Preferred Language
Articles
/
7xa0CYoBVTCNdQwChI-0
Deployment of multiservice code in FSO-based hybrid subcarrier system
...Show More Authors
Abstract<p>This research aims to investigate and improve multi-user free space optic systems (FSO) based on a hybrid subcarrier multiplexing spectral amplitude coding-optical code division multiple access (SCM-SAC-OCDMA) technique using MS code with a direct decoding technique. The performance is observed under different weather conditions including clear, rain, and haze conditions. The investigation includes analyzing the proposed system mathematically using MATLAB and OptiSystem software. The simulation is carried out using a laser diode. Furthermore, the performances of the MS code in terms of angles of bit rate, beam divergence and noise are evaluated based on bit error rate (BER), received power, and transmission distance. The performance of the MS code-based system was subsequently compared with Khazani Syed code (KS), multi-diagonal (MD), and modified quadratic congruence code (MQC) codes under different weather conditions at a bit rate of 1 Gb/s and BER threshold of 10<sup>−9</sup>. Heavy rain indicates the worst performance in terms of transmission distance of 0.9 km. Nevertheless, the system designed using the MS code outperformed the KS, MD and MQC systems as it is capable of supporting up to 6.3, 0.8, 0.9, and 1.5 km, respectively, under clear weather. In conclusion, this study provides a means of improving FSO communications that suits tropical and Malaysia weather conditions.</p>
Scopus Crossref
View Publication
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Remote Patient Healthcare surveillance system based real-time vital signs
...Show More Authors

Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of  ECG signal such as Q,R,S, and T waves.  The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Private Backend Server Software-Based Telehealthcare Tracking and Monitoring System
...Show More Authors

In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso

... Show More
View Publication
Scopus (32)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of costs by using the tool of the quality function deployment: / applied research in the State Company for Textile and Leather Industries
...Show More Authors

The research aims to apply one of the techniques of management accounting, which is the technique of the quality function deployment on the men's leather shoe product Model (79043) in the General Company for Textile and Leather Industries by determining the basic requirements of the customer and then designing the characteristics and specifications of the product according to the preferences of the customer in order to respond to the customer's voice in agreement With the characteristics and technical characteristics of the product, taking into account the products of the competing companies to achieve the maximum customer satisfaction, the highest quality and the lowest costs. Hence, the importance of research has emerged, which indicat

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
On Bayesian Estimation of System Reliability in Stress – Strength Model Based on Generalized Inverse Rayleigh Distribution
...Show More Authors
Abstract<p>The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.</p>
View Publication
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 14 2026
Journal Name
Journal Of Engineering
Design and Implementation of ICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

View Publication
Publication Date
Mon Nov 01 2010
Journal Name
Journal Of Systems And Software
Development of Java based RFID application programmable interface for heterogeneous RFID system
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Fme Transactions
Development of automated liquid filling system based on the interactive design approach
...Show More Authors

The automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve

... Show More
View Publication
Scopus (18)
Crossref (16)
Scopus Clarivate Crossref