Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 58 )

2018 ( 353 )

2017 ( 366 )

2016 ( 539 )

Custom range...

Search Results: 1 - 10 of 22936 matches for " Mohammed Muzammil Al-Ameen Rizath "
All listed articles are free for downloading (OA Articles)
Page 1 /22936
Display every page Item
Obstetric and Perinatal Outcomes of Teenage Pregnancies: A Cross-Sectional Study  [PDF]
Ahamed Lebbe Failur Rahman, Athambawa Mohamed Razmy, Mohammed Muzammil Al-Ameen Rizath
Open Access Library Journal (OALib Journal) , 2017, DOI: 10.4236/oalib.1103839
The teenage pregnancy is still preferred in different part of the world against the advice of the medical practitioners. This study aimed to describe the obstetric and perinatal outcomes of the teenage mothers and to compare these with outcomes of the adult mothers. For this purpose, 762 teenage and 756 adult mothers were followed in the eastern region of Sri Lanka for 21 months. This study found that the premature birth was the only negative perinatal outcome directly related to teenage mothers. All other negative pregnancy outcomes associated with teenage pregnancy were caused by the factors which are prevailing in higher percentages among teenagers such as low BMI and less number of parity. No differences in occurrence of small to date (IUGR), perinatal complications and lower segment caesarean section (LSCS) were observed between teenage and adult mothers. Finally, this study concludes the teenage pregnancy can be accepted for the mothers with higher BMI if the risk for premature birth is controlled.
Prevalence of Diabetic Retinopathy among Diabetics: A Hospital Based Study at Ashraff Memorial Hospital, Kalmunai  [PDF]
Mohammed Muzammil Al-Ameen Rizath, Jayasiri Deshapriya Dias, Hameem Mohammed Ismy Mohammed, Mohamed Meerasahib Maroozathul Ilahi, Athambawa Mohamed Razmy
Open Access Library Journal (OALib Journal) , 2015, DOI: 10.4236/oalib.1102230
Abstract: Diabetic Retinopathy and diabetics are two highly associated severe diseases in human. This study assesses the risk of getting Diabetic Retinopathy among the Diabetic patients in the Kalmunai region. In this hospital based cross sectional study, all the diabetic patients who were attending to the diabetic clinic of the Ashraff memorial hospital from January 2014 to December 2014 were screened for Diabetic Retinopathy and their demographic details were recorded. Obtained information was analyzed for estimating the risk for Diabetic Retinopathy among the diabetic patients and it was estimated as 13.16%. No difference in risk of getting Diabetic Retinopathy was observed among different age group, educated level and gender. Risk of getting Diabetic Retinopathy increases with the increase of the duration suffered by the diabetic. The relative risk of getting Diabetic Retinopathy for patients with diabetic for more 12 years is 3.55 times greater compared to the fresh diabetic patients.
An Intelligent Fire Alert System using Wireless Mobile Communication
Mahdi Nasrullah Al-Ameen
Computer Science , 2013,
Abstract: The system has come to light through the way of inspiration to develop a compact system, based on the fundamental ideas of safety, security and control. Once this system is installed to operation specifying temperature and smoke threshold, in case of any emergency situation due to increasing temperature and/or smoke at place surpassing the threshold, the system immediately sends automatic alert-notifications to the users, concerned with the situations. The user gets total control over the system through mobile SMS, even from the distant location, that to change the threshold, turn on/off the feature of sending 'alert notification' and also to reset the system after the emergency situation is overcome. Before executing any command (through SMS) from the user, the system asks for the preset password to verify an authorized user. The security issues have been considered with utter attention in this system to ensure its applicability in industries and business organizations, where security is an important concern. Hence, the fundamental ideas of safety, security and control have been entirely ensured through the system, which have definitely worked as the gear moving factor to look for a new dimension of an 'Intelligent Fire Alert System'.
A Comprehensive Study of the GeoPass User Authentication Scheme
Mahdi Nasrullah Al-Ameen,Matthew Wright
Computer Science , 2014,
Abstract: Before deploying a new user authentication scheme, it is critical to subject the scheme to comprehensive study. Few works, however, have undertaken such a study. Recently, Thorpe et al. proposed GeoPass, the most promising of a class of user authentication schemes based on geographic locations in online maps. Their study showed very high memorability (97%) and satisfactory resilience against online guessing, which means that GeoPass has compelling features for real-world use. No comprehensive study, however, has been conducted for GeoPass or any other location-based password scheme. In this paper, we present a systematic approach for the detailed evaluation of a password system, which we implement to study GeoPass. We conducted three separate studies to evaluate the suitability of GeoPass for widespread use. First, we performed a field study over two months, in which users in a real-world setting remembered their location-passwords 96% of the time and showed improvement with more login sessions. Second, we conducted a study to test how users would fare with multiple location-passwords and found that users remembered their location-passwords in less than 70% of login sessions, with 40% of login failures due to interference effects. Third, we conducted a study to examine the resilience of GeoPass against shoulder surfing. Our participants played the role of attackers and had an overall success rate of 48%. Based on our results, we suggest suitable applications of GeoPass in its current state and identify aspects of GeoPass that must be improved before widespread deployment could be considered.
iPersea : The Improved Persea with Sybil Detection Mechanism
Mahdi Nasrullah Al-Ameen,Matthew Wright
Computer Science , 2014,
Abstract: P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of identities and uses them to control a substantial fraction of the system. Persea is the most recent approach towards designing a social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P systems based on social networks, Persea does not rely on two key assumptions: (i) that the social network is fast mixing, and (ii) that there is a small ratio of attack edges to honest peers. Both assumptions have been shown to be unreliable in real social networks. The hierarchical distribution of node IDs in Persea confines a large attacker botnet to a considerably smaller region of the ID space than in a normal P2P system and its replication mechanism lets a peer to retrieve the desired results even if a given region is occupied by attackers. However, Persea system suffers from certain limitations, since it cannot handle the scenario, where the malicious target returns an incorrect result instead of just ignoring the lookup request. In this paper, we address this major limitation of Persea through a Sybil detection mechanism built on top of Persea system, which accommodates inspection lookup, a specially designed lookup scheme to detect the Sybil nodes based on their responses to the lookup query. We design a scheme to filter those detected Sybils to ensure the participation of honest nodes on the lookup path during regular DHT lookup. Since the malicious nodes are opt-out from the lookup path in our system, they cannot return any incorrect result during regular lookup. We evaluate our system in simulations with social network datasets and the results show that catster, the largest network in our simulation with 149700 nodes and 5449275 edges, gains 100% lookup success rate, even when the number of attack edges is equal to the number of benign peers in the network.
Volterra-Fredholm Integral Equation with Carleman Kernel in Position and Time
A.K. Khamis,M.A. Al-Ameen
Journal of Engineering and Applied Sciences , 2012,
Abstract: In this study, we introduce an efficient method to find and discuss an approximate solution of the integral equation of type Volterra-Fredholm in the space L2[a, b] x [0, T]. The kernel of Fredholm is considered in position and represented in a logarithmic form, while the kernel of Volterra is taken in time as a continuous function. Using a numerical method we obtain a linear system of Fredholm integral equations is position which will be solved.
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues
Mahdi Nasrullah Al-Ameen,Matthew Wright,Shannon Scielzo
Computer Science , 2015,
Abstract: Given the choice, users produce passwords reflecting common strategies and patterns that ease recall but offer uncertain and often weak security. System-assigned passwords provide measurable security but suffer from poor memorability. To address this usability-security tension, we argue that systems should assign random passwords but also help with memorization and recall. We investigate the feasibility of this approach with CuedR, a novel cued-recognition authentication scheme that provides users with multiple cues (visual, verbal, and spatial) and lets them choose the cues that best fit their learning process for later recognition of system-assigned keywords. In our lab study, all 37 of our participants could log in within three attempts one week after registration (mean login time: 38.0 seconds). A pilot study on using multiple CuedR passwords also showed 100% recall within three attempts. Based on our results, we suggest appropriate applications for CuedR, such as financial and e-commerce accounts.
Design of a High Accurate Aircraft Ground-based Landing System
Ahmad Abbas Al-Ameen Salih1,a and Amzari Zhahir
International Journal of Engineering Trends and Technology , 2013,
Abstract: The rapid increase in aviation industry requires parallel effective plans, programs and designs of systems and facilities nationwide to fulfill the increasing needs for safe air transportation. Aircraft landing remains a problem for a long time all over the world. Systems that aircraft rely on in landing are unreliable to perform a precise guidance due to many limitations such as inaccuracy, unreliability and dependency. In low visibility conditions, when pilots are unable to see the runway, the aircrafts are diverted to another airport. However, low visibility can also affect all airports in the vicinity, forcing aircrafts to land in low visibility conditions depending on Instrument Flight Rules (IFR). Aircraft approach and landing are the most hazardous portions of flight; accidents records indicate that approximately 50 percent of the accidents occur during aircraft landing. Aircraft landing Category III C is not yet in operation anywhere in the world. It requires landing with no visibility or runway visual range.Currently, Global Positioning System (GPS) is the main navigation system used all over the world for aircraft navigation, approach and landing. However, in aircraft approach and landing phase, the accuracy of GPS is not sufficient to perform a perfect landing due to the possibility of aircraft to be drifted out of the runway. The accuracy of GPS could be improved to 3 meter by sending correction. Improved accuracy has not been able to meet ICAO standards for aircraft automatic landing. In this paper, aircraft landing systems characteristics, performance and accuracies have been studied and compared for the purpose of assessinglimitations and drawbacks. An aircraft landing system with improved performance is proposed to meet ICAO standards for all-weather aircraft landing required and recommended practices with high accuracy to perform full automatic landing for aircrafts
Some biochemical effects of Aloe vera leaves on tissues in normal mice
M. G. Matti,S. A. Al-Ameen,S. H. Rashed
Iraqi Journal of Veterinary Sciences , 2010,
Abstract: This research was carried out mainly to investigate the effects of the aqueous extract and proteinous fractions of Aloe veraleaves on cholesterol, acetycholinesterase in brain, glycogen, glutathione in liver and malonaldehyde levels in heart in normalmale albino mice. The antioxidant properties and inhibition of acetylcholine-sterase in tissue were detected. Intraperitonealadministration of Aloe vera extract in concentration of 400 mg/kg significantly decreased the levels of AchE in brain by (-88.27%) and glutathione content in liver by (-35.48%), and increased the levels of glycogen in liver and malonaldehyde inheart by (22.60%, 85.50%) respectively. At a concentration of 300 mg/kg Aloe vera extract significantly increased the level ofcholesterol in brain by (24.39%). These results clearly show the antioxidant property of the extract of Aloe vera leaves.
ReDS: A Framework for Reputation-Enhanced DHTs
Ruj Akavipat,Mahdi N. Al-Ameen,Apu Kapadia,Zahid Rahman,Roman Schlegel,Matthew Wright
Computer Science , 2012, DOI: 10.1109/TPDS.2013.231
Abstract: Distributed Hash Tables (DHTs) such as Chord and Kademlia offer an efficient solution for locating resources in peer-to-peer networks. Unfortunately, malicious nodes along a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using a combination of redundancy and diversity in the paths taken by redundant lookup queries. Much greater assurance can be provided, however. We describe Reputation for Directory Services (ReDS), a framework for enhancing lookups in redundant DHTs by tracking how well other nodes service lookup requests. We describe how the ReDS technique can be applied to virtually any redundant DHT including Halo and Kad. We also study the collaborative identification and removal of bad lookup paths in a way that does not rely on the sharing of reputation scores --- we show that such sharing is vulnerable to attacks that make it unsuitable for most applications of ReDS. Through extensive simulations we demonstrate that ReDS improves lookup success rates for Halo and Kad by 80% or more over a wide range of conditions, even against strategic attackers attempting to game their reputation scores and in the presence of node churn.
Page 1 /22936
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.