Search results for: Zyad Adnan Turkistani
111 Esophageal Premalignant and Malignant Epithelial Lesions: Pathological Characteristics and Value of Cyclooxygenase-2 Expression.
Authors: Hanan Mohamed Abd Elmoneim, Rawan Saleh AlJawi, Razan Saleh AlJawi, Aseel Abdullah AlMasoudi , Zyad Adnan Turkistani, Anas Abdulkarim Alkhoutani , Ohood Musaed AlJuhani , Hanan Attiyah AlZahrani
Abstract:
Background Esophageal cancer is the eighth most common cancer worldwide. More than 90% of esophageal cancers are either squamous cell carcinoma or adenocarcinoma. Squamous dysplasia is a precancerous lesion for squamous cell carcinoma and Barrett's esophagus is the precancerous lesion for adenocarcinoma. Gastro-esophageal reflux disease (GERD) is the initiation factor for Barrett's esophagus. Cyclooxygenase-2 (COX-2) is a key enzyme in arachidonic metabolism. It appears to play an important role in gastrointestinal carcinogenesis. COX-2 activity may be a potential target for the prevention of cancer progression by selective COX-2 inhibitors, which decrease proliferation and increase apoptosis. Objectives To assess COX-2 expression in premalignant and malignant esophageal epitheliums changes and detect its roles in progression of these lesions. Materials and Methods We analyzed the expression of COX-2 immunohistochemically in 40 esophageal biopsies utilizing the streptavidin-biotin-peroxidase complex method on archival formalin fixed-paraffin embedded blocks. Histopathologically, 17 (42.5%) of cases were non-malignant cases which included GERD, Barrett's esophagus and squamous dysplasia. The malignant cases were 23 (57.5%) squamous cell carcinoma, adenocarcinoma and undifferentiated carcinoma. Results In non-malignant cases 7 (41.2%) out of 17 cases had high COX-2 expression. In squamous cell carcinoma 10 (83.3%) out of 12 cases had high COX-2 expression. The expression of COX-2 was high in all 9 (100%) cases of adenocarcinoma. COX-2 expression is significantly increased (P=0.005 and P=0.0001) in squamous cell carcinoma and adenocarcinoma respectively. There was a significant difference in COX-2 immunoreactivity between malignant and non-malignant lesions (P=0.0003). Conclusion COX-2 is responsible for the progression of esophageal diseases from benign to malignant. We recommend that COX-2 immunohistochemistry should be done routinely for premalignant and malignant esophageal lesions as selective COX-2 inhibitors will be helpful in the treatment. Further studies on molecular and genetic basis of COX-2 expression are needed to unmask its role and relation to progression of esophageal lesions.Keywords: Cox-2, Esophageal adinocarcinoma, Esophageal squamous cell carcinoma, Immunohistochemistry.
Procedia PDF Downloads 350110 Factorial Validity for the Morale Sprit Scale: The Case for Physical Education Faculty Members at Jordanian Universities
Authors: Abedalbasit M. Abedalhafiz, Aman Kasawneh, Zyad Altahynah, Ahmad Okor
Abstract:
The purpose of this study was to determine the construct validity of the morale sprit scale (MSS). Ninety faculty members from colleges of physical education at Jordanian universities were chosen to participate in this study. The design of this study was an ex-post facto. The MSS consists of (48) items that measure different dimensions of morale spirit among faculty members. Principle axis factoring with oblique rotation was utilized to uncover the underlying structure of the instrument. The findings revealed eight factor solution explaining (72.825%). Seven factors were accepted according to the conditions of accepting factors. The seven factors were named morale as reflection of faculty and department's administration, regulations and instructions, working environment and conditions, promotions and incentives and salaries, relations between the faculty member's, the trend toward the college and university, the trend toward self factors.Keywords: Factorial validity, morale sprit, faculty members, Jordanian Universities
Procedia PDF Downloads 416109 Intrusion Detection System Using Linear Discriminant Analysis
Authors: Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou
Abstract:
Most of the existing intrusion detection systems works on quantitative network traffic data with many irrelevant and redundant features, which makes detection process more time’s consuming and inaccurate. A several feature extraction methods, such as linear discriminant analysis (LDA), have been proposed. However, LDA suffers from the small sample size (SSS) problem which occurs when the number of the training samples is small compared with the samples dimension. Hence, classical LDA cannot be applied directly for high dimensional data such as network traffic data. In this paper, we propose two solutions to solve SSS problem for LDA and apply them to a network IDS. The first method, reduce the original dimension data using principal component analysis (PCA) and then apply LDA. In the second solution, we propose to use the pseudo inverse to avoid singularity of within-class scatter matrix due to SSS problem. After that, the KNN algorithm is used for classification process. We have chosen two known datasets KDDcup99 and NSLKDD for testing the proposed approaches. Results showed that the classification accuracy of (PCA+LDA) method outperforms clearly the pseudo inverse LDA method when we have large training data.Keywords: LDA, Pseudoinverse, PCA, IDS, NSL-KDD, KDDcup99
Procedia PDF Downloads 226108 Metastatic Ovarian Tumor Discovered Accidentally during Cesarean Section in a 34 Year Old Woman: A Case Report
Authors: Ghada E. Esheba, Ghufran Kheshaifaty, Kholoud Al-Harbi, Wafa'a Al-Harbi, Ala'a Al-Orabi, Moayad Turkistani
Abstract:
Krukenberg tumor is a rare metastatic ovarian carcinoma that usually occurs in female between 30 - 40 year old and rarely seen after menopause. Stomach is the most common primary site. Histopathological features of krukenberg tumors appear as diffuse stromal proliferation, mucus-production, and numerous signet-cells and these tumors spread mostly by lymphatic route. Treatment and prognostic factors are not well established. This study describes a 34 year old female with a unilateral ovarian mass discovered accidentally during cesarean section delivery and it was misdiagnosed as luteoma of pregnancy, but histopathological examination showed a diffuse infiltration of the ovary and omentum by signet ring cells. These findings were not correlated with luteoma of pregnancy or any other types of primary ovarian tumors like surface epithelial tumor, sex cord stromal tumor or germ cell tumor. However, after the analysis of immunohistochemical results (negative CK7, positive CK20 and CDX-2), the finding was the diagnostic of metastatic krukenberg tumor. Two weeks later, the patient was evaluated and a large gastric tumor was found in her stomach and she underwent gastrectomy.Keywords: CK7, CK20, CDX-2, Krukenburg tumor, metastatic ovarian tumor
Procedia PDF Downloads 315107 Effect of Aeration on Bacterial Cellulose (BC) Production by Gluconacetobacter xylinus DSM46604 in Batch Fermentation
Authors: Azila Adnan, Giridhar R. Nair, Mark C. Lay, Janis E. Swan
Abstract:
The effect of aeration on bacterial cellulose (BC) production by Gluconacetobacter xylinus DSM46604 was studied in 5-L bioreactor. Four aeration rates were applied (0.3, 0.6, 1.0 and 1.5 vvm) in the fermentation media at constant agitation rate, 150 rpm. One vvm enhanced BC concentration (4.4 g/L) and productivity (0.44 g/L/day) while greater agitation rate (1.5 vvm) decreased BC concentration (4.0 g/L) and productivity (0.40 g/L/day).Keywords: aeration, bacterial cellulose, fermentation, gluconacetobacter xylinus
Procedia PDF Downloads 427106 A New Internal Architecture Based On Feature Selection for Holonic Manufacturing System
Authors: Jihan Abdulazeez Ahmed, Adnan Mohsin Abdulazeez Brifcani
Abstract:
This paper suggests a new internal architecture of holon based on feature selection model using the combination of Bees Algorithm (BA) and Artificial Neural Network (ANN). BA is used to generate features while ANN is used as a classifier to evaluate the produced features. Proposed system is applied on the Wine data set, the statistical result proves that the proposed system is effective and has the ability to choose informative features with high accuracy.Keywords: artificial neural network, bees algorithm, feature selection, Holon
Procedia PDF Downloads 457105 The Impacts of Internal Employees on Brand Building: A Case Study of Cell Phone
Authors: Adnan Gohar
Abstract:
This research work aims the importance of internal employees in the making of a brand (cell phone) through customer satisfaction which basically explains the connection of internal employees with external customers. This research is designed to measure the satisfaction level of internal employees which further connects to the product evolution as a brand leaving a brand image in the eye of the external customer. The main focus is that internal employees are as important as external customers for the uplift of the product resulting in the brand. Internal employees are individual organization employees, vendors, departments, and distributors.Keywords: brand building, customer satisfaction, internal employees, mobile franchise
Procedia PDF Downloads 257104 Adaptive Routing Protocol for Dynamic Wireless Sensor Networks
Authors: Fayez Mostafa Alhamoui, Adnan Hadi Mahdi Al- Helali
Abstract:
The main issue in designing a wireless sensor network (WSN) is the finding of a proper routing protocol that complies with the several requirements of high reliability, short latency, scalability, low power consumption, and many others. This paper proposes a novel routing algorithm that complies with these design requirements. The new routing protocol divides the WSN into several sub-networks and each sub-network is divided into several clusters. This division is designed to reduce the number of radio transmission and hence decreases the power consumption. The network division may be changed dynamically to adapt with the network changes and allows the realization of the design requirements.Keywords: wireless sensor networks, routing protocols, AD HOC topology, cluster, sub-network, WSN design requirements
Procedia PDF Downloads 537103 Quick Similarity Measurement of Binary Images via Probabilistic Pixel Mapping
Authors: Adnan A. Y. Mustafa
Abstract:
In this paper we present a quick technique to measure the similarity between binary images. The technique is based on a probabilistic mapping approach and is fast because only a minute percentage of the image pixels need to be compared to measure the similarity, and not the whole image. We exploit the power of the Probabilistic Matching Model for Binary Images (PMMBI) to arrive at an estimate of the similarity. We show that the estimate is a good approximation of the actual value, and the quality of the estimate can be improved further with increased image mappings. Furthermore, the technique is image size invariant; the similarity between big images can be measured as fast as that for small images. Examples of trials conducted on real images are presented.Keywords: big images, binary images, image matching, image similarity
Procedia PDF Downloads 196102 Stress Corrosion Cracking, Parameters Affecting It, Problems Caused by It and Suggested Methods for Treatment: State of the Art
Authors: Adnan Zaid
Abstract:
Stress corrosion cracking (SCC) may be defined as a degradation of the mechanical properties of a material under the combined action of a tensile stress and corrosive environment of the susceptible material. It is a harmful phenomenon which might cause catastrophic fracture without a sign of prior warning. In this paper, the stress corrosion cracking, SCC, process, the parameters affecting it, and the different damages caused by it are given and discussed. Utilization of shot peening as a mean of enhancing the resistance of materials to SCC is given and discussed. Finally, a method for improving materials resistance to SCC by grain refining its structure by some refining elements prior to usage is suggested.Keywords: stress corrosion cracking, parameters, damages, treatment methods
Procedia PDF Downloads 330101 Evaluation of Antimicrobial Activity of Phenolic Compounds Extracted from Jordanian Juglans regia L.
Authors: Hamoud Alshammari, Adnan Almezani, Hamdan Alshammari, Faris Alharbi
Abstract:
In this study we have examined of antimicrobial activity for unripe Juglan Regia phenolic extracts against a wide range of pathogenic microorganisms. Walnut (Juglans regia L.) is a member of Juglandaceae family used as a remedy in folk medicine. Leaves, barks, fruits and husk (peel) reported to harbor distinctive medical effect. In our study, we examined the anti-microbial effect against a set of gram positive and negative bacteria and even we have tested them against eukaryotic candida strains in a concentration gradual manner. Ethyl acetate extract of J. regia had the best antibacterial activity when compared with ciprofloxacin. The Minimum inhibition concentration for S. aureus, P. aerogenosa and S. epidermidis MIC was 0.85 mg/mL.Keywords: antimicrobial, J. regia, S. aureus, phytochemistry
Procedia PDF Downloads 200100 Characterization of Thixoformed AlSi12 Alloy with the Addition of Trace Amounts of Silver
Authors: Nursen Saklakoglu, Adnan Turker
Abstract:
The main objective of this study is to reveal the effect of the Thixoforming process on the microstructure and mechanical properties of the AlSi12 alloy with trace amounts of silver. It is concluded that Thixoforming has an important effect on the morphology of intermetallics and Si formation, as well as globular α-Al morphology. The intermetallics have been fractured during thixoforming. It is believed that the fine distribution of the intermetallics is one mechanism for the improved mechanical properties of Thixoformed alloys. The discrete Si particles have been observed during both isothermal heating to the semi-solid range and Thixoforming, also have an important effect on mechanical properties. The Thixoforming process has a greater effect on hardness than the addition of Ag does.Keywords: AlSi alloys, intermetallic phases, mechanical properties trace element, silver, thixoforming
Procedia PDF Downloads 32699 Case Study of Child Labour in Pakistan
Authors: Ahmad Ali Ansari, Hassan Arshad, Basharat Hussani, Adnan Raza, Ahmad Ali Khan
Abstract:
Child labor is a kind of an issue which was found all over the world, but now the first world countries like countries in Europe and America (USA) got hold of it up to a large extent but Underdeveloped or the developing countries including Pakistan are still a victim of this issue. The following attempt has been made in this research article to figure out the main reasons of child labor in underdeveloped countries especially in Pakistan and also some of the issues are discussed which are hindering the solution of child labor in Pakistan. In this research we interviewed 70 working children in the area of Rawalpindi, Islamabad, Taxila and Hatar who belonged to the different parts of the country and figured out the basic causes of the child labor in Pakistan, what are its bad effects on the young one who is a victim of it and we also put a light on what the government of Pakistan is doing in this context and what the government still have to do.Keywords: child labour, Pakistan, case study, underdeveloped countries
Procedia PDF Downloads 66398 Review of Ultrasound Image Processing Techniques for Speckle Noise Reduction
Authors: Kwazikwenkosi Sikhakhane, Suvendi Rimer, Mpho Gololo, Khmaies Oahada, Adnan Abu-Mahfouz
Abstract:
Medical ultrasound imaging is a crucial diagnostic technique due to its affordability and non-invasiveness compared to other imaging methods. However, the presence of speckle noise, which is a form of multiplicative noise, poses a significant obstacle to obtaining clear and accurate images in ultrasound imaging. Speckle noise reduces image quality by decreasing contrast, resolution, and signal-to-noise ratio (SNR). This makes it difficult for medical professionals to interpret ultrasound images accurately. To address this issue, various techniques have been developed to reduce speckle noise in ultrasound images, which improves image quality. This paper aims to review some of these techniques, highlighting the advantages and disadvantages of each algorithm and identifying the scenarios in which they work most effectively.Keywords: image processing, noise, speckle, ultrasound
Procedia PDF Downloads 11097 A Novel Image Steganography Scheme Based on Mandelbrot Fractal
Authors: Adnan H. M. Al-Helali, Hamza A. Ali
Abstract:
Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography
Procedia PDF Downloads 53996 A Novel Image Steganography Method Based on Mandelbrot Fractal
Authors: Adnan H. M. Al-Helali, Hamza A. Ali
Abstract:
The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography
Procedia PDF Downloads 61895 Assessment of Bridge Performance with Laminated versus Spring Seismic Isolation
Authors: M. Z. Ramli, A. Adnan, Chee Wei Tan
Abstract:
To gain a better understanding of earthquake forces on reinforced concrete bridge piers with different bearing condition, a series of experiments was conducted on a realistic, 1:4 scale reinforced concrete bridge pier. The normal practices of laminated seismic isolation bearing is compared with the new design spring seismic isolation bearing where invented by Engineering Seismology and Earthquake Engineering Research (e-SEER), Universiti Teknologi Malaysia. The nonlinear behavior of piers is modeled using the fibre beam theory to verify the experimental works. The hysteresis of bridge pier with different bearing condition was illustrated under different Peak Ground Acceleration (PGAs). The average slope of the hysteresis respectively to the global stiffness was also investigated.Keywords: bridge, laminated seismic isolation, spring seismic isolation, Peak Ground Acceleration, stiffness
Procedia PDF Downloads 55994 A Review of Physiological Measures for Cognitive Workload Assessment of Aircrew
Authors: Naveed Tahir, Adnan Maqsood
Abstract:
Cognitive workload is a significant factor affecting user performance, and it has been broadly investigated for its application in ergonomics as well as in designing and optimizing effective human-machine interactions. It is mentally challenging to maneuver an aircraft, and pilots must control the aircraft and adequately communicate to the verbal-auditory stimuli. Several physiological measures have long been researched and used to demonstrate the cognitive workload. In our current study, we have summarized recent findings of the effectiveness, accuracy, and applicability of commonly used physiological measures in evaluating cognitive workload. We have also highlighted on the advancements in physiological measures. The strength and limitations of physiological measures have also been discussed to assess the cognitive workload of people, especially the aircrews in laboratory settings and real-time situations. We have presented the research findings of the physiological measures to base suggestions on the proper applications of the measures and settings demanding the use of single measure or their combinations.Keywords: aircrew, cognitive workload, subjective measure, physiological measure, performance measure
Procedia PDF Downloads 16293 Effect of Superabsorbent for the Improvement of Car Seat's Thermal Comfort
Authors: Funda Buyuk Mazari, Adnan Mazari, Antonin Havelka, Jakub Wiener, Jawad Naeem
Abstract:
The use of super absorbent polymers (SAP) for moisture absorption and comfort is still unexplored. In this research the efficiency of different SAP fibrous webs are determined under different moisture percentage to examine the sorption and desorption efficiency. The SAP fibrous web with low thickness and high moisture absorption are tested with multilayer sandwich structure of car seat cover to determine the moisture absorption through cover material. Sweating guarded hot plate (SGHP) from company Atlas is used to determine the moisture permeability of different car seat cover with superabsorbent layer closed with impermeable polyurethane foam. It is observed that the SAP fibrous layers are very effective in absorbing and desorbing water vapor under extreme high and low moisture percentages respectively. In extreme humid condition (95 %RH) the 20g of SAP layer absorbs nearly 3g of water vapor per hour and reaches the maximum absorption capacity in 6 hours.Keywords: car seat, comfort, SAF, superabsorbent
Procedia PDF Downloads 47592 Improving Library Service Quality in Local City of Indonesia
Authors: Prima Fithri, Afri Adnan, Verra Syahmer
Abstract:
Library as a public service should be able to provide excellent and quality service. The criteria that should be available in the library is having the collection which relevant, actual and reliable, qualified and professional employee, delivery system that prompt and appropriate as well as supported by proper infrastructure. The aim of this study is to show the performance as an effort to provide quality of services that appropriate with the needs and desires of user. Then, in this research has been carried out the calculation of the gap between the perceptions and expectations of user about the services of the library. The Sevqual and QFD methods are used in this study. Servqual method for measuring the value of the gap that occurs in the dimensions of service quality and QFD method for determine priority repairment that need to be done to improve the quality of services that occur in the dimensions of service quality. From 97 questionaires, shows that value of the gap that occurs in the dimensions of service quality using by Servqual is 27.7% dimensions of responsiveness. It show how much user expectations are not met by the quality of existing services. Construction of the library and standard library becomes priority improvements that need to be done to improve the quality of service that occurs in the dimensions of service quality using the QFD.Keywords: library, service quality, service quality, QFD
Procedia PDF Downloads 57891 A New Tool for Global Optimization Problems: Cuttlefish Algorithm
Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman
Abstract:
This paper presents a new meta-heuristic bio-inspired optimization algorithm which is called Cuttlefish Algorithm (CFA). The algorithm mimics the mechanism of color changing behavior of the cuttlefish to solve numerical global optimization problems. The colors and patterns of the cuttlefish are produced by reflected light from three different layers of cells. The proposed algorithm considers mainly two processes: reflection and visibility. Reflection process simulates light reflection mechanism used by these layers, while visibility process simulates visibility of matching patterns of the cuttlefish. To show the effectiveness of the algorithm, it is tested with some other popular bio-inspired optimization algorithms such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Bees Algorithm (BA) that have been previously proposed in the literature. Simulations and obtained results indicate that the proposed CFA is superior when compared with these algorithms.Keywords: Cuttlefish Algorithm, bio-inspired algorithms, optimization, global optimization problems
Procedia PDF Downloads 56390 Performance Analysis of the Time-Based and Periodogram-Based Energy Detector for Spectrum Sensing
Authors: Sadaf Nawaz, Adnan Ahmed Khan, Asad Mahmood, Chaudhary Farrukh Javed
Abstract:
Classically, an energy detector is implemented in time domain (TD). However, frequency domain (FD) based energy detector has demonstrated an improved performance. This paper presents a comparison between the two approaches as to analyze their pros and cons. A detailed performance analysis of the classical TD energy-detector and the periodogram based detector is performed. Exact and approximate mathematical expressions for probability of false alarm (Pf) and probability of detection (Pd) are derived for both approaches. The derived expressions naturally lead to an analytical as well as intuitive reasoning for the improved performance of (Pf) and (Pd) in different scenarios. Our analysis suggests the dependence improvement on buffer sizes. Pf is improved in FD, whereas Pd is enhanced in TD based energy detectors. Finally, Monte Carlo simulations results demonstrate the analysis reached by the derived expressions.Keywords: cognitive radio, energy detector, periodogram, spectrum sensing
Procedia PDF Downloads 37789 Intelligent Prediction of Breast Cancer Severity
Authors: Wahab Ali, Oyebade K. Oyedotun, Adnan Khashman
Abstract:
Breast cancer remains a threat to the woman’s world in view of survival rates, it early diagnosis and mortality statistics. So far, research has shown that many survivors of breast cancer cases are in the ones with early diagnosis. Breast cancer is usually categorized into stages which indicates its severity and corresponding survival rates for patients. Investigations show that the farther into the stages before diagnosis the lesser the chance of survival; hence the early diagnosis of breast cancer becomes imperative, and consequently the application of novel technologies to achieving this. Over the year, mammograms have used in the diagnosis of breast cancer, but the inconclusive deductions made from such scans lead to either false negative cases where cancer patients may be left untreated or false positive where unnecessary biopsies are carried out. This paper presents the application of artificial neural networks in the prediction of severity of breast tumour (whether benign or malignant) using mammography reports and other factors that are related to breast cancer.Keywords: breast cancer, intelligent classification, neural networks, mammography
Procedia PDF Downloads 48788 Parametric Screening and Design Refinement of Ceiling Fan Blades
Authors: Shamraiz Ahmad, Riaz Ahmad, Adnan Maqsood
Abstract:
This paper describes the application of 2k-design of experiment in order to screen the geometric parameters and experimental refinement of ceiling fan blades. The ratio of the air delivery to the power consumed is commonly known as service value (SV) in ceiling fan designer’s community. Service value was considered as the response for 56 inch ceiling fan and four geometric parameters (bend position at root, bend position at tip, bent angle at root and bent angle at tip) of blade were analyzed. With two levels, the 4-design parameters along with their eleven interactions were studied and design of experiment was employed for experimental arrangement. Blade manufacturing and testing were done in a medium scale enterprise. The objective was achieved and service value of ceiling fan was increased by 10.4 % without increasing the cost of production and manufacturing system. Experiments were designed and results were analyzed using Minitab® 16 software package.Keywords: parametric screening, 2k-design of experiment, ceiling fan, service value, performance improvement
Procedia PDF Downloads 56487 Reliable Line-of-Sight and Non-Line-of-Sight Propagation Channel Identification in Ultra-Wideband Wireless Networks
Authors: Mohamed Adnan Landolsi, Ali F. Almutairi
Abstract:
The paper addresses the problem of line-of-sight (LOS) vs. non-line-of-sight (NLOS) propagation link identification in ultra-wideband (UWB) wireless networks, which is necessary for improving the accuracy of radiolocation and positioning applications. A LOS/NLOS likelihood hypothesis testing approach is applied based on exploiting distinctive statistical features of the channel impulse response (CIR) using parameters related to the “skewness” of the CIR and its root mean square (RMS) delay spread. A log-normal fit is presented for the probability densities of the CIR parameters. Simulation results show that different environments (residential, office, outdoor, etc.) have measurable differences in their CIR parameters’ statistics, which is then exploited in determining the nature of the propagation channels. Correct LOS/NLOS channel identification rates exceeding 90% are shown to be achievable for most types of environments. Additional improvement is also obtained by combining both CIR skewness and RMS delay statistics.Keywords: UWB, propagation, LOS, NLOS, identification
Procedia PDF Downloads 24986 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 1185 A Hybrid Watermarking Model Based on Frequency of Occurrence
Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis
Abstract:
Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: authentication, copyright protection, information hiding, ownership, watermarking
Procedia PDF Downloads 56584 Frequency of Occurrence Hybrid Watermarking Scheme
Authors: Hamza A. Ali, Adnan H. M. Al-Helali
Abstract:
Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication
Procedia PDF Downloads 36883 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'
Authors: Adnan M. Al Assaf
Abstract:
This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message
Procedia PDF Downloads 45982 Effect of Zr Addition to Aluminum Grain Refined by Ti+B on Its Wear Resistance after Extrusion Condition
Authors: Adnan I. O. Zaid, Safwan M. A. Alqawabah
Abstract:
Review of the available literature on grain refinement of aluminum and its alloys reveals that little work is published on the effect of refiners on mechanical characteristics and wear resistance. In this paper, the effect of addition of Zr to Al grain refined by Ti+B on its metallurgical, mechanical characteristics and wear resistance both in the as cast and after extrusion condition are presented and discussed. It was found that Addition of Zr to Al resulted in deterioration of its mechanical strength and hardness, whereas it resulted in improvement of both of them when added to Al grain refined by Ti+B. Furthermore it was found that the direct extrusion process resulted in further increase of the mechanical strength and hardness of Al and its micro-alloys. Also it resulted in increase of their work hardening index, n, i.e. improved their formability, hence it reduces the number of stages required for forming at large strains in excess of the plastic instability before Zr addition.Keywords: aluminum, grain refinement, titanium + boron, zirconium, mechanical characteristics, wear resistance, direct extrusion
Procedia PDF Downloads 446