Preferred Language
Articles
/
jkmc-255
A Population-Based Study on Agreement between Actual and Perceived Body Image
...Show More Authors

Background: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.

Objective: This study aims to determine the agreement between actual and perceived body image in the general population.

Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for assessing the actual body weight status. Cohen's Kappa statistics were performed.

Results: Out of 300 participants, n=143 were males, and n=157 were females. In reality, according to BMI, 6 % were underweight, 47 % were average, 28 % were overweight, and 19 % were obese. According to perception, 8% of participants were underweight, 39 % were average, about 45% were overweight, and 8 % were obese. The mean score of real BMI was 25. 51±5.62 and figure rating score was 4.81±1.75. r value showed a strong positive relationship between both variables with a a P-value of <0.001. Cohen's Kappa score was 0.362. The rate of agreement between actual and perceived body weight status in the general population was 53.88%, and the disagreement rate was 46.12%

Conclusion: There was a weak agreement in the perception and realities of the self-image of people have the wrong impression about their body image.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (15)
Scopus
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences 318, 03002 (2021)
A Comparative Study on Behavior of RC Columns Strengthened by CFRP and Steel Jacket
...Show More Authors

This paper studies the behavior of axially loaded RC columns which are confined with carbon fiber reinforced polymers’ sheet (CFRP) and steel jackets (SJ). The study is based on twelve axially loaded RC columns tested up to failure. It is divided into three schemes based on its strengthening type; each scheme has four columns. The main parameters in this study were the compressive strength of the concrete and steel reinforcement ratio. Furthermore, the results of the experimental test showed a substantial enhancement in the column's load-carrying capacity. When compared to the original columns, the CFRP sheet had a significant effect on improving the ductility of the column by increasing the axial deformation by about 59.2 to 95.7

... Show More
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
A study of the Effect of Air Inlet and Exit on Indoor Air Movement
...Show More Authors

This work consists of a numerical simulation to predict the velocity and temperature distributions, and an experimental work to visualize the air flow in a room model. The numerical work is based on non-isothermal, incompressible, three dimensional, k turbulence model, and solved using a computational fluid dynamic (CFD) approach, involving finite volume technique to solve continuity, momentum and energy equations, that governs the room’s turbulent flow domain. The experimental study was performed using (1/5) scaled room model of the actual dimensions of the room to simulate room air flow and visualize the flow pattern using smoke generated  from burnt herbs and collected in a smoke generator to delivered through

... Show More
View Publication Preview PDF
Crossref