Preferred Language
Articles
/
aRYq6okBVTCNdQwC_Y7n
A true random number generator based on the photon arrival time registered in a coincidence window between two single-photon counting modules
...Show More Authors

True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Nov 02 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Appraising the Role of Pharmacists in Medication Reconciliation at Hospital Discharge: A Field-Based Study
...Show More Authors

Objective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physici

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Theoretical Study of the Energy Flow of a Two Stages Four Generators Adsorption Chiller
...Show More Authors

This work is concerned with a two stages four beds adsorption chiller utilizing activated carbon-methanol adsorption pair that operates on six separated processes. The four beds that act as thermal compressors are powered by a low grade thermal energy in the form of hot water at a temperature range of 65 to 83 °C.  As well as, the water pumps and control cycle consume insignificant electrical power. This adsorption chiller consists of three water cycles. The first water cycle is the driven hot water cycle. The second cycle is the cold water cycle to cool the carbon, which adsorbs the methanol. Finally, the chilled water cycle that is used to overcome the building load. The theoretical results showed that average cycle cooling power

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Motivations of Volunteers in Jordan: An Exploratory Study Based on a Sample of University Students within the Context of their Social Relations
...Show More Authors

Volunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these fun

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
2017 Ieee 56th Annual Conference On Decision And Control (cdc)
Hierarchical non-singular terminal sliding mode controller for a single link flexible joint robot manipulator
...Show More Authors

—This paper studies the control motion of a single link flexible joint robot by using a hierarchical non-singular terminal sliding mode controller (HNTSMC). In comparison to the conventional sliding mode controller (CSMC), the proposed algorithm (NTSMC) not only can conserve characteristics of the convention CSMC, such as easy implementation, guaranteed stability and good robustness against system uncertainties and external disturbances, but also can ensure a faster convergence rate of the systems states to zero in a finite time and singularity free. The flexible joint robot (FJR) is a two degree of freedom (2DOF) nonlinear and underactuated system. The system here is modeled as a fourth order system by using Lagrangian method. Based on t

... Show More
View Publication
Scopus (11)
Crossref (10)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Biomaterials Science
Single-atom silver-borophene hybrid hydrogels for electrically stimulated wound healing: a multifunctional antibacterial platform
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Nov 24 2018
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Outcomes of Operative Management of 96 Cases with Traumatic Retroperitoneal Hematoma: A Single-Institution Experience
...Show More Authors

AIM: To analyse our experiences in the management of traumatic retroperitoneal hematoma (RPH), highlighting the various challenges faced and to report on the outcome of these patients. METHODS: From May 2014 to May 2017, all patients with traumatic RPH who underwent surgical treatment were retrospectively analysed. The kind of injury, intraoperative findings, sites of hematoma, postoperative morbidity and the overall outcomes were recorded. RESULTS: Ninety-six patients; 53 with blunt trauma and 43 with penetrating injury, were included in this study. The centre-medial hematoma was observed in 24 (25%) patients, lateral hematoma in 46 (47.9%) patients, pelvic hematoma in 19 (19.8%) patients, and multiple zone hematomas in

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Fusion Splicing for a Large Mode Area Photonic Crystal Fiber with Conventional Single Mode Fiber
...Show More Authors

In this paper the experimentally obtained conditions for the fusion splicing with photonic crystal fibers (PCF) having large mode areas were reported. The physical mechanism of the splice loss and the microhole collapse property of photonic crystal fiber (PCF) were studied. By controlling the arc-power and the arc-time of a conventional electric arc fusion splicer (FSM-60S), the minimum loss of splicing for fusion two conventional single mode fibers (SMF-28) was (0.00dB), which has similar mode field diameter. For splicing PCF (LMA-10) with a conventional single mode fiber (SMF-28), the loss was increased due to the mode field mismatch.

View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Transplantation Proceedings
Prevalence of Polyomavirus Among United Arab Emirates Kidney Transplant Recipients: Results From a Single Center
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref