Search results for: Mohd Hassan Abdullah
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1570

Search results for: Mohd Hassan Abdullah

880 Solving Process Planning, Weighted Apparent Tardiness Cost Dispatching, and Weighted Processing plus Weight Due-Date Assignment Simultaneously Using a Hybrid Search

Authors: Halil Ibrahim Demir, Caner Erden, Abdullah Hulusi Kokcam, Mumtaz Ipek

Abstract:

Process planning, scheduling, and due date assignment are three important manufacturing functions which are studied independently in literature. There are hundreds of works on IPPS and SWDDA problems but a few works on IPPSDDA problem. Integrating these three functions is very crucial due to the high relationship between them. Since the scheduling problem is in the NP-Hard problem class without any integration, an integrated problem is even harder to solve. This study focuses on the integration of these functions. Sum of weighted tardiness, earliness, and due date related costs are used as a penalty function. Random search and hybrid metaheuristics are used to solve the integrated problem. Marginal improvement in random search is very high in the early iterations and reduces enormously in later iterations. At that point directed search contribute to marginal improvement more than random search. In this study, random and genetic search methods are combined to find better solutions. Results show that overall performance becomes better as the integration level increases.

Keywords: process planning, genetic algorithm, hybrid search, random search, weighted due-date assignment, weighted scheduling

Procedia PDF Downloads 357
879 Performance Investigation of UAV Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion

Authors: Ebrahim Hassan Kapeel, Ahmed Mohsen Kamel, Hossan Hendy, Yehia Z. Elhalwagy

Abstract:

Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control lawisdesigned for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.

Keywords: UAV dynamic model, attitude control, nonlinear PID, dynamic inversion

Procedia PDF Downloads 97
878 West African Islamic Civilization: Sokoto Caliphate and Science Education

Authors: Hassan Attahiru Gwandu

Abstract:

This study aims at surveying and analyzing the contribution of Sokoto scholars or Sokoto Caliphate in the development of science and technology in West Africa. Today, it is generally accepted that the 19th century Islamic revivalism in Hausaland was a very important revolution in the history of Hausa society and beyond. It is therefore, as a result of this movement or Jihad; the Hausaland (West Africa in general) witnessed several changes and transformations. These changes were in different sectors of life from politics, economy to social and religious aspect. It is these changes especially on religion that will be given considerations in this paper. The jihad resulted is the establishment of an Islamic state of Sokoto Caliphate, the revival Islam and development of learning and scholarship. During the existence of this Caliphate, a great deal of scholarship on Islamic laws were revived, written and documented by mostly, the three Jihad leaders; Usmanu Danfodiyo, his brother Abdullahi Fodiyo and his son Muhammad Bello. The trio had written more than one thousand books and made several verdicts on Islamic medicine. This study therefore, seeks to find out the contributions of these scholars or the Sokoto caliphate in the development of science in West Africa.

Keywords: Sokoto caliphate, scholarship, science and technology, West Africa

Procedia PDF Downloads 286
877 The Relationship between Body Esteem and Self-Esteem with Sport-Confidence Students

Authors: Saeid Motevalli, Siti Fatimah Azzahrah Binti Abd Mutalib, Mohd Sahandri Ghani Hamzah, Hazalizah Hamzah

Abstract:

The main purpose of the present study was to investigate the relationship between body esteem and self-esteem with sport-confidence among university students. This study was conducted by using the descriptive and correlational study design. Meanwhile, the method involved in this study was the online survey method. The population of the sample are mainly Universiti Pendidikan Sultan Idris (UPSI) students only which 120 participants were selected by cluster sampling method from two faculties named Fakulti Pembangunan Manusia (FPM) and Fakulti Sains Sukan dan Kejurulatihan (FSSKJ). The instrument used in this study was The Body-Esteem Scale (BES) by Franzoi and Shields (1984), Rosenberg Self-Esteem Scale (RSES) by Rosenberg (1965) and the Vealey’s Trait Sport-Confidence Inventory (TSCI) by (Vealey, 1986). The results of the Pearson product-moment correlation coefficient showed that there was a positive and moderate correlation between students’ body-esteem and sport-confidence and a negative and low correlation between students’ self-esteem and sport-confidence. Likewise, based on the entry method used all two predictor variables were significant in explaining sport confidence among UPSI students. In conclusion, it can be said that students’ sport-confidence affected by students’ self-esteem and body-esteem.

Keywords: body esteem, self-esteem, sport-confidence, students

Procedia PDF Downloads 141
876 Effect of Varying Levels of Concentrate Ration on the Performance of Nili-Ravi Buffalo Heifer Calves

Authors: Z. M. Iqbal, M. Abdullah, K. Javed, M. A. Jabbar, A. Haque, M. Saadullah, F. Shahzad

Abstract:

The current study was conducted to set the appropriate concentrate level for Nili-Ravi buffalo heifers. Twenty seven buffalo heifers were randomly divided into three different groups A, B and C having nine animals in each group. All the heifers were given free access to chopped green fodder and fresh water. In addition, heifers of group A, B and C were given concentrate at the rate of 0.5%, 1% and 1.5% of their body weight. The average daily dry matter intake was 2.69, 3.06 and 3.83 kg with average daily gain of 456.09, 398.56 and 515.87 gm in group A, B and C, respectively. The feed conversion ratio of heifers of these groups was 5.89, 7.74 and 7.52, respectively. There was non-significant (P>0.05) difference in the body measurements (height at wither, body length and heart girth), final body condition and scoring and blood serum (glucose, total protein and cholesterol) of heifers of all the three groups. The results of current study shows that there is non-significant (P>0.05) difference in the growth rate of Nili-Ravi heifers at varying levels of concentrate so, it is cost effective to raise 6-8 month calves by offering concentrate at the rate of 0.5% body weight along with free access of green fodder.

Keywords: concentrate level, buffalo heifer, body measurement, green fodder

Procedia PDF Downloads 411
875 Alignment between Understanding and Assessment Practice among Secondary School Teachers

Authors: Eftah Bte Moh, Hj Abdullah Izazol Binti Idris, Abd. Aziz Bin Abd. Shukor

Abstract:

This study aimed to identify the alignment of understanding and assessment practices among secondary school teachers. The study was carried out using quantitative descriptive study. The sample consisted of 164 teachers who taught Form 1 and 2 from 11 secondary schools in the district of North Kinta, Perak, Malaysia. Data were obtained from 164 respondents who answered Expectation Alignment Understanding and Practices of School Assessment (PEKDAPS) questionnaire. The data were analysed using SPSS 17.0 +. The Cronbach alpha value obtained through PEKDAPS questionnaire pilot study was 0.86. The results showed that teachers' performance in PEKDAPS based on the mean value was less than 3, which means that perfect alignment does not occur between the understanding and practices of school assessment. Two major PEKDAPS sub-constructs of articulation across grade and age and usability of the system were higher than the moderate alignment of the understanding and practices of school assessment (Min=2.0). The content was focused on PEKDAPs sub-constructs which showed lower than the moderate alignment of the understanding and practices of school assessment (Min=2.0). Another two PEKDAPS sub-constructs of transparency and fairness and the pedagogical implications showed moderate alignment (2.0). The implications of the study is that teachers need to fully understand the importance of alignment among components of assessment, learning and teaching and learning objectives as strategies to achieve quality assessment process.

Keywords: school based assessment, alignment, understanding, assessment practices

Procedia PDF Downloads 451
874 Fake News During COVID-19 Pandemic: An Overview from A Legal Perspective

Authors: Ida Shafinaz Mohamed Kamil, Mohd Dahlan Abdul Malek

Abstract:

Today, the whole world is facing a catastrophe called the novel coronavirus disease known as COVID-19. As of October 2021, it has been reported that more than 248 million cases and 5 million deaths have been recorded worldwide. In Malaysia, 2,466,663 cases were reported, with 28,876 deaths recorded on 30 October 2021. Unfortunately, the world is not only facing the COVID-19 pandemic but the COVID-19 infodemic as well, where fake news about COVID-19 disease is spreading faster and more widely than from the virus itself. The spread of fake news is amplified through various social media platforms, which is causing concern among the community. The uncertainty in understanding what fake news really is has caused difficulties and challenges in providing a solution to the hazards that it creates. This article discusses what constitutes fake news and examines the current legal framework put in place to combat fake news in Malaysia. Employing a doctrinal research methodology, this article thoroughly analyzes the relevant legal provisions under the Communications and Multimedia Act 1998, the Penal Code and the Emergency (Essential Powers) Ordinance (No.2) 2021, which came into force on 12 March 2021 as well as related case laws, for offenses and punishments with regards to fake news. The findings from the analysis indicate that there is still room for improvement in regulating fake news, in particular concerning COVID-19.

Keywords: fake news, legal pespective, covid 19, pendemic

Procedia PDF Downloads 77
873 Performance of CO₂/N₂ Foam in Enhanced Oil Recovery

Authors: Mohamed Hassan, Rahul Gajbhiye

Abstract:

The high mobility and gravity override of CO₂ gas can be minimized by generating the CO₂ foam with the aid of surfactant. However, CO₂ is unable to generate the foam/stable foam above its supercritical point (1100 psi, 31°C). These difficulties with CO₂ foam is overcome by adding N₂ in small fraction to enhance the foam generation of CO₂ at supercritical conditions. This study shows how the addition of small quantity of N₂ helps in generating the CO₂ foam and performance of the CO₂/N₂ mixture foam in enhanced oil recovery. To investigate the performance of CO₂/N₂ foam, core-flooding experiments were conducted at elevated pressure and temperature condition (higher than supercritical CO₂ - 50°C and 1500 psi) in sandstone cores. Fluorosurfactant (FS-51) was used as a foaming agent, and n-decane was used as model oil in all the experiments. The selection of foam quality and N₂ fraction was optimized based on foam generation and stability tests. Every gas or foam flooding was preceded by seawater injection to simulate the behavior in the reservoir. The results from the core-flood experiments showed that the CO₂ and CO₂/N₂ foam flooding recovered an additional 34-40% of Original Initial Oil in Place (OIIP) indicating that foam flooding succeeded in producing more oil than pure CO₂ gas injection processes. Additionally, the performance CO₂/N₂ foam injection was better than CO₂ foam injection.

Keywords: CO₂/N₂ foam, enhanced oil recovery (EOR), supercritical CO₂, sweep efficiency

Procedia PDF Downloads 268
872 Wireless Sensor Network Energy Efficient and QoS-Aware MAC Protocols: A Survey

Authors: Bashir Abdu Muzakkari, Mohamad Afendee Mohamad, Mohd Fadzil Abdul Kadir

Abstract:

Wireless Sensor Networks (WSNs) is an aggregation of several tiny, low-cost sensor nodes, spatially distributed to monitor physical or environmental status. WSN is constantly changing because of the rapid technological advancements in sensor elements such as radio, battery and operating systems. The Medium Access Control (MAC) protocols remain very vital in the WSN because of its role in coordinating communication amongst the sensors. Other than battery consumption, packet collision, network lifetime and latency are factors that largely depend on WSN MAC protocol and these factors have been widely treated in recent days. In this paper, we survey some latest proposed WSN Contention-based, Scheduling-based and Hybrid MAC protocols while presenting an examination, correlation of advantages and limitations of each protocol. Concentration is directed towards investigating the treatment of Quality of Service (QoS) performance metrics within these particular protocols. The result shows that majority of the protocols leaned towards energy conservation. We, therefore, believe that other performance metrics of guaranteed QoS such as latency, throughput, packet loss, network and bandwidth availability may play a critical role in the design of future MAC protocols for WSNs.

Keywords: WSN, QoS, energy consumption, MAC protocol

Procedia PDF Downloads 387
871 Encryption and Decryption of Nucleic Acid Using Deoxyribonucleic Acid Algorithm

Authors: Iftikhar A. Tayubi, Aabdulrahman Alsubhi, Abdullah Althrwi

Abstract:

The deoxyribonucleic acid text provides a single source of high-quality Cryptography about Deoxyribonucleic acid sequence for structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to encrypt and decrypt Deoxy Ribonucleic Acid sequence text. It includes complex, securing by using Algorithm to encrypt and decrypt Deoxy Ribonucleic Acid sequence. The utility of this Deoxy Ribonucleic Acid Sequence Text is that, it can provide a user-friendly interface for users to Encrypt and Decrypt store the information about Deoxy Ribonucleic Acid sequence. These interfaces created in this project will satisfy the demands of the scientific community by providing fully encrypt of Deoxy Ribonucleic Acid sequence during this website. We have adopted a methodology by using C# and Active Server Page.NET for programming which is smart and secure. Deoxy Ribonucleic Acid sequence text is a wonderful piece of equipment for encrypting large quantities of data, efficiently. The users can thus navigate from one encoding and store orange text, depending on the field for user’s interest. Algorithm classification allows a user to Protect the deoxy ribonucleic acid sequence from change, whether an alteration or error occurred during the Deoxy Ribonucleic Acid sequence data transfer. It will check the integrity of the Deoxy Ribonucleic Acid sequence data during the access.

Keywords: algorithm, ASP.NET, DNA, encrypt, decrypt

Procedia PDF Downloads 221
870 The Impact of the Knowledge-Sharing Factors on Improving Decision Making at Sultan Qaboos University Libraries

Authors: Aseela Alhinaai, Suliman Abdullah, Adil Albusaidi

Abstract:

Knowledge has been considered an important asset in private and public organizations. It is utilized in the libraries sector to run different operations of technical services and administrative works. As a result, the International Federation of Library Association (IFLA) established a department “Knowledge Management” in December 2003 to provide a deep understanding of the KM concept for professionals. These are implemented through different programs, workshops, and activities. This study aims to identify the impact of the knowledge-sharing factors (technology, collaboration, management support) to improve decision-making at Sultan Qaboos University Libraries. This study conducted a quantitative method using a questionnaire instrument to measure the impact of technology, collaboration, and management support on knowledge sharing that lead to improved decision-making. The study population is the (SQU) libraries (Main Library, Medical Library, College of Economic and political science library, and Art Library). The results showed that management support, collaboration, and technology use have a positive impact on the knowledge-sharing process, and knowledge-sharing positively affects the decision making process.

Keywords: knowledge sharing, decision-making, information technology, management support, corroboration, Sultan Qaboos University

Procedia PDF Downloads 68
869 Artificial Intelligent Methodology for Liquid Propellant Engine Design Optimization

Authors: Hassan Naseh, Javad Roozgard

Abstract:

This paper represents the methodology based on Artificial Intelligent (AI) applied to Liquid Propellant Engine (LPE) optimization. The AI methodology utilized from Adaptive neural Fuzzy Inference System (ANFIS). In this methodology, the optimum objective function means to achieve maximum performance (specific impulse). The independent design variables in ANFIS modeling are combustion chamber pressure and temperature and oxidizer to fuel ratio and output of this modeling are specific impulse that can be applied with other objective functions in LPE design optimization. To this end, the LPE’s parameter has been modeled in ANFIS methodology based on generating fuzzy inference system structure by using grid partitioning, subtractive clustering and Fuzzy C-Means (FCM) clustering for both inferences (Mamdani and Sugeno) and various types of membership functions. The final comparing optimization results shown accuracy and processing run time of the Gaussian ANFIS Methodology between all methods.

Keywords: ANFIS methodology, artificial intelligent, liquid propellant engine, optimization

Procedia PDF Downloads 569
868 The Bernstein Expansion for Exponentials in Taylor Functions: Approximation of Fixed Points

Authors: Tareq Hamadneh, Jochen Merker, Hassan Al-Zoubi

Abstract:

Bernstein's expansion for exponentials in Taylor functions provides lower and upper optimization values for the range of its original function. these values converge to the original functions if the degree is elevated or the domain subdivided. Taylor polynomial can be applied so that the exponential is a polynomial of finite degree over a given domain. Bernstein's basis has two main properties: its sum equals 1, and positive for all x 2 (0; 1). In this work, we prove the existence of fixed points for exponential functions in a given domain using the optimization values of Bernstein. The Bernstein basis of finite degree T over a domain D is defined non-negatively. Any polynomial p of degree t can be expanded into the Bernstein form of maximum degree t ≤ T, where we only need to compute the coefficients of Bernstein in order to optimize the original polynomial. The main property is that p(x) is approximated by the minimum and maximum Bernstein coefficients (Bernstein bound). If the bound is contained in the given domain, then we say that p(x) has fixed points in the same domain.

Keywords: Bernstein polynomials, Stability of control functions, numerical optimization, Taylor function

Procedia PDF Downloads 127
867 Investigating Flutter Energy Harvesting through Piezoelectric Materials in Both Experimental and Theoretical Modes

Authors: Hassan Mohammad Karimi, Ali Salehzade Nobari, Hosein Shahverdi

Abstract:

With the advancement of technology and the decreasing weight of aerial structures, there is a growing demand for alternative energy sources. Structural vibrations can now be utilized to power low-power sensors for monitoring structural health and charging small batteries in drones. Research on extracting energy from flutter using piezoelectric has been extensive in recent years. This article specifically examines the use of a single-jointed beam with a free surface attached to its free end and a bimorph piezoelectric patch connected to the joint, providing two degrees of torsional and bending freedom. The study investigates the voltage harvested at various wind speeds and bending and twisting stiffness in a wind tunnel. The results indicate that as flutter speed increases, the output voltage also increases to some extent. However, at high wind speeds, the limited cycle created becomes unstable, negatively impacting the harvester's performance. These findings align with other research published in reputable scientific journals.

Keywords: energy harvesting, piezoelectric, flutter, wind tunnel

Procedia PDF Downloads 57
866 The Effect of Using Computer-Assisted Translation Tools on the Translation of Collocations

Authors: Hassan Mahdi

Abstract:

The integration of computer-assisted translation (CAT) tools in translation creates several opportunities for translators. However, this integration is not useful in all types of English structures. This study aims at examining the impact of using CAT tools in translating collocations. Seventy students of English as a foreign language participated in this study. The participants were divided into three groups (i.e., CAT tools group, Machine Translation group, and the control group). The comparison of the results obtained from the translation output of the three groups demonstrated the improvement of translation using CAT tools. The results indicated that the participants who used CAT tools outscored the participants who used MT, and in turn, both groups outscored the control group who did not use any type of technology in translation. In addition, there was a significant difference in the use of CAT for translation different types of collocations. The results also indicated that CAT tools were more effective in translation fixed and medium-strength collocations than weak collocations. Finally, the results showed that CAT tools were effective in translation collocations in both types of languages (i.e. target language or source language). The study suggests some guidelines for translators to use CAT tools.

Keywords: machine translation, computer-assisted translation, collocations, technology

Procedia PDF Downloads 187
865 Numerical Study of Trailing Edge Serrations on a Wells Turbine

Authors: Abdullah S. AlKhalifa, Mohammad Nasim Uddin, Michael Atkinson

Abstract:

The primary objective of this investigation is to explore the aerodynamic impact of adding trailing edge serrations to a Wells turbine. The baseline turbine consists of eight blades with NACA 0015 airfoils. The blade chord length was 0.125 m, and the span was 0.100 m. Two modified NACA 0015 serrated configurations were studied: 1) full-span and 2) partial span serrations covering the trailing edge from hub to tip. Numerical simulations were carried out by solving the three-dimensional, incompressible steady-state Reynolds Averaged Navier-Stokes (RANS) equations using the k-ω SST turbulence model in ANSYS™ (CFX). The aerodynamic performance of the modified Wells turbine to the baseline was made by comparing non-dimensional parameters of torque coefficient, pressure drop coefficient, and turbine efficiency. A comparison of the surface limiting streamlines was performed to analyze the flow topology of the turbine blades. The trailing edge serrations generated a substantial change in surface pressure and effectively reduced the separated flow region, thus improving efficiency in most cases. As a result, the average efficiency increased across the range of simulated flow coefficients.

Keywords: renewable energy, trailing edge serrations, Wells turbine, partial serration

Procedia PDF Downloads 91
864 Capsaicin Derivatives Enhanced Activity of α1β2γ2S-Aminobutyric Acid Type a Receptor Expressed in Xenopus laevis Oocytes

Authors: Jia H. Wong, Jingli Zhang, Habsah Mohamad, Iswatun H. Abdullah Ripain, Muhammad Bilal, Amelia J. Lloyd, Abdul A. Mohamed Yusoff, Jafri M. Abdullah

Abstract:

Epilepsy is one of the most common neurological diseases affecting more than 50 million of people worldwide. Epilepsy is a state of recurrent, spontaneous seizures with multiple syndromes and symptoms of different causes of brain dysfunction, prognosis, and treatments; characterized by transient, occasional and stereotyped interruptions of behavior whereby the excitatory-inhibitory activities within the central nervous system (CNS) are thrown out of balance due to various kinds of interferences. The goal of antiepileptic treatment is to enable patients to be free from seizures or to achieve control of seizures through surgical treatment and/or pharmacotherapy. Pharmacotherapy through AED plays an important role especially in countries with epilepsy treatment gap due to costs and availability of health facilities, skills and resources, yet there are about one-third of the people with epilepsy have drug-resistant seizures. Hence, this poses considerable challenges to the healthcare system and the effort in providing cost-effective treatment as well as the search for alternatives to treatment and management of epilepsy. Enhancement of γ-aminobutyric acid (GABA)-mediated inhibitory neurotransmission is one of the key mechanisms of actions of antiepileptic drugs. GABA type > a receptors (GABAAR) are ligand-gated ion channels that mediate rapid inhibitory neurotransmission upon the binding of GABA with a heteropentameric structure forming a central pore that is permeable to the influx of chloride ions in its activated state. The major isoform of GABAA receptors consists of two α1, two β2, and one γ2 subunit. It is the most abundantly expressed combinations in the brain and the most commonly researched through Xenopus laevis oocytes. With the advancing studies on ethnomedicine and traditional treatments using medicinal plants, increasing evidence reveal that spice and herb plants with medicinal properties play an important role in the treatment of ailments within communities across different cultures. Capsaicin is the primary natural capsaicinoid in hot peppers of plant genus Capsicum, consist of an aromatic ring, an amide linkage and a hydrophobic side chain. The study showed that capsaicins conferred neuroprotection in status epilepticus mouse models through anti-ictogenic, hypothermic, antioxidative, anti-inflammatory, and anti-apoptotic actions in a dose-dependent manner. In this study, five capsaicin derivatives were tested for their ability to increase the GABA-induced chloride current on α1β2γ2S of GABAAR expressed on Xenopus laevis oocytes using the method of two-microelectrode voltage clamp. Two of the capsaicin derivatives, IS5 (N-(4-hydroxy-3-methoxybenzyl)-3-methylbutyramide) and IS10 (N-(4-hydroxy-3-methoxybenzyl)-decanamide) at a concentration of 30µM were able to significantly increase the GABA-induced chloride current with p=0.002 and p=0.026 respectively. This study were able to show the enhancement effect of two capsaicin derivatives with moderate length of hydrocarbon chain on this receptor subtype, revealing the promising inhibitory activity of capsaicin derivatives through enhancement of GABA-induced chloride current and further investigations should be carried out to verify its antiepileptic effects in animal models.

Keywords: α1β2γ2 GABAA receptors, α1β2γ2S, antiepileptic, capsaicin derivatives, two-microelectrode voltage clamp, Xenopus laevis oocytes

Procedia PDF Downloads 352
863 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 62
862 Chipless RFID Capacity Enhancement Using the E-pulse Technique

Authors: Haythem H. Abdullah, Hesham Elkady

Abstract:

With the fast increase in radio frequency identification (RFID) applications such as medical recording, library management, etc., the limitation of active tags stems from its need to external batteries as well as passive or active chips. The chipless RFID tag reduces the cost to a large extent but at the expense of utilizing the spectrum. The reduction of the cost of chipless RFID is due to the absence of the chip itself. The identification is done by utilizing the spectrum in such a way that the frequency response of the tags consists of some resonance frequencies that represent the bits. The system capacity is decided by the number of resonators within the pre-specified band. It is important to find a solution to enhance the spectrum utilization when using chipless RFID. Target identification is a process that results in a decision that a specific target is present or not. Several target identification schemes are present, but one of the most successful techniques in radar target identification in the oscillatory region is the extinction pulse technique (E-Pulse). The E-Pulse technique is used to identify targets via its characteristics (natural) modes. By introducing an innovative solution for chipless RFID reader and tag designs, the spectrum utilization goes to the optimum case. In this paper, a novel capacity enhancement scheme based on the E-pulse technique is introduced to improve the performance of the chipless RFID system.

Keywords: chipless RFID, E-pulse, natural modes, resonators

Procedia PDF Downloads 64
861 New Quinazoline Derivative Exhibit Cytotoxic Effect agaisnt MCF-7 Human Breast Cancer Cell

Authors: Maryam Zahedifard, Fadhil Lafta Faraj, Nazia Abdul Majid, Hapipah Mohd Ali, Mahmood Ameen Abdulla

Abstract:

The new quinazoline Schiff bases have been synthesized through condensation reaction of 2-aminobenzhydrazide with 5-bromosalicylaldehyde and 3-methoxy-5-bromosalicylaldehyde. The compound was investigated for anticancer activity against MCF-7 human breast cancer cell line. It demonstrated a remarkable antiproliferative effect, with an IC50 value of 3.41±0.34, after 72 hours of treatment. Most apoptosis morphological features in treated MCF-7 cells were observed by AO/PI staining. The results of cell cycle analysis indicate that compounds did not induce S and M phase arrest in cell after 24 hours of treatment. Furthermore, MCF-7 cells treated with compound subjected to apoptosis death, as exhibited by perturbation of mitochondrial membrane potential and cytochrome C release as well as increase in ROS generation. We also found activation of caspases 3/7 and -9. Moreover, acute toxicity results demonstrated the nontoxic nature of the compounds in mice. Our results showed the selected compound significantly induce apoptosis in MCF-7 cells via intrinsic pathway, which might be considered as a potential candidate for further in vivo and clinical breast cancer studies.

Keywords: quinazoline Schiff base, apoptosis, MCF-7, caspase, cell cycle, acute toxicity

Procedia PDF Downloads 426
860 Screening Methodology for Seismic Risk Assessment of Aging Structures in Oil and Gas Plants

Authors: Mohammad Nazri Mustafa, Pedram Hatami Abdullah, M. Fakhrur Razi Ahmad Faizul

Abstract:

With the issuance of Malaysian National Annex 2017 as a part of MS EN 1998-1:2015, the seismic mapping of Malaysian Peninsular including Sabah and Sarawak has undergone some changes in terms of the Peak Ground Acceleration (PGA) value. The revision to the PGA has raised a concern on the safety of oil and gas onshore structures as these structures were not designed to accommodate the new PGA values which are much higher than the previous values used in the original design. In view of the high numbers of structures and buildings to be re-assessed, a risk assessment methodology has been developed to prioritize and rank the assets in terms of their criticality against the new seismic loading. To-date such risk assessment method for oil and gas onshore structures is lacking, and it is the main intention of this technical paper to share the risk assessment methodology and risk elements scoring finalized via Delphi Method. The finalized methodology and the values used to rank the risk elements have been established based on years of relevant experience on the subject matter and based on a series of rigorous discussions with professionals in the industry. The risk scoring is mapped against the risk matrix (i.e., the LOF versus COF) and hence, the overall risk for the assets can be obtained. The overall risk can be used to prioritize and optimize integrity assessment, repair and strengthening work against the new seismic mapping of the country.

Keywords: methodology, PGA, risk, seismic

Procedia PDF Downloads 146
859 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 297
858 A Multiple Beam LTE Base Station Antenna with Simultaneous Vertical and Horizontal Sectorization

Authors: Mohamed Sanad, Noha Hassan

Abstract:

A low wind-load light-weight broad-band multi-beam base station antenna has been developed. It can generate any required number of beams with the required beamwidths. It can have horizontal and vertical sectorization at the same time. Vertical sectorization doubles the overall number of beams. It will be very valuable in LTE-A and 5G. It can be used to serve vertically split inner and outer cells, which improves system performance. The intersection between the beams of the proposed multi-beam antenna can be controlled by optimizing the design parameters of the antenna. The gain at the points of intersection between the beams, the null filling and the overlap between the beams can all be modified. The proposed multi-beam base station antenna can cover an unlimited number of wireless applications, regardless of their frequency bands. It can simultaneously cover all, current and future, wireless technology generations such as 2G, 3G, 4G (LTE), --- etc. For example, in LTE, it covers the bands 450-470 MHz, 690-960 MHz, 1.4-2.7 GHz and 3.3-3.8 GHz. It has at least 2 ports for each band in each beam for ±45° polarizations. It can include up to 72 ports or even more, which could facilitate any further needed capacity expansions.

Keywords: base station antenna, multi-beam antenna, smart antenna, vertical sectorization

Procedia PDF Downloads 249
857 The Effects of Electrical Muscle Stimulation (EMS) towards Male Skeletal Muscle Mass

Authors: Mohd Faridz Ahmad, Amirul Hakim Hasbullah

Abstract:

Electrical Muscle Stimulation (EMS) has been introduced to the world in the 19th and 20th centuries and has globally gained increasing attention on its usefulness. EMS is known as the application of electrical current transcutaneous to muscles through electrodes to induce involuntary contractions that can lead to the increment of muscle mass and strength. This study can be used as an alternative to help people especially those living a sedentary lifestyle to improve their muscle activity without having to go through a heavy workout session. Therefore, this study intended to investigate the effectiveness of EMS training in 5 weeks interventions towards male body composition. It was a quasi-experimental design, held at the Impulse Studio Bangsar, which examined the effects of EMS training towards skeletal muscle mass among the subjects. Fifteen subjects (n = 15) were selected to assist in this study. The demographic data showed that, the average age of the subjects was 43.07 years old ± 9.90, height (173.4 cm ± 9.09) and weight was (85.79 kg ± 18.07). Results showed that there was a significant difference on the skeletal muscle mass (p = 0.01 < 0.05), upper body (p = 0.01 < 0.05) and lower body (p = 0.00 < 0.05). Therefore, the null hypothesis has been rejected in this study. As a conclusion, the application of EMS towards body composition can increase the muscle size and strength. This method has been proven to be able to improve athlete strength and thus, may be implemented in the sports science area of knowledge.

Keywords: body composition, EMS, skeletal muscle mass, strength

Procedia PDF Downloads 477
856 Optimality Theoretic Account of Indian Loanwords in Hadhrami Arabic

Authors: Mohammed Saleh Lahmdi, Hassan Obeid Alfadly

Abstract:

This study explores an optimality-theoretic account of Indian loanwords in Hadhrami Arabic (henceforth HA), a variety of Arabic spoken in Hadhramout Province in the coastal areas and Hadhramout Valley. The purpose of this paper is to find out how the phonological forms of Indian loanwords can be accounted for from an OT standpoint. To achieve this purpose, two main instruments were implemented: participant observation and interview. The sample of this study was selected carefully with certain characteristics by judgment sampling consisting of eleven informants. An ethnographic qualitative approach was employed to find out the phonological articulations that the researcher encountered during the implementation. Many phonological processes are used and several markedness and faithfulness constraints have been interacted in conflict in order to choose the optimal form of Hadhrami realisations. The findings of the study confirm that the Hadhrami syllable structure prevails over the donor language, i.e., the Indian (mainly Urdu) language. Specifically, markedness constraints dominate faithfulness ones when most of the Indian loanwords are incorporated into HA.

Keywords: linguistic borrowing, optimality theory, Hadhrami Arabic, loanword, phonological processes

Procedia PDF Downloads 34
855 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 162
854 Geographic Information System-Based Identification of Road Traffic Crash Hotspots on Rural Roads in Oman

Authors: Mohammed Bakhit Kashoob, Mohammed Salim Al-Maashani, Ahmed Abdullah Al-Marhoon

Abstract:

The use of Geographic Information System (GIS) tools in the analysis of traffic crash data can help to identify locations or hotspots with high instances or risk of traffic crashes. The identification of traffic crash hotspots can effectively improve road safety measures. Mapping of road traffic crash hotspots can help the concerned authorities to give priority and take targeted measures and improvements to the road structure at these locations to reduce traffic crashes and fatalities. In Oman, there are countless rural roads that have more risks for traveling vehicles compared to urban roads. The likelihood of traffic crashes as well as fatality rate may increase with the presence of risks that are associated with the rural type of community. In this paper, the traffic crash hotspots on rural roads in Oman are specified using spatial analysis methods in GIS and traffic crash data. These hotspots are ranked based on the frequency of traffic crash occurrence (i.e., number of traffic crashes) and the rate of fatalities. The result of this study presents a map visualization of locations on rural roads with high traffic crashes and high fatalities rates.

Keywords: road safety, rural roads, traffic crash, GIS tools

Procedia PDF Downloads 129
853 Performance of VSAT MC-CDMA System Using LDPC and Turbo Codes over Multipath Channel

Authors: Hassan El Ghazi, Mohammed El Jourmi, Tayeb Sadiki, Esmail Ahouzi

Abstract:

The purpose of this paper is to model and analyze a geostationary satellite communication system based on VSAT network and Multicarrier CDMA system scheme which presents a combination of multicarrier modulation scheme and CDMA concepts. In this study the channel coding strategies (Turbo codes and LDPC codes) are adopted to achieve good performance due to iterative decoding. The envisaged system is examined for a transmission over Multipath channel with use of Ku band in the uplink case. The simulation results are obtained for each different case. The performance of the system is given in terms of Bit Error Rate (BER) and energy per bit to noise power spectral density ratio (Eb/N0). The performance results of designed system shown that the communication system coded with LDPC codes can achieve better error rate performance compared to VSAT MC-CDMA system coded with Turbo codes.

Keywords: satellite communication, VSAT Network, MC-CDMA, LDPC codes, turbo codes, uplink

Procedia PDF Downloads 490
852 Measurement and Analysis of Radiation Doses to Radiosensitive Organs from CT Examination of the Cervical Spine Using Radiochromic Films and Monte Carlo Simulation Based Software

Authors: Khaled Soliman, Abdullah Alrushoud, Abdulrahman Alkhalifah, Raed Albathi, Salman Altymiat

Abstract:

Radiation dose received by patients undergoing Computed Tomography (CT) examination of the cervical spine was evaluated using Gafchromic XR-QA2 films and CT-EXPO software (ver. 2.3), in order to document our clinical dose values and to compare our results with other benchmarks reported in the current literature. Radiochromic films were recently used as practical dosimetry tool that provides dose profile information not available using the standard ionisation chamber routinely used in CT dosimetry. We have developed an in-house program to use the films in order to calculate the Entrance Dose Length Product (EDLP) in (mGy.cm) and to relate the EDLP to various organ doses calculated using the CT-EXPO software. We also calculated conversion factor in (mSv/mGy.cm) relating the EDLP to the effective dose (ED) from the examination using CT-EXPO software. Variability among different types of CT scanners and dose modulation methods are reported from at least three major CT brands available at our medical institution. Our work describes the dosimetry method and results are reported. The method can be used as in-vivo dosimetry method. But this work only reports results obtained from adult female anthropomorphic Phantom studies.

Keywords: CT dosimetry, gafchromic films, XR-QA2, CT-Expo software

Procedia PDF Downloads 465
851 Risk Assessment for International Investment: A Standardized Approach to Identify Risk, Risk Appetite, Risk Rating, Risk Treatment and Mitigation Plans

Authors: Pui Yong Leo, Normy Maziah Mohd Said

Abstract:

Change of global economy landscape and business environment has led to companies’ decision to go global and enter international markets. As the companies go beyond the comfort zone (i.e. investing in the home country), it is important to ensure a comprehensive risk assessment is carried out. This paper describes a standardized approach for international investment, ensuring identification of risk, risk appetite, risk rating, risk treatment and mitigation plans for respective international investment proposal. The standardized approach is divided into three (3) stages as follows: Stage 1 – Preliminary Risk profiling; with the objective to gauge exposure to countries and high level risk factors as first level assessment. Stage 2 – Risk Parameters; with the objective to define risk appetite for the international investment from the perspective of likelihood and impact. Stage 3 – Detailed Risk Assessments; with the objectives to assess in detail any triggered elements from Stage 1, and project specific risks. The final output will include the mitigation plans for the identified risks for the total investment. Example will be given in this paper to show how comprehensive risk assessment is carried out for an international investment in power energy sector.

Keywords: international investment, mitigation plans, risk appetite, risk assessment

Procedia PDF Downloads 368