Archive

ARCHERY EQUIPMENT SHOP IN VIRTUAL REALITY ENVIRONMENT (X-10 SHOP IN VR)

Authors:

Yousef A.Baker El-Ebiary, Salameh A. Mjlae, ,Syarilla Iryani A. Saany, Julaily Aida Jusoh, M. Hafiz Yusoff, Muhamad Syafik Izwan

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00027

Abstract:

VR technology has begun entering the repertoir of tools used by all parties. Today, sports goods business uses VR for visualization and sales. For example, VR is used as a promotional tool in selling goods to consumers and providing up-to-date information on the right prices and archery items. Very important, VR can help customers communicate better about the proposed plateform. Therefore, the proposed application for the X-10 Store in Virtual Reality is recommended. The X-10 Shop is a shop to provide information and pricing for beginner users on archery tools and they can also learn about archery equipment before buying it. The main objective of this research is to develop applications, to test the use of this application. This app is a platform for users to create users who want to buy archery tools and easy tools to view information and prices of archery equipment without having to go to the store and waste time to get there. This involves the use of Unity application development software to generate X-10 Shop in Realita Maya.

Keywords:

Virtual Reality, VR,Mobile based application,Computer Application ,Electronic Shop,X-10 Shop,

Refference:

I Andy Hood, (2017, May 6). Archery Star. Grand Millennium Plaza (Lower Block), 181 Queen’s Road Central, Hong Kong: Taprun Studio.

II El-Ebiary, Y. A. M. A., Saany, S. I. A., Rahman, M. N. A., Alwi, E. A. Z. E., Mohamad, M., & Ahmad, M. M. T. (2019). “Using Smartphone Application to Notify Muslim Travelers the Jama’Qasar Pray, Azan Times and Other Facilities”. (IJEAT), 8(2S2), pp. 366-370.

III Matt Foro, (2018, April 11). Archery Kings VR. United Kingdom: Appnori Inc Developer.

IV Saany, S. I. A., El-Ebiary, Y. A. M. A., Rahman, M. N. A., Alwi, E. A. Z. E., Mohamad, M., & Ahmad, M. M. T. (2019). Lactation Mobile Application in Islam Perspective”. (IJEAT), 8(3S), pp. 271-274.

V Sinteza. (2017). Addie Model for Development of E-Courses. Information Technology in Education, 244.

VI Wiki. (6 May, 2019). Wikipedia. Retrieved from Virtual reality: https://en.wikipedia.org/wiki/Virtual_reality

View Download

SEEDING BIG DATA IN INDONESIAN CORRECTIONAL JUSTICE SYSTEM FOR INTERVENING RESTORATIVE PROGRAM: A CONCEPTUAL PAPER

Authors:

Abdul Samad Dahri, Shafiq-ur-Rehman Massan, Liaquat Ali Thebo

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00028

Abstract:

Prisons are overcrowded and running out of capacity globally including Indonesia. The Indonesian justice system is claimed for irregularities and prisoner recidivism issues, thus, needs remedy than ever before to monitor prisoners’ actions. To help this situation, Indonesia is enforcing a restorative justice system for post-prison rehabilitation and reintegration of people back in society. This article has addressed the restorative justice system from Big Data perspective. This might face data management issues and techniques to interpret and extract relevant information. Here, Big Data and analytic techniques are introduced for a breakthrough in Indonesian restorative justice system towards a potentially more controlled and meaningful digital era of correctional programming. Potential implications are unearthed, likewise, recommendations are limitless. Similarly, research terrain is vastly unknown which attracts further investigation in both conceptual and empirical field regarding the law, policy, and practice for overall strong Indonesian judicial system.

Keywords:

Restorative Justice,Big Data, Indonesia,Conceptual paper,

Refference:

I. Baaziz, A., &Quoniam, L. (2014). How to use Big Data technologies to optimize operations in Upstream Petroleum Industry. arXiv preprint Baaziz, A., &Quoniam, L. (2014). How to use Big Data technologies to optimize arXiv:1412.0755.

II. Barbier, G., & Liu, H. (2011). Data mining in social media. In Social network data analytics (pp. 327-352). Springer, Boston, MA.

III. Bucher T (2012) ‘Want to be on the top?’ Algorithmic power and the threat of invisibility on Facebook. New Media and Society 14(7): 1164–1180.

IV. Bradshaw, W., Roseborough, D., &Umbreit, M. S. (2006). The effect of victim offender mediation on juvenile offender recidivism: A meta‐analysis. Conflict Resolution Quarterly, 24(1), 87-98.

V. Chang Z., Larsson H., Lichtenstein P., &Fazel S. (2015). Psychiatric disorders and violent reoffending: A national cohort study of convicted prisoners in Sweden. The Lancet Psychiatry, 2, 891–900. 10.1016/S2215-0366(15)00234-5
VI. Chung, W. (2014). BizPro: Extracting and categorizing business intelligence factors from textual news articles. International Journal of Information Management, 34(2), 272-284.

VII. Fazel S., & Seewald K. (2012). Severe mental illness in 33,588 prisoners worldwide: Systematic review and meta-regression analysis. The British Journal of Psychiatry, 200, 364–373. 10.1192/bjp.bp.111.096370

VIII. Feblowitz, J. (2012). The big deal about big data in upstream oil and gas. IDC Energy Insights, 1-11.

IX. Feldman, R. (2013). Techniques and applications for sentiment analysis. Communications of the ACM, 56(4), 82-89. Galaway, B. (1995). Victim‐offender mediation by New Zealand probation officers: The possibilities and the reality. Mediation Quarterly, 12(3), 249-262.

X. FriederDünkel, ‘The Rise and Fall of Prison Population Rates in Europe’, Criminology in Europe, 2016, www.esc-eurocrim.org/images/esc/newsletters/ESC_15_2_2016.pdf

XI. Goodrum, P. M., McLaren, M. A., &Durfee, A. (2006). The application of active radio frequency identification technology for tool tracking on construction job sites. Automation in Construction, 15(3), 292-302

XII. Goff A., Rose E., Rose S., & Purves D. (2007). Does PTSD occur in sentenced prison populations? A systematic literature review. Criminal Behavior and Mental Health, 17, 152–162. 10.1002/cbm.653

XIII. Global Prison Trends (2018). Global Prison Trends 2018 is the fourth edition in PRI’s annual flagship. Retrieved from https://www.penalreform.org/resource/global-prison-trends-2018/ on March, 23 2019.

XIV. Gundecha, P., & Liu, H. (2012). Mining social media: a brief introduction. In New Directions in Informatics, Optimization, Logistics, and Production (pp. 1-17). Informs.

XV. Hartmann, A., & von Lampe, K. (2008). The German underworld and the Ringvereine from the 1890s through the 1950s. Global Crime, 9(1-2), 108-135.

XVI. Hawton K., Linsell L., Adeniji T., Sariaslan A., &Fazel S. (2014). Self-harm in prisons in England and Wales: An epidemiological study of prevalence, risk factors, clustering, and subsequent suicide. The Lancet, 383, 1147–1154. 10.1016/S0140-6736(13)62118-2

XVII. Hirschberg, J., Hjalmarsson, A., &Elhadad, N. (2010). “You’re as sick as you sound”: Using computational approaches for modeling speaker state to gauge illness and recovery. In Advances in speech recognition (pp. 305-322). Springer, Boston, MA.

XVIII. Joanna Shapland (July, 1 2008). Restorative justice reduces crime by 27%. Retrieved from https://www.cam.ac.uk/news/restorative-justice-reduces-crime-by-27 on March, 24 2019.

XIX. Kays, R., Crofoot, M. C., Jetz, W., &Wikelski, M. (2015). Terrestrial animal tracking as an eye on life and planet. Science, 348(6240), aaa2478

XX. Kristiansen, S., &Trijono, L. (2005). Authority and law enforcement: local government reforms and security systems in Indonesia. Contemporary Southeast Asia: A Journal of International and Strategic Affairs, 27(2), 236-254.

XXI. Labrinidis, A., &Jagadish, H. V. (2012). Challenges and opportunities with big data. Proceedings of the VLDB Endowment, 5(12), 2032-2033.

XXII. Lawrence, S., Mears, D. P., Dubin, G., & Travis, J. (2002). The Practice and Promise of Prison Programming. Research Report.

XXIII. Liang, F., Das, V., Kostyuk, N., & Hussain, M. M. (2018). Constructing a Data‐Driven Society: China’s Social Credit System as a State Surveillance Infrastructure. Policy & Internet, 10(4), 415-453.

XXIV. Liu, B., & Zhang, L. (2012). A survey of opinion mining and sentiment analysis. In mining text data (pp. 415-463). Springer, Boston, MA.

XXV. Marr, B. (2014). How Facebook is Using Big Data: The Good, the Bad, and the Ugly.

XXVI. Ministry of justice evaluation (2008). Ministry of Justice evaluation: implementing restorative justice schemes (Crime Reduction Program) final report.https://restorativejustice.org.uk/resources/ministry-justice-evaluation-implementing-restorative-justice-schemes-crime-reduction-1

XXVII. Monteith, S., Glenn, T., Geddes, J., & Bauer, M. (2015). Big data are coming to psychiatry: a general introduction. International journal of bipolar disorders, 3(1), 21.

XXVIII. Miyamoto, S. W., Henderson, S., Young, H. M., Pande, A., & Han, J. J. (2016). Tracking health data is not enough: a qualitative exploration of the role of healthcare partnerships and mHealth technology to promote physical activity and to sustain behavior change. JMIR mHealth and uHealth, 4(1).
XXIX. Moses, L. B., & Chan, J. (2014). Using big data for legal and law enforcement decisions: Testing the new tools. UNSWLJ, 37, 643.

XXX. Osama Manzar (2013). Prison Management System (PRISMS) An e-Governance Project of the Govt. of Goa. https://www.nisg.org/project/81

XXXI. Nagin, D. S., Cullen, F. T., & Jonson, C. L. (2009). Imprisonment and reoffending. Crime and justice, 38(1), 115-200

XXXII. News 24 (January, 23 2017). ‘Burundi frees prisoners, but rights group cautious’, www.news24.com/Africa/News/burundi-frees-prisoners-but-rights-groupscautious-20170123

XXXIII. Patil, H. A. (2010). “Cry Baby”: Using Spectrographic Analysis to Assess Neonatal Health Status from an Infant’s Cry. In Advances in speech recognition (pp. 323-348). Springer, Boston, MA.

XXXIV. Pujiyono (2015). RECONSTRUCTION OF INDONESIAN CRIMINAL JUSTICE SYSTEM IN THE PERSPECTIVE OF THE JUDICIAL POWER INDEPENDENCE. International Journal of Business, Economics and Law, Vol. 6, Issue 4 (Apr.)

XXXV. Roy Walmsley (2016), Institute for Criminal Policy Research, World Prison Population, 11th edition.

XXXVI. Roy Walmsley (2017). Institute for Criminal Policy Research, World Prison Population list, 12th edition.

XXXVII. Sherman, L. W., Strang, H., Barnes, G., Bennett, S., Angel, C. M., Newbury-Birch, D.,& Gill, C. E. (2007). Restorative justice: The evidence.

XXXVIII. Shoval, N., &Ahas, R. (2016). The use of tracking technologies in tourism research: the first decade. Tourism Geographies, 18(5), 587-606

XL. Solusi Hukum (February, 13 2018). http://sinarpidie.co/news/gampong-dan-penyelesaian-sengketa/index.html

XLI. The Conversation (November 15, 2018). Indonesia should promote restorative justice and send fewer people to prison. Retrieved from http://theconversation.com/indonesia-should-promote-restorative-justice-and-send-fewer-people-to-prison-101276 on March, 23 2019.

XLII. Rea, L. M. (2012). Restorative justice: The new way forward. Retrieved from Restorative Justice International: http://restorativejusticeinternational.com/assets/PrisonArticleRea.pdf

XLIII. The Jakarta Post (April, 29 2016). Govt. spends too much on prison needs: Experts. https://www.thejakartapost.com/news/2016/04/29/govt-spends-too-much-on-prison-needs-experts.html

XLIV. UN General Assembly (1991), United Nations Standard Minimum Rules for Non-Custodial Measures (The Tokyo Rules) : resolution / adopted by the General Assembly, 2 April 1991, A/RES/45/110, available at: ttps://www.refworld.org/docid/3b00f22117.html [accessed 26 March 2019]

XLV. Venter, A., & Rankin, P. (2006). Victim-Offender Mediation-A South African Experience. British Journal of Community Justice, 4(3).

View Download

TRANSFER:- DEEP INDUCTIVE NETWORK FOR FACIAL EMOTION RECOGNITION

Authors:

Arpita Gupta, Nandhini Swaminathan, Ramadoss Balakrishnan

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00029

Abstract:

The image-based Facial Emotion Recognition (FER) aims to classify the image into basic emotions being communicated by it. FER is one of the most prominent research areas in computer vision. Most of the existing works are aimed at high-quality images which are collected in the lab environment. These images are very different from the real-life facial emotion that leads to a lack of wild labeled data. Deep learning using transfer learning has shown promising results in computer vision in solving the problem of lack of labeled data.  In the recent system, there is a great focus to overcome the lack of data issue in FER. Our paper has utilized the deep residual networks with inductive learning and self-attention module to overcome this problem. We have experimented different pretraining settings and datasets for the model, which are ImageNet and VGG face dataset (source datasets). The self-attention block is applied for better visual perspective to the model. Our target dataset is FER-2013, a benchmark dataset in FER. TransFER is a deep residual network based on inductive learning and attention module. Our proposed approach has achieved superior performance than the existing state of the art models in the FER application using transfer learning.

Keywords:

Facial Emotion Recognition, Deep Learning,Deep Residual Networks,Transfer Learning, Inductive Learning, Self-Attention,

Refference:

I Deng, Jia, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. “Imagenet: A large-scale hierarchical image database.” In 2009 IEEE conference on computer vision and pattern recognition, pp. 248-255. Ieee, 2009.

II Devries, Terrance, Kumar Biswaranjan, and Graham W. Taylor. “Multi-task learning of facial landmarks and expression.” In 2014 Canadian Conference on Computer and Robot Vision, pp. 98-103. IEEE, 2014.

III Ekman, Paul, and Wallace V. Friesen. “Constants across cultures in the face and emotion.” Journal of personality and social psychology 17, no. 2 (1971): 124.

IV Geng, Mengyue, Yaowei Wang, Tao Xiang, and Yonghong Tian. “Deep transfer learning for person re-identification.” arXiv preprint arXiv:1611.05244 (2016).

V Goodfellow, Ian J., Dumitru Erhan, Pierre Luc Carrier, Aaron Courville, Mehdi Mirza, Ben Hamner, Will Cukierski et al. “Challenges in representation learning: A report on three machine learning contests.” In International Conference on Neural Information Processing, pp. 117-124. Springer, Berlin, Heidelberg, 2013.

VI He, Kaiming, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. “Deep residual learning for image recognition.” In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770-778. 2016.

VII Li, Shan, and Weihong Deng. “Deep emotion transfer network for cross-database facial expression recognition.” In 2018 24th International Conference on Pattern Recognition (ICPR), pp. 3092-3099. IEEE, 2018.

VIII Liu, Mengyi, Shaoxin Li, Shiguang Shan, and Xilin Chen. “Au-aware deep networks for facial expression recognition.” In 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1-6. IEEE, 2013.

IX Miao, Yun-Qian, Rodrigo Araujo, and Mohamed S. Kamel. “Cross-domain facial expression recognition using supervised kernel mean matching.” In 2012 11th International Conference on Machine Learning and Applications, vol. 2, pp. 326-332. IEEE, 2012.

X Mollahosseini, Ali, David Chan, and Mohammad H. Mahoor. “Going deeper into facial expression recognition using deep neural networks.” In 2016 IEEE Winter conference on applications of computer vision (WACV), pp. 1-10. IEEE, 2016.

XI Ng, Hong-Wei, Viet Dung Nguyen, Vassilios Vonikakis, and Stefan Winkler. “Deep learning for emotion recognition on small datasets using transfer learning.” In Proceedings of the 2015 ACM on international conference on multimodal interaction, pp. 443-449. 2015.

XII Ouellet, Sébastien. “Real-time emotion recognition for gaming using deep convolutional network features.” arXiv preprint arXiv:1408.3750 (2014).

XIII Parkhi, Omkar M., Andrea Vedaldi, and Andrew Zisserman. “Deep face recognition.” (2015).

XIV Sandbach, Georgia, Stefanos Zafeiriou, Maja Pantic, and Daniel Rueckert. “Recognition of 3D facial expression dynamics.” Image and Vision Computing 30, no. 10 (2012): 762-773.

XV Vaswani, Ashish, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Łukasz Kaiser, and IlliaPolosukhin. “Attention is all you need.” In Advances in neural information processing systems, pp. 5998-6008. 2017.

XVI Xu, Mao, Wei Cheng, Qian Zhao, Li Ma, and Fang Xu. “Facial expression recognition based on transfer learning from deep convolutional networks.” In 2015 11th International Conference on Natural Computation (ICNC), pp. 702-708. IEEE, 2015.

XVII Yan, Haibin, Marcelo H. Ang, and AunNeow Poo. “Cross-dataset facial expression recognition.” In 2011 IEEE International Conference on Robotics and Automation, pp. 5985-5990. IEEE, 2011.

XVIII Zhang, Zhanpeng, Ping Luo, Chen-Change Loy, and Xiaoou Tang. “Learning social relation traits from face images.” In Proceedings of the IEEE International Conference on Computer Vision, pp. 3631-3639. 2015.

View Download

ONLINE ATHEISM AND ITS IMPACT ON THE INDIVIDUAL AND SOCIETY

Authors:

Amr Mohammed Sayed Emam Sallam, AllaaEddin Ismaail, Mohammed Ebrahim El Sherbiny Sakr, Mohammed Elsayed Mohammed Mohammed Abdou, Yousef A.Baker El-Ebiary

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00030

Abstract:

Abstract With the great development that the world has witnessed with regard to technology, and specifically the emergence of the Internet, there have been a number of negative and positive impacts on the individual and society, perhaps the greatest benefit of the Internet is to provide access to infinite information and knowledge with ease by browsing the websites spread on the Internet and the ease of communication The Internet has contributed greatly to the ease of communication and sharing between individuals regardless of distances, and has provided immediate access to anyone in the world. However, in light of the huge spread of information, it is difficult to choose the correct and accurate information, and among the misconceptions on the Internet are atheism or disbelief in God and inclination through the people of faith, rationality, disbelief in resurrection, heaven, fire, and dedication of all life to the world only, which is what is today called "secular or non-religious" Atheists base their ideas on their denial of the unseen altogether and in detail their mockery of rituals their fierce war against good morals and customs maximizing them for matter and nature. This research aims to clarify the full meaning of atheism in terms and form, and the importance of technology in the spread of information..

Keywords:

Electronic Information,The Internet,Online Data,Atheism, Social Media,

Refference:

I. Abd al-Rahman Abd al-Khaleq: Atheism, the causes of this phenomenon and methods of treating it, Saudi Ministry of Ifta, 2nd edition, 1404.
II. AllaaEddinIsmaail, Mohammed Elsayed Mohammed MohammedAbdou, Amr Mohammed SayedEmamSallam, Mohd Faizal, A.K., Yousef A.Baker El-Ebiary, MohammedEbrahim El SherbinySakr. “Christian Attitudes towards the Bible through Wikipedia Content” Volume 83, Issue: May – June 2020, P: 9260 – 9269. (TEM).
III. An article in the BBC’s Atheism in the Arab World: Why Have Some People Abandoned Religion? (August 31, 2015).
IV. Arabia Net on Wednesday 06 Safar 1434 AH – December 19, 2012 AD.
V. Interpretation of Al-Tabari – Dar Al-Hadith – Cairo, 2016.
VI. Mohammed Ebrahim El SherbinySakr, Amr Mohammed Sayed EmamSallam, Mohammed Elsayed Mohammed Mohammed Abdou, AllaaEddinIsmaail, Yousef A.Baker El-Ebiary. “A Sample of Orientalist Suspicious Contained in The Internet and The Response” Volume 83, Issue: May – June 2020, P: 7026 – 7032. (TEM).
VII. Muhammad Abdullah Draz – Religion – Hindawi Foundation – Cairo – 2014 edition.
VIII. Muhammad Al-Khader Hussein: Atheism, its causes, its natures, its evils, the reasons for its emergence, its treatment, the research of Muhammad Al-Shaibani, Ibn Taymiyyah Library, Kuwait, first edition, 1406.
IX. Shehata H. M. El Sheikh, A.Ghani Bin Md Din, Rabie I. M. H., M. Hamed M. Said, Shaaban A. Hameed R. M., Yousef A.Baker El-Ebiary, “Electronic Content On the Internet and Its Role in The Intellectual and Ideological Extension of the Kharijites Division and Its Impact On the Islamic World”, (JCR). 2020; 7(15): 293-298, doi: 10.31838/jcr.07.15.37.

View Download

SHIITE ACTIVITY THROUGH THEIR ONLINE CHANNELS

Authors:

Mohammed Elsayed Mohammed Mohammed Abdou, Mohammed Ebrahim El Sherbiny Sakr, Ahmad Effat Bin Mokhtar, AllaaEddin Ismaail, Yousef A.Baker El-Ebiary

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00031

Abstract:

Allah sent His messengers to reform people with a pure belief monotheism, some of people believed in them and some of them disbelieved. Moreover, some of them stray from the true way of divine religion, diverged from, and made changes in it. All praises to Allah who has honored this Islamic nation with a blessing that was not for other nations, and it is a blessing to complete the religion and protect it from distortion and alteration until the Day of Resurrection, as almighty said. Since the spread of the Islamic missionary call, many people have tried to challenge and question it even they accused the Messenger of Allah Muhammad - may God’s prayers and peace be upon him - of lying, witchcraft and other false and shameful accusations. Among the groups and sections that drifted away from the correct approach, challenged and questioned the followers of Islam are “Shiites” who had used various means - including the Internet - to spread its deviations related to belief and law among the Sunnis, so we have to highlight some of these deviations and their criticality. There is no doubt that the means of modern technology today are essential institutions that have beaten all other institutions. Through it, you can broadcast the beliefs and ideas whatever you intend to. Shiites have exploited this medium and have published many private and public pages on the Internet. Shiites were keen to distort the image of the Sunnis among the societies. Therefore, thought the topic of the research should be Shiite activity through their online channels.  

Keywords:

Online information,The Internet, Online Channels,Shiite Activities,

Refference:

I. Alasraarul- Fatimiyyah: Muhammad Fadel Al-Masoudi, investigation: Mr. Adel Al-Alawi, second edition 1420 AH, publisher of the Visitor Foundation (Qom).
II. Alawasimminal-qawasim of, Abu Bakr Al-Arabi, investigation: Moheb Al-Din Al-Khatib, 2nd edition, 1407 AH, Dar Al-Jeel (Beirut).
III. AllaaEddinIsmaail, Mohammed Elsayed Mohammed MohammedAbdou, Amr Mohammed SayedEmamSallam, Mohd Faizal, A.K., Yousef A.Baker El-Ebiary, MohammedEbrahim El SherbinySakr. “Christian Attitudes towards the Bible through Wikipedia Content” Volume 83, Issue: May – June 2020, P: 9260 – 9269. (TEM).
IV. Al-Nabaa Information Network, Al-Anwar satellite channel, and the mission of transmitting Islam’s moderate spread, aspirations for a targeted satellite broadcast www.annabaa.org/http.
V. History of the Umayyad dynasty: Dr. Muhammad Suhail Takoush, 7th Edition, 2010 AD, Dar Al-Nafees (Beirut).
VI. Mohammed Ebrahim El SherbinySakr, Amr Mohammed Sayed EmamSallam, Mohammed Elsayed Mohammed Mohammed Abdou, AllaaEddinIsmaail, Yousef A.Baker El-Ebiary. “A Sample of Orientalist Suspicious Contained in The Internet and The Response” Volume 83, Issue: May – June 2020, P: 7026 – 7032. (TEM).
VII. Shia missionary satellite TV stations: Al-Haytham Zaafan, 1st edition, 2010 AD, Al-TanweerCenter for Humanities.
VIII. The Caliphate System in Islamic Thought, Mustafa Helmy, 1977 AD, Dar Al-Absar (Riyadh).
IX. The issue of the Imamate originated and developed between the Islamic groups, Muhammad Hassan Bakhit, 1st floor, 2011 AD, Dar Majdalawi (Amman).
X. The Umayyad state, factors of prosperity and the fallout from fall: Ali Al-Salabi, 2nd edition, 1429 AH, Dar Al-Maarefa Printing Press (Beirut).
XI. Ummu Hani Abas, A.Ghani Bin Md Din, M. Syauqi Arshad, Faridah Isa Binawae, Harliza B. H., Yousef A.Baker El-Ebiary., “The Usage of Google Translator Apps in Translation of the Arabic-Language Book into Indonesia and Malaysia: Comparative Review”,(JCR). 2020; 7(15): 669-674, doi: 10.31838/jcr.07.15.37
XII. Usul Al-Kafi, Al-Kulayni, without the Dar Al-Fajr edition (Beirut – Lebanon) 1428 AH.

View Download

THE FUTURE OF ORIENTALIST TRENDS ON INTERNET SITES AND THEIR IMPACT ON QURANIC STUDIES

Authors:

Reda Owis Hassan Serour, MukhamadHadiMusolin Subagio, Mohd Faizal, A.K. , AllaaEddin Ismaail, Yousef A.Baker El-Ebiary

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00032

Abstract:

Orientalist trends on Internet sites differ from the old classic form of Orientalism, and these sites have varied among sites for Middle Eastern studies and sciences or politically or socially specialized research centers and so on. There is no doubt that the Orientalist movements have provided some services for Quranic studies in the indexing, translation, and investigation of manuscripts ... etc. but they have been right in matters and wrong in others, as some Orientalists attacked the Qur’an and its sciences, which had a significant negative impact among the generation of Muslims. The orientalist’s view of the Holy Qur’an varied in terms of holiness, belief and idea in each of them, so their perception of the Qur'an differed accordingly. There are literatures that require consideration, attention, and even republishing for the goodness that it contains, and there are works that needed to review supported by arguments and statement and making the people aware of it and even should use our all sources to stop it from republishing it again. Likewise, among the Muslims who adopted the technique of the orientalists and their literature as a model for himself and started repeating and spreading some of their suspicions (uncertainty regarding to Islamic studies) either intentionally or being ignorant of what he means, so he should be corrected if he is unaware of it or she should be answered by arguments if he was intended to do so.

Keywords:

TheInternet, Orientalism,Orientalists,Quranic studies,

Refference:

I. Abdu Ghani Bin Md Din, Ebrahim M. A. Eldesoky, M. I. H. Othman, Omar Bin MdDin, Ibrahim BaBikir El Hag Abd el Gadir, Yousef A.Baker El-Ebiary. “The Adjustment of Arabic Words and the Problems of Its Digital Content on the Internet” Volume 82, Issue: January – February 2020, P: 11615 – 11623. (TEM).
II. AllaaEddinIsmaail, M. Elsayed M. M. Abdou, Amr Mohammed Sayed EmamSallam, Mohd Faizal, A.K., Yousef A.Baker El-Ebiary, MohammedEbrahim El SherbinySakr. “Christian Attitudes towards the Bible through Wikipedia Content” Volume 83, Issue: May – June 2020, P: 9260 – 9269. (TEM).
III. AmerOmran Al-Khafaji, (2009), References for Understanding the Quranic Text of the German Orientalist (Noldke) in his book (History of the Qur’an), Babylon University Journal, Humanities, Part 1, No. 1.
IV. Dr.Fadl Abbas (1989), Qur’anic Issues in the British Encyclopedia, Criticism of defamation, answer to suspicion, Publishing house, Oman.
V. Dr. Mahmoud Zakzouk, (1983 AD – 1404 AH). Orientalism and the intellectual background of the civilization conflict.
VI. Dr. Muhammad Abu Laila (2002) The Noble Qur’an from an Orientalist perspective: an analytical critical study, publishing center for universities.
VII. Dr. Muhammad Hussein Ali Al-Sagheer (1999) Orientalists and Quranic Studies, Arab Historian’s House, Beirut, Lebanon.
VIII. Dr.Ne’ma Raheem Al-Azzawi (2001) Linguistic Research Approaches between Heritage and Contemporarily, Baghdad, Academic Complex.
IX. Mohammed Ebrahim El SherbinySakr, Amr Mohammed Sayed EmamSallam, M. Elsayed M. M. Abdou, AllaaEddinIsmaail, Yousef A.Baker El-Ebiary. “A Sample of Orientalist Suspicious Contained in The Internet and The Response” Volume 83, Issue: May – June 2020, P: 7026 – 7032. (TEM).
X. MishaJuha, Arab-Islamic Studies in Europe, Arab Names Institute.
XI. YahyaAlyan and Othman Ghunaim (2000) Methods and styles of Scientific Research, Theory and Practice, Dar Al-Safa for Publishing and Distribution, Amman.

View Download

WEB CONTEXT AND THE MULTIPLE SEMANTIC LINGUISTIC ORIGINS AND ITS IMPACTS ON THE PROPHET’S TEXT

Authors:

Omar bin Md Din, Abdul Ghani Bin Md Din, Rusdee Taher , Abduloh Usof, PrasertPanprae, Yousef A.Baker El-Ebiary

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00033

Abstract:

The web content control system is an integrated software package that constitutes a system for managing the content to be published and displayed for visitors and members of the site, and it provides tools to control the publishing process, and these systems usually work on the Internet, although they can also be run on the local network. So, This research aims to apply a linguistic study of the phenomenon of multiplicity of semantics and linguistic meanings to some of the words mentioned in the Prophet’s Hadith, and the extent of the influence of this semantic multiplication in determining the meaning of the prophetic text, and whether or not it is based on a separation in a legal rule of worship or not, with an attempt to weight between multiple and different meanings and meanings, Clarification of weightings, to the conclusion that linking semantic linguistic studies with Islamic studies through analyzing their texts and explaining their linguistic phenomena; One of the important and useful studies in human research, and the research will follow the descriptive analytical method, as the research chose some words from the hadith of the Prophet, as its meanings and linguistic origins multiplied, so he analyzed them and returned them to their semantic linguistic origins used by the Arabs, then applied those indications to the word in the context of the Prophet’s text, And the explanations of the meanings and meanings indicated by those contexts, then weighting between the different meanings and indications in accordance with the linguistic and legal principles, and among the results of the research that the linguistic studies have a close link to the legal studies, and that the multiple semantic assets may have a significant impact in determining the meaning of the hadith, And it is based on determining the different legal rule of worship in it.

Keywords:

Web Context, The Internet,Linguistic significance,semantic transition,semantic allocation,semantic generalization,

Refference:

I. Abdul Ghani Bin Md Din, Omar bin Md Din, Ummu Hani binti Abas, MohdSyauqi bin Arshad, MohdZaki bin Masoh, Yousef A.Baker El-Ebiary. “The Use of Modern Technology in the Semantic Allocation in Terms of Worship” Volume 83, Issue: March – April 2020, P: 13205 – 13213.
II. Al-Albani, Muhammad Nasir al-Din, Sahih al-Jami` al-Saghir and its Increase, al-Fath al-Kabir, the Islamic Office, Third Edition, 1988.
III. Al-Anbari, Abu Muhammad bin Al-Qasim, Al-Zahir in the meanings of people’s words, investigation: Dr. Hatem Saleh Al-Damen, Al-Resala Foundation, first edition 1992.
IV. Al-Asfahani, Abu Al-Faraj Ali bin Al-Hussein Abi Al-Faraj, Songs, Egyptian House of Books edition 1394 AH.
V. Al-Asqalani, Ahmad bin Ali bin Hajar Al-Shafii, Fath Al-Bari Sharh Sahih Al-Bukhari, Dar Al-Maarefah, Beirut, 1959 AD.
VI. Al-Azhari, Abu Mansour Muhammad bin Ahmed, Al-Zahir in “Gharib Al-Imam Al-Shafi’i”, an investigation by: Dr. Abdel-Moneim Al-Taw’iBashnati, Dar Al-Bashaer Al-Islamiyyah, first edition 1419 AH.
VII. Al-Azhari, Abu Mansour Muhammad bin Ahmed, Refining the Language, an investigation: Abd al-Salam Muhammad Harun, Dar al-Sadiq, 1990.
VIII. Al-Bukhari, Muhammad bin Ismail Abu Abdullah, The Right Compact Mosque, investigation: Dr. Mustafa Deeb Al-Bagha, Dar Ibn Katheer, Al-Yamamah, Third Edition, 1987.
IX. Al-Farahidi, Hebron bin Ahmed, Al-Ain, investigation: Dr. Mahdi Al-Makhzoumi, and Dr. Ibrahim Al-Samarrai, Al-Hilal House and Library.
X. Al-Fayoumi, Ahmad ibn Muhammad ibn Ali al-Muqri, The luminous lamp in Gharib al-Sharh al-Kabir, Lebanon Library, 1990.
XI. Al-Gohary, Ismail bin Hammad, Al-Sahah, investigation by Ahmed Abdul Ghafour Attar, Dar Al-Alam for millions, fourth edition, 1990
XII. Al-Khattabi, by Imam Abi Suleiman Hamad bin Muhammad bin Ibrahim Al-Busti, Gharib Al-Hadith, investigation: Abdel-Karim Ibrahim Al-Azbawi, Dar Al-Fikr, Damascus, second edition 2002.
XIII. Al-Matarazi, Abu Al-Fath Nasir Al-Din Bin Abd Al-Sayyid Bin Ali, Morocco in Order of the Arabized, by: Mahmoud Fakhoury and Abdel Hamid Mukhtar, Osama Bin Zaid Library, Aleppo, first edition, 1979 AD.
XIV. Al-Nasafi, Omar bin Muhammad bin Ahmed, students of students in jurisprudence terminology, the investigator: Muhammad Hassan Ismail, House of Scientific Books, 1997 AD.
XV. Al-Nawawi, Abu Zakaria Yahya bin Sharaf bin Mari, The curriculum explained Sahih Muslim bin Al-Hajjaj, the Arab Heritage Revival House, Beirut, second edition, 1392 AH.
XVI. Al-Waqshi, Hisham bin Ahmed Al-Andalusi, Commentary on Al-Muwatta for Al-Waqshi, investigation: Dr. Abdul Rahman bin Sulaiman Al-Othaimeen, Al-Obeikan Library, first edition 1421 AH.
XVII. Al-Suyuti, Abdul-Rahman Jalaluddin, Al-Mizhar in Language Sciences and its Types, Investigation and Explanation: Muhammad Ahmad Jad Al-Mawla and others, Dar Al-Turath Library, Cairo, Egypt, Third Edition, Dr.
XVIII. Al-Zamakhshari, Mahmoud bin Omar, Al-Faeq in Gharib Al-Hadith, investigation: Ali Muhammad Al-Bajawi, and Muhammad Abu Al-Fadl Ibrahim, Dar Al-Maarefa – Lebanon, second edition
XIX. Ebrahim M. A. Eldesoky, Abdu Ghani Bin Md Din, M. I. H. Othman, Omar Bin MdDin, M. Azizul R. bin Zabidin, Yousef A.Baker El-Ebiary. “Context and Building the Semantics of the Text Linguistically and Technically Using Semantic Web” Volume 82, Issue: January – February 2020, P: 11609 – 11614.
XX. Elsayed Mohamed Salem SalemElawadi, Zulazhan Ab. Halim, Najeeb Abbas Al-Sammarraie, Yousef Abubaker El-Ebiary, Bishwajeet Pandey, (2019). “Digitization of the Arabic Language Between Reality and Expectations”, (IJRTE), Volume-8 Issue-2S3, pp. 1151-1158.
XXI. Elsayed Mohamed Salem SalemElawadi, Zulazhan Ab. Halim, Najeeb Abbas Al-Sammarraie, Yousef Abubaker El-Ebiary, Bishwajeet Pandey, (2019). “The Impact of E-Learning in Teaching Arabic Language for Non-Native Speakers”, (IJRTE), Volume-8 Issue-2S3, pp. 1159-1162.
XXII. ElsayedSalemm, Ragab Awad, Abdelsattar Ayoub, Abdelrahman Tahawi, Yousef A.Baker El-Ebiary, Bishwajeet Pandey. “The Importance of Rhetorical and the Technological Learning Solutions for Non-Arabic Speakers”, (TEM), Volume 82, Issue: January-February 2020, P: 16484 – 16492.
XXIII. Ibn Al-Atheer, Abu Al-Saadat, The End in Gharib Al-Hadith and Al-Athar, by Tahir Al-Zawi and Mahmoud Al-Dahi, Al-Babi Al-Halabi Press, First Edition, 1965 AD.
XXIV. Ibn Al-Attar, Imam Ala Al-Din Ali Bin Dawood Bin Al-Attar Al-Shafi’i, The Kit in Explaining the Mayor, Investigation: Nizam Muhammad Salih Yaqoubi, Dar Al-Bashaer Al-Islamiyyah, First Edition 2007 AD.
XXV. Ibn Al-Jawzi, Abu al-Faraj Abdul Rahman, revealed the problem from the hadith of Sahihin, an investigation: Ali Hussein al-Bawab, Dar Al-Watan, Riyadh, 1418 AH.
XXVI. Ibn Al-Malqan, Abu Hafs Omar bin Ali bin Ahmed Al-Ansari Al-Shafi’i, Information on the Benefits of the Mayor of Al-Ahkam, Investigation: Abdulaziz Al-Mushaigeh, Dar Al-Asimah, First Edition, 1997.
XXVII. Ibn Dureid, Muhammad ibn al-Hasan Abu Bakr, the language community, an investigation: Ramzi Munir Baalbaki, House of Knowledge for millions, 1987
XXVIII. Ibn Faris, Abu al-Hussein Ahmad bin Zakaria, Standards of Language, taken care of by: Muhammad AwadMarab, and Fatima Muhammad Aslan, House of Revival of Arab Heritage, Beirut, first edition, 2002 AD.
XXIX. Ibn Salam, al-Qasim al-Hirawi Abu Ubaid, Gharib al-Hadith, investigation: Dr. Muhammad Abd al-Mu`id Khan, Dar al-Kitab al-Arabi, Beirut, first edition, 1396 AH.
XXX. Ibn Qutaybah, Abu Muhammad Abdullah bin Muslim al-Dinuri, Gharib al-Hadith by Ibn Qutaybah, investigation: NaimZarzur, Dar Al-Kutub Al-Alami, First Edition 1408 AH.
XXXI. Muslim, Muslim ibn al-Hajjaj Abu al-Husayn al-Qushairi al-Nisaburi, Sahih Muslim, investigation by Muhammad Fuad Abd al-Baqi, Arab Heritage Revival House, Beirut, 1991 AD.
XXXII. Rabie I. M. Hassan, Abdul Ghani Bin Md Din, Shehata Hafez M. El Sheikh, Mohamed Hamed M. Said, Sha’aban Abdel Hamid Refae M., Yousef A.Baker El-Ebiary. “Computer Etiquette and Its Role in Organizing Peaceful Coexistence” Volume 83, Issue: March – April 2020, P: 13214 – 13224.
XXXIII. Ragab Awad, Elsayed Salem, Abdelsattar Ayoub, Abdelrahman Tahawi, Yousef A.Baker El-Ebiary, Bishwajeet Pandey. “The Online Platform Mechanism and Characteristics in Arabic Language Tests for Non-Native Speakers” Volume 82, Issue: January-February 2020, P: 16473 – 16483.

View Download

CFD ANALYSIS OF RB211AND CFM56 CHEVRON NOZZLES

Authors:

N.MK.Sarath Kumar, A.Vamsi Krishna , G.Shyam Mahesh, K.Bharath Kumar, M.Venkataiah

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00034

Abstract:

With the increase in advancements in the aerospace industry, the introduction of the concept of the chevron to reduce noise and turbulence has been effective to a certain extent. In the present context, a baseline axisymmetric separate-flow nozzle with standard dimensions is taken into consideration. Then the chevron nozzle represents the conventional chevron nozzle in use today. Noise emission and its intensity have been a major concern for the past few decades. This paper mainly deals with the velocity magnitude and acoustic power level of the four types of nozzles which includes the combination of two nozzles accounting the baseline model and its modification with a set of chevrons. Based on the two results the unprejudiced one is ideal for the airplane.

Keywords:

Chevrons,Nozzles, Noise,Turbulence,

Refference:

I “America on the Move,” National Museum of American History, Smithsonian Institution, n.d. Web.
II Aizat. “Using Technology to Combat Noise,” Silence, Please – On Noise Pollution, Blog Post, Centre for Instructional Technology, National University of Singapore, 13 Oct. 2016. Web.
III Janardan, B.A., Hoff, G.E., Barter, J.W., Martens, “AST Critical Propulsion and Noise Reduction Technologies for Future Commercial Subsonic Engines: Separate-Flow Exhaust System Noise Reduction Concept Evaluation,” NASA CR 2000-210039, 2000.
IV Krothapalli, A., Venkatakrishnan, L., Elavarasan, R., and Lourenco, L., Supersonic jet noise suppression by water injection, 2000, AIAA-2000-2025.
V MunipallyPrathibha, CFD Analysis on a Different Advanced Rocket Nozzles, August 2015, pp. 14–22.
VI SunayanMullick, Impact Of New Chevron Configurations On Mixing Enhancement In Subsonic Jets, 26 Apr 2016. Web.

View Download

SIMULATION OF SHANK-FOOT 2-DOF MANIPULATOR WITH COMPUTED TORQUE CONTROL FOR TRAJECTORY GENERATION

Authors:

Gamini Suresh, K.Balakrishna Reddy, M.Nagarjuna

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00035

Abstract:

Exoskeletons and external assistive devices for human locomotion plays an predominant role in now a days. To assist elderly people and injured content, a shank foot manipulator is modelled and analysed. This shank foot manipulator is a 2 degree of freedom link which is represented by dynamic equation of non linear differential equation. Numerical solution is employed to obtain the closed form solutions. The trajectory generated by the manipulator is discussed with the control strategies like computed torque control with the use of MATLAB. Due to the uncertainties and non linearity nature, it becomes complex to attain the motion control in a accurate position. With the ease of computed torque control, the manipulator is made to be in a desired position.

Keywords:

Shank-foot manipulator, Control,Desired Trajectory generation,

Refference:

I. Merabet, A. & Gu, J. 2010. Advanced Nonlinear Control of Robot Manipulators. INTECH,Open Access Publisher.

II. Kordasz, M., Kuczkowski, K. & Sauer, P. 201-Study on possible control algorithms forlower limb rehabilitation system. In: Rehabilitation Robotics (ICORR), 2011 IEEE International Conference on. IEEE,1–6.

III. Tomachika Ozaki, Tatsuya Suzuki, Takeshi Furuhashi, Shigeru Okuma, YoshikiUchikawa. “Trajectory Control of Robotic Manipulators Using Neural Networks”.IEEE Transactions on Industrial Electronics, Vol. 38, No. 3, June 1991.

IV. Suel Jung, “Neural Network Controllers for Robot Manipulators”. PhD Dissertation, University of California, 1996.

V. Suel Jung, T.C. Hsia, “Neural Network Reference Compensation Technique for Position Control of Robot Manipulators”, Proceedings of the IEEE International Conference on Neural Networks, Vol. 3, pp. 1765-1770, 1996.

VI. Amol A. Khalate, Gopinathan Leena, GoshaidasRay,’An Adaptive Fuzzy Controller for Trajectory Tracking of Robot Manipulator’, Intelligent Control and Automation, 2011, 364-370

VII. Koren Ward,’ Rapid Simultaneous Learning of Multiple Behaviours with a Mobile Robot’ Proc. 2001,Australian Conference on Roboics and Automation ,Sydney,14-15 Nov 2001

VIII. J.Y.S. Luh, Conventional controller design for Industrial robots-a tutorial, IEEE Trans. Systems Man Cybernet. 1983, 298–316.

IX. Pradeep K. Khosla, Takeo Kanade, Experimental of Evaluation of Nonlinear Feedback and Feedforward Control Schemes for Manipulators, The International Journal of Robotirs Research, Vol. 7, No. 1, February 1988.

X. J.J.E. Slotine, W. Li, Adaptive Manipulator Control: A Case Study, IEEE Trans. Automat. Control 33, 1988 , 995– 1003.

XI. Mark W.Spong and M.Vidyasagar, ”Robot Dynamics and control” John Wiley & Sons,2004.

XII. John M Hollerbach , ‘Computer, Brains and the Control Movement’, Manchester Institute of Technology,Artificial Intelligence Laboratory, June 1982.

XIII. Jolly Shah, Dr.S.S.Rattan, Prof. B. C. Nakra,’ Kinematic Analysis of a Planer Robot Using Artificial Neural Network’, International Journal of Robotics and Automation, September 2012, 145-151.

XIV. Dodds ,A two-link manipulator: simulation and control design Advisor: Dr.MahboubBaccouch , University of Nebraska at Omaha Omaha, NE, 68134, March 2012

XV. Duy Nguyen-Tuong, Jan Peters,’ Learning Robot Dynamics for Computed Torque Control using Local Gaussian Processes Regression’, ECSIS Symposium on Learning and Adaptive Behaviors for Robotic Systems, 2008.

XVI. R. K. Mandava and P. R. Vundavilli, “Study on Influence of Hip Trajectory on the Balance of a Biped Robot,” pp. 265–272.

View Download

A REVIEW ON SURFACE DISPLACEMENTS AND STRAINS USING DIGITAL IMAGE CORRELATION TECHNIQUES

Authors:

Srikar Gemaraju, Kiran Kumar Yadav Aerra, Suresh Gamini, Phaneendra Kumar Kopparthi, Bhaskara Rao Pathakokila

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00036

Abstract:

In the earlier days, the displacement and strain were being measured by conventional techniques. The most useful and efficient tool put in practice with the implementation of advances in technology to measure displacements and strains on the region of interest of the object is full field optical measurement technique. This technique is a non-contact optical method known as digital image correlation (DIC), which compares the images captured before and after deformation and stores in a computer for the measurement of displacements and strains.These can be determined considering the displacement of speckles deposited on the surface of object. In this paper, the two-dimensional digital image correlation (2D-DIC) and three-dimensional digital image correlation (3D-DIC) are presented and its fundamental concepts are discussed.

Keywords:

Digital image correlation,Displacement,Strain, Error,

Refference:

I. S.W. Khoo, S. Karuppanan, C. Tan, “A review of surface deformation and strain measurement using two-dimensional digital image correlation”, Metrology and Measurement Systems,Vol 23 (3), 461-480, 2016
II. M.A. Sutton, J. Orteu, H.W. Schreier, “Image correlation for shape, motion and deformation measurements”, Basic concepts, Theory and Applications. Springer-2009
III. N.R. Kolanu and M. Ramji, “Material characterization of Al-2014 T6 alloy using 3D digital image correlation technique”, International Journal of Innovation & Research, 1-8, 2014
IV. B. Pan, K. Qian, H. Xie, A. Asundi, “Two-dimensional digital image correlation for in-plane displacement and strain measurement: a review”, Measurement Science and Technology, 20, 1-17, 2009
V. F. Hild and S. Roux, “Digital image correlation: from displacement measurement to identification of elastic properties –a review”, Strain, 42: 69-80, 2006
VI. M.A. Sutton, S.R. McNeill, J. Jang, M. Babai, “Effects of sub-pixel image restoration on digital correlation error estimates”, Optical Engineering, 27, 870-877, 1988
VII. H.W. Schreier, J.R. Braasch, M.A. Sutton, “Systematic errors in digital image correlation caused by intensity interpolation”, Optical Engineering, 3, 2915-2921, 2000
VIII. D.J. Chen, F.P. Chiang, Y.S. Tan, H.S. Don, “Digital speckle-displacement measurement using a complex spectrum method”, Applied Optics, 32, 1839-1849, 1993
IX. M. Sjodahl and L.R. Benckert, “Electronic speckle photography: analysis of an algorithm giving the displacement with sub-pixel accuracy,” Applied Optics, 32, 2278-2284, 1993
X. P. Bing, X. Hui-min, X. Bo-qin, D. Fu-long, “Performance of sub-pixel registration algorithms in digital image correlation”, Measurement Science and Technology, 17(6), 1615-21, 2006
XI. B.C. Wattrisse, A. Muracciole, J.M. Nemoz-Gaillard, “Analysis of strain localization during tensile tests bydigital image correlation”, Experimental Mechanics, 41, 29-39, 2001
XII. B. Pan, H.M. Xie, Z.Q. Guo, T. Hua, “Full-field strain measurement using a two-dimensional Savitzky-Golaydigital differentiator in digital image correlation”, Optical Engineering, 46(3), 33601-33610, 2007
XIII. B. Pan, A. Asundi, H.M. Xie, J.X. Gao, “Digital image correlation using iterative least squares and pointwise least squares for displacement field and strain field measurements,” Optics and Lasers in Engineering, 47 (7), 865-874, 2009
XIV. H. Haddadi and S. Belhabib, “Use of rigid-body motion for the investigation and estimation of the measurement errors related to digital image correlation technique”, Optics and Lasers in Engineering, 46, 185-96, 2007
XV. W.H. Peters and W.F. Ranson, “Digital imaging techniques in experimental stress analysis”, Optical Engineering, 21 (3), 427-431, 1982
XVI. B.K. Bay, T.S. Smith, D.P. Fyhrie, M. Saad, “Digital volume correlation: three-dimensional strain mapping using x-ray tomography”, Experimental Mechanics, 39, 217-26, 1999
XVII. T.S. Smith, B.K. Bay, M.M. Rashid, “Digital volume correlation including rotational degrees of freedom during minimization”, Experimental Mechanics, 42, 272-278, 2002
XVIII. A.S. Michael, “Digital image correlation for shape and deformation measurements”, Part C, Non-contact methods, 565-600, 2008

View Download