http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
AL-Omari, Ahmad H.,Otair, Mohammed A.,Alzwahreh, Bayan N. International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.12
Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.
Reproducibility of Gallbladder Ejection Fraction Measured by Fatty Meal Cholescintigraphy
Al-Muqbel, Kusai M.,Bani Hani, Mohammed N.,Elheis, Mwaffaq A.,Al-Omari, Ma'moon H. The Korea Society of Nuclear Medicine 2010 핵의학 분자영상 Vol.44 No.4
Purpose There are conflicting data in the literature regarding the reproducibility of the gallbladder ejection fraction (GBEF) measured by fatty meal cholescintigraphy (CS). We aimed to test the reproducibility of GBEF measured by fatty meal CS. Methods Thirty-five subjects (25 healthy volunteers and 10 patients with chronic abdominal pain) underwent fatty meal CS twice in order to measure GBEF1 and GBEF2. The healthy volunteers underwent a repeat scan within 1-13 months from the first scan. The patients underwent a repeat scan within 1-4 years from the first scan and were not found to have chronic acalculous cholecystitis (CAC). Our standard fatty meal was composed of a 60-g Snickers chocolate bar and 200 ml full-fat yogurt. Results The mean ${\pm}$ SD values for GBEF1 and GBEF2 were $52{\pm}17%$ and $52{\pm}16%$, respectively. There was a direct linear correlation between the values of GBEF1 and GBEF2 for the subjects, with a correlation coefficient of 0.509 (p=0.002). Subgroup data analysis of the volunteer group showed that there was significant linear correlation between volunteer values of GBEF1 and GBEF2, with a correlation coefficient of 0.473 (p=0.017). Subgroup data analysis of the non-CAC patient group showed no significant correlation between patient values of GBEF1 and GBEF2, likely due to limited sample size. Conclusions This study showed that fatty meal CS is a reliable test in gallbladder motility evaluation and that GBEF measured by fatty meal CS is reproducible.
WEAK AND STRONG FORMS OF sT-CONTINUOUS FUNCTIONS
AL-OMARI, AHMAD,NOIRI, TAKASHI,NOORANI, MOHD. SALMI MD. Korean Mathematical Society 2015 대한수학회논문집 Vol.30 No.4
The aim of this paper is to present some properties of sT-continuous functions. Moreover, we obtain a characterization and preserving theorems of semi-compact, S-closed and s-closed spaces.
ON θ-($\mathcal{G}$, $\mathcal{H}$)-CONTINUOUS FUNCTIONS IN GRILL TOPOLOGICAL SPACES
Al-Omari, Ahmad Korean Mathematical Society 2013 대한수학회논문집 Vol.28 No.2
In this paper, we investigate some properties of ${\theta}$-($\mathcal{G}$, $\mathcal{H}$)-continuous functions in a grill topological spaces. Moreover, the relationships with other related functions are investigated.
ESTIMATION OF A MODIFIED INTEGRAL ASSOCIATED WITH A SPECIAL FUNCTION KERNEL OF FOX'S H-FUNCTION TYPE
Al-Omari, Shrideh Khalaf Qasem Korean Mathematical Society 2020 대한수학회논문집 Vol.35 No.1
In this article, we discuss classes of generalized functions for certain modified integral operator of Bessel-type involving Fox's H-function kernel. We employ a known differentiation formula of Fox's H-function to obtain the definition and properties of the distributional modified Bessel-type integral. Further, we derive a smoothness theorem for its kernel in a complete countably multi-normed space. On the other hand, using an appropriate class of convolution products, we derive axioms and establish spaces of modified Boehmians which are generalized distributions. On the defined spaces, we introduce addition, convolution, differentiation and scalar multiplication and further properties of the extended integral.
Al-Omari, Shrideh Khalaf Korean Mathematical Society 2018 대한수학회논문집 Vol.33 No.2
In this paper, we investigate a modified $G^2$ transform on a class of Boehmians. We prove the axioms which are necessary for establishing the $G^2$ class of Boehmians. Addition, scalar multiplication, convolution, differentiation and convergence in the derived spaces have been defined. The extended $G^2$ transform of a Boehmian is given as a one-to-one onto mapping that is continuous with respect to certain convergence in the defined spaces. The inverse problem is also discussed.
A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures
Omari, Ahmed H. Al,Alsariera, Yazan A.,Alhadawi, Hussam S.,Albawaleez, Mahmoud A.,Alkhliwi, Sultan S. International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.2
Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.
Behavior of piled rafts overlying a tunnel in sandy soil
Al-Omari, Raid R.,Al-Azzawi, Adel A.,AlAbbas, Kadhim A. Techno-Press 2016 Geomechanics & engineering Vol.10 No.5
The present research presents experimental and finite element studies to investigate the behavior of piled raft-tunnel system in a sandy soil. In the experimental work, a small scale model was tested in a sand box with load applied vertically to the raft through a hydraulic jack. Five configurations of piles were tested in the laboratory. The effects of pile length (L), number of piles in the group and the clearance distance between pile tip and top of tunnel surface (H) on the load carrying capacity of the piled raft-tunnel system are investigated. The load sharing percent between piles and rafts are included in the load-settlement presentation. The experimental work on piled raft-tunnel system yielded that all piles in the group carry the same fraction of load. The load carrying capacity of the piled raft-tunnel model was increased with increasing (L) for variable (H) distances and decreased with increasing (H) for constant pile lengths. The total load carrying capacity of the piled raft-tunnel model decreases with decreasing number of piles in the group. The total load carrying capacity of the piles relative to the total applied load (piles share) increases with increasing (L) and the number of piles in the group. The increase in (L/H) ratio for variable (H) distance and number of piles leads to an increase in piles share. ANSYS finite element program is used to model and analyze the piled raft-tunnel system. A three dimensional analysis with elastoplastic soil model is carried out. The obtained results revealed that the finite element method and the experimental modeling are rationally agreed.
ON -MODIFICATIONS OF GENERALIZED TOPOLOGIES VIA HEREDITARY CLASSES
Al-Omari, Ahmad,Modak, Shyamapada,Noiri, Takashi Korean Mathematical Society 2016 대한수학회논문집 Vol.31 No.4
Let (X, ${\mu}$) be a generalized topological space (GTS) and $\mathcal{H}$ be a hereditary class on X due to $Cs{\acute{a}}sz{\acute{a}}r$ [8]. In this paper, we define an operator $()^{\circ}:\mathcal{P}(X){\rightarrow}\mathcal{P}(X)$. By setting $c^{\circ}(A)=A{\cup}A^{\circ}$ for every subset A of X, we define the family ${\mu}^{\circ}=\{M{\subseteq}X:X-M=c^{\circ}(X-M)\}$ and show that ${\mu}^{\circ}$ is a GT on X such that ${\mu}({\theta}){\subseteq}{\mu}^{\circ}{\subseteq}{\mu}^*$, where ${\mu}^*$ is a GT in [8]. Moreover, we define and investigate ${\mu}^{\circ}$-codense and strongly ${\mu}^{\circ}$-codense hereditary classes.
AL-OMARI, J. F. M. 대한수학회 2007 Kyungpook mathematical journal Vol.47 No.1
In this paper, we consider a delay differential equation model of two competing species with harvesting of the mature and immature members of each species. The time delay in the model represents the time from birth to maturity of that species, which appears in the adults recruitment terms. We study the dynamics of our model analytically and we present results on positivity and boundedness of the solution, conditions for the existence and globally asymptotically stable of equilibria, a threshold of harvesting, and the optimal harvesting of the mature populations of each species.