Engineering
Browse by
Collections in this community
Recent Submissions
-
Optimising grey iron powder compacts
(Taylor & Francis, 2009)The grey iron microstructure Fe–2C–2Si powder based compact is tailored by different kinds of in situ and post sintering processing. This has been achieved by combining thermodynamic and kinetics modelling of microstructure ... -
Solidification time effects on surface and subsurface aluminum casting defects
(National Metallurgical Laboratory, 2011)The effects of aluminum casting solidification time on the intensity and distribution of surface and subsurface defects were reported nine samples of Al castings were used with different solidification time ranged from 5 ... -
The Effect of Carbon and Silicon Alloying Additions on the Morphology of Pores and Tensile Characteristics of Sintered Steels
(Springer Link, 2019)The influence of C and Si on pore morphology and tensile behavior of Fe–C–P–Si was investigated. The contribution of C on the morphology of pores was explained using thermodynamic formulation by incorporating the surface ... -
A Revision for the Different Reuses of Polyethylene Terephthalate (PET) Water Bottles
(ProQuest, 2022-04)According to studies on global plastic manufacturing and the resulting pollution, plastic wastes have been identified as a serious environmental concern. The impact of plastic garbage on marine species, humans, and the ... -
Optimization of fatigue life of hollow rollers under pure normal loading
(ASME Digital Collection, 2006)Fatigue life investigations have been made for hollow rollers in pure normal loading. Different hollowness percentages between 20% and 80% have been tested to find the optimum percentage hollowness that gives the longest ... -
Predicting Loading–Unloading Pile Static Load Test Curves by Using Artificial Neural Networks
(Springer International Publishing, 2019-06)In the United Arab Emirates, Continuous Flight Auger piles are the most widely used type of deep foundation. To test the pile behavior, the static load test is routinely conducted in the field by increasing the dead load ... -
NON DESTRUCTIVE TESTING FOR Ni-Ti SAMPLES PREPARED BY DIFFERENT TECHNIQES
(IJASCE, 2013-10)Long series of searches were applied to emphasize Ni-Ti alloy composition harmony within human body. Ni-Ti alloy chemical and mechanical testing results paved for a revolution in the field of medical implants. Despite the ... -
Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
(Hindawi, 2022)IoT emergence has given rise to a new digital experience of payment transactions where physical objects like refrigerators, cars, and wearables will make payments. These physical objects will be storing the cardholder ... -
Multilayer IPSec (ML-IPSec) Design for Transport and Application Layer Satellite Performance Enhancing Proxies
(American Institute of Aeronautics and Astronautics, 2010)Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TCP/IP applications. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and ... -
A new dynamic multilayer IPSec protocol
(Springer, 2012-03)Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TCP/IP applications. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and ... -
A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design
(IEEE, 2020-08)Key Management in Delay Tolerant Networks (DTN) still remains an unsolved complex problem. Due to peculiar characteristics of DTN, important challenges that make it difficult to design key management architecture are: 1) ... -
Interworking between Satellite Performance Enhancing Proxies and Multilayer IPSec (ML-IPSec)
(2010)Abstract Satellite networks use intermediate devices (Performance Enhancing Proxies, PEPs) for better performance of the TCP/IP data and web browsing applications. PEPs can be classified into transport (such as TCP) and ... -
A Key Transport Protocol for Advance Metering Infrastructure (AMI) Based on Public Key Cryptography
(IEEE, 2020)Advance metering infrastructure (AMI) is an important element of the Smart Grid as it is expectable to simplify the transport of meter reading and control information from meters to the utility provider. Smart meters are ... -
An Expert System for Calculating Zakat in Islam
(IEEE, 2018-12)Islam makes it mandatory for all rich Muslims to pay 2.5% of their annual savings to the needy people in the form of Zakat. It is straightforward to calculate Zakat if one's savings are in the form of cash only. However, ... -
Redesigning of IPSec for interworking with satellite Performance Enhancing Proxies
(IEEE, 2011)Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TCP/IP applications. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and ... -
Detection and mitigation of Denial of Service (DoS) attacks using performance aware Software Defined Networking (SDN)
(IEEE, 2017)Software Defined Networking (SDN) stands to transmute our modern networks and data centers, opening them up into highly agile frameworks that can be reconfigured depending on the requirement. Denial of Service (DoS) attacks ... -
Security in vehicular ad hoc networks: challenges and countermeasures
(Hindawi, 2021-07)Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport ... -
Wormhole attack detection in routing protocol for low power lossy networks
(IEEE, 2018-03)The next wave for internet is called Internet of things. With billions of things attached to internet through IP forms the complex heterogeneous network. Previously devices weren't connected to internet they don't pose a ... -
Intelligent Sampling for Inspecting Milled Flat Plates
(2013-01)Realizing the nature of the manufacturing process used to make a part can help determine the locations and the optimum number of inspection points. Face and End milling processes are used in this work to produce plates and ... -
Security in vehicular ad hoc networks: challenges and countermeasures
(Hindawi, 2021-07)Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport ... -
Public‐key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks
(The Institution of Engineering and Technology, 2017-01)Public-key infrastructure (PKI) is based on public-key certificates and is the most widely used mechanism for trust and key management. However, standard PKI validation and revocation mechanisms are considered major reasons ... -
An Efficient, Scalable Key Transport Scheme (ESKTS) for Delay/Disruption Tolerant Networks
(Springer, 2014-10)In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In ... -
The Role of Phosphorus in Pore Rounding of Sintered Steels
(Taylor & Francis, 2018)The contribution of the surface active element Phosphorus (P) in pore rounding in sintered steels is absent in popular sintering models. Instead, these mathematical models analyze the rate of mass transport, which, according ... -
Fatigue life prediction of optimum hollowness of hollow cylindrical rollers in pure rolling contact
(ASME Digital Collection, 2006-01)Fatigue life investigations have been made for cylindrical hollow rollers in pure rolling contact. In addition to normal loading, the rollers have been subjected to tangential loading of 1/3rd the normal load value. ... -
Enabling bidirectional traffic mobility for ITS simulation in smart city environments
(North-Holland, 2019-03)Visualization and simulation of Intelligent Transportation Systems (ITS) for future city models is a key research area to bring better traffic safety and efficiency solutions in smart cities. However, the cost of deploying ... -
Secure identification, traceability and real-time tracking of agricultural food supply during transportation using internet of things
(IEEE, 2021-04)Food supply chain process comprises crops collection, processing of food, shipping & delivery to the whole seller in the market. Harvested foods decompose from the moment they are harvested due to attacks from enzymes, ... -
A survey on blockchain technology: evolution, architecture and security
(IEEE, 2021-04)Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties. Blockchain gained considerable attention due to its very first ... -
Creation of Different Cell Layouts Using Part Assignment Process for Manufacturing a Traction Drive Speed Reducer
(AURAK, 2017-09): Cellular manufacturing is an advanced technique to improve the manufacturing efficiency. This paper is comparing the efficiency of three different layouts for manufacturing self-actuating traction drive speed reducer ... -
Heterogeneous Femur Model Reconstruction for Improved FEA Analysis
(ResearchGate, 2012)The objective of this research is to reconstruct the femur bone as a heterogeneous model and to examine the mechanical response of the proximal femur bone under mechanical loading using finite element analysis. Contrary ... -
Security analysis for Delay/Disruption Tolerant satellite and sensor networks
(Wiley Periodicals, 2009-09)In the last few years, Delay/Disruption Tolerant Networking has grown to a healthy research topic because of its suitability for challenged environments characterized by heterogeneity, long delay paths and unpredictable ... -
Smart city big data analytics: An advanced review
(Wiley Periodicals, 2019-10)With the increasing role of ICT in enabling and supporting smart cities, the demand for big data analytics solutions is increasing. Various artificial intelligence, data mining, machine learning and statistical analysis-based ... -
A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks
(MDPI, 2022-01)Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of illegitimate events. However, accessing this publicly available information ... -
A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks
(IEEE, 2022-04)The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality ... -
Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps
(Springer, 2020)A true random number generator (TRNG) is proposed, harvesting entropy from multicore CPUs to generate non-deterministic outputs. The entropy source is the unpredictable sequence of thread access when parallel threads attempt ... -
Ensemble deep transfer learning model for Arabic (Indian) handwritten digit recognition
(Springer London, 2022-01)Recognising handwritten digits or characters is a challenging task due to noisy data that results from different writing styles. Numerous applications essentially motivate to build an effective recognising model for such ... -
A group theoretic construction of large number of AES-like substitution-boxes
(Springer US, 2022-02)Modern block ciphers have been used to design security schemes to fulfil the security requirements in different areas of applications. The substitution boxes, significant components, used in block ciphers must have strong ... -
Surface and Subsurface Defects Investigation of Ni-Ti Samples Processed by Different Fabrication Methods
(ResearchGate, 2015-12)The use of Ni-Ti alloy in medical applications gave a great importance for the right composition of this alloy and the method of fabricating this alloy parts. Medical implants should be tested to assure that there are no ... -
Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model
(The ACM Digital Library, 2019-02)The chaotic map has attracted more researchers in chaotic cryptography domain. That is because to large similarity among their characteristics such as unpredictability and sensitivity to an initial condition. Moreover, ... -
NIML: non-intrusive machine learning-based speech quality prediction on VoIP networks
(The Institution of Engineering and Technology, 2019-10)Voice over Internet Protocol (VoIP) networks have recently emerged as a promising telecommunication medium for transmitting voice signal. One of the essential aspects that interests researchers is how to estimate the quality ... -
The effect of rolling direction on the weld structure and mechanical properties of DP 1000 steel
(Taylor & Francis, 2018-01)Since gas metal arc welding (GMAW) is a common procedure to join different sheets in the industry, the welding direction dependence on the rolling direction was investigated for a welded DP1000, a cold-rolled dual phase ... -
Using SERVIQUAL to investigate the quality of provided wireless communication services in UAE
(Emerald Publishing Limited, 2020-02)The purpose of this paper is to investigate the service quality of wireless telecommunication services in the UAE.This study uses the five dimensions of SERVQUAL instrumentation (reliability, assurance, tangibility, empathy ... -
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
(IEEE Access, 2020-07)In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward ... -
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities
(Springer London, 2021-07)Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are procedures required to get the most out of data and, consequently, ... -
The internet of things security: A survey encompassing unexplored areas and new insights
(Elsevier, 2022-01)The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in IoT and its associated components. While the rapid evolution ... -
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
(IEEE Access, 2021)Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims. We address this problem by proposing a hash function based on a ... -
A review on the security of the internet of things: challenges and solutions
(Springer US, 2021-09)The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. ... -
Blockchain Consensus: An Overview of Alternative Protocols
(MDPI, 2021)Blockchain networks are based on cryptographic notions that include asymmetric-key encryption, hash functions and consensus protocols. Despite their popularity, mainstream protocols, such as Proof of Work or Proof of Stake ... -
Deterministic chaotic finite-state automata
(Springer Netherlands, 2019-06)Chaotic dynamics have been widely applied in various domains such as cryptography, watermarking and optimization algorithms. Enhancing chaotic complexity of simple one-dimensional (1D) chaotic maps has been a popular topic ... -
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
(Springer Netherlands, 2020)Chaotic maps have various properties that mirror the security requirements of cryptographic algorithms. As such, researchers have utilized them in the design of algorithms such as hash functions. Although there exist a ... -
Enhancing unimodal digital chaotic maps through hybridisation
(Springer Netherlands, 2019-04)Despite sharing many similar properties with cryptography, digitizing chaotic maps for the purpose of developing chaos-based cryptosystems leads to dynamical degradation, causing many security issues. This paper introduces ...