Search results for: Adnan Ibrahim
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 808

Search results for: Adnan Ibrahim

778 Characterization of Thixoformed AlSi12 Alloy with the Addition of Trace Amounts of Silver

Authors: Nursen Saklakoglu, Adnan Turker

Abstract:

The main objective of this study is to reveal the effect of the Thixoforming process on the microstructure and mechanical properties of the AlSi12 alloy with trace amounts of silver. It is concluded that Thixoforming has an important effect on the morphology of intermetallics and Si formation, as well as globular α-Al morphology. The intermetallics have been fractured during thixoforming. It is believed that the fine distribution of the intermetallics is one mechanism for the improved mechanical properties of Thixoformed alloys. The discrete Si particles have been observed during both isothermal heating to the semi-solid range and Thixoforming, also have an important effect on mechanical properties. The Thixoforming process has a greater effect on hardness than the addition of Ag does.

Keywords: AlSi alloys, intermetallic phases, mechanical properties trace element, silver, thixoforming

Procedia PDF Downloads 326
777 Case Study of Child Labour in Pakistan

Authors: Ahmad Ali Ansari, Hassan Arshad, Basharat Hussani, Adnan Raza, Ahmad Ali Khan

Abstract:

Child labor is a kind of an issue which was found all over the world, but now the first world countries like countries in Europe and America (USA) got hold of it up to a large extent but Underdeveloped or the developing countries including Pakistan are still a victim of this issue. The following attempt has been made in this research article to figure out the main reasons of child labor in underdeveloped countries especially in Pakistan and also some of the issues are discussed which are hindering the solution of child labor in Pakistan. In this research we interviewed 70 working children in the area of Rawalpindi, Islamabad, Taxila and Hatar who belonged to the different parts of the country and figured out the basic causes of the child labor in Pakistan, what are its bad effects on the young one who is a victim of it and we also put a light on what the government of Pakistan is doing in this context and what the government still have to do.

Keywords: child labour, Pakistan, case study, underdeveloped countries

Procedia PDF Downloads 664
776 Review of Ultrasound Image Processing Techniques for Speckle Noise Reduction

Authors: Kwazikwenkosi Sikhakhane, Suvendi Rimer, Mpho Gololo, Khmaies Oahada, Adnan Abu-Mahfouz

Abstract:

Medical ultrasound imaging is a crucial diagnostic technique due to its affordability and non-invasiveness compared to other imaging methods. However, the presence of speckle noise, which is a form of multiplicative noise, poses a significant obstacle to obtaining clear and accurate images in ultrasound imaging. Speckle noise reduces image quality by decreasing contrast, resolution, and signal-to-noise ratio (SNR). This makes it difficult for medical professionals to interpret ultrasound images accurately. To address this issue, various techniques have been developed to reduce speckle noise in ultrasound images, which improves image quality. This paper aims to review some of these techniques, highlighting the advantages and disadvantages of each algorithm and identifying the scenarios in which they work most effectively.

Keywords: image processing, noise, speckle, ultrasound

Procedia PDF Downloads 110
775 ICT for Smart Appliances: Current Technology and Identification of Future ICT Trend

Authors: Abubakar Uba Ibrahim, Ibrahim Haruna Shanono

Abstract:

Smart metering and demand response are gaining ground in industrial and residential applications. Smart Appliances have been given concern towards achieving Smart home. The success of Smart grid development relies on the successful implementation of Information and Communication Technology (ICT) in power sector. Smart Appliances have been the technology under development and many new contributions to its realization have been reported in the last few years. The role of ICT here is to capture data in real time, thereby allowing bi-directional flow of information/data between producing and utilization point; that lead a way for the attainment of Smart appliances where home appliances can communicate between themselves and provide a self-control (switch on and off) using the signal (information) obtained from the grid. This paper depicts the background on ICT for smart appliances paying a particular attention to the current technology and identifying the future ICT trends for load monitoring through which smart appliances can be achieved to facilitate an efficient smart home system which promote demand response program. This paper grouped and reviewed the recent contributions, in order to establish the current state of the art and trends of the technology, so that the reader can be provided with a comprehensive and insightful review of where ICT for smart appliances stands and is heading to. The paper also presents a brief overview of communication types, and then narrowed the discussion to the load monitoring (Non-intrusive Appliances Load Monitoring ‘NALM’). Finally, some future trends and challenges in the further development of the ICT framework are discussed to motivate future contributions that address open problems and explore new possibilities.

Keywords: communication technology between appliances, demand response, load monitoring, smart appliances, smart grid

Procedia PDF Downloads 613
774 Chamba Encroachment into Jukum Territory and Its Impact 1830-1900

Authors: Iliya Ibrahim Gimba

Abstract:

The period between the late 18th and early 19th centuries was characterized by conflict of ethnic nationalities in the Benue valley region. This conflict was exacerbated by the introduction of the Fulani jihad that began in Hausa land into the Benue valley region. Fulani in this region launched the Jihad movement which pushed out some ethnic groups from their natural abode or ancestral home to live a nomad live until they could settle and established a stayed in a particular place. The Chamba were being displaced by the Fulani jihad that took place around Faro deo in about 1809. It was from there that most of the Chamba migrated out, some into the Cameroon republic, while others moved into the Benue valley region. Among those that entered into the Benue valley region are the Sama, Kola, Gayam etc, and could be found in Donga local Government area of Taraba state. Those Chamba clan that later on cameo into the Benue Valley are Pyeri, Kashimbila etc. The sudden movement of the Chamba or migrations into the Jukun territory co-in ceded with the period that the Jihad had already had a severe and consequential effect or impact on the Jukun territory cause by Yakubu Ibrahim of Bzuchi, and Buba Yero of Gombe, and Hamaruwa of Muri Emirate. This ne authorities in Kwararafa Kingdom cut the Jukun King out of contact with Borno and Hausa-land. This paper set to examine the chiefdom that the Chamba established right within the Jukun headquarters of Wukari. Sources to be used are published books, Journals, Archival materials, and M.A. Thesis to enable us know the impact of Chamba migrations on the Jukun territory and reactions of the Jukun’s to this new comers.

Keywords: Chamba people, encroachment, migration, ethnic nationalities

Procedia PDF Downloads 458
773 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 539
772 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 618
771 Assessment of Bridge Performance with Laminated versus Spring Seismic Isolation

Authors: M. Z. Ramli, A. Adnan, Chee Wei Tan

Abstract:

To gain a better understanding of earthquake forces on reinforced concrete bridge piers with different bearing condition, a series of experiments was conducted on a realistic, 1:4 scale reinforced concrete bridge pier. The normal practices of laminated seismic isolation bearing is compared with the new design spring seismic isolation bearing where invented by Engineering Seismology and Earthquake Engineering Research (e-SEER), Universiti Teknologi Malaysia. The nonlinear behavior of piers is modeled using the fibre beam theory to verify the experimental works. The hysteresis of bridge pier with different bearing condition was illustrated under different Peak Ground Acceleration (PGAs). The average slope of the hysteresis respectively to the global stiffness was also investigated.

Keywords: bridge, laminated seismic isolation, spring seismic isolation, Peak Ground Acceleration, stiffness

Procedia PDF Downloads 560
770 A Review of Physiological Measures for Cognitive Workload Assessment of Aircrew

Authors: Naveed Tahir, Adnan Maqsood

Abstract:

Cognitive workload is a significant factor affecting user performance, and it has been broadly investigated for its application in ergonomics as well as in designing and optimizing effective human-machine interactions. It is mentally challenging to maneuver an aircraft, and pilots must control the aircraft and adequately communicate to the verbal-auditory stimuli. Several physiological measures have long been researched and used to demonstrate the cognitive workload. In our current study, we have summarized recent findings of the effectiveness, accuracy, and applicability of commonly used physiological measures in evaluating cognitive workload. We have also highlighted on the advancements in physiological measures. The strength and limitations of physiological measures have also been discussed to assess the cognitive workload of people, especially the aircrews in laboratory settings and real-time situations. We have presented the research findings of the physiological measures to base suggestions on the proper applications of the measures and settings demanding the use of single measure or their combinations.

Keywords: aircrew, cognitive workload, subjective measure, physiological measure, performance measure

Procedia PDF Downloads 162
769 Effect of Superabsorbent for the Improvement of Car Seat's Thermal Comfort

Authors: Funda Buyuk Mazari, Adnan Mazari, Antonin Havelka, Jakub Wiener, Jawad Naeem

Abstract:

The use of super absorbent polymers (SAP) for moisture absorption and comfort is still unexplored. In this research the efficiency of different SAP fibrous webs are determined under different moisture percentage to examine the sorption and desorption efficiency. The SAP fibrous web with low thickness and high moisture absorption are tested with multilayer sandwich structure of car seat cover to determine the moisture absorption through cover material. Sweating guarded hot plate (SGHP) from company Atlas is used to determine the moisture permeability of different car seat cover with superabsorbent layer closed with impermeable polyurethane foam. It is observed that the SAP fibrous layers are very effective in absorbing and desorbing water vapor under extreme high and low moisture percentages respectively. In extreme humid condition (95 %RH) the 20g of SAP layer absorbs nearly 3g of water vapor per hour and reaches the maximum absorption capacity in 6 hours.

Keywords: car seat, comfort, SAF, superabsorbent

Procedia PDF Downloads 475
768 Fuel Cells and Offshore Wind Turbines Technology for Eco-Friendly Ports with a Case Study

Authors: Ibrahim Sadek Sedik Ibrahim, Mohamed M. Elgohary

Abstract:

Sea ports are considered one of the factors affecting the progress of economic globalization and the international trade; consequently, they are considered one of the sources involved in the deterioration of the maritime environment due to the excessive amount of exhaust gases emitted from their activities. The majority of sea ports depend on the national electric grid as a source of power for the domestic and ships’ electric demands. This paper discusses the possibility of shifting ports from relying on the national grid electricity to green power-based ports. Offshore wind turbines and hydrogenic PEM fuel cell units appear as two typical promising clean energy sources for ports. As a case study, the paper investigates the prospect of converting Alexandria Port in Egypt to be an eco-friendly port with the study of technical, logistic, and financial requirements. The results show that the fuel cell, followed by a combined system of wind turbines and fuel cells, is the best choice regarding electricity production unit cost by 0.101 and 0.107 $/kWh, respectively. Furthermore, using of fuel cells and offshore wind turbine as green power concept will achieving emissions reduction quantity of CO₂, NOx, and CO emissions by 80,441, 20.814, and 133.025 ton per year, respectively. Finally, the paper highlights the role that renewable energy can play when supplying Alexandria Port with green energy to lift the burden on the government in supporting the electricity, with a possibility of achieving a profit of 3.85% to 22.31% of the annual electricity cost compared with the international prices.

Keywords: fuel cells, green ports, IMO, national electric grid, offshore wind turbines, port emissions, renewable energy

Procedia PDF Downloads 141
767 Improving Library Service Quality in Local City of Indonesia

Authors: Prima Fithri, Afri Adnan, Verra Syahmer

Abstract:

Library as a public service should be able to provide excellent and quality service. The criteria that should be available in the library is having the collection which relevant, actual and reliable, qualified and professional employee, delivery system that prompt and appropriate as well as supported by proper infrastructure. The aim of this study is to show the performance as an effort to provide quality of services that appropriate with the needs and desires of user. Then, in this research has been carried out the calculation of the gap between the perceptions and expectations of user about the services of the library. The Sevqual and QFD methods are used in this study. Servqual method for measuring the value of the gap that occurs in the dimensions of service quality and QFD method for determine priority repairment that need to be done to improve the quality of services that occur in the dimensions of service quality. From 97 questionaires, shows that value of the gap that occurs in the dimensions of service quality using by Servqual is 27.7% dimensions of responsiveness. It show how much user expectations are not met by the quality of existing services. Construction of the library and standard library becomes priority improvements that need to be done to improve the quality of service that occurs in the dimensions of service quality using the QFD.

Keywords: library, service quality, service quality, QFD

Procedia PDF Downloads 578
766 A New Tool for Global Optimization Problems: Cuttlefish Algorithm

Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman

Abstract:

This paper presents a new meta-heuristic bio-inspired optimization algorithm which is called Cuttlefish Algorithm (CFA). The algorithm mimics the mechanism of color changing behavior of the cuttlefish to solve numerical global optimization problems. The colors and patterns of the cuttlefish are produced by reflected light from three different layers of cells. The proposed algorithm considers mainly two processes: reflection and visibility. Reflection process simulates light reflection mechanism used by these layers, while visibility process simulates visibility of matching patterns of the cuttlefish. To show the effectiveness of the algorithm, it is tested with some other popular bio-inspired optimization algorithms such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Bees Algorithm (BA) that have been previously proposed in the literature. Simulations and obtained results indicate that the proposed CFA is superior when compared with these algorithms.

Keywords: Cuttlefish Algorithm, bio-inspired algorithms, optimization, global optimization problems

Procedia PDF Downloads 563
765 Performance Analysis of the Time-Based and Periodogram-Based Energy Detector for Spectrum Sensing

Authors: Sadaf Nawaz, Adnan Ahmed Khan, Asad Mahmood, Chaudhary Farrukh Javed

Abstract:

Classically, an energy detector is implemented in time domain (TD). However, frequency domain (FD) based energy detector has demonstrated an improved performance. This paper presents a comparison between the two approaches as to analyze their pros and cons. A detailed performance analysis of the classical TD energy-detector and the periodogram based detector is performed. Exact and approximate mathematical expressions for probability of false alarm (Pf) and probability of detection (Pd) are derived for both approaches. The derived expressions naturally lead to an analytical as well as intuitive reasoning for the improved performance of (Pf) and (Pd) in different scenarios. Our analysis suggests the dependence improvement on buffer sizes. Pf is improved in FD, whereas Pd is enhanced in TD based energy detectors. Finally, Monte Carlo simulations results demonstrate the analysis reached by the derived expressions.

Keywords: cognitive radio, energy detector, periodogram, spectrum sensing

Procedia PDF Downloads 377
764 Intelligent Prediction of Breast Cancer Severity

Authors: Wahab Ali, Oyebade K. Oyedotun, Adnan Khashman

Abstract:

Breast cancer remains a threat to the woman’s world in view of survival rates, it early diagnosis and mortality statistics. So far, research has shown that many survivors of breast cancer cases are in the ones with early diagnosis. Breast cancer is usually categorized into stages which indicates its severity and corresponding survival rates for patients. Investigations show that the farther into the stages before diagnosis the lesser the chance of survival; hence the early diagnosis of breast cancer becomes imperative, and consequently the application of novel technologies to achieving this. Over the year, mammograms have used in the diagnosis of breast cancer, but the inconclusive deductions made from such scans lead to either false negative cases where cancer patients may be left untreated or false positive where unnecessary biopsies are carried out. This paper presents the application of artificial neural networks in the prediction of severity of breast tumour (whether benign or malignant) using mammography reports and other factors that are related to breast cancer.

Keywords: breast cancer, intelligent classification, neural networks, mammography

Procedia PDF Downloads 487
763 The Effects of High Velocity Low Amplitude Thrust Manipulation versus Low Velocity Low Amplitude Mobilization in Treatment of Chronic Mechanical Low Back Pain

Authors: Ahmed R. Z. Baghdadi, Ibrahim M. I. Hamoda,  Mona H. Gamal Eldein, Ibrahim Magdy Elnaggar

Abstract:

Background: High-velocity low amplitude thrust (HVLAT) manipulation and low-velocity low amplitude (LVLA) mobilization are an effective treatment for low back pain (LBP). Purpose: This study compared the effects of HVLAT versus LVLA on pain, functional deficits and segmental mobility in treatment of chronic mechanical LBP. Methods: Ninety patients suffering from chronic mechanical LBP are classified to three groups; Thirty patients treated by HVLAT (group I), thirty patients treated by LVLA (group II) and thirty patients as control group (group III) participated in the study. The mean age was 28.00±2.92, 27.83±2.28 and 28.07±3.05 years and BMI 27.98±2.60, 28.80±2.40 and 28.70±2.53 kg/m2 for group I, II and III respectively. The Visual Analogue Scale (VAS), the Oswestry low back pain disability questionnaire and modified schoper test were used for assessment. Assessments were conducted two weeks before and after treatment with the control group being assessed at the same time intervals. The treatment program group one was two weeks single session per week, and for group II two sessions per week for two weeks. Results: The One-way ANOVA revealed that group I had significantly lower pain scores and Oswestry score compared with group II two weeks after treatment. Moreover, the mobility in modified schoper increased significantly and the pain scores and Oswestry scores decreased significantly after treatment in group I and II compared with control group. Interpretation/Conclusion: HVLAT is preferable to LVLA mobilization, possibly due to a beneficial neurophysiological effect by Stimulating mechanically sensitive neurons in the lumbar facet joint capsule.

Keywords: low back pain, manipulation, mobilization, low velocity

Procedia PDF Downloads 602
762 Parametric Screening and Design Refinement of Ceiling Fan Blades

Authors: Shamraiz Ahmad, Riaz Ahmad, Adnan Maqsood

Abstract:

This paper describes the application of 2k-design of experiment in order to screen the geometric parameters and experimental refinement of ceiling fan blades. The ratio of the air delivery to the power consumed is commonly known as service value (SV) in ceiling fan designer’s community. Service value was considered as the response for 56 inch ceiling fan and four geometric parameters (bend position at root, bend position at tip, bent angle at root and bent angle at tip) of blade were analyzed. With two levels, the 4-design parameters along with their eleven interactions were studied and design of experiment was employed for experimental arrangement. Blade manufacturing and testing were done in a medium scale enterprise. The objective was achieved and service value of ceiling fan was increased by 10.4 % without increasing the cost of production and manufacturing system. Experiments were designed and results were analyzed using Minitab® 16 software package.

Keywords: parametric screening, 2k-design of experiment, ceiling fan, service value, performance improvement

Procedia PDF Downloads 564
761 Development of E-Tendering Models for Nigerian Public Procuring Entities

Authors: Bello Abdullahi, Kabir Bala, Yahaya M. Ibrahim, Ahmed D. Ibrahim

Abstract:

Public sector tendering has traditionally been conducted using manual paper-based processes which are known to be inefficient, less transparent, and more prone to manipulations and errors. However, the advent of the Internet and its associated technologies has led to the development of numerous e-Tendering systems that addressed many of the problems associated with the manual paper-based tendering system. Currently, in Nigeria, the public tendering processes are largely conducted based on manual paper-based system that is bedevilled by a number of problems such as inordinate delays, inefficiencies, manipulation of the tender evaluation process, corruption, lack of transparency and competition, among other problems. These problems can be addressed through the adoption of existing web-based e-Tendering systems which are known to address most of these problems. However, these existing e-Tendering systems that have been developed are not based on the Nigerian legal procurement processes and as such their suitability for local application is very limited. This paper is part of a larger study that attempt to address this problem through the development of an e-Tendering system that is based on the requirements of the Nigerian public procuring entities. In this paper, the identified tendering processes commonly used by Nigerian public procuring entities in the selection of construction sources are presented. A multi-methods research approach was used to identify those tendering processes. Specifically, 19 existing business use cases used by Nigerian public procuring entities were identified and 61 system use cases were prescribed based on the identified business use cases. The use cases were used as the basis for the development of domain and software conceptual models. The models were successfully used to guide the development of an e-Tendering system called NPS-eTender. Ripple and Unified Process were adopted as the software development methodologies.

Keywords: e-tendering, e-procurement, requirement model, conceptual model, public sector tendering, public procurement

Procedia PDF Downloads 195
760 Reliable Line-of-Sight and Non-Line-of-Sight Propagation Channel Identification in Ultra-Wideband Wireless Networks

Authors: Mohamed Adnan Landolsi, Ali F. Almutairi

Abstract:

The paper addresses the problem of line-of-sight (LOS) vs. non-line-of-sight (NLOS) propagation link identification in ultra-wideband (UWB) wireless networks, which is necessary for improving the accuracy of radiolocation and positioning applications. A LOS/NLOS likelihood hypothesis testing approach is applied based on exploiting distinctive statistical features of the channel impulse response (CIR) using parameters related to the “skewness” of the CIR and its root mean square (RMS) delay spread. A log-normal fit is presented for the probability densities of the CIR parameters. Simulation results show that different environments (residential, office, outdoor, etc.) have measurable differences in their CIR parameters’ statistics, which is then exploited in determining the nature of the propagation channels. Correct LOS/NLOS channel identification rates exceeding 90% are shown to be achievable for most types of environments. Additional improvement is also obtained by combining both CIR skewness and RMS delay statistics.

Keywords: UWB, propagation, LOS, NLOS, identification

Procedia PDF Downloads 249
759 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset

Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor

Abstract:

The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.

Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques

Procedia PDF Downloads 11
758 A Hybrid Watermarking Model Based on Frequency of Occurrence

Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis

Abstract:

Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: authentication, copyright protection, information hiding, ownership, watermarking

Procedia PDF Downloads 565
757 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 368
756 Gender and Political Participation in Africa

Authors: Ibrahim Baba

Abstract:

The work examines the nature and causes of differential politics in Africa with particular reference to the sub-Saharan region of the continent. It also among other objectives provides alternative panacea to gender discrimination in African politics and offers solutions on how to promote political inclusion of all citizens in respect of gender differences in Africa. The work is conducted using library base documentation analysis.

Keywords: gender, political, participation, differential politics, sub-Saharan Africa

Procedia PDF Downloads 426
755 Bayesian Approach for Moving Extremes Ranked Set Sampling

Authors: Said Ali Al-Hadhrami, Amer Ibrahim Al-Omari

Abstract:

In this paper, Bayesian estimation for the mean of exponential distribution is considered using Moving Extremes Ranked Set Sampling (MERSS). Three priors are used; Jeffery, conjugate and constant using MERSS and Simple Random Sampling (SRS). Some properties of the proposed estimators are investigated. It is found that the suggested estimators using MERSS are more efficient than its counterparts based on SRS.

Keywords: Bayesian, efficiency, moving extreme ranked set sampling, ranked set sampling

Procedia PDF Downloads 513
754 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 459
753 Effect of Zr Addition to Aluminum Grain Refined by Ti+B on Its Wear Resistance after Extrusion Condition

Authors: Adnan I. O. Zaid, Safwan M. A. Alqawabah

Abstract:

Review of the available literature on grain refinement of aluminum and its alloys reveals that little work is published on the effect of refiners on mechanical characteristics and wear resistance. In this paper, the effect of addition of Zr to Al grain refined by Ti+B on its metallurgical, mechanical characteristics and wear resistance both in the as cast and after extrusion condition are presented and discussed. It was found that Addition of Zr to Al resulted in deterioration of its mechanical strength and hardness, whereas it resulted in improvement of both of them when added to Al grain refined by Ti+B. Furthermore it was found that the direct extrusion process resulted in further increase of the mechanical strength and hardness of Al and its micro-alloys. Also it resulted in increase of their work hardening index, n, i.e. improved their formability, hence it reduces the number of stages required for forming at large strains in excess of the plastic instability before Zr addition.

Keywords: aluminum, grain refinement, titanium + boron, zirconium, mechanical characteristics, wear resistance, direct extrusion

Procedia PDF Downloads 446
752 Effect of Vanadium Addition to Aluminum Grain Refined by Ti or Ti + B on Its Microstructure, Mechanical Behavior, Fatigue Strength and Life

Authors: Adnan I. O. Zaid

Abstract:

As aluminum solidifies in columnar structure with large grain size which reduces its surface quality and mechanical strength; therefore it is normally grain refined either by titanium or titanium + boron (Ti or Ti + B). In this paper, the effect of addition of either Ti or Ti + B to commercially pure aluminum on its grain size, Vickers hardness, mechanical strength and fatigue strength and life is presented and discussed. Similarly, the effect of vanadium addition to Al grain refined by Ti or Ti+ B is presented and discussed. Two binary master alloys Al-Ti and Al-Vi were laboratory prepared from which five different micro-alloys in addition to the commercially pure aluminum namely Al-Ti, Al-Ti-B, Al-V, Al-Ti-V and Al-Ti-B-V were prepared for the investigation. Finally, the effect of their addition on the fatigue cracks initiation and propagation, using scanning electron microscope, SEM, is also presented and discussed. Photomirographs and photoscans are included in the paper.

Keywords: aluminum, fatigue, grain refinement, titanium, titanium+boron, vanadium

Procedia PDF Downloads 486
751 Design and Synthesis of Some Pyrimidine Derivatives as Bruton’s Tyrosine Kinase Inhibitors for Hematologic Malignancies

Authors: Ibrahim M. Labouta, Gina N. Tageldin, Salwa M. Fahmy, Hayam M. Ashour, Mounir A. Khalil, Tamer M. Ibrahim, Nefertiti A. El-Nikhely

Abstract:

Bruton’s tyrosine kinase (BTK) is a critical effector molecule in B cell antigen receptor (BCR) signaling transduction. It regulates B cell proliferation, development and survival. Since BTK is widely expressed in many B cell leukaemias and lymphomas, targeting BTK by small molecules inhibitors became an attractive idea as new treatment modalities for B cell mediated hematologic malignancies. Ibrutinib is the 1st generation BTK inhibitor, approved by FDA for treatment of relapsed mantle cell lymphoma (MCL) and chronic lymphocytic leukemia (CLL). It binds irreversibly to the unique cysteine (Cys481) within the ATP-binding pocket of BTK. Besides ibrutinib, many irreversible covalent BTK inhibitors comprising pyrimidine nucleus such as spebrutinib (phase IIb) showed high selectivity and potency when compared to it. In this study, the designed compounds were based on 5-cyano-2-methylsulfanyl pyrimidine core and decorated with electrophilic warheads which are essential for the optimal activity for targeted covalent inhibition (TCI). However, modifications at pyrimidine C4 or C6 were made by introduction of substituted amines which are provided to behave differently. The synthesized derivatives were evaluated for their anticancer activity in leukemia cell lines (e.g. THP-1). Results showed that, some derivatives exhibited antiproliferative activity with IC50 ranged from 5-50 μM, The in vitro enzymatic inhibitory assay for these compounds against BTK is still under investigation. Nevertheless, we could conclude from the initial biological screening that, the synthesized 4 or 6-subsitituted aminopyrimidines represent promising and novel antileukemic agents. Meanwhile, further studies are still needed to attribute this activity through targeting BTK enzyme and inhibition of BCR signaling pathway.

Keywords: BTK inhibitors, hematologic malignancies, structure based drug design (SBDD), targeted covalent inhibitors (TCI)

Procedia PDF Downloads 148
750 Public Administrators, Code of Conduct and the Nigerian Society

Authors: Mahmud Adam, Inuwa Abdu Ibrahim

Abstract:

The issue of ethics and values of public office holders in Nigerian has been and still is a matter of great mystery. Their behaviours in the discharge of their official responsibility remain unsatisfactory. The paper looks at the code of conduct and the societal values with which the Nigerian Administrators function today. Secondary sources of data were used. In conclusion, a change in attitude, reorientation, harsh and enforceable laws is required to reverse the trend.

Keywords: society, administrators, code of conduct, Nigeria

Procedia PDF Downloads 339
749 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 422