Musab A. M. Ali

ORCID: 0000-0003-0677-5993
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • User Authentication and Security Systems
  • Computational Drug Discovery Methods
  • Non-Invasive Vital Sign Monitoring
  • Digital Media Forensic Detection
  • Anomaly Detection Techniques and Applications
  • Cloud Computing and Resource Management
  • Technology Adoption and User Behaviour
  • IoT-based Smart Home Systems
  • ERP Systems Implementation and Impact
  • Wireless Body Area Networks
  • IoT and Edge/Fog Computing
  • Context-Aware Activity Recognition Systems
  • Entrepreneurship Studies and Influences
  • ECG Monitoring and Analysis
  • Vehicular Ad Hoc Networks (VANETs)
  • Peptidase Inhibition and Analysis
  • Fire Detection and Safety Systems
  • Network Security and Intrusion Detection
  • Software Engineering Research
  • Migration, Ethnicity, and Economy
  • Video Surveillance and Tracking Methods
  • Chemical Synthesis and Analysis
  • Mobile Health and mHealth Applications
  • Opportunistic and Delay-Tolerant Networks

Amrita Vishwa Vidyapeetham
2024-2025

University of KwaZulu-Natal
2024-2025

Sylhet Agricultural University
2024

College of Applied Sciences, Nizwa
2023-2024

International Information Technologies University
2023-2024

University of Waterloo
2024

University of Baghdad
2023

College of Applied Sciences- Ibri
2023

Sudan University of Science and Technology
2022

Haliç University
2021

In this prototyped project, an attempt will be made to develop a locking system for cars so it would not start without alcohol checking mechanism. The take the advantage of pre-existing Alcohol sensor. fact, project is intended granting base further explorations in future. This aimed at exiting efforts accidents prevention developments, hope implementing real life increase roads safety.

10.1109/iscaie.2018.8405475 article EN 2018-04-01

This paper proposed a new detection method to detect video copy-move forgery with significant improvement in terms of its accuracy based on the optical flow inconsistencies that considers image motion for clone an object movement displacement paths. Finally, paths are compared between each other using Dynamic Time Warping (DTW) matching algorithm object. The experimental results show this is higher than preceding relevant study and very encouraging.

10.1109/iscaie.2018.8405504 article EN 2018-04-01

The purpose of this paper is to investigate the relationship between green supply chain management (GSCM), sustainability and environmental uncertainties through corporate social responsibility (CSR) perspective.The study also tries examine mediating role in sustainable performance.The carried out on firms oil gas sector Kingdom Oman results are analyzed using SEM-PLS.The findings reveal fact that performance has become primary objective organizations.Achieving now becoming main for business...

10.5267/j.uscm.2019.3.001 article EN Uncertain Supply Chain Management 2019-01-01

Robots are devised in such way to dispose of human intervention from labour extensive and hazardous work environment. At times they also used travel unreachable workplaces that typically not possible access by human. Pipe inspections fall the same category due fact carry toxic chemicals fluids. Furthermore, most pipeline segments have tiny internal diameter or bends which end up The complex inner geometry hazard content constraints pipes call for robots inspection so as test corrosion,...

10.1109/spc.2018.8704127 article EN 2018-12-01

Iris recognition is one of the most reliable biometrics for identification purpose in terms reliability and accuracy. Hence, this research integration cancelable features iris using encryption decryption non-invertible transformation proposed. Here, biometric data protected via proposed method. The experimental results showed that rate achieved 99.9% Bath-A dataset with a maximum decision criterion 0.97 along acceptable processing time.

10.1109/iscaie.2018.8405512 article EN 2018-04-01

Abstract Human malaria remains a global health challenge, with Plasmodium falciparum responsible for the most severe cases. Despite efforts, eradicating has proven difficult, mainly because of rise in drug resistance, particularly against artemisinin and its derivatives. One possible cause this resistance is activation unfolded protein response (UPR), which helps maintain cellular balance under stress. In P. , UPR operates through ubiquitin-proteasome system (UPS), involves proteins such as...

10.1007/s12013-025-01709-2 article EN cc-by Cell Biochemistry and Biophysics 2025-03-20

Abstract Acetyl-CoA Synthetase 2 (ACSS2) has emerged as a new target for anticancer development owing to its high expression in various tumours and enhancement of malignancy. Stressing the growing interest peptide-derived drugs featuring better selectivity efficacy, computational protocol was applied design peptide inhibitor ACSS2. Herein, 3600 sequences derived from ACSS2 nucleotide motif were generated by classifying 20 amino acids into six physiochemical groups. De novo modeling...

10.1007/s12013-025-01729-y article EN cc-by Cell Biochemistry and Biophysics 2025-04-27

Carbon monoxide (CO) gas is a compound produced by incomplete combustion of various carbon-based fuels and substances. The slow accumulation this poisonous can cause headaches, nausea, vomiting, vertigo confusion which are harmful for the passengers' safety environmental protection. This study aims to design an integrated system vehicle that sense detect gases such as carbon (CO). Further, it monitors content lively displays their concentration every second. It also provides alarm...

10.1109/cspa.2019.8696001 article EN 2019-03-01

The main purpose of this paper is to understand the true impact security on e-banking users and its relationship with user behavior toward acceptance. This reviews in-depth previous studies factors affecting e-banking. Security trust, risks, protection strategy best practices for future trends are discussed help banks consumers mitigate suitable secure transactions Results from reviewing valuable in shows that trust privacy concerns have highest accepting any system. issues can decrease...

10.1109/icsgrc.2019.8837070 article EN 2019-08-01

DeepFake is a concern for celebrities and everyone because it simple to create.DeepFake images, especially high-quality ones, are difficult detect using people, local descriptors, current approaches.On the other hand, video manipulation detection more accessible than an image, which many state-of-the-art systems offer.Moreover, of depends entirely on its through images.Many worked in but they had complex mathematical calculations preprocessing steps, limitations, including that face must be...

10.22266/ijies2023.0630.07 article EN International journal of intelligent engineering and systems 2023-05-01

Mitotic kinesins are eukaryotic proteins that play a vital role in cellular mitosis. Their over-expression malignant rather than normal cells and their specific made kinesin inhibitors promising cancer therapeutics. The realization of in-vitro antitumor activity the investigational molecule-monastrol-was traced to its allosteric inhibition ATPase motor domain Human Kensin-5 (Eg5) prompted extensive efforts towards inhibitors. Many reports pointed prospect Kinesin-like protein (KIFC1) as...

10.1016/j.chphi.2024.100480 article EN cc-by-nc-nd Chemical Physics Impact 2024-01-21

ABSTRACT Protein–protein interactions, or PPIs, are a part of every biological activity and have been linked to number diseases, including cancer, infectious neurological disorders. As such, targeting PPIs is considered strategic vital approach in the development new medications. Nonetheless, wide flat contact interface makes it difficult find small‐molecule PP inhibitors. An alternative strategy would be use PPI interaction motifs as building blocks for design peptide‐based Herein, we...

10.1002/jcb.30633 article EN cc-by Journal of Cellular Biochemistry 2024-08-15

Many researchers realised that iris as biometrics is the most accurate means for recognition since of human contain uniquepatterns. Hence in this study, we used Gabor filter feature extraction to evaluate possibility extracting half with Support Vector Machine classifier. Initial findings based on experimental analysis conducted showed proposed method suitable input performance attained specifically FAR and FRR 0.21% ERR 99.56%. Thus, technique could be overcome occlusion due eyelids...

10.1109/cspa.2014.6805765 article EN 2014-03-01

Fire fighter robot is a machine developed by humans to guard human live, because the accidents happening during fire extinguishing process uncountable. This main function detect and move towards automatically extinguish it from safe distance using water. robot's movement behavior will be fully controlled programmable raspberry pi. which in form of vehicle right, left, front back fire. also have thermal camera an infrared mounted over it. The purpose temperature provide night vision imaging...

10.1109/cspa.2019.8696077 article EN 2019-03-01

Digital video can be manipulated and edited easily because of the available robust processing editing software. In current times, digital image tools has contributed to challenge in authenticating multimedia content an accurate manner. It is now possible modify, through adding removing, pertinent evidence form a recording without leaving clue as tampering process. Even worse, some post-methods effects, which insert deleting object order mimic or hide particular event frames video, are also...

10.1109/spc.2018.8704160 article EN 2018-12-01

The number of migrants with specialized skills and higher education has increased significantly since the 1990s. These are very active in high-tech engineering-intensive industries that rely heavily on knowledge, innovation advanced systems processes. This paper pieces together literature this group people to brings light their importance contribution host countries. We noted by virtue knowledge contribution, globally valued may enjoy unique privileges. Their key takes forms of: filling...

10.1109/spc.2018.8704139 article EN 2018-12-01

Recently, (Radio Frequency Identification) RFID based frameworks move beyond security to turn into tracking systems that integrate with more proficient materials inside the library, involving easier and quicker charging & discharging, handling inventorying. In this study, a book RFID-based system has been designed developed replace existing library barcoding system. This enables librarians minimise spent time is required for scanning barcodes during discharging process. Further, technology...

10.1109/cspa.2019.8696005 article EN 2019-03-01
Coming Soon ...