Preferred Language
Articles
/
lhdMfJIBVTCNdQwC9LH4
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Apr 07 2025
Journal Name
Structures Congress 2025
Encased Pultruded I-GFRP Beam under Impact Loading
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Plant Interactions
Photosynthetic and biochemical characterization of in vitro-derived African violet (<i>Saintpaulia ionantha</i>H. Wendl) plants to ex vitro conditions
...Show More Authors

View Publication
Scopus (19)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Food And Nutrition Sciences
Optimization of Culture Conditions to Produce Phytase from &amp;lt;i&amp;gt;Aspergillus tubingensis SKA&amp;lt;/i&amp;gt;
...Show More Authors

The effects of nutrients and physical conditions on phytase production were investigated with a recently isolated strain of Aspergillus tubingensis SKA under solid state fermentation on wheat bran. The nutrient factors investigated included carbon source, nitrogen source, phosphate source and concentration, metal ions (salts) and the physical parameters investigated included inoculum size, pH, temperature and fermentation duration. Our investigations revealed that optimal productivity of phytase was achieved using wheat bran supplemented with: 1.5% glucose. 0.5% (NH4)2SO4, 0.1% sodium phytate. Additionally, optimal physical conditions were 1 × 105 spore/g substrate, initial pH of 5.0, temperature of fermentation 30˚C and fermentation dura

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Canadian Journal Of Physics
Influence of the variation in the Hubbard parameter (<i>U</i>) on activation energies of CeO<sub>2</sub>-catalysed reactions
...Show More Authors

Accurate description of thermodynamic, structural, and electronic properties for bulk and surfaces of ceria (CeO2) necessitates the inclusion of the Hubbard parameter (U) in the density functional theory (DFT) calculations to precisely account for the strongly correlated 4f electrons. Such treatment is a daunting task when attempting to draw a potential energy surface for CeO2-catalyzed reaction. This is due to the inconsistent change in thermo-kinetics parameters of the reaction in reference to the variation in the U values. As an illustrative example, we investigate herein the discrepancy in activation and reaction energies for steps underlying the partial and full hydrogenation of acetyl

... Show More
View Publication
Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Apr 24 2018
Journal Name
International Journal Of Engineering Technologies And Management Research
MODELING CITY PULSATION VIA MOBILE DATA
...Show More Authors

In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for

... Show More
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Data Analytics and Blockchain: A Review
...Show More Authors

Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (19)
Crossref (14)
Scopus Crossref