EEG Mouse:A Machine Learning-Based Brain Computer Interface
Authors : Mohammad H. Alomari, Ayman AbuBaker, Aiman Turani, Ali M. Baniyounes, Adnan Manasreh
Abstract : The main idea of the current work is to use a wireless Electroencephalography (EEG) headset as a remote control for the mouse cursor of a personal computer. The proposed system uses EEG signals as a communication link between brains and computers. Signal records obtained from the PhysioNet EEG dataset were analyzed using the Coif lets wavelets and many features were extracted using different amplitude estimators for the wavelet coefficients. The extracted features were inputted into machine learning algorithms to generate the decision rules required for our application. The suggested real time implementation of the system was tested and very good performance was achieved. This system could be helpful for disabled people as they can control computer applications via the imagination of fists and feet movements in addition to closing eyes for a short period of time.
Keywords : BCI; Data Mining; Machine Learning; SVMs; NNs; DWT; Feature Extraction
رابط البحث
Ensuring telecommunication network security through cryptology: a case of 4G and 5G LTE cellular network providers
Authors : Adnan Manasreh1 , Ahmed A. M. Sharadqh2 , Jawdat S. Alkasassbeh3 , Aws Al-Qaisi4
Abstract : This paper aims to present the details regarding telecommunication network security through cryptology protocols. The data was based on scientific data collection and the quantitative method was adopted. The questionnaire was developed and the primary respondents were approached who were working in 4 telecommunication networking companies namely Huawei, Ericsson, SK Telecom and Telefonica. The sample size of the research was 60 participants and the statistical analysis was used to analyze research. The finding shows that cryptology protocol such as SSH, SSL, Kerberos PGP and SET are implemented within the companies in order to secure network.
Keywords : KERBEROS ,PGP ,SSH , SSL
رابط البحث
An Overview of Solar Cooling Technologies Markets Development and its Managerial Aspects
Authors : Ali M Baniyounesa , Yazeed Yasin Ghadib,*, M.G. Rasulb , Mohammad H. Alomaric , and Adnan Manasreh
Abstract : Commercial buildings consume a considerable amount of fossil fuel that directly has negative impacts on the environment. In fact this leads to significant greenhouse gas emissions and the production of non-environmental friendly materials. Hence global warming is the most common dilemma facing world governments at the present time. Solar cooling technologies proved to be a successful alternative for conventional cooling systems especially in hot and sunny climates. The solar cooling technologies are able to reduce electricity demand since it relies on solar energy to produce cooling. There are many research articles that focus on the solar cooling technologies technical and engineering developments meanwhile there are limited research activities detailing its barriers, opportunity, architectural and managerial aspects. This research paper outlines the potential markets of solar cooling systems, as well as their architectural and managerial implications. The article also discusses, and suggests recommendations to overcome issues and barriers during solar cooling systems installation phase. In addition the article presents the solar cooing systems industry markets development and the potential of implementing the solar cooling technologies in livestock storage facilities, crops drying business, hospitals,
Keywords : Solar cooling, Conventional cooling, Market development, Potential Markets
رابط البحث
The Differential Transimpedance Amplifier Design based 0.18 µm CMOS Technology
Authors : Adnan Manasreh
Abstract : The transimpedance amplifier is recognized in a 0.18μm CMOS technology. The TIA applies a shunt-shunt feedback topology, differential TIA as it grasps a higher bandwidth rather than a conservative one. The TIA additionally has a variable gain to upsurge the bandwidth of the amplifier. The TIA has a concentrated gain of 70 dBΩ, bandwidth 3.1GHZ, bit rate 5Gb/s and input-referred current noise of 5 pA/√Hz. Eye jitter at bit rate 5Gb/sequal to 5ps (peak to peak)
Keywords : Preamplifier, Transimpedance amplifier , CMOS technology , Advanced design system
رابط البحث
Design, Optimization and Simulation of III-Nitride Power Heterostructure Field Effect Transistor
Authors : Adnan Manasreh
Abstract : : An enhanced design for a GaN/AlGaN HFET is proposed in this study, the proposed design is the multi-layered metal stack design of a HFET using the metals and thicknesses of Ti (250Å)-Al (750Å)-Ti (100Å)-Al (750Å)-Ti (100Å)-Au (250Å). This novel design has been proposed before and is an enhancement of the traditional Ti-Al-Ti-Au. The aim of the prosed design was to obtain better ohmic contact performance with the Ti-Al and multi-layering being the difference between the two. The two HFETs are expected to perform differently with the proposed design showing better ohmic metalization, consistent with past results and which have been proven using MATLAB simulation of its performance. The Ti-Al multi-layer metal stack returned a resistance value of 3.23 Ωmm while the traditional model had values of 3.40 Ωmm. The proposed Ti-Al multi-layer model also had better performance in terms of current densities with a value of 0.12 AmmG1 compared to the traditional design that had 0.08 AmmG1 . Al mole fraction was observed to have a direct effect on leakage performance, leakage being an important performance factor. The MATLAB results showed convergence, falling within the 1×10G10 and 1×10G6 . The results were also comparable to those from past research
Keywords : Field Effect Transistors (FET), ohmic contacts, metal stack, MATLAB, convergence
رابط البحث
Digital Color Image Classification Based on Modified Local Binary Pattern Using Neural Network
Authors : Aws Al-Qaisi1 , A. Manasreh2 , A. Sharadqeh3 , Z. Alqadi3
Abstract : Classification of digital color images is one of the preeminent crucial processes in the image processing field since it increases the efficiency of the digital image recognition system. This paper presents a highly accurate and effective technique to extract color image features, which can be passed as an input data set of artificial neural network for classification purposes. The proposed method will be tested utilizing color images database. Then, the efficiency parameters will be determined in order to demonstrate the exactness and proficiency of the proposed technique. A modified local binary pattern method of extracting color image features, which can be used later as a signature to recognize color image is proposed and discussed. The proposed method is employed to create a feature array for each color image. The suggested classification technique using artificial neural network chops down the memory address space needed to store the necessary data required for the recognition system. Hence, the recognition time will be reduced
Keywords : Modified Local Binary Pattern, Artificial Neural Network, Classification Process and Image Features
رابط البحث
COVER IMAGE REARRANGEMENT TO SECURE LSB METHOD OF DATA STEGANOGRAPHY
Authors : Mohammad S. Khrisat1 , Adnan Manasreh2 , Hatim Ghazi Zaini3 and Ziad A. Alqadi
Abstract : Protecting the data circulated through the various means of communication, whether the data is secret text messages or secret colored images, is very important to prevent intruders from eavesdropping on confidential data. In this paper research a method based on LSB will be introduced to be used easily for data steganography. The method will adds a hard to attack private key, this key will be generated as a result of cover image decomposition and image segments rearrangement, and it will be used to reproduce the cover image by replacing the cover image segments. The proposed method will control the data hiding capacity and adding a capability of hiding text messages and huge color images at the same time.
Keywords : steganography, cover, stego, PK, WPT, MSE, PSNR, capacity, throughput
رابط البحث
Cascade Neural Network to Control A Mobile Robot in Non-Structured Environment
Authors : Adnan Manasreh, Ayman AbuBaker, Mohammad H. Alomari, Ali M. Baniyounes
Abstract : Obstacle avoidance is an important task in the field of robotics, since the goal of autonomous robot is to reach the destination without collision. Several algorithms have been proposed for obstacle avoidance, having drawbacks and benefits. In this paper, cascade neural network is used to tackle the problem of mobile robot autonomous navigation in a non-structured environment. The objective is to make the robot move along a collision free trajectory until it reaches its target. The proposed approach uses the adaptive cascade neural network instead of fuzzification and inference engines. Moreover, number of linguistic labels is optimized for the input of the mobile robot in order to reduce computational time for real-time applications. The hybrid neuro-fuzzy controller is evaluated subjectively and objectively with other approaches and also the processing time is taken in consideration. The proposed neuro-fuzzy controller showed a good response in real-time applications by avoiding all the tested obstacles. The neuro-fuzzy controller can efficiently reduce the processing time by 70% comparing with tradition fuzzy logic controller.
Keywords : Fuzzy Logic, Neuro-Fuzzy, Mobile Robot, Hybrid Controller.
رابط البحث
EFFICIENT, SIMPLE AND SECURE ENCRYPTION DECRYPTION ALGORITHM USING COLOR IMAGE AS A PRIVATE KEY
Authors : Adnan Manasreh1, Mohammad S. Khrisat12, Hatim Ghazi Zaini3 and Ziad A. Alqadi2
Abstract : Cryptography is the art of destroying secret data making it unintelligible and illegible, in this paper research a method based on the use of digital images will be introduces. The method will use a digital color image to extract all necessary working and sup keys. The method will be implemented to show how it increases the cryptography process efficiency. The proposed method will be compared with other popular method such as DES, AES, and LED methods, it will be shown how the introduced method will decrease both the encryption and decryption times eliminating some important tasks in cryptography process like key generation and key scheduling.
Keywords : cryptography, throughput, PK, Image_key, DES, AES, LED
رابط البحث