Preferred Language
Articles
/
jkmc-315
Evidence Based Updating of HbA1c Targets: Global Guidelines forGlycemic Control in Type 2 Diabetes Mellitus
...Show More Authors

Background:Measurement of hemoglobin A1c (A1C) is a renowned tactic for gauging long-term glycemic control, and exemplifies an outstanding influence to the quality of care in diabetic patients.The concept of targets is open to criticism; they may be unattainable, or limit what could be attained, and in addition they may be economically difficult to attain. However, without some form of targeted control of an asymptomatic condition it becomes difficult to promote care at allObjectives: The present article aims to address the most recent evidence-based global guidelines of A1C targets intended for glycemic control in Type 2 Diabetes Mellitus (T2D).Key messages:Rationale for Treatment Targets of A1C includesevidence for microvascular and macrovascular protectionand changes in quality of life. More or less stringent A1C goals may be appropriate for individual patients, andgoals should be individualized based on:duration of diabetes, age/life expectancy, comorbid conditions, CVD or advanced microvascular complications,hypoglycemia unawareness, and individual patient considerations

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Fast Temporal Video Segmentation Based on Krawtchouk-Tchebichef Moments
...Show More Authors

View Publication
Scopus (41)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Deep Learning-Based Speech Enhancement Algorithm Using Charlier Transform
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Valuation of Construction Projects Based on of Quantity Scale by using Expert System
...Show More Authors

The subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.

The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.

View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Applied Sciences And Nanotechnology
Characterization of Prepared Polyaniline Nanofibers Based on a Hydrothermal Variation of Aniline Concentration
...Show More Authors

Polyaniline nanofibers (PAni-NFs) have been synthesized under various concentrations (0.12, 0.16, and 0.2 g/l) of aniline and different times (2h and 3 h) by hydrothermal method at 90°C. Was conducted with the use of X-ray diffraction (XRD), Fourier Transform Infrared spectra (FTIR), Ultraviolet-Visible (UV-VIS) absorption spectra, Thermogravimetric Analysis (TGA), and Field Emission-Scanning Electron Microscopy (FE-SEM). The X-ray diffraction patterns revealed the amorphous nature of all the produced samples. FE-SEM demonstrated that Polyaniline has a nanofiber-like structure. The observed typical peaks of PAni were (1580, 1300-1240, and 821 cm-1 ), analyzed by the chemical bonding of the formed PAni through FTIR spectroscopy. Also, tests

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Motivations of Volunteers in Jordan: An Exploratory Study Based on a Sample of University Students within the Context of their Social Relations
...Show More Authors

Volunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these fun

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 29 2022
Journal Name
World Journal Of Clinical Infectious Diseases
Five-year retrospective hospital-based study on epidemiological data regarding human leishmaniasis in West Kordofan state, Sudan
...Show More Authors

View Publication
Crossref (2)
Crossref