Search results for: Egyptian code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 883

Search results for: Egyptian code

883 English Loanwords in the Egyptian Variety of Arabic: Morphological and Phonological Changes

Authors: Mohamed Yacoub

Abstract:

This paper investigates the English loanwords in the Egyptian variety of Arabic and reaches three findings. Data, in the first finding, were collected from Egyptian movies and soap operas; over two hundred words have been borrowed from English, code-switching was not included. These words then have been put into eleven different categories according to their use and part of speech. Finding two addresses the morphological and phonological change that occurred to these words. Regarding the phonological change, eight categories were found in both consonant and vowel variation, five for consonants and three for vowels. Examples were given for each. Regarding the morphological change, five categories were found including the masculine, feminine, dual, broken, and non-pluralize-able nouns. The last finding is the answers to a four-question survey that addresses forty eight native speakers of Egyptian Arabic and found that most participants did not recognize English borrowed words and thought they were originally Arabic and could not give Arabic equivalents for the loanwords that they could recognize.

Keywords: sociolinguistics, loanwords, borrowing, morphology, phonology, variation, Egyptian dialect

Procedia PDF Downloads 362
882 Code-Switching and Code Mixing among Ogba-English Bilingual Conversations

Authors: Ben-Fred Ohia

Abstract:

Code-switching and code-mixing are linguistic behaviours that arise in a bilingual situation. They limit speakers in a conversation to decide which code they should use to utter particular phrases or words in the course of carrying out their utterance. Every human society is characterized by the existence of diverse linguistic varieties. The speakers of these varieties at some points have various degrees of contact with the non-speakers of their variety, which one of the outcomes of the linguistic contact is code-switching or code-mixing. The work discusses the nature of code-switching and code-mixing in Ogba-English bilinguals’ speeches. It provides a detailed explanation of the concept of code-switching and code-mixing and explains the typology of code-switching and code-mixing and their manifestation in Ogba-English bilingual speakers’ speeches. The findings reveal that code-switching and code-mixing are functionally motivated and being triggered by various conversational contexts.

Keywords: bilinguals, code-mixing, code-switching, Ogba

Procedia PDF Downloads 156
881 Effect of Bored Pile Diameter in Sand on Friction Resistance

Authors: Ashraf Mohammed M. Eid, Hossam El Badry

Abstract:

The bored pile friction resistance may be affected by many factors such as the method of construction, pile length and diameter, the soil properties, as well as the depth below ground level. These factors can be represented analytically to study the influence of diameter on the unit skin friction. In this research, the Egyptian Code of soil mechanics is used to assess the skin friction capacity for either the ordinary pile diameter as well as for the large pile diameter. The later is presented in the code and through the work of some researchers based on the results of investigations adopted for a sufficient number of field tests. The comparative results of these researchers with respect to the Egyptian Code are used to check the adequacy of both methods. Based on the results of this study, the traditional static formula adopted for piles of diameter less than 60 cm may be continually used for larger piles by correlating the analyzed formulae. Accordingly, the corresponding modified angle of internal friction is concluded demonstrating a reduction of shear strength due to soil disturbance along the pile shaft. Based on this research the difference between driven piles and bored piles constructed in same soil can be assessed and a better understanding can be evaluated for the effect of different factors on pile skin friction capacity.

Keywords: large piles, static formula, friction piles, sandy soils

Procedia PDF Downloads 465
880 Employing QR Code as an Effective Educational Tool for Quick Access to Sources of Kindergarten Concepts

Authors: Ahmed Amin Mousa, M. Abd El-Salam

Abstract:

This study discusses a simple solution for the problem of shortage in learning resources for kindergarten teachers. Occasionally, kindergarten teachers cannot access proper resources by usual search methods as libraries or search engines. Furthermore, these methods require a long time and efforts for preparing. The study is expected to facilitate accessing learning resources. Moreover, it suggests a potential direction for using QR code inside the classroom. The present work proposes that QR code can be used for digitizing kindergarten curriculums and accessing various learning resources. It investigates using QR code for saving information related to the concepts which kindergarten teachers use in the current educational situation. The researchers have established a guide for kindergarten teachers based on the Egyptian official curriculum. The guide provides different learning resources for each scientific and mathematical concept in the curriculum, and each learning resource is represented as a QR code image that contains its URL. Therefore, kindergarten teachers can use smartphone applications for reading QR codes and displaying the related learning resources for students immediately. The guide has been provided to a group of 108 teachers for using inside their classrooms. The results showed that the teachers approved the guide, and gave a good response.

Keywords: kindergarten, child, learning resources, QR code, smart phone, mobile

Procedia PDF Downloads 266
879 The Egyptian eGovernment Journey

Authors: Ali Abdelsattar Elshabrawy

Abstract:

The Egyptian government is struggling to build it's eGovernment project. They succeeded to build the Egyptian digital portal, which contain links for number of services provided by different ministries. For achieving such success, their are requirements necessary to build such a project such as: internet dissemination, IT literacy, Strategy, disqualification of paper based services. This paper is going to clarify the main obstacles to the Egyptian eGovernment project from both the supply and demand sides. Also will clarify the most critical requirements in this phase of the project lifecycle. This paper should be in great value for the project team and also for many other developing countries that share the same obstacles.

Keywords: the egyptian egovernment project lifecycle, supply side barriers, demand side barriers, egovernment project requirements

Procedia PDF Downloads 127
878 Interdisciplinary Urban Design: Toward Egyptian Manifesto

Authors: Hisham M. G. Abusaada

Abstract:

This article focuses on the field the art of the city, at the beginning of the third millennium, in the 21st century. It seems that a few Egyptian architects suffer from the lack of the ability to create and share knowledge in their field of proficiency. The assumption is that this weakness is the main reason that led to the invalidity of the local theorizing process. The presupposition is that the absence of respecting the conceptualization of enlightenment during the two phases of preparing and teaching the educational programs makes the students urban design projects not well designed. This paper submits an Egyptian Manifesto, to formulate some guidelines for the development of the work of some researchers, scholars and specialist's method.

Keywords: Egyptian manifesto, pedagogy, knowledge, urban design

Procedia PDF Downloads 429
877 The Works of Ibrahim Eissa: A Controversy

Authors: Malak Khaled Hosny

Abstract:

The paper inspects Ibrahim Eissa, a famous Egyptian writer and TV persona, and his literary and film works. Having faced threats of persecution and assassination, Eissa is a controversial figure in Egyptian media, and his works always pose a trigger of outrage and conversation. His book The Preacher, his movie The Guest, and his TV show Faten Amal Harby all led to some controversy unfolding in Egyptian society, and all led to conversations erupting in Egyptian households and on social media platforms. Through a close reading of his written work and an analytic watch of his work on-screen, the paper delves into the details of the intentions behind and the repercussions of Ibrahim Eissa's work.

Keywords: censorship, film, literature, religion

Procedia PDF Downloads 77
876 Astronomical Panels of Measuring and Dividing Time in Ancient Egypt

Authors: Omnia Abd Elghany Zaki Mohamed Mahmoud

Abstract:

The ancient Egyptian used the stars to measure time or in a more precise sense as one of the astronomical means of measuring time. These methods differed throughout the historical ages. They began with simple observations of observing astronomical phenomena and watching them, such as observing the movements of the stars in the sky. The year, to know the days, nights, and other means used to help set the time when the sky overcast, and so the researcher tries through archaeological evidence to demonstrate the knowledge of the ancient Egyptian stars of heaven, and movements through the first pre-history. It is not believed that the astronomical information possessed by the Egyptian was limited, and simple, it was reaching a level of almost optimal in terms of importance, and the goal he wanted to reach the ancient Egyptian, and also help him to know the time, and the passage of time; which ended in finally trying to find a system of timing and calculation of time. It was noted that there were signs that the stellar creed was known, and prosperous, especially since the pre-family ages, and this is evident on the inscriptions that come back to that period. The Egyptian realized that some of the stars remain visible at night, The ancient Egyptian was familiar with the daily journey of the stars. This is what was adopted in many paragraphs of the texts of the pyramids, and its references to the rise of the deceased king of the heavenly world between the stars of the eternal sky. It was noted that the ancient Egyptian link between the doctrine of the star, it find that the public The lunar was known to the ancient Egyptian, and sang it for two years: and the stellar solar; but it was based on the appearance of the star Sirius, and this is the first means used to measure time, and know the calendar stars.

Keywords: archaeology, astronomical panels, ancient Egypt, Egyptian

Procedia PDF Downloads 18
875 Characterization of Onboard Reliable Error Correction Code FORSDRAM Controller

Authors: N. Pitcheswara Rao

Abstract:

In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.

Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code

Procedia PDF Downloads 404
874 Characterization of Onboard Reliable Error Correction Code for SDRAM Controller

Authors: Pitcheswara Rao Nelapati

Abstract:

In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.

Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code

Procedia PDF Downloads 398
873 Error Analysis of the Pronunciation of English Consonants and Arabic Consonants by Egyptian Learners

Authors: Marwa A. Nasser

Abstract:

This is an empirical study that provides an investigation of the most significant errors of Egyptian learners in producing English consonants and Arabic consonants, and advice on how these can be remedied. The study adopts a descriptive approach and the analysis is based on audio recordings of two groups of people. The first group includes six volunteers of Egyptian learners belonging to the English Department at Faculty of Women who learn English as a foreign language. The other group includes six Egyptian learners who are studying Tajweed (how to recite Quran correctly). The audio recordings were examined, and sounds were analyzed in an attempt to highlight the most common error done by the learners while reading English or reading (or reciting) Quran. Results show that the two groups of learners have problems with certain phonemic contrasts. Both groups share common errors although both languages are different and not related (e.g. pre-aspiration of fortis stops, incorrect articulation of consonants and velarization of certain sounds).

Keywords: consonant articulations, Egyptian learners of English, Egyptian learners of Quran, empirical study, error analysis, pronunciation problems

Procedia PDF Downloads 249
872 A Resistant-Based Comparative Study between Iranian Concrete Design Code and Some Worldwide Ones

Authors: Seyed Sadegh Naseralavi, Najmeh Bemani

Abstract:

The design in most counties should be inevitably carried out by their native code such as Iran. Since the Iranian concrete code does not exist in structural design software, most engineers in this country analyze the structures using commercial software but design the structural members manually. This point motivated us to make a communication between Iranian code and some other well-known ones to create facility for the engineers. Finally, this paper proposes the so-called interpretation charts which help specify the position of Iranian code in comparison of some worldwide ones.

Keywords: beam, concrete code, strength, interpretation charts

Procedia PDF Downloads 501
871 Code-Switching in Facebook Chatting Among Maldivian Teenagers

Authors: Aaidha Hammad

Abstract:

This study examines the phenomenon of code switching among teenagers in the Maldives while they carry out conversations through Facebook in the form of “Facebook Chatting”. The current study aims at evaluating the frequency of code-switching and it investigates between what languages code-switching occurs. Besides the study identifies the types of words that are often codeswitched and the triggers for code switching. The methodology used in this study is mixed method of qualitative and quantitative approach. In this regard, the chat log of a group conversation between 10 teenagers was collected and analyzed. A questionnaire was also administered through online to 24 different teenagers from different corners of the Maldives. The age of teenagers ranged between 16 and 19 years. The findings of the current study revealed that while Maldivian teenagers chat in Facebook they very often code switch and these switches are most commonly between Dhivehi and English, but some other languages are also used to some extent. It also identified the different types of words that are being often code switched among the teenagers. Most importantly it explored different reasons behind code switching among the Maldivian teenagers in Facebook chatting.

Keywords: code-switching, Facebook, Facebook chatting Maldivian teenagers

Procedia PDF Downloads 222
870 Archaeology Study of Soul Houses in Ancient Egypt on Five Models in the Grand Egyptian Museum

Authors: Mahmoud Aly, Mohamed Ismail, Mohamed Badereldin, Amro Mostafa

Abstract:

Introduction: The models of soul houses were appeared in the prehistory, old kingdom, and middle kingdom period. They represented the imagination of the deceased about his house in the afterlife, some of these soul houses were two floors, and the study will examine five models of soul houses which were discovered near Saqqara site by an Egyptian mission. These models had been transferred to The Grand Egyptian Museum (GEM) to be ready to display at the new museum. We focus upon five models of soul houses (GEM Numbers, 1276,1280,1281,1282,8711) they related to the old kingdom period. These models were all made of pottery, the five models have oval shape and were decorated with relief. Methodology: The study will focus on the development of soul houses during the different periods in ancient Egypt and the kinds of offerings which will reflect the economic situation in the Egyptian society and kinds of oils which were famous in ancient Egypt. Conclusion: This research focuses on the function of soul house and the kind of offerings which were put in it, This study will be useful for the heritage and ancient civilizations, specially when we talk about opening new museums like The Grand Egyptian Museum, which will display a new collection of soul houses.

Keywords: archaeology study, grand egyptian museum, relief, soul houses

Procedia PDF Downloads 54
869 Nutritional Quality of Partially Processed Chicken Meat Products from Egyptian and Saudi Arabia Markets

Authors: Ali Meawad Ahmad, Hosny A. Abdelrahman

Abstract:

Chicken meat is a good source of protein of high biological value which contains most of essential amino-acids with high proportion of unsaturated fatty acids and low cholesterol level. Besides, it contain many vitamins as well as minerals which are important for the human body. Therefore, a total of 150 frozen chicken meat product samples, 800g each within their shelf-life, were randomly collected from commercial markets from Egypt (75 samples) and Saudi Arabian (75 samples) for chemical evaluation. The mean values of fat% in the examined samples of Egyptian and Saudi markets were 16.0% and 4.6% for chicken burger; 15.0% and 11% for nuggets and 11% and 11% for strips respectively. The mean values of moisture % in the examined samples of Egyptian and Saudi markets were 67.0% and 81% for chicken burger; 66.0% and 78% for nuggets and 71.0% and 72% for strips respectively. The mean values of protein % in the examined samples of Egyptian and Saudi markets were 15% and 17% for chicken burger; 16% and 16% for nuggets and 16% and 17% for strips respectively. The obtained results were compared with the Egyptian slandered and suggestions for improving the chemical quality of chicken products were given.

Keywords: chicken meat, nutrition, Egypt, markets

Procedia PDF Downloads 545
868 Potential Risk Factors Associated with Sole Hemorrhages Causing Lameness in Egyptian Water Buffaloes and Native Breed Cows

Authors: Waleed El-Said Abou El-Amaiem

Abstract:

Sole hemorrhages are considered as a main cause for sub clinical laminitis. In this study we aimed at discussing the most prominent risk factors associated with sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows. The final multivariate logistic regression model showed, a significant association between sub acute ruminal acidosis (P< 0.05), limb affected (P< 0.05) and weight (P< 0.05) and sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows. According to our knowledge, this is the first paper to discuss the risk factors associated with sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows.

Keywords: lameness, buffalo, sole hemorrhages, breed cows

Procedia PDF Downloads 428
867 The Anti-Cyber and Information Technology Crimes Law on Information Access and Dissemination by Egyptian Journalists

Authors: Miral Sabry AlAshry

Abstract:

The main objective of the study is to investigate the effectiveness of Egyptian Journalists through the Anti-Cyber and Information Technology Crimes Law, as well as its implications for journalistic practice and the implications for press freedom in Egypt. Questionnaires were undertaken with 192 journalists representing four official newspapers, and in-depth interviews were held with 15 journalists. The study used an Authoritarian theory as a theoretical framework. The study revealed that the government placed restrictions on journalists by using the law to oppress them.

Keywords: anti-cyber and information technology crimes law, media legislation, personal information, Egyptian constitution

Procedia PDF Downloads 349
866 The Pragmatics of the Evil Eye: Compliment Response Strategies in Egyptian Colloquial Arabic

Authors: HebatAllah Mohamed

Abstract:

The present study aims at identifying compliment response strategies used by Egyptian students when responding to a problematic and cultural-specific type of compliments: those allegedly provoking the evil eye. Discourse Completion Tasks (DCTs) and interviews were used to collect the data. both The participants were 21 female and 16 male Egyptian graduate and undergraduate students at the American university in Cairo. The results revealed a number of both common and different main and sub-categories of responses utilized by participants of both genders. Pedagogical implications are discussed.

Keywords: Arabic pragmatics, compliment responses, evil eye pragmatics, pragmatics in Egypt

Procedia PDF Downloads 462
865 Means of Securing Graves in the Egyptian Kingdom Era

Authors: Mohamed Saeed Ahmed Salman

Abstract:

This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.

Keywords: Egyptian kingdom, ancient Egyptian, securing graves, Means of securing graves, Egypt, archaeology

Procedia PDF Downloads 52
864 Means of Securing Graves in the Egyptian Kingdom Era

Authors: Mohamed Ahmed Madkour, Haitham Magdy Hamad

Abstract:

This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.

Keywords: archaeology, Egyptian kingdom era, graves, tombs, ancient Egyptian

Procedia PDF Downloads 47
863 Features of Testing of the Neuronetwork Converter Biometrics-Code with Correlation Communications between Bits of the Output Code

Authors: B. S. Akhmetov, A. I. Ivanov, T. S. Kartbayev, A. Y. Malygin, K. Mukapil, S. D. Tolybayev

Abstract:

The article examines the testing of the neural network converter of biometrics code. Determined the main reasons that prevented the use adopted in the works of foreign researchers classical a Binomial Law when describing distribution of measures of Hamming "Alien" codes-responses.

Keywords: biometrics, testing, neural network, converter of biometrics-code, Hamming's measure

Procedia PDF Downloads 1116
862 Optical Multicast over OBS Networks: An Approach Based on Code-Words and Tunable Decoders

Authors: Maha Sliti, Walid Abdallah, Noureddine Boudriga

Abstract:

In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.

Keywords: optical multicast, optical burst switching networks, optical code-words, tunable decoder, virtual optical memory

Procedia PDF Downloads 578
861 Means of Securing Graves in the Egyptian Kingdom Era

Authors: Haitham Nabil Zaghlol Hasan

Abstract:

This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.

Keywords: Egypt, archaeology, civilization, Egyptian

Procedia PDF Downloads 46
860 Photographic Documentation of Archaeological Collections in the Grand Egyptian Museum

Authors: Sameh El Mahdy

Abstract:

Recording and documenting archaeological collections, especially photographic documentation, is considered one of the very important matters that museums care about and give great priority, as photographic documentation is of great importance. We monitor some of them for example, Photographs of collectibles are considered evidence and an archival record that proves the condition of the collectibles at various stages. A photo of the possessions is placed on the paper record of the possessions registration. These photos are used in inventorying archaeological collections. These pictures are viewed by researchers and scholars interested in studying these collections. These images are used in advertising campaigns for museum displays of archaeological collections. The Grand Egyptian Museum is considered one of the museums that is a unique model in terms of establishing a specific system that is used when photographing archaeological collections. The Grand Egyptian Museum sets standards for the photos that are taken inside the Grand Egyptian Museum. We mention some of them for example, Pictures must be of high quality. It is necessary to set a color scale for the drawing in order to clarify the dimensions of the collectibles in the picture and also in order to clarify the natural colors of the collectibles without any additions. Putting the numbers of the collectibles in the pictures, especially the number of the Grand Egyptian Museum. To take a good photo of the artifacts in the Grand Egyptian Museum, there are many steps: (1) Create a good location, (2) How to handle the Artifacts. (3) Choose the best position for the artifact, (4) Make the light to create a good photo without shadows to make the photo represent all the artifact details. (5) Be sure of the camera settings, and their quality. All of these steps and other ones are the best criteria for taking the best photo, which helps us in the database to represent the details of the artifact in our interface.

Keywords: grand egyptian museum, photographing, museum collections, registration and documentation

Procedia PDF Downloads 19
859 Geographic Aspects of Egyptian Illegal Migration to Europe

Authors: Mohamed Ahmed Aly Hassanien

Abstract:

This study examines the geographic aspects of Egyptian illegal migration to Europe. It used files of Egyptian government bodies and data obtained from a field study carried out in 2015 on the areas of origin. The study revealed that the phenomenon has passed historically through four phases. Areas of origin are classified geographically into three areas: coastal, river, and interior. The study developed a map for routes of migration which identified the main and secondary routes. The main routes included the Libyan, the Mediterranean and the Arab-Turkish routes. Recently, The Mediterranean route has been the largest and the most dangerous.

Keywords: areas of destination, areas of origin, illegal migration, routes of migration

Procedia PDF Downloads 323
858 Code Refactoring Using Slice-Based Cohesion Metrics and AOP

Authors: Jagannath Singh, Durga Prasad Mohapatra

Abstract:

Software refactoring is very essential for maintaining the software quality. It is an usual practice that we first design the software and then go for coding. But after coding is completed, if the requirement changes slightly or our expected output is not achieved, then we change the codes. For each small code change, we cannot change the design. In course of time, due to these small changes made to the code, the software design decays. Software refactoring is used to restructure the code in order to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods which requires refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we have used the concepts of Aspects to adjust the code structure so that the external behaviour of the original module does not change.

Keywords: software refactoring, program slicing, AOP, cohesion metrics, code restructure, AspectJ

Procedia PDF Downloads 482
857 Maximum Distance Separable b-Symbol Repeated-Root γ-Constacylic Codes over a Finite Chain Ring of Length 2

Authors: Jamal Laaouine, Mohammed Elhassani Charkani

Abstract:

Let p be a prime and let b be an integer. MDS b-symbol codes are a direct generalization of MDS codes. The γ-constacyclic codes of length pˢ over the finite commutative chain ring Fₚm [u]/ < u² > had been classified into four distinct types, where is a nonzero element of the field Fₚm. Let C₃ be a code of Type 3. In this paper, we obtain the b-symbol distance db(C₃) of the code C₃. Using this result, necessary and sufficient conditions under which C₃ is an MDS b-symbol code are given.

Keywords: constacyclic code, repeated-root code, maximum distance separable, MDS codes, b-symbol distance, finite chain rings

Procedia PDF Downloads 119
856 An Explanatory Study into the Information-Seeking Behaviour of Egyptian Beggars

Authors: Essam Mansour

Abstract:

The key purpose of this study is to provide first-hand information about beggars in Egypt, especially from the perspective of their information seeking behaviour including their information needs. The researcher tries to investigate the information-seeking behaviour of Egyptian beggars with regard to their thoughts, perceptions, motivations, attitudes, habits, preferences as well as challenges that may impede their use of information. The research methods used were an adapted form of snowball sampling of a heterogeneous demographic group of participants in the beggary activity in Egypt. This sampling was used to select focus groups to explore a range of relevant issues. Data on the demographic characteristics of the Egyptian beggars showed that they tend to be men, mostly with no formal education, with an average age around 30s, labeled as low-income persons, mostly single and mostly Muslims. A large number of Egyptian beggars were seeking for information to meet their basic needs as well as their daily needs, although some of them were not able to identify their information needs clearly. The information-seeking behaviour profile of a very large number of Egyptian beggars indicated a preference for informal sources of information over formal ones to solve different problems and meet the challenges they face during their beggary activity depending on assistive devices, such as mobile phones. The high degree of illiteracy and the lack of awareness about the basic rights of information as well as information needs were the most important problems Egyptian beggars face during accessing information. The study recommended further research to be conducted about the role of the library in the education of beggars. It also recommended that beggars’ awareness about their information rights should be promoted through educational programs that help them value the role of information in their life.

Keywords: user studies, information-seeking behaviour, information needs, information sources, beggars, Egypt

Procedia PDF Downloads 298
855 An Examination of the Factors Affecting the Adoption of Cloud Enterprise Resource Planning Systems in Egyptian Companies

Authors: Mayar A. Omar, Ismail Gomaa, Heba Badawy, Hosam Moubarak

Abstract:

Enterprise resource planning (ERP) is an integrated system that helps companies in managing their resources. There are two types of ERP systems, traditional ERP systems and cloud ERP systems. Cloud ERP systems were introduced after the development of cloud computing technology. This research aims to identify the factors that affect the adoption of cloud ERP in Egyptian companies. Moreover, the aim of our study is to provide guidance to Egyptian companies in the cloud ERP adoption decision and to participate in increasing the number of cloud ERP studies that are conducted in the Middle East and in developing countries. There are many factors influencing the adoption of cloud ERP in Egyptian organizations, which are discussed and explained in the research. Those factors are examined by combining the diffusion of innovation theory (DOI) and technology-organization-environment framework (TOE). Data were collected through a survey that was developed using constructs from the existing studies of cloud computing and cloud ERP technologies and was then modified to fit our research. The analysis of the data was based on structural equation modeling (SEM) using Smart PLS software that was used for the empirical analysis of the research model.

Keywords: cloud computing, cloud ERP systems, DOI, Egypt, SEM, TOE

Procedia PDF Downloads 114
854 Performance Analysis and Comparison of Various 1-D and 2-D Prime Codes for OCDMA Systems

Authors: Gurjit Kaur, Shashank Johri, Arpit Mehrotra

Abstract:

In this paper we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension i.e. time slots whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for OCDMA system on a single platform. Results shows that 1D Extended Prime Code (EPC) can support more number of active users compared to other codes but at the expense of larger code length which further increases the complexity of the code. Modified Prime Code (MPC) supports lesser number of active users at λc=2 but it has a lesser code length as compared to 1D prime code. Analysis shows that 2D prime code supports lesser number of active users than 1D codes but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 484