Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kamal Shahrabi is active.

Publication


Featured researches published by Kamal Shahrabi.


long island systems, applications and technology conference | 2017

Utilization of the reusable and free Energy around us

Mark Krinker; Kamal Shahrabi; Aron Goykadosh

We live in a world of Energy. We use it and, following the laws of Thermodynamics, give up a portion of that as inevitable toll for its conversion for our purposes. There are the non-conventional sources around us. Utilization of these energies will help to reduce harmful pollution caused by the oil and coal technologies and save money for the social developments. Beside the previously considered recuperating applications, other approaches will be considered here.


DEStech Transactions on Computer Science and Engineering | 2017

Model of Electric Power Load by Adaptive Neural Network

Hong Li; Ali Setoodehnia; Kamal Shahrabi

The Generation and load balance is required in economic scheduling of the generating units and in electricity market trades. Energy forecasting became very important to mitigate some of the challenges that arise from the uncertainty in the resource. The paper presents a short term forecasting of hourly electric power load. Historical data are sourced from Global Energy Forecasting Competition 2017 (GEFCom2017). An adaptive learning algorithm is derived from analysis of system stability to ensure convergence of training process. The simulations with different initial state of network structure demonstrate that training error steadily decrease with an adaptive learning factor starting at different initial values whereas errors behave volatile with constant learning factors.


long island systems, applications and technology conference | 2016

Universality of spin-angular momentum of media as a carrier of information

Mark Krinker; Kamal Shahrabi; Aron Goykadosh

The paper considers a group of phenomena united by their common driver-Torsion Fields (TF) and their measurable attribute - field angular momentum and its specific power. This phenomenon plays a considerable role in a human life, manifesting itself everywhere. It has both negative and positive consequences for the mankind and cannot be ignored. One of the positive aspects of this phenomenon is a new approach to Telecommunication without a classical electromagnetic approach. This technology is in its early stages. The methods and the instrument for registering TF consist of simple devices such as energetic barrier detectors through more complex ones, based on registering a Field Gyroscope, associated with Torsion Fields.


long island systems, applications and technology conference | 2015

Social importance and physical base of GPZ and dowsing: Instrumentation with perspectives of further development

Mark Krinker; Aron Goykadosh; Kamal Shahrabi

The paper considers social importance of monitoring Geo Pathogenic Zones, GPZ, which negatively affects humans, plants and machinery. One component of Physics of GPZ is based on the origination of natural alternating fields, which entrain the pace of human organs. Another component is the origination of localized spinning electromagnetic fields, which develop strong non-linear phenomena, negatively affecting a wide class of objects. Instrumentation technology is discussed as well as the results which reveal quantum nature of the GPZ issue.


Proceedings of SPIE | 2013

Enhanced information security employing orthogonal code, steganography, and joint transform correlation

Mohammed Nazrul Islam; Mohammad F. Islam; Kamal Shahrabi

A novel and robust technique is proposed in this paper for securing confidential information by utilizing orthogonal coding scheme, encoded steganography and nonlinear encryption through joint transform correlation. Different biometric signatures are encoded using individual orthogonal codes and then multiplexed together. The encrypted and multiplexed image is hidden inside a cover image employing a steganography technique, where one from the three least significant bits is chosen using another secret key. A color cover image is utilized which is decomposed into three color components, red, green and blue, so that three different sets of biometric signatures can be embedded into each of the color components. The color stego image is finally encrypted using multiple phase-shifted reference joint transform correlation (MRJTC) technique. The proposed encryption technique is a nonlinear process which increases the security strength significantly against any unauthorized access. The encoded steganography technique reduces the vulnerability that an intruder can retrieve any information from a given image through any steganalysis attack. Finally, the orthogonal coding scheme enhances the robustness by making the biometric information almost inaccessible without authorization.


2013 10th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT) | 2013

Optical security system employing shifted phase-encoded joint transform correlation and orthogonal code

M. Nazrul Islam; Kamal Shahrabi

Efficient cryptographic techniques are very much crucial in protecting confidential information, including personal identification and biometrics. Reliable encryption algorithm must restrict any and all unauthorized access to information or information system. At the same time, the algorithm should reproduce the information to its authorized users without any loss of distortion. Optics has played an important role in devising fast and reliable security systems without requiring complex architecture. Though several optical security techniques have so far been proposed in the literature, but they are not as successful in providing with robust performance and strong security against unauthorized access. This paper proposes an efficient optical security system utilizing a joint transform correlation (JTC) technique and orthogonal encoding scheme. Multiple information in the form of images are encoded using orthogonal codes and then mixed together. The single encoded image is fed to the JTC scheme, where the input image is nonlinearly encrypted by the key using Fourier lenses. The proposed technique also includes a fringe-adjusted filter to eliminate noisy signals and hence to enhance the decryption performance. Computer simulation investigation verifies that the scheme can secure the confidential information from any threats.


Journal of Information Privacy and Security | 2012

Using PRNG Generated Templates to Protect Fingerprint Database

Qinghai Gao; Kamal Shahrabi

Abstract Fingerprint databases are widely used in background/criminal investigation and physical access control. However, the security mechanisms protecting these databases are often inadequate. Once a hacker or an insider obtains a copy of a database the fingerprints in the database can be utilized easily to conduct identity theft or impersonation. Therefore, it is extremely important to protect the database against possible misuses. In this paper we propose using synthetic fingerprint minutiae templates generated with pseudorandom number generator to protect genuine fingerprint templates. Our experimental results show that fingerprint minutiae templates can still match successfully even after being inserted with large number of foreign minutiae and that the pseudorandomly generated synthetic minutiae templates can be utilized to protect real templates.


Optik | 2015

Robust information security system using steganography, orthogonal code and joint transform correlation

M. Nazrul Islam; Muhammad Faysal Islam; Kamal Shahrabi


Archive | 2009

Optical Properties and Applications of Nanoscale Silicon

Adam Filios; Yeong Ryu; Kamal Shahrabi


2008 Annual Conference & Exposition | 2008

An Optimized Humidity And Temperature Control System For Fuel Cells

Razwaan Arif; Han Chu; Yeong Ryu; Adam Filios; Hazem Tawfik; Kamal Shahrabi

Collaboration


Dive into the Kamal Shahrabi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aron Goykadosh

New York City College of Technology

View shared research outputs
Top Co-Authors

Avatar

Mark Krinker

New York City College of Technology

View shared research outputs
Top Co-Authors

Avatar

Yeong Ryu

State University of New York System

View shared research outputs
Top Co-Authors

Avatar

Adam Filios

State University of New York System

View shared research outputs
Top Co-Authors

Avatar

M. Nazrul Islam

State University of New York System

View shared research outputs
Top Co-Authors

Avatar

Adam A. Filios

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Mohammad F. Islam

George Washington University

View shared research outputs
Top Co-Authors

Avatar

Mohammed Nazrul Islam

State University of New York System

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge