Search results for: Ahmad Fakhriy Hassan
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1645

Search results for: Ahmad Fakhriy Hassan

1255 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 291
1254 A Multiple Beam LTE Base Station Antenna with Simultaneous Vertical and Horizontal Sectorization

Authors: Mohamed Sanad, Noha Hassan

Abstract:

A low wind-load light-weight broad-band multi-beam base station antenna has been developed. It can generate any required number of beams with the required beamwidths. It can have horizontal and vertical sectorization at the same time. Vertical sectorization doubles the overall number of beams. It will be very valuable in LTE-A and 5G. It can be used to serve vertically split inner and outer cells, which improves system performance. The intersection between the beams of the proposed multi-beam antenna can be controlled by optimizing the design parameters of the antenna. The gain at the points of intersection between the beams, the null filling and the overlap between the beams can all be modified. The proposed multi-beam base station antenna can cover an unlimited number of wireless applications, regardless of their frequency bands. It can simultaneously cover all, current and future, wireless technology generations such as 2G, 3G, 4G (LTE), --- etc. For example, in LTE, it covers the bands 450-470 MHz, 690-960 MHz, 1.4-2.7 GHz and 3.3-3.8 GHz. It has at least 2 ports for each band in each beam for ±45° polarizations. It can include up to 72 ports or even more, which could facilitate any further needed capacity expansions.

Keywords: base station antenna, multi-beam antenna, smart antenna, vertical sectorization

Procedia PDF Downloads 245
1253 Android Application on Checking Halal Product Based on Augmented Reality

Authors: Saidatul A'isyah Ahmad Shukri, Haslina Arshad

Abstract:

This study was conducted to develop an application that provides Augmented Reality experience in identifying halal food products and beverages based on Malaysian Islamic Development Department (JAKIM) database for Muslim consumers in Malaysia. The applications is operating on the mobile device using the Android platform. This application aims to provide a new experience to the user how to use the Android application implements Augmentation Reality technology The methodology used is object-oriented analysis and design (OOAD). The programming language used is JAVA programming using the Android Software Development Kit (SDK) and XML. Android operating system is selected, and it is an open source operating system. Results from the study are implemented to further enhance diversity in presentation of information contained in this application and so can bring users using these applications from different angles.

Keywords: android, augmented reality, food, halal, Malaysia, products, XML

Procedia PDF Downloads 445
1252 Simple Ecofriendly Cyclodextrine-Surfactant Modified UHPLC Method for Quantification of Multivitamins in Pharmaceutical and Food Samples

Authors: Hassan M. Albishri, Abdullah Almalawi, Deia Abd El-Hady

Abstract:

A simple and ecofriendly cyclodextrine-surfactant modified UHPLC (CDS-UPLC) method for rapid and sensitive simultaneous determination of multi water-soluble vitamins such as ascorbic acid, pyridoxine hydrochloride and thiamine hydrochloride in commercial pharmaceuticals and milk samples have been firstly developed. Several chromatographic effective parameters have been changed in a systematic way. Adequate results have been achieved by a mixture of β-cyclodextrine (β-CD) and cationic surfactant under acidic conditions as an eco-friendly isocratic mobile phase at 0.02 mL/min flow rate. The proposed CDS- UHPLC method has been validated for the quantitative determination of multivitamins within 8 min in food and pharmaceutical samples. The method showed excellent linearity for analytes in a wide range of 10-1000 ng/µL. The repeatability and reproducibility of data were about 2.14 and 4.69 RSD%, respectively. The limits of detection (LODs) of analytes ranged between 0.86 and 5.6 ng/µL with a range of 81.8 -115.8% recoveries in tablets and milk samples. The current first CDS- UHPLC method could have vast applications for the precise analysis of multivitamins in complicated matrices.

Keywords: ecofriendly, cyclodextrine-surfactant, multivitamins, UHPLC

Procedia PDF Downloads 257
1251 Optimality Theoretic Account of Indian Loanwords in Hadhrami Arabic

Authors: Mohammed Saleh Lahmdi, Hassan Obeid Alfadly

Abstract:

This study explores an optimality-theoretic account of Indian loanwords in Hadhrami Arabic (henceforth HA), a variety of Arabic spoken in Hadhramout Province in the coastal areas and Hadhramout Valley. The purpose of this paper is to find out how the phonological forms of Indian loanwords can be accounted for from an OT standpoint. To achieve this purpose, two main instruments were implemented: participant observation and interview. The sample of this study was selected carefully with certain characteristics by judgment sampling consisting of eleven informants. An ethnographic qualitative approach was employed to find out the phonological articulations that the researcher encountered during the implementation. Many phonological processes are used and several markedness and faithfulness constraints have been interacted in conflict in order to choose the optimal form of Hadhrami realisations. The findings of the study confirm that the Hadhrami syllable structure prevails over the donor language, i.e., the Indian (mainly Urdu) language. Specifically, markedness constraints dominate faithfulness ones when most of the Indian loanwords are incorporated into HA.

Keywords: linguistic borrowing, optimality theory, Hadhrami Arabic, loanword, phonological processes

Procedia PDF Downloads 29
1250 Experimental Investigation on the Behavior of Steel Fibers Reinforced Concrete under Impact Loading

Authors: Feng Fu, Ahmad Bazgir

Abstract:

This study aimed to investigate and examine the structural behaviour of steel fibre reinforced concrete slabs when subjected to impact loading using drop weight method. A number of compressive tests, tensile splitting tests, as well as impact tests were conducted. The experimental work consists of testing both conventional reinforced slabs and SFRC slabs. Parameters to be considered for carrying out the test will consist of the volume fraction of steel fibre, type of steel fibres, drop weight height and number of blows. Energy absorption of slabs under impact loading and failure modes were examined in-depth and compared with conventional reinforced concrete slab are investigated.

Keywords: steel fibre reinforce concrete, compressive test, tensile splitting test, impact test

Procedia PDF Downloads 409
1249 Beneficial Ownership in Islamic Finance: The Need for Shari'ah Parameters

Authors: Nik Abdul Rahim Nik Abdul Ghani, Mat Noor Mat Zain, Ahmad Dahlan Salleh

Abstract:

Ownership of asset is an important aspect in ensuring the validity of sale contract. Nevertheless, in Islamic finance, the issue of beneficial ownership as practiced in the current system is seriously debated among Shariah scholars. It has been argued as violating the real concept of ownership (milkiyyah) in Shariah law. This article aims at studying the status of beneficial ownership from the Shariah perspective. This study begins with examining the meaning of ownership and its attributes from the Islamic point of view and followed by the discussion on the origin of beneficial ownership from the legal perspective. The approach that is applied to clarify the concept of beneficial ownership is content analysis. Subsequently, this study explains some current applications of beneficial ownership in Islamic finance to be analyzed further from the Shariah aspect. The research finding suggests that beneficial ownership should be recognized as a real ownership due to the fact that Shariah allows the transfer of ownership after the execution of offer (ijab) and acceptance (qabul).

Keywords: beneficial ownership, ownership, Islamic finance, parameter

Procedia PDF Downloads 255
1248 Scouring Rate Pattern/Monitoring at Coastal and Offshore Structures

Authors: Ahmad Saifullah Mazlan, Hossein Basser, Shatirah Akib

Abstract:

Scouring pattern evaluation and measuring its depth around coastal and offshore structures is very essential issue to assure the safety of the structures as well as providing needed design parameters. Scouring is known as one of the important phenomena which threatens the safety of infrastructures. Several countermeasures have been developed to control scouring by protecting the structures against water flow attack directly or indirectly by changing the water flow pattern. Recently, monitoring methods for estimating water flow pattern and scour depth are studied to track the safety of structures. Since most of studies regarding scouring is related to monitoring scouring around piers in rivers therefore it is necessary to develop researches investigating scouring around piers in coastal and offshore areas. This paper describes a review of monitoring methods may be used for detecting scour depth around piers in coastal and offshore structures.

Keywords: scour, monitoring, pier, coastal, offshore

Procedia PDF Downloads 623
1247 Performance of VSAT MC-CDMA System Using LDPC and Turbo Codes over Multipath Channel

Authors: Hassan El Ghazi, Mohammed El Jourmi, Tayeb Sadiki, Esmail Ahouzi

Abstract:

The purpose of this paper is to model and analyze a geostationary satellite communication system based on VSAT network and Multicarrier CDMA system scheme which presents a combination of multicarrier modulation scheme and CDMA concepts. In this study the channel coding strategies (Turbo codes and LDPC codes) are adopted to achieve good performance due to iterative decoding. The envisaged system is examined for a transmission over Multipath channel with use of Ku band in the uplink case. The simulation results are obtained for each different case. The performance of the system is given in terms of Bit Error Rate (BER) and energy per bit to noise power spectral density ratio (Eb/N0). The performance results of designed system shown that the communication system coded with LDPC codes can achieve better error rate performance compared to VSAT MC-CDMA system coded with Turbo codes.

Keywords: satellite communication, VSAT Network, MC-CDMA, LDPC codes, turbo codes, uplink

Procedia PDF Downloads 486
1246 Research Approaches for Identifying Images of the Past in the Built Environment

Authors: Ahmad Al-Zoabi

Abstract:

Development of research approaches for identifying images of the past in the built environment is at a beginning stage, and a review of the current literature reveals a limited body of research in this area. This study seeks to make a contribution to fill this void. It investigates the theoretical and empirical studies that examine the built environment as a medium for communicating the past in order to understand how images of the past are operationalized in these studies. Findings revealed that image could be operationalized in several ways depending on the focus of the study. Three concerns were addressed in this study when defining the image of the past: (a) to investigate an 'everyday' popular image of the past; (b) to look at the building's image as an integrated part of a larger image for the city; and (c) to find patterns within residents' images of the past. This study concludes that a future study is needed to address the effects of different scales (size and depth of history) of cities and of different cultural backgrounds of images of the past.

Keywords: architecture, built environment, image of the past, research approaches

Procedia PDF Downloads 299
1245 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 132
1244 Failure Analysis and Fatigue Life Estimation of a Shaft of a Rotary Draw Bending Machine

Authors: B. Engel, Sara Salman Hassan Al-Maeeni

Abstract:

Human consumption of the Earth's resources increases the need for a sustainable development as an important ecological, social, and economic theme. Re-engineering of machine tools, in terms of design and failure analysis, is defined as steps performed on an obsolete machine to return it to a new machine with the warranty that matches the customer requirement. To understand the future fatigue behavior of the used machine components, it is important to investigate the possible causes of machine parts failure through design, surface, and material inspections. In this study, the failure modes of the shaft of the rotary draw bending machine are inspected. Furthermore, stress and deflection analysis of the shaft subjected to combined torsion and bending loads are carried out by an analytical method and compared with a finite element analysis method. The theoretical fatigue strength, correction factors, and fatigue life sustained by the shaft before damaged are estimated by creating a stress-cycle (S-N) diagram. In conclusion, it is seen that the shaft can work in the second life, but it needs some surface treatments to increase the reliability and fatigue life.

Keywords: failure analysis, fatigue life, FEM analysis, shaft, stress analysis

Procedia PDF Downloads 280
1243 Classifying ERP Implementation’s Risks in Banking Sectors Based on Different Implementation Phases

Authors: Farnaz Farzadnia, Ahmad Alibabaei

Abstract:

Enterprise Resource Planning (ERP) systems are considered as complicated information systems. Many organizations failed implementing ERP systems because it is a very difficult, time-consuming and expensive process. Enterprise resource planning system is appropriate for organizations in all economic sectors. As banking is currently considered a non-typical area for ERP usage, there are very little studies on ERP implementation in banking. This paper presents a general risks taxonomy. In this research, after identifying implementation risks, a process quality management method has been applied to identify relations between risks of implementation ERP in banking sectors and implementation phases. Oracle application implementation method titled as AIM used in this research for classifying the risks. These findings will help managers to develop better strategies for supervising and controlling ERP implementation projects.

Keywords: AIM implementation, bank, enterprise resource planning, risk, process quality management method

Procedia PDF Downloads 526
1242 Buckling Analysis of Composite Shells under Compression and Torsional Loads: Numerical and Analytical Study

Authors: Güneş Aydın, Razi Kalantari Osgouei, Murat Emre Öztürk, Ahmad Partovi Meran, Ekrem Tüfekçi

Abstract:

Advanced lightweight laminated composite shells are increasingly being used in all types of modern structures, for enhancing their structural efficiency and performance. Such thin-walled structures are susceptible to buckling when subjected to various loading. This paper focuses on the buckling of cylindrical shells under axial compression and torsional loads. Effects of fiber orientation on the maximum buckling load of carbon fiber reinforced polymer (CFRP) shells are optimized. Optimum fiber angles have been calculated analytically by using MATLAB program. Numerical models have been carried out by using Finite Element Method program ABAQUS. Results from analytical and numerical analyses are also compared.

Keywords: buckling, composite, cylindrical shell, finite element, compression, torsion, MATLAB, optimization

Procedia PDF Downloads 575
1241 Comparison of Selected Pier-Scour Equations for Wide Piers Using Field Data

Authors: Nordila Ahmad, Thamer Mohammad, Bruce W. Melville, Zuliziana Suif

Abstract:

Current methods for predicting local scour at wide bridge piers, were developed on the basis of laboratory studies and very limited scour prediction were tested with field data. Laboratory wide pier scour equation from previous findings with field data were presented. A wide range of field data were used and it consists of both live-bed and clear-water scour. A method for assessing the quality of the data was developed and applied to the data set. Three other wide pier-scour equations from the literature were used to compare the performance of each predictive method. The best-performing scour equation were analyzed using statistical analysis. Comparisons of computed and observed scour depths indicate that the equation from the previous publication produced the smallest discrepancy ratio and RMSE value when compared with the large amount of laboratory and field data.

Keywords: field data, local scour, scour equation, wide piers

Procedia PDF Downloads 392
1240 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning

Procedia PDF Downloads 141
1239 The Application of FSI Techniques in Modeling of Realist Pulmonary Systems

Authors: Abdurrahim Bolukbasi, Hassan Athari, Dogan Ciloglu

Abstract:

The modeling lung respiratory system which has complex anatomy and biophysics presents several challenges including tissue-driven flow patterns and wall motion. Also, the lung pulmonary system because of that they stretch and recoil with each breath, has not static walls and structures. The direct relationship between air flow and tissue motion in the lung structures naturally prefers an FSI simulation technique. Therefore, in order to toward the realistic simulation of pulmonary breathing mechanics the development of a coupled FSI computational model is an important step. A simple but physiologically-relevant three dimensional deep long geometry is designed and fluid-structure interaction (FSI) coupling technique is utilized for simulating the deformation of the lung parenchyma tissue which produces airflow fields. The real understanding of respiratory tissue system as a complex phenomenon have been investigated with respect to respiratory patterns, fluid dynamics and tissue visco-elasticity and tidal breathing period.

Keywords: lung deformation and mechanics; Tissue mechanics; Viscoelasticity; Fluid-structure interactions; ANSYS

Procedia PDF Downloads 306
1238 A New Distributed Computing Environment Based On Mobile Agents for Massively Parallel Applications

Authors: Fatéma Zahra Benchara, Mohamed Youssfi, Omar Bouattane, Hassan Ouajji, Mohamed Ouadi Bensalah

Abstract:

In this paper, we propose a new distributed environment for High Performance Computing (HPC) based on mobile agents. It allows us to perform parallel programs execution as distributed one over a flexible grid constituted by a cooperative mobile agent team works. The distributed program to be performed is encapsulated on team leader agent which deploys its team workers as Agent Virtual Processing Unit (AVPU). Each AVPU is asked to perform its assigned tasks and provides the computational results which make the data and team works tasks management difficult for the team leader agent and that influence the performance computing. In this work we focused on the implementation of the Mobile Provider Agent (MPA) in order to manage the distribution of data and instructions and to ensure a load balancing model. It grants also some interesting mechanisms to manage the others computing challenges thanks to the mobile agents several skills.

Keywords: image processing, distributed environment, mobile agents, parallel and distributed computing

Procedia PDF Downloads 391
1237 Poetic Music by the Poet, Commander of the Faithful, Muhammad Bello: Prosodical Study

Authors: Sirajo Muhammad Sokoto

Abstract:

The Commander of the Faithful, Muhammad Bello, is considered one of the most distinguished scholars and poetic geniuses who is famous for reciting poetry in the classical vertical style. He is also represented by pre-Islamic poets such as Imru’ al-Qays and Alqamah and among the Islamists such as Hassan bin Thabit, Amr bin Abi Rabi’ah, and others. The poet drew from the seas of the Arabic language and its styles at the hands of His father, Sheikh Othman Bin Fodio, and his uncle, Sheikh Abdullah Bin Fodio, are both things that made Muhammad Bello conversant with the Arabic language until he was able to write poetry in a beautiful format and good style. The Commander of the Faithful, Muhammad Bello, did not deviate from what the Arabs know of poetic elements, such as taking into account its meanings and music; Muhammadu Bello has used every Bahr of prosody and its technicals in many of his poems. This article prepares the reader for the efforts made by the poet Muhammad Bello in composing poems on poetic seas, taking into account musical tones for different purposes according to his desire. The article will also discuss the poet’s talent, skill, and eloquence.

Keywords: music, Muhammad Bello, poetry, performances

Procedia PDF Downloads 58
1236 A Novel Alginate/Tea Waste Complex for Restoration and Conservation of Historical Textiles Using Immobilized Enzymes

Authors: Mohamed E. Hassan

Abstract:

Through numerous chemical linkages, historical textiles in burial contexts or in museums are exposed to many different forms of stains and filth. The cleaning procedure must be carried out carefully without causing any irreparable harm, and sediments must be removed without damaging the surface's original material. Science and technology continue to develop novel methods for cleaning historical textiles and artistic surfaces biologically (using enzymes). Lipase and α-amylase were immobilized on nanoparticles of alginate/tea waste nanoparticle complex and used in historical textile cleaning. The preparation of nanoparticles, activation, and enzyme immobilization were characterized. Optimization of loading times and units of the two enzymes was done. It was found that the optimum time and units of amylase were 3 hours and 30 U, respectively. While the optimum time and units of lipase were 2.5 hours and 20 U, respectively, FT-IR and TGA instruments were used in proving the preparation of nanoparticles and the immobilization process. SEM was used to examine the fibres before and after treatment. In conclusion, a new carrier was prepared from alginate/Tea waste and optimized to be used in the restoration and conservation of historical textiles using immobilized lipase and α-amylase.

Keywords: alginate/tea waste, nanoparticles, immobilized enzymes, historical textiles

Procedia PDF Downloads 79
1235 Annual Water Level Simulation Using Support Vector Machine

Authors: Maryam Khalilzadeh Poshtegal, Seyed Ahmad Mirbagheri, Mojtaba Noury

Abstract:

In this paper, by application of the input yearly data of rainfall, temperature and flow to the Urmia Lake, the simulation of water level fluctuation were applied by means of three models. According to the climate change investigation the fluctuation of lakes water level are of high interest. This study investigate data-driven models, support vector machines (SVM), SVM method which is a new regression procedure in water resources are applied to the yearly level data of Lake Urmia that is the biggest and the hyper saline lake in Iran. The evaluated lake levels are found to be in good correlation with the observed values. The results of SVM simulation show better accuracy and implementation. The mean square errors, mean absolute relative errors and determination coefficient statistics are used as comparison criteria.

Keywords: simulation, water level fluctuation, urmia lake, support vector machine

Procedia PDF Downloads 353
1234 The Impact of Transformational Leadership on Individual Attributes

Authors: Bilal Liaqat, Muhammad Umar, Zara Bashir, Hassan Rafique, Mohsin Abbasi, Zarak Khan

Abstract:

Transformational leadership is one of the most studied topics in the organization sciences. However, the impact of transformational leadership on employee’s individual attributes have not yet been studied. Purpose: This research aims to discover the relationship between transformational leadership and employee motivation, performance and creativity. Moreover, the study will also investigate the influence of transformational leadership on employee performance through employee motivation and employee creativity. Design-Methodology-Approach: The data was collected from employees in different organization. This cross-sectional study collected data from employees and the methodology used includes survey data that were collected from employees in organizations. Structured interviews were also conducted to explain the outcomes from the survey. Findings: The results of this study reveal that transformational leadership has a positive impact on employee’s individual attributes. Research Implications: Although this study expands our knowledge about the role of learning orientation between transformational leadership and employee motivation, performance and creativity, the prospects for further research are still present.

Keywords: employee creativity, employee motivation, employee performance, transformational leadership

Procedia PDF Downloads 215
1233 Characterization of Extra Virgin Olive Oil from Olive Cultivars Grown in Pothwar, Pakistan

Authors: Abida Mariam, Anwaar Ahmed, Asif Ahmad, Muhammad Sheeraz Ahmad, Muhammad Akram Khan, Muhammad Mazahir

Abstract:

The plant olive (Olea europaea L.) is known for its commercial significance due to nutritional and health benefits. Pakistan is ranked 4th among countries who import olive oil whereas, 70% of edible oil is imported to fulfil the needs of the country. There exists great potential for Olea europaea cultivation in Pakistan. The popularity and cultivation of olive fruit has increased in recent past due to its high socio-economic and health significance. There exist almost negligible data on the chemical composition of extra virgin olive oil extracted from cultivars grown in Pothwar, an area with arid climate conducive for growth of olive trees. Keeping in view these factors a study has been conducted to characterize the olive oil extracted from olive cultivars collected from Pothwar regions of Pakistan for their nutritional potential and value addition. Ten olive cultivars (Gemlik, Coratina, Sevillano, Manzanilla, Leccino, Koroneiki, Frantoio, Arbiquina, Earlik and Ottobratica) were collected from Barani Agriculture Research Institute, Chakwal. Extra Virgin Olive Oil (EVOO) was extracted by cold pressing and centrifuging of olive fruits. The highest amount of oil was yielded in Coratina (23.9%) followed by Frantoio (23.7%), Koroneiki (22.8%), Sevillano (22%), Ottobratica (22%), Leccino (20.5%), Arbiquina (19.2%), Manzanilla (17.2%), Earlik (14.4%) and Gemllik (13.1%). The extracted virgin olive oil was studied for various physico- chemical properties and fatty acid profile. The Physical and chemical properties i.e., characteristic odor and taste, light yellow color with no foreign matter, insoluble impurities (≤0.08), fee fatty acid (0.1 to 0.8), acidity (0.5 to 1.6 mg/g acid), peroxide value (1.5 to 5.2 meqO2/kg), Iodine value (82 to 90), saponification value (186 to 192 mg/g) and unsaponifiable matter (4 to 8g/kg), ultraviolet spectrophotometric analysis (k232 and k270), showed values in the acceptable range, established by PSQCA and IOOC set for extra virgin olive oil. Olive oil was analyzed by Near Infra-Red spectrophotometry (NIR) for fatty acids sin olive oils which were found as: palmitic, palmitoleic, stearic, oleic, linoleic and alpha-linolenic. Major fatty acid was Oleic acid in the highest percentage ranging from (55 to 66.1%), followed by linoleic (10.4 to 20.4%), palmitic (13.8 to 19.5%), stearic (3.9 to 4.4%), palmitoleic (0.3 to 1.7%) and alpha-linolenic (0.9 to 1.7%). The results were significant with differences in parameters analyzed for all ten cultivars which confirm that genetic factors are important contributors in the physico-chemical characteristics of oil. The olive oil showed superior physical and chemical properties and recommended as one of the healthiest forms of edible oil. This study will help consumers to be more aware of and make better choices of healthy oils available locally thus contributing towards their better health.

Keywords: characterization, extra virgin olive oil, oil yield, fatty acids

Procedia PDF Downloads 82
1232 Numerical Modelling of Effective Diffusivity in Bone Tissue Engineering

Authors: Ayesha Sohail, Khadija Maqbool, Anila Asif, Haroon Ahmad

Abstract:

The field of tissue engineering is an active area of research. Bone tissue engineering helps to resolve the clinical problems of critical size and non-healing defects by the creation of man-made bone tissue. We will design and validate an efficient numerical model, which will simulate the effective diffusivity in bone tissue engineering. Our numerical model will be based on the finite element analysis of the diffusion-reaction equations. It will have the ability to optimize the diffusivity, even at multi-scale, with the variation of time. It will also have a special feature, with which we will not only be able to predict the oxygen, glucose and cell density dynamics, more accurately, but will also sort the issues arising due to anisotropy. We will fix these problems with the help of modifying the governing equations, by selecting appropriate spatio-temporal finite element schemes, by adaptive grid refinement strategy and by transient analysis.

Keywords: scaffolds, porosity, diffusion, transient analysis

Procedia PDF Downloads 526
1231 Decomposition of Third-Order Discrete-Time Linear Time-Varying Systems into Its Second- and First-Order Pairs

Authors: Mohamed Hassan Abdullahi

Abstract:

Decomposition is used as a synthesis tool in several physical systems. It can also be used for tearing and restructuring, which is large-scale system analysis. On the other hand, the commutativity of series-connected systems has fascinated the interest of researchers, and its advantages have been emphasized in the literature. The presentation looks into the necessary conditions for decomposing any third-order discrete-time linear time-varying system into a commutative pair of first- and second-order systems. Additional requirements are derived in the case of nonzero initial conditions. MATLAB simulations are used to verify the findings. The work is unique and is being published for the first time. It is critical from the standpoints of synthesis and/or design. Because many design techniques in engineering systems rely on tearing and reconstruction, this is the process of putting together simple components to create a finished product. Furthermore, it is demonstrated that regarding sensitivity to initial conditions, some combinations may be better than others. The results of this work can be extended for the decomposition of fourth-order discrete-time linear time-varying systems into lower-order commutative pairs, as two second-order commutative subsystems or one first-order and one third-order commutative subsystems.

Keywords: commutativity, decomposition, discrete time-varying systems, systems

Procedia PDF Downloads 95
1230 Use of Artificial Intelligence in Teaching Practices: A Meta-Analysis

Authors: Azmat Farooq Ahmad Khurram, Sadaf Aslam

Abstract:

This meta-analysis systematically examines the use of artificial intelligence (AI) in instructional methods across diverse educational settings through a thorough analysis of empirical research encompassing various disciplines, educational levels, and regions. This study aims to assess the effects of AI integration on teaching methodologies, classroom dynamics, teachers' roles, and student engagement. Various research methods were used to gather data, including literature reviews, surveys, interviews, and focus group discussions. Findings indicate paradigm shifts in teaching and education, identify emerging trends, practices, and the application of artificial intelligence in learning, and provide educators, policymakers, and stakeholders with guidelines and recommendations for effectively integrating AI in educational contexts. The study concludes by suggesting future research directions and practical considerations for maximizing AI's positive influence on pedagogical practices.

Keywords: artificial intelligence, teaching practices, meta-analysis, teaching-learning

Procedia PDF Downloads 46
1229 A Supervised Face Parts Labeling Framework

Authors: Khalil Khan, Ikram Syed, Muhammad Ehsan Mazhar, Iran Uddin, Nasir Ahmad

Abstract:

Face parts labeling is the process of assigning class labels to each face part. A face parts labeling method (FPL) which divides a given image into its constitutes parts is proposed in this paper. A database FaceD consisting of 564 images is labeled with hand and make publically available. A supervised learning model is built through extraction of features from the training data. The testing phase is performed with two semantic segmentation methods, i.e., pixel and super-pixel based segmentation. In pixel-based segmentation class label is provided to each pixel individually. In super-pixel based method class label is assigned to super-pixel only – as a result, the same class label is given to all pixels inside a super-pixel. Pixel labeling accuracy reported with pixel and super-pixel based methods is 97.68 % and 93.45% respectively.

Keywords: face labeling, semantic segmentation, classification, face segmentation

Procedia PDF Downloads 241
1228 Efficiency and Factors Affecting Inefficiency in the Previous Enclaves of Northern Region of Bangladesh: An Analysis of SFA and DEA Approach

Authors: Md. Mazharul Anwar, Md. Samim Hossain Molla, Md. Akkas Ali, Mian Sayeed Hassan

Abstract:

After 68 years, the agreement between Bangladesh and India was ratified on 6 June 2015 and Bangladesh received 111 Indian enclaves. Millions of farm household lived in these previous enclaves, being detached from the mainland of the country, they were socially, economically and educationally deprived people in the world. This study was undertaken to compare of the Stochastic Frontier Analysis (SFA) and the constant returns to scale (CRS) and variable returns to scale (VRS) output-oriented DEA models, based on a sample of 300 farms from the three largest enclaves of Bangladesh in 2017. However, the aim of the study was not only to compare estimates of technical efficiency obtained from the two approaches, but also to examine the determinants of inefficiency. The results from both the approaches indicated that there is a potential for increasing farm production through efficiency improvement and that farmers' age, educational level, new technology dissemination and training on crop production technology have a significant effect on efficiency. The detection and measurement of technical inefficiency and its determinants can be used as a basis of policy recommendations.

Keywords: DEA approach, previous enclaves, SFA approach, technical inefficiency

Procedia PDF Downloads 113
1227 Modelling and Optimization of Laser Cutting Operations

Authors: Hany Mohamed Abdu, Mohamed Hassan Gadallah, El-Giushi Mokhtar, Yehia Mahmoud Ismail

Abstract:

Laser beam cutting is one nontraditional machining process. This paper optimizes the parameters of Laser beam cutting machining parameters of Stainless steel (316L) by considering the effect of input parameters viz. power, oxygen pressure, frequency and cutting speed. Statistical design of experiments are carried in three different levels and process responses such as 'Average kerf taper (Ta)' and 'Surface Roughness (Ra)' are measured accordingly. A quadratic mathematical model (RSM) for each of the responses is developed as a function of the process parameters. Responses predicted by the models (as per Taguchi’s L27 OA) are employed to search for an optimal parametric combination to achieve desired yield of the process. RSM models are developed for mean responses, S/N ratio, and standard deviation of responses. Optimization models are formulated as single objective problem subject to process constraints. Models are formulated based on Analysis of Variance (ANOVA) using MATLAB environment. Optimum solutions are compared with Taguchi Methodology results.

Keywords: optimization, laser cutting, robust design, kerf width, Taguchi method, RSM and DOE

Procedia PDF Downloads 609
1226 A Hybrid Approach for Thread Recommendation in MOOC Forums

Authors: Ahmad. A. Kardan, Amir Narimani, Foozhan Ataiefard

Abstract:

Recommender Systems have been developed to provide contents and services compatible to users based on their behaviors and interests. Due to information overload in online discussion forums and users diverse interests, recommending relative topics and threads is considered to be helpful for improving the ease of forum usage. In order to lead learners to find relevant information in educational forums, recommendations are even more needed. We present a hybrid thread recommender system for MOOC forums by applying social network analysis and association rule mining techniques. Initial results indicate that the proposed recommender system performs comparatively well with regard to limited available data from users' previous posts in the forum.

Keywords: association rule mining, hybrid recommender system, massive open online courses, MOOCs, social network analysis

Procedia PDF Downloads 283