Search results for: Syed Muneer Ahmed
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1785

Search results for: Syed Muneer Ahmed

1455 Analysis of Different Classification Techniques Using WEKA for Diabetic Disease

Authors: Usama Ahmed

Abstract:

Data mining is the process of analyze data which are used to predict helpful information. It is the field of research which solve various type of problem. In data mining, classification is an important technique to classify different kind of data. Diabetes is most common disease. This paper implements different classification technique using Waikato Environment for Knowledge Analysis (WEKA) on diabetes dataset and find which algorithm is suitable for working. The best classification algorithm based on diabetic data is Naïve Bayes. The accuracy of Naïve Bayes is 76.31% and take 0.06 seconds to build the model.

Keywords: data mining, classification, diabetes, WEKA

Procedia PDF Downloads 127
1454 Material Fracture Dynamic of Vertical Axis Wind Turbine Blade

Authors: Samir Lecheb, Ahmed Chellil, Hamza Mechakra, Brahim Safi, Houcine Kebir

Abstract:

In this paper we studied fracture and dynamic behavior of vertical axis wind turbine blade, the VAWT is a historical machine, it has many properties, structure, advantage, component to be able to produce the electricity. We modeled the blade design then imported to Abaqus software for analysis the modes shapes, frequencies, stress, strain, displacement and stress intensity factor SIF, after comparison we chose the idol material. Finally, the CTS test of glass epoxy reinforced polymer plates to obtain the material fracture toughness Kc.

Keywords: blade, crack, frequency, material, SIF

Procedia PDF Downloads 528
1453 Towards the Design of Gripper Independent of Substrate Surface Structures

Authors: Annika Schmidt, Ausama Hadi Ahmed, Carlo Menon

Abstract:

End effectors for robotic systems are becoming more and more advanced, resulting in a growing variety of gripping tasks. However, most grippers are application specific. This paper presents a gripper that interacts with an object’s surface rather than being dependent on a defined shape or size. For this purpose, ingressive and astrictive features are combined to achieve the desired gripping capabilities. The developed prototype is tested on a variety of surfaces with different hardness and roughness properties. The results show that the gripping mechanism works on all of the tested surfaces. The influence of the material properties on the amount of the supported load is also studied and the efficiency is discussed.

Keywords: claw, dry adhesion, insects, material properties

Procedia PDF Downloads 339
1452 A Nanoindentation Study of Thin Film Prepared by Physical Vapor Deposition

Authors: Dhiflaoui Hafedh, Khlifi Kaouther, Ben Cheikh Larbi Ahmed

Abstract:

Monolayer and multilayer coatings of CrN and AlCrN deposited on 100Cr6 (AISI 52100) substrate by PVD magnetron sputtering system. The micro structures of the coatings were characterized using atomic force microscopy (AFM). The AFM analysis revealed the presence of domes and craters which are uniformly distributed over all surfaces of the various layers. Nano indentation measurement of CrN coating showed maximum hardness (H) and modulus (E) of 14 GPa and 240 GPa, respectively. The measured H and E values of AlCrN coatings were found to be 30 GPa and 382 GPa, respectively. The improved hardness in both the coatings was attributed mainly to a reduction in crystallite size and decrease in surface roughness. The incorporation of Al into the CrN coatings has improved both hardness and Young’s modulus.

Keywords: CrN, AlCrN coatings, hardness, nanoindentation

Procedia PDF Downloads 541
1451 Fractional-Order Modeling of GaN High Electron Mobility Transistors for Switching Applications

Authors: Anwar H. Jarndal, Ahmed S. Elwakil

Abstract:

In this paper, a fraction-order model for pad parasitic effect of GaN HEMT on Si substrate is developed and validated. Open de-embedding structure is used to characterize and de-embed substrate loading parasitic effects. Unbiased device measurements are implemented to extract parasitic inductances and resistances. The model shows very good simulation for S-parameter measurements under different bias conditions. It has been found that this approach can improve the simulation of intrinsic part of the transistor, which is very important for small- and large-signal modeling process.

Keywords: fractional-order modeling, GaNHEMT, si-substrate, open de-embedding structure

Procedia PDF Downloads 335
1450 Electrochemical Studies of Some Schiff Bases on the Corrosion of Steel in H2SO4 Solution

Authors: Ahmed A. Farag, M. A. Hgazy

Abstract:

The influence of three Schiff bases (SB-I, SB-II, and SB-III) on the corrosion of carbon steel in 0.5 M H2SO4 solution was studied by potentiodynamic polarization and electrochemical impedance spectroscopy (EIS) techniques. The inhibition efficiency increases with the concentration of the Schiff bases and follow the trend: SB-III > SB-II > SB-I. Tafel polarization measurements revealed that the three tested inhibitors function as anodic inhibitors. The thermodynamic parameters Kads and ΔGºads are calculated and discussed. The Langmuir isotherm equation was found to provide an accurate description of the adsorption behaviour of the investigated Schiff bases. Depending on the results, the inhibitive mechanism was proposed.

Keywords: Schiff bases, corrosion inhibitors, EIS, adsorption

Procedia PDF Downloads 520
1449 Fusion of MOLA-based DEMs and HiRISE Images for Large-Scale Mars Mapping

Authors: Ahmed F. Elaksher, Islam Omar

Abstract:

In this project, we used MOLA-based DEMs to orthorectify HiRISE optical images. The MOLA data was interpolated using the kriging interpolation technique. Corresponding tie points were then digitized from both datasets. These points were employed in co-registering both datasets using GIS analysis tools. Different transformation models, including the affine and projective transformation models, were used with different sets and distributions of tie points. Additionally, we evaluated the use of the MOLA elevations in co-registering the MOLA and HiRISE datasets. The planimetric RMSEs achieved for each model are reported. Results suggested the use of 3D-2D transformation models.

Keywords: photogrammetry, Mars, MOLA, HiRISE

Procedia PDF Downloads 53
1448 Trust: The Enabler of Knowledge-Sharing Culture in an Informal Setting

Authors: Emmanuel Ukpe, S. M. F. D. Syed Mustapha

Abstract:

Trust in an organization has been perceived as one of the key factors behind knowledge sharing, mainly in an unstructured work environment. In an informal working environment, to instill trust among individuals is a challenge and even more in the virtual environment. The study has contributed in developing the framework for building trust in an unstructured organization in performing knowledge sharing in a virtual environment. The artifact called KAPE (Knowledge Acquisition, Processing, and Exchange) was developed for knowledge sharing for the informal organization where the framework was incorporated. It applies to Cassava farmers to facilitate knowledge sharing using web-based platform. A survey was conducted; data were collected from 382 farmers from 21 farm communities. Multiple regression technique, Cronbach’s Alpha reliability test; Tukey’s Honestly significant difference (HSD) analysis; one way Analysis of Variance (ANOVA), and all trust acceptable measures (TAM) were used to test the hypothesis and to determine noteworthy relationships. The results show a significant difference when there is a trust in knowledge sharing between farmers, the ones who have high in trust acceptable factors found in the model (M = 3.66 SD = .93) and the ones who have low on trust acceptable factors (M = 2.08 SD = .28), (t (48) = 5.69, p = .00). Furthermore, when applying Cognitive Expectancy Theory, the farmers with cognitive-consonance show higher level of trust and satisfaction with knowledge and information from KAPE, as compared with a low level of cognitive-dissonance. These results imply that the adopted trust model KAPE positively improved knowledge sharing activities in an informal environment amongst rural farmers.

Keywords: trust, knowledge, sharing, knowledge acquisition, processing and exchange, KAPE

Procedia PDF Downloads 95
1447 A Robotic Cube to Preschool Children for Acquiring the Mathematical and Colours Concepts

Authors: Ahmed Amin Mousa, Tamer M. Ismail, M. Abd El Salam

Abstract:

This work presents a robot called Conceptual Robotic Cube, CR-Cube. The robot can be used as an educational tool for children from the age of three. It has a cube shape attached with a camera colours sensor. In addition, it contains four wheels to move smoothly. The researchers prepared a questionnaire to measure the efficiency of the robot. The design and the questionnaire was presented to 11 experts who agreed that the robot is appropriate for learning numbering and colours for preschool children.

Keywords: CR-Cube, robotic cube, conceptual robot, conceptual cube, colour concept, early childhood education

Procedia PDF Downloads 388
1446 The Effect of Aluminum Oxide Nanoparticles on the Optical Properties of (PVP-PEG) Blend

Authors: Hussein Hakim, Zainab Al-Ramadhan, Ahmed Hashim

Abstract:

Polymer nano composites of polyvinylpyrrolidone and poly-ethylene glycol with different concentrations of aluminum oxide (Al2O3) nano particles have been prepared by solution cast method. The optical characterizations have been done by analyzing the absorption (A) spectra in the 300–800 nm spectral region. It was found that the optical energy gap decreases with the increasing of Al2O3 nano particles content. The optical constants (refractive index, extinction coefficient, real and imaginary parts of the dielectric constant) are changing with increasing aluminum oxide nano particle concentrations.

Keywords: nanocomposites, polyvinylpyrrolidone, optical constants, polymers, blend

Procedia PDF Downloads 400
1445 A New Internal Architecture Based On Feature Selection for Holonic Manufacturing System

Authors: Jihan Abdulazeez Ahmed, Adnan Mohsin Abdulazeez Brifcani

Abstract:

This paper suggests a new internal architecture of holon based on feature selection model using the combination of Bees Algorithm (BA) and Artificial Neural Network (ANN). BA is used to generate features while ANN is used as a classifier to evaluate the produced features. Proposed system is applied on the Wine data set, the statistical result proves that the proposed system is effective and has the ability to choose informative features with high accuracy.

Keywords: artificial neural network, bees algorithm, feature selection, Holon

Procedia PDF Downloads 437
1444 Representation of Islamophobia on Social Media: Facebook Comments Analysis

Authors: Nadia Syed

Abstract:

The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.

Keywords: Islamophobia, online, social media, facebook, internet, extremism

Procedia PDF Downloads 74
1443 A Clustering-Sequencing Approach to the Facility Layout Problem

Authors: Saeideh Salimpour, Sophie-Charlotte Viaux, Ahmed Azab, Mohammed Fazle Baki

Abstract:

The Facility Layout Problem (FLP) is key to the efficient and cost-effective operation of a system. This paper presents a hybrid heuristic- and mathematical-programming-based approach that divides the problem conceptually into those of clustering and sequencing. First, clusters of vertically aligned facilities are formed, which are later on sequenced horizontally. The developed methodology provides promising results in comparison to its counterparts in the literature by minimizing the inter-distances for facilities which have more interactions amongst each other and aims at placing the facilities with more interactions at the centroid of the shop.

Keywords: clustering-sequencing approach, mathematical modeling, optimization, unequal facility layout problem

Procedia PDF Downloads 309
1442 Smart Trust Management for Vehicular Networks

Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel

Abstract:

Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.

Keywords: active vehicle, cooperation, petri nets, trust management, VANET

Procedia PDF Downloads 378
1441 Experimental Testing of Solar Still with Movable Inclined Surface and Equipped with Wick

Authors: Ahmed N. Shmroukh

Abstract:

This study examined a new solar still equipped with a movable inclined back, and this back is covered with a wick for seawater desalination. The tested backside inclination angles were 105, 125 and 160, respectively. The wick helped in increasing the seawater evaporation rate by increasing the evaporation surface area allowed for seawater in the still basin. The proposed modified solar still was compared with the conventional simple still. The results showed that the daily produced desalinated water of the modified solar still with angles 105, 125 and 160 increased by approximately 13.7%, 27.9%, and 39.2%, respectively, compared with the conventional solar still.

Keywords: solar still, inclined still, porous materials, Wick

Procedia PDF Downloads 46
1440 Throughput of Point Coordination Function (PCF)

Authors: Faisel Eltuhami Alzaalik, Omar Imhemed Alramli, Ahmed Mohamed Elaieb

Abstract:

The IEEE 802.11 defines two modes of MAC, distributed coordination function (DCF) and point coordination function (PCF) mode. The first sub-layer of the MAC is the distributed coordination function (DCF). A contention algorithm is used via DCF to provide access to all traffic. The point coordination function (PCF) is the second sub-layer used to provide contention-free service. PCF is upper DCF and it uses features of DCF to establish guarantee access of its users. Some papers and researches that have been published in this technology were reviewed in this paper, as well as talking briefly about the distributed coordination function (DCF) technology. The simulation of the PCF function have been applied by using a simulation program called network simulator (NS2) and have been found out the throughput of a transmitter system by using this function.

Keywords: DCF, PCF, throughput, NS2

Procedia PDF Downloads 555
1439 Comparative Fragility Analysis of Shallow Tunnels Subjected to Seismic and Blast Loads

Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed

Abstract:

Underground structures are crucial components which required detailed analysis and design. Tunnels, for instance, are massively constructed as transportation infrastructures and utilities network especially in urban environments. Considering their prime importance to the economy and public safety that cannot be compromised, thus any instability to these tunnels will be highly detrimental to their performance. Recent experience suggests that tunnels become vulnerable during earthquakes and blast scenarios. However, a very limited amount of studies has been carried out to study and understanding the dynamic response and performance of underground tunnels under those unpredictable extreme hazards. In view of the importance of enhancing the resilience of these structures, the overall aims of the study are to evaluate probabilistic future performance of shallow tunnels subjected to seismic and blast loads by developing detailed fragility analysis. Critical non-linear time history numerical analyses using sophisticated finite element software Midas GTS NX have been presented about the current methods of analysis, taking into consideration of structural typology, ground motion and explosive characteristics, effect of soil conditions and other associated uncertainties on the tunnel integrity which may ultimately lead to the catastrophic failure of the structures. The proposed fragility curves for both extreme loadings are discussed and compared which provide significant information the performance of the tunnel under extreme hazards which may beneficial for future risk assessment and loss estimation.

Keywords: fragility analysis, seismic loads, shallow tunnels, blast loads

Procedia PDF Downloads 318
1438 Counting People Utilizing Space-Time Imagery

Authors: Ahmed Elmarhomy, K. Terada

Abstract:

An automated method for counting passerby has been proposed using virtual-vertical measurement lines. Space-time image is representing the human regions which are treated using the segmentation process. Different color space has been used to perform the template matching. A proper template matching has been achieved to determine direction and speed of passing people. Distinguish one or two passersby has been investigated using a correlation between passerby speed and the human-pixel area. Finally, the effectiveness of the presented method has been experimentally verified.

Keywords: counting people, measurement line, space-time image, segmentation, template matching

Procedia PDF Downloads 427
1437 The Impact of Varying the Detector and Modulation Types on Inter Satellite Link (ISL) Realizing the Allowable High Data Rate

Authors: Asmaa Zaki M., Ahmed Abd El Aziz, Heba A. Fayed, Moustafa H. Aly

Abstract:

ISLs are the most popular choice for deep space communications because these links are attractive alternatives to present day microwave links. This paper explored the allowable high data rate in this link over different orbits, which is affected by variation in modulation scheme and detector type. Moreover, the objective of this paper is to optimize and analyze the performance of ISL in terms of Q-factor and Minimum Bit Error Rate (Min-BER) based on different detectors comprising some parameters.

Keywords: free space optics (FSO), field of view (FOV), inter satellite link (ISL), optical wireless communication (OWC)

Procedia PDF Downloads 372
1436 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 153
1435 Unsupervised Reciter Recognition Using Gaussian Mixture Models

Authors: Ahmad Alwosheel, Ahmed Alqaraawi

Abstract:

This work proposes an unsupervised text-independent probabilistic approach to recognize Quran reciter voice. It is an accurate approach that works on real time applications. This approach does not require a prior information about reciter models. It has two phases, where in the training phase the reciters' acoustical features are modeled using Gaussian Mixture Models, while in the testing phase, unlabeled reciter's acoustical features are examined among GMM models. Using this approach, a high accuracy results are achieved with efficient computation time process.

Keywords: Quran, speaker recognition, reciter recognition, Gaussian Mixture Model

Procedia PDF Downloads 357
1434 Leveraging Unannotated Data to Improve Question Answering for French Contract Analysis

Authors: Touila Ahmed, Elie Louis, Hamza Gharbi

Abstract:

State of the art question answering models have recently shown impressive performance especially in a zero-shot setting. This approach is particularly useful when confronted with a highly diverse domain such as the legal field, in which it is increasingly difficult to have a dataset covering every notion and concept. In this work, we propose a flexible generative question answering approach to contract analysis as well as a weakly supervised procedure to leverage unannotated data and boost our models’ performance in general, and their zero-shot performance in particular.

Keywords: question answering, contract analysis, zero-shot, natural language processing, generative models, self-supervision

Procedia PDF Downloads 154
1433 Catalytic Combustion of Methane over Co/Mo and Co/Mn Catalysts at Low Temperature

Authors: Ahmed I. Osman, Jehad K. Abu-Dahrieh, Jillian M. Thompson, David W. Rooney

Abstract:

Natural gas (the main constituent is Methane 95%) is considered as an alternative to petroleum for the production of synthetics fuels. Nowadays, methane combustion at low temperature has received much attention however; it is the most difficult hydrocarbon to be combusted. Co/Mo and (4:1 wt/wt) catalysts were prepared from a range of different precursors and used for the low temperature total methane oxidation (TMO). The catalysts were characterized by, XRD, BET and H2-TPR and tested under reaction temperatures of 250-400 °C with a GHSV= 36,000 mL g-1 h-1. It was found that the combustion temperature was dependent on the type of the precursor, and that those containing chloride led to catalysts with lower activity. The optimum catalyst was Co/Mo (4:1wt/wt) where greater than 20% methane conversion was observed at 250 °C. This catalyst showed a high degree of stability for TMO, showing no deactivation during 50 hours of time on stream.

Keywords: methane low temperature total oxidation, oxygen carrier, Co/Mo, Co/Mn

Procedia PDF Downloads 522
1432 Review of Cable Fault Locating Methods and Usage of VLF for Real Cases of High Resistance Fault Locating

Authors: Saadat Ali, Rashid Abdulla Ahmed Alshehhi

Abstract:

Cable faults are always probable and common during or after commissioning, causing significant delays and disrupting power distribution or transmission network, which is intolerable for the utilities&service providers being their reliability and business continuity measures. Therefore, the adoption of rapid localization & rectification methodology is the main concern for them. This paper explores the present techniques available for high voltage cable localization & rectification and which is preferable with regards to easier, faster, and also less harmful to cables. It also provides insight experience of high resistance fault locating by utilization of the Very Low Frequency (VLF) method.

Keywords: faults, VLF, real cases, cables

Procedia PDF Downloads 82
1431 A Brief Review of Titanium Powders Used in Laser Powder-Bed Fusion Additive Manufacturing

Authors: Ali Alhajeri, Tarig Makki, Mosa Almutahhar, Mohammed Ahmed, Usman Ali

Abstract:

Metal powder is the raw material used for laser powder-bed fusion (LPBF) additive manufacturing (AM). There are many metal materials that can be used in LPBF. The properties of these materials are varied between each other, which can affect the building part. The objective of this paper is to do an overview of the titanium powders available in LBPF. Comparison between different literature works will lead us to study the similarities and differences between the powder properties such as size, shape, and chemical composition. Furthermore, the results of this paper will point out the significant titanium powder properties in order to clearly illustrate their effect on the build parts.

Keywords: LPBF, titanium, Ti-6Al-4V, Ti-5553, metal powder, AM

Procedia PDF Downloads 144
1430 Role of Social Media in Imparting Climate Change through Diffusion of Innovation

Authors: Zahra Ali Abbasi, Syed Muhammad Saqib Saleem

Abstract:

This research explores the relationship between social media and awareness about climate change amongst the university students of Lahore, Pakistan. The aim is to understand how the people of Pakistan perceive climate change, especially on the social media. A deductive and quantitative method is applied on the research to find out the awareness of climate change in the people using social media. For this purpose, a survey method is used, to analyze the response from 167 online respondents through stratified random sampling technique. The relation between multiple variables including awareness about important climatic events like Paris agreement, GreenTube, Smog in Lahore, Floods in Pakistan and other eminent incidents of climate change and social media are calculated by analyzing social media as a source to impart information about climate change. The results show that as people get aware of climate change, they post about different national and international events/incidents of climate which reveal a significant relationship between respondents' awareness about climate change and their posting and sharing of content about climate change. Another test indicates that respondents’ post/share/comment (impart) information about climate change when there is a shift in the climate both globally and nationally. However, the significance of both these correlations has been found to be negligible. Social media being an independent platform holds greater influencing power, hence, as consumers of the environment the users hold the responsibility of producing and sharing content at a global platform about climate. However, matters of politics, economy and religion seem to have overshadowed the significance of climate.

Keywords: climate change, diffusion of innovation, environment, social media, Pakistan

Procedia PDF Downloads 167
1429 An Enhanced Support Vector Machine Based Approach for Sentiment Classification of Arabic Tweets of Different Dialects

Authors: Gehad S. Kaseb, Mona F. Ahmed

Abstract:

Arabic Sentiment Analysis (SA) is one of the most common research fields with many open areas. Few studies apply SA to Arabic dialects. This paper proposes different pre-processing steps and a modified methodology to improve the accuracy using normal Support Vector Machine (SVM) classification. The paper works on two datasets, Arabic Sentiment Tweets Dataset (ASTD) and Extended Arabic Tweets Sentiment Dataset (Extended-AATSD), which are publicly available for academic use. The results show that the classification accuracy approaches 86%.

Keywords: Arabic, classification, sentiment analysis, tweets

Procedia PDF Downloads 120
1428 Foreign Investment, Technological Diffusion and Competiveness of Exports: A Case for Textile Industry in Pakistan

Authors: Syed Toqueer Akhter, Muhammad Awais

Abstract:

Pakistan is a country which is gifted by naturally abundant resources these resources are a pioneer towards a prospect and developed country. Pakistan is the fourth largest exporter of the textile in the world and with the passage of time the competitiveness of these exports is subject to a decline. With a lot of International players in the textile world like China, Bangladesh, India, and Sri Lanka, Pakistan needs to put up a lot of effort to compete with these countries. This research paper would determine the impact of Foreign Direct Investment upon technological diffusion and that how significantly it may be affecting on export performance of the country. It would also demonstrate that with the increase in Foreign Direct Investment, technological diffusion, strong property rights, and using different policy tools, export competitiveness of the country could be improved. The research has been carried out using time series data from 1995 to 2013 and the results have been estimated by using competing Econometrics modes such as Robust regression and Generalized least squares so that to consolidate the impact of the Foreign Investments and Technological diffusion upon export competitiveness comprehensively. Distributed Lag model has also been used to encompass the lagged effect of policy tools variables used by the government. Model estimates entail that 'FDI' and 'Technological Diffusion' do have a significant impact on the competitiveness of the exports of Pakistan. It may also be inferred that competitiveness of Textile Sector requires integrated policy framework, primarily including the reduction in interest rates, providing subsides, and manufacturing of value added products.

Keywords: high technology export, robust regression, patents, technological diffusion, export competitiveness

Procedia PDF Downloads 478
1427 Dem Based Surface Deformation in Jhelum Valley: Insights from River Profile Analysis

Authors: Syed Amer Mahmood, Rao Mansor Ali Khan

Abstract:

This study deals with the remote sensing analysis of tectonic deformation and its implications to understand the regional uplift conditions in the lower Jhelum and eastern Potwar. Identification and mapping of active structures is an important issue in order to assess seismic hazards and to understand the Quaternary deformation of the region. Digital elevation models (DEMs) provide an opportunity to quantify land surface geometry in terms of elevation and its derivatives. Tectonic movement along the faults is often reflected by characteristic geomorphological features such as elevation, stream offsets, slope breaks and the contributing drainage area. The river profile analysis in this region using SRTM digital elevation model gives information about the tectonic influence on the local drainage network. The steepness and concavity indices have been calculated by power law of scaling relations under steady state conditions. An uplift rate map is prepared after carefully analysing the local drainage network showing uplift rates in mm/year. The active faults in the region control local drainages and the deflection of stream channels is a further evidence of the recent fault activity. The results show variable relative uplift conditions along MBT and Riasi and represent a wonderful example of the recency of uplift, as well as the influence of active tectonics on the evolution of young orogens.

Keywords: quaternary deformation, SRTM DEM, geomorphometric indices, active tectonics and MBT

Procedia PDF Downloads 331
1426 Delimitation of the Perimeters of PR Otection of the Wellfield in the City of Adrar, Sahara of Algeria through the Used Wyssling’s Method

Authors: Ferhati Ahmed, Fillali Ahmed, Oulhadj Younsi

Abstract:

delimitation of the perimeters of protection in the catchment area of the city of Adrar, which are established around the sites for the collection of water intended for human consumption of drinking water, with the objective of ensuring the preservation and reducing the risks of point and accidental pollution of the resource (Continental Intercalar groundwater of the Northern Sahara of Algeria). This wellfield is located in the northeast of the city of Adrar, it covers an area of 132.56 km2 with 21 Drinking Water Supply wells (DWS), pumping a total flow of approximately 13 Hm3/year. The choice of this wellfield is based on the favorable hydrodynamic characteristics and their location in relation to the agglomeration. The vulnerability to pollution of this slick is very high because the slick is free and suffers from the absence of a protective layer. In recent years, several factors have been introduced around the field that can affect the quality of this precious resource, including the presence of a strong centre for domestic waste and agricultural and industrial activities. Thus, its sustainability requires the implementation of protection perimeters. The objective of this study is to set up three protection perimeters: immediate, close and remote. The application of the Wyssling method makes it possible to calculate the transfer time (t) of a drop of groundwater located at any point in the aquifer up to the abstraction and thus to define isochrones which in turn delimit each type of perimeter, 40 days for the nearer and 100 days for the farther away. Special restrictions are imposed for all activities depending on the distance of the catchment. The application of this method to the Adrar city catchment field showed that the close and remote protection perimeters successively occupy areas of 51.14 km2 and 92.9 km2. Perimeters are delimited by geolocated markers, 40 and 46 markers successively. These results show that the areas defined as "near protection perimeter" are free from activities likely to present a risk to the quality of the water used. On the other hand, on the areas defined as "remote protection perimeter," there is some agricultural and industrial activities that may present an imminent risk. A rigorous control of these activities and the restriction of the type of products applied in industrial and agricultural is imperative.

Keywords: continental intercalaire, drinking water supply, groundwater, perimeter of protection, wyssling method

Procedia PDF Downloads 75