software as a studying method, and the control group consisted of (44) students who follow the traditional method. The researchers prepared a list of skills for searching information and they

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Algorithms Based Nonlinear PID Neural Trajectory Tracking Controller for the Differential Wheeled Mobile Robot Model
...Show More Authors

This paper presents a comparative study of two learning algorithms for the nonlinear PID neural trajectory tracking controller for mobile robot in order to follow a pre-defined path. As simple and fast tuning technique, genetic and particle swarm optimization algorithms are used to tune the nonlinear PID neural controller's parameters to find the best velocities control actions of the right wheel and left wheel for the real mobile robot. Polywog wavelet activation function is used in the structure of the nonlinear PID neural controller. Simulation results (Matlab) and experimental work (LabVIEW) show that the proposed nonlinear PID controller with PSO
learning algorithm is more effective and robust than genetic learning algorithm; thi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Evaluation of EDI Software Application
...Show More Authors

The primary objective of this research is to determine the best EDI
software application that meets the users' requirements, and to show
the functionality potentially presented in any software of electronic
data interchange (EDI) system. Also, in this paper, will be addressed
issues relating to integration EDI system into business process, and
the issues regarding the performance of EDI application will also be
discussed

View Publication Preview PDF