This paper presents an enhancement technique for tracking and regulating the blood glucose level for diabetic patients using an intelligent auto-tuning Proportional-Integral-Derivative PID controller. The proposed controller aims to generate the best insulin control action responsible for regulating the blood glucose level precisely, accurately, and quickly. The tuning control algorithm used the Dolphin Echolocation Optimization (DEO) algorithm for obtaining the near-optimal PID controller parameters with a proposed time domain specification performance index. The MATLAB simulation results for three different patients showed that the effectiveness and the robustness of the proposed control algorithm in terms of fast generating insulin control action and tracking the dynamics behavior of the blood glucose level of the diabetic patients through minimizing overshoot, rise time and settling time in the transient state as well as the steady-state blood glucose level error is reduced approximately to zero and keep it in the desired glucose level, especially when we added a meal as disturbance effect.
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreThe banking industry, as a result of the great challenges it faced, required continuous development of the principles of management, control and mechanisms used. The Basel Committee on Banking Supervision has played a leading role in legalizing many of these developments and has been able to contribute significantly to establishing a common framework for banking supervision, The central role in the various countries of the world is based on coordination between the various regulatory authorities and thinking about finding mechanisms to confront the risks faced by banks, recognizing the importance of the banking sector in the stability of domestic and international banking systems or the danger of this sector in the emergence of F
... Show MoreInthis study new derivatives of Schiff bases and nucleoside analogues have been synthesized from the starting material D-glucose after a series of reactions. Derivative 1 was prepared from D-glucose then react with P-bromoacetophenone gave derivative 2 was reacted with dimethyl sulfoxide and acetic anhydride for dehydration a molecule of water gave 3. The spiro ring was prepared at 3-position from the reaction of 3 derivative with 1-phenyl-2–thioureagave 4. The protection group at 1 position was removed by using acetic acid fllowed by periodate oxidation to obtain 6. Reaction of 6 with hydrazide derivative at once and dtriazole derivative at another gave 8 and 9 respectively. Compound 6 was reduced to gave derivative 7. The 1-hydroxylgrou
... Show More