Search results for: Hamza Hanif Chauhan
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 197

Search results for: Hamza Hanif Chauhan

137 Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks

Authors: Eman I. Raslan, Haitham S. Hamza, Reda A. El-Khoribi

Abstract:

Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques.

Keywords: fiber-wireless (FiWi), dynamic bandwidth allocation (DBA), passive optical networks (PON), media access control (MAC)

Procedia PDF Downloads 504
136 Evaluation of Genetic Diversity for Salt Stress in Maize Hybrids (Zea Mays L.) at Seedling Stage

Authors: Abdu Qayyum, Hafiz Muhammad Saeed, Mamoona Hanif, Etrat Noor, Waqas Malik, Shoaib Liaqat

Abstract:

Salinity is extremely serious problem that has a drastic effect on maize crop, environment and causes economic losses of country. An advance technique to overcome salinity is to develop salt tolerant geno types which require screening of huge germ plasm to start a breeding program. Therefore, present study was undertaken to screen out 25 maize hybrids of different origin for salinity tolerance at seedling stage under three levels of salt stress 250 and 300 mM NaCl including one control. The existence of variation for tolerance to enhanced NaCl salinity levels at seedling stage in maize proved that hybrids had differing ability to grow under saline environment and potential variability within specie. Almost all the twenty five maize hybrids behaved varyingly in response to different salinity levels. However, the maize hybrids H6, H13, H21, H23 and H24 expressed better performance under salt stress in terms of all six characters and proved to be as highly tolerant while H22, H17 H20, H18, H4, H9, and H8 were identified as moderately tolerant. Hybrids H14, H5, H11 and H3 H12, H2, were expressed as most sensitive to salinity suggesting that screening is an effective tool to exploit genetic variation among maize hybrids and salt tolerance in maize can be enhanced through selection and breeding procedure.

Keywords: salinity, hybrids, maize, variation

Procedia PDF Downloads 698
135 Simultaneous Measurement of Pressure and Temperature Profile of Lubricating Oil-Film along Orthogonally Displaced Non-Circular Journal Bearing: An Experimental Study

Authors: Amit Singla, Amit Chauhan

Abstract:

The non-circular journal bearings provide better thermal stability and lesser oil-film temperature rise as compared to circular journal bearings. Experimentation on simultaneous measurement of pressure and temperature of lubricated oil-film along the profile of the bearing will help the designer to design journal bearings. In this paper, pressure and temperature of oil-film along orthogonally displaced non-circular journal bearing have been measured on a designed journal bearing test rig. The orthogonal non-circular journal bearing has been fabricated by displacing two circular halves away from the centers in the orthogonal direction. The data acquisition for oil film pressure and temperature has been carried out at journal speed=3000 rpm and by increasing the static radial load from 500 N to 2000 N in steps of 500 N using three different grades of oil (ISOVG 32, 68, and 150) named as oil-1, oil-2, and oil-3 respectively. The results show that the oil-film pressure and temperature increases with increase in radial load and change of lubricating oil towards increasing viscosity. Further, two lobes in the pressure and temperature profiles have been obtained which accounts for better thermal stability as it reduces cavitation zone inside the bearing.

Keywords: cavitation, non-circular journal bearing, orthogonally displaced, thermal stability

Procedia PDF Downloads 330
134 Exoskeleton for Hemiplegic Patients: Mechatronic Approach to Move One Disabled Lower Limb

Authors: Alaoui Hamza, Moutacalli Mohamed Tarik, Chebak Ahmed

Abstract:

The number of people suffering from hemiplegia is growing each year. This lower limb disability affects all the aspects of their lives by taking away their autonomy. This implicates their close relatives, as well as the health system to provide the necessary care they need. The integration of exoskeletons in the medical field became a promising solution to resolve this issue. This paper presents an exoskeleton designed to help hemiplegic people get back the sensation and ability of normal walking. For this purpose, three step models have been created. The first step allows a simple forward movement of the leg. The second method is designed to overcome some obstacles in the patient path, and finally the third step model gives the patient total control over the device. Each of the control methods was designed to offer a solution to the challenges that the patients may face during the walking process.

Keywords: ability of normal walking, exoskeleton, hemiplegic patients, lower limb motion- mechatronics

Procedia PDF Downloads 133
133 Selecting Skyline Mash-Ups under Uncertainty

Authors: Aymen Gammoudi, Hamza Labbaci, Nizar Messai, Yacine Sam

Abstract:

Web Service Composition (Mash-up) has been considered as a new approach used to offer the user a set of Web Services responding to his request. These approaches can return a set of similar Mash-ups in a given context that makes users unable to select the perfect one. Recent approaches focus on computing the skyline over a set of Quality of Service (QoS) attributes. However, these approaches are not sufficient in a dynamic web service environment where the delivered QoS by a Web service is inherently uncertain. In this paper, we treat the problem of computing the skyline over a set of similar Mash-ups under certain dimension values. We generate dimensions for each Mash-up using aggregation operations applied to the QoS attributes. We then tackle the problem of computing the skyline under uncertain dimensions. We present each dimension value of mash-up using a frame of discernment and introduce the d-dominance using the Evidence Theory. Finally, we propose our experimental results that show both the effectiveness of the introduced skyline extensions and the efficiency of the proposed approaches.

Keywords: web services, uncertain QoS, mash-ups, uncertain dimensions, skyline, evidence theory, d-dominance

Procedia PDF Downloads 215
132 The Prevalence of Coronary Artery Disease and Its Risk Factors in Rural and Urban Areas of Pakistan

Authors: Muhammad Kamran Hanif Khan, Fahad Mushtaq

Abstract:

Background: In both developed and underdeveloped countries, coronary artery disease (CAD) is a serious cause of death and disability. Cardiovascular disease (CVD) is becoming more prevalent in emerging countries like Pakistan due to the spread and acceptance of Western lifestyles. Material and Methods: An observational cross-sectional investigation was conducted, and data collection relied on a random cluster sampling method. The sample size for this cross-sectional study was calculated using the following factors: estimated true proportion of 17.5%, desired precision of 2%, and confidence interval of 95%. The data for this study was collected from a sample of 1387 adults. Results: The average age of those living in rural areas is 55.24 years, compared to 52.60 years for those living in urban areas. The mean fasting blood glucose of the urban participants is 105.28 mg/dL, which is higher than the mean fasting blood glucose of the rural participants, which is 102.06 mg/dL. The mean total cholesterol of the urban participants is 192.20 mg/dL, which is slightly higher than the mean total cholesterol of the rural participants, which is 191.97 mg/dL. CAD prevalence is greater in urban areas than in rural areas. ECG abnormalities prevalence is 16.1% in females compared to 12.5% in men. Conclusion: The prevalence of CAD is more common in urban areas than in rural ones for all of the measures of CAD used in the study.

Keywords: CVD prevalence, CVD risk factors, rural area, urban area

Procedia PDF Downloads 58
131 Enhancement of Growth Regulators to Callus Formation and Silymarin Content from Different Explants of Silybum marianum Seedling

Authors: M. A. Hamza, H. A. Bosila, M. A. Zewil, I. M. Harridy

Abstract:

Silymarin is one active component extracted from milk thistle Silybum marianum; it is flavonoid recognized for its ability to benefit people with liver disorders and as a protective compound against liver damaging agents. For this reason, this research aims to study the effect of growth regulators (BA+NAA) and explant type (cotyledon, hypocotyl, and root) to increase the growth and active ingredients (silymarin) in callus of S. mariaum plant. The results showed that cotyledon explant which have been cultured in MS medium supplemented with BA 0.4 mg/l. +NAA 0.25 mg/l. Led to obtain the best results in callus fresh weight (1.847a) and callus dry weight (0.155a). On the other hand, the same explant (cotyledon) cultured in MS medium supplemented with BA 1.6 mg/l. + NAA 0.5 mg/l. The suitable condition to silymarin content (0.132 mg/100 mg dry weight). And also, it turned out, lack of importance of the use of hypocotyl and root in the production of callus and silymarin compared to cotyledon.

Keywords: silybum, callus, tissue culture, cotyledon

Procedia PDF Downloads 179
130 Influence of Elicitors on Callus Growth and Active Ingredient in Echinacea purpurea

Authors: Mohamed Abdelfattah Meawad Hamza, H. A. Bosila, M. A. Zewil

Abstract:

This research aims to study the effect of different sources of elicitors for increase growth and active ingredients in callus of Echinacea purpurea plant. Callus that have been obtained from leaf explant, was used to conduct the following studies. A study of the impact of both the phenylalanine and tyrosine (50, 100,150 and 200 mg/l.) individually and casein hydrolysate (100, 200 and 300 mg/l.) supplemented to MS medium. Results show that Casein hydrolysate 100 mg/l. has achieved the better results in both callus fresh weight 1.881 g/explant after 8 weeks of the incubation period and callus growth rate 0.398 g/explant after 6 weeks of the incubation period, while gave add 200 mg/l. The best results in total carbohydrate 2.444 mg/ 100 mg dry weight. Phenylalanine 150 mg/l. has achieved the best results in callus dry weight 0.156 g/explant after 8 weeks of incubation period. Tyrosine 200 mg/l. recorded the best result for positive production of caffeic acid 0.460 mg/ 100 mg dry weight after 4 weeks incubation period.

Keywords: tissue culture, echinacea, tyrosine, casein

Procedia PDF Downloads 254
129 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation

Authors: Aditi Chauhan, Neethu S. Mohan

Abstract:

In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.

Keywords: documents, identity, computational system, suspect

Procedia PDF Downloads 159
128 MIMO UWB Antenna for Exploring Body Centric Communication

Authors: Osama Aziz, Hamza Ahmad, Muhibur Rahman

Abstract:

The performance of wireless communication systems has been suggested to be improved by UWB MIMO antenna systems. However, creating a successful UWB MIMO antenna is a difficult undertaking that calls for resolving a number of design issues, including radiation efficiency, size, and frequency range. This study's primary objective is to create a novel, highly effective, small-sized, ultra-wideband (UWB) multiple-input multiple-output (MIMO) antenna and investigate its potential applications in body-centric communication. Two radiating elements, shared ground plane, circular stubs, and t-shaped isolation elements are used to achieve the MIMO antenna. Outstanding multiplexing efficiency, significant peak gain across the entire UWB frequency spectrum, extremely low mutual coupling (S21=-16 dB), high diversity gain (DG>9), and low envelop correlation are achieved. The proposed antenna will be one of the promising candidates for body centric communication.

Keywords: UWB communication, UWB MIMO antennas, body-centric communication, diversity gain

Procedia PDF Downloads 58
127 A Virtual Grid Based Energy Efficient Data Gathering Scheme for Heterogeneous Sensor Networks

Authors: Siddhartha Chauhan, Nitin Kumar Kotania

Abstract:

Traditional Wireless Sensor Networks (WSNs) generally use static sinks to collect data from the sensor nodes via multiple forwarding. Therefore, network suffers with some problems like long message relay time, bottle neck problem which reduces the performance of the network. Many approaches have been proposed to prevent this problem with the help of mobile sink to collect the data from the sensor nodes, but these approaches still suffer from the buffer overflow problem due to limited memory size of sensor nodes. This paper proposes an energy efficient scheme for data gathering which overcomes the buffer overflow problem. The proposed scheme creates virtual grid structure of heterogeneous nodes. Scheme has been designed for sensor nodes having variable sensing rate. Every node finds out its buffer overflow time and on the basis of this cluster heads are elected. A controlled traversing approach is used by the proposed scheme in order to transmit data to sink. The effectiveness of the proposed scheme is verified by simulation.

Keywords: buffer overflow problem, mobile sink, virtual grid, wireless sensor networks

Procedia PDF Downloads 367
126 Cytotoxic Activity Of Major Iridoids From Barleria Trispinosa (Forssk.) Vahl. Growing In Saudi Arabia

Authors: Hamza Assiry, Gamal A. Mohamed, Sabrin R. M. Ibrahim, Hossam M. Abdallah

Abstract:

Chemical investigation of the aerial parts of Barleria trispinosa(Forssk.) Vahl. resulted in isolation of four major iridoids that were identified as 6,8-O,O-diacetylshanhiside methyl ester (acetyl barlerin) (1), 8-O-acetylshanzhiside methyl ester (barlerin) (2), shanzhiside methyl ester (3), and 6- ⍺ -L-rhamnopyranosyl-8-O-acetylshanzihiside methyl ester (4). The isolated compounds were confirmed by detailed one and two-dimensional NMR. Isolated compounds were tested for their cytotoxic activity on breast cancer (MCF-7, MDA-MB-231) and colon cancer (LS174T) cell linesusing sulphorhodamine B (SRB) assay. It is noteworthy that compound 1 demonstrated a significant cytotoxic potential towards MDA-MB-231 cell line with IC5016.7 ± 2.7µg / mL compared to doxorubicin whereas compounds 2, showed moderate cytotoxic potential with IC5021.2 ± 1.9µg / mL on MCF-7. The other compounds showed moderate activity on the tested cell lines.

Keywords: acanthaceae, cytotoxicity, metabolites, barleria trispinosa

Procedia PDF Downloads 132
125 Compilation of Islamic Law as Law Applied Religious Courts in Indonesia (Responding to Changes in Religious Courts Authority)

Authors: Hamdan Arief Hanif, Rahmat Sidiq

Abstract:

Indonesia is a country of law, the legal system adopted by Indonesia is a civil law system. A major feature of the civil law is the codified legislation. Meanwhile the majority of society Indonesia are Muslims, whilst Islamic law itself having the sources written in Qur'an, Sunnah and the opinion of Muslim scholars, generally not codified in book form of legislation that is easy on the set as a reference. in Indonesia, many scholars have different opinions in decisions so that there is no legal certainty in Muslim civil cases, so the need for legal codification, which, as the source of the judges in deciding a case, especially a case in religious courts. This paper raised the topic of discussion which offers a solution to the application of the codification of the Islamic Law which became the core resources in delivering a verdict against Islamic civil related issue; codification usually called a compilation of Islamic Law. Compilation of Islamic Law is highly recommended as a core reference for the judges in religious courts in Indonesia. This compilation which includes a collection of large number of opinions scholars (book of fiqh) that existed previously and are ripened in deduce in order to unify the existing differences. This paper also discusses how the early formation of the compilation and as the right solution in order to create legal certainty and justice especially for the muslim community in Indonesia.

Keywords: Islamic law, compilation, law applied core, religious court

Procedia PDF Downloads 344
124 A Hybrid Watermarking Model Based on Frequency of Occurrence

Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis

Abstract:

Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: authentication, copyright protection, information hiding, ownership, watermarking

Procedia PDF Downloads 546
123 Thermal Regeneration of CO2 Spent Palm Shell-Polyetheretherketone Activated Carbon Sorbents

Authors: Usman D. Hamza, Noor S. Nasri, Mohammed Jibril, Husna M. Zain

Abstract:

Activated carbons (M4P0, M4P2, and M5P2) used in this research were produced from palm shell and polyetherether ketone (PEEK) via carbonization, impregnation, and microwave activation. The adsorption/desorption process was carried out using static volumetric adsorption. Regeneration is important in the overall economy of the process and waste minimization. This work focuses on the thermal regeneration of the CO2 exhausted microwave activated carbons. The regeneration strategy adopted was thermal with nitrogen purge desorption with N2 feed flow rate of 20 ml/min for 1 h at atmospheric pressure followed by drying at 1500C. Seven successive adsorption/regeneration processes were carried out on the material. It was found that after seven adsorption regeneration cycles; the regeneration efficiency (RE) for CO2 activated carbon from palm shell only (M4P0) was more than 90% while that of hybrid palm shell-PEEK (M4P2, M5P2) was above 95%. The cyclic adsorption and regeneration shows the stability of the adsorbent materials.

Keywords: activated carbon, palm shell-PEEK, regeneration, thermal

Procedia PDF Downloads 470
122 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 355
121 A Dam Break Analysis Using MIKE11

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchahed

Abstract:

The consequences of a dam breach can be devastating; both in terms of lives lost and damaged infrastructure and property. Hydraulic modeling provides a clear picture of the possible consequences of partial or complete failure of a dam, which is the key to carry out emergency planning and conduct reliable risk assessments. In this paper, the MIKE11 model developed by the Danish Hydrologic Institute (DHI) was used to simulate the flood wave propagation associated with a potential failure analysis failure of Zardezas dam located in the city of Skikda in the North East of Algeria. MIKE11 results including inundation maps and the representative channel/valley cross-sections depicting flow depth and maximal flow velocities showed that Zardezas reservoir presents a significant risk to downstream areas in the event of a dam failure. These results can be used as the basis of the development of an Emergency Action Plan (EAP).The main objective of this plan is to predict the appropriate steps to avoid or at least decrease the consequences of unexpected failure of Zardezas dam.

Keywords: MIKE11, dam break, inundation maps, emergency action plan

Procedia PDF Downloads 439
120 Dambreak Flood Analysis Using HEC-RAS and GIS Technologies

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchehed

Abstract:

The potential risks associated with dam break flooding could be considerable and result in major damage, including loss of life and property destruction. In the past, Algeria experienced such flood disasters; let’s recall the failure of Fergoug dam in 1881, this accident cost 200 lives, many houses and bridges were destroyed by the flooding. Recently the Algerian government have obligated to dam owners the development of detailed dam break Emergency Action Plans for its 64 major dams. The research presented here was conducted within this framework, Zardezas dam which is located in the city of Skikda in the North East of Algeria was the case of study. The model HEC-RAS was used for the hydrodynamic routing of the dam break flood wave. In addition, Geographic Information System (GIS) was used to create inundation maps and produce a visualization of the flood propagation in the Saf-Saf River.The simulation results that demonstrate the significance of Zardezas dam break flooding; constitute a real tool for developing emergency response plans and assisting territorial communities in land use planning.

Keywords: dam break, HEC-RAS, GIS, inundation maps, Emergency Action Plan

Procedia PDF Downloads 372
119 Improved Processing Speed for Text Watermarking Algorithm in Color Images

Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari

Abstract:

Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.

Keywords: steganography, watermarking, time complexity measurements, private keys

Procedia PDF Downloads 127
118 The Influence of the Discharge Point Position on the Pollutant Dispersion

Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Said, Hervé Bournot, Georges Le Palec

Abstract:

The distribution characteristics of pollutants released at different vertical inlet positions of an open channel are investigated with a three-dimensional numerical model. Pollutants are injected from time-dependent sources in a turbulent free surface flow. Numerical computations were carried out using ANSYS Fluent which is based on the finite volume approach. The air/water interface was modeled with the volume of the fluid method (VOF). By focusing on investigating the influences of flow on pollutants, it is found that pollutant released from the bottom position of the channel takes more time to disperse in the longitudinal direction of the flow in comparison with the case of pollutant released near the free surface. On the other hand, the pollutant released from the bottom position generates a vertical dispersion with decreased amplitude. These findings may assist in cost-effective scientific countermeasures to be taken for accident or planned pollutant discharged into a river.

Keywords: numerical simulation, pollutant release, turbulent free surface flow, VOF model

Procedia PDF Downloads 496
117 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 330
116 Speed Breaker/Pothole Detection Using Hidden Markov Models: A Deep Learning Approach

Authors: Surajit Chakrabarty, Piyush Chauhan, Subhasis Panda, Sujoy Bhattacharya

Abstract:

A large proportion of roads in India are not well maintained as per the laid down public safety guidelines leading to loss of direction control and fatal accidents. We propose a technique to detect speed breakers and potholes using mobile sensor data captured from multiple vehicles and provide a profile of the road. This would, in turn, help in monitoring roads and revolutionize digital maps. Incorporating randomness in the model formulation for detection of speed breakers and potholes is crucial due to substantial heterogeneity observed in data obtained using a mobile application from multiple vehicles driven by different drivers. This is accomplished with Hidden Markov Models, whose hidden state sequence is found for each time step given the observables sequence, and are then fed as input to LSTM network with peephole connections. A precision score of 0.96 and 0.63 is obtained for classifying bumps and potholes, respectively, a significant improvement from the machine learning based models. Further visualization of bumps/potholes is done by converting time series to images using Markov Transition Fields where a significant demarcation among bump/potholes is observed.

Keywords: deep learning, hidden Markov model, pothole, speed breaker

Procedia PDF Downloads 127
115 Multiannual Trends of Toxic and Potentially Toxic Microalgae (Ostreopsis cf. ovata, Prorocentrum lima, and Coolia monotis) in Sfax Coasts (North of Gabes Gulf, Tunisia)

Authors: Moncer Malika, Ben Brahim Mounir, Bel Hassen Malika, Hamza Asma

Abstract:

During the last decades, microalgae communities have presented significant changes in their structure and taxa composition along the Mediterranean littoral shallow waters. The main purpose of this work was to evaluate possible changes, over a 17-year scale (1997–2013), in the diversity and abundance of three toxic and potentially toxic microalgae related to changes in environmental parameters on Sfax coasts, a pole of shellfish production in Tunisia. In this 17-year span, a chronological series of data showed that a clear disparity from one year to another was observed in the abundance of studied species. The distribution of these species has been subjected to a seasonal cycle. The studied microalgae, especially Prorocentrum lima, seem to have significant relationships with many physicochemicaland meteorological parameters.

Keywords: long-term monitoring HABs, physico-chemical parameters, meteorological parameters, Prorocentrum lima, Ostreopsis cf. ovata, Coolia monotis

Procedia PDF Downloads 107
114 Growth and Characterization of Bis-Thiourea Nickel Barium Chloride Single Crystals

Authors: Rakesh Hajiyani, Chetan Chauhan, Harshkant Jethva, Mihir Joshi

Abstract:

Metal bis-thiourea type organo-metallic crystals are popular as non-linear optical materials. Bis-thiourea nickel barium chloride was synthesized and crystals were grown by slow aqueous solvent evaporation technique. The transparent and colorless crystals having maximum dimensions of 13 mm x 8 mm x 2.2 mm were obtained. The EDAX was carried out to estimate the content of nickel and barium in the grown crystals. The powder XRD analysis suggested orthorhombic crystal structure with unit cell parameters as: a= 9.70 Å, b= 10.68 Å and c= 17.95 Å. The FTIR spectroscopy study confirmed the presence of various functional groups. The UV-vis spectroscopy study indicated that the crystals were transparent in the visible region with 90% transmittance level further optical parameters were studied. From the TGA it was found that the crystals remained stable up to 170 0C and then decomposed through two decomposition stages. The dielectric study was carried out in the frequency range of applied field from 500 Hz to 1 MHz. The variations of dielectric constant, dielectric loss were studied with frequency. It was found that the dielectric constant and the dielectric loss decreased as the frequency of applied field increased. The results are discussed.

Keywords: crystal growth, dielectric study, optical parameters, organo-metallic crystals, powder xrd, slow evaporation technique, TGA

Procedia PDF Downloads 435
113 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 58
112 Second Representation of Modules over Commutative Rings

Authors: Jawad Abuhlail, Hamza Hroub

Abstract:

Let R be a commutative ring. Representation theory studies the representation of R-modules as (possibly finite) sums of special types of R-submodules. Here we are interested in a class of R-modules between the class of semisimple R-modules and the class of R-modules that can be written as (possibly finite) sums of secondary R-submodules (we know that every simple R-submodule is secondary). We investigate R-modules which can be written as (possibly finite) sums of second R-submodules (we call those modules second representable). Moreover, we investigate the class of (main) second attached prime ideals related to a module with such representation. We provide sufficient conditions for an R-module M to get a (minimal) second representation. We also found the collection of second attached prime ideals for some types of second representable R-modules, in particular within the class of injective R-modules. As we know that every simple R-submodule is second and every second R-submodule is secondary, we can see the importance of the second representable R-module.

Keywords: lifting modules, second attached prime ideals, second representations, secondary representations, semisimple modules, second submodules

Procedia PDF Downloads 171
111 CFD Study of Free Surface Flows Resulting from a Dam-Breaking

Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Saïd, Hervé Bournot, Georges Le Palec

Abstract:

Free surface flows caused by dam breaks in channels or rivers is an attention-getting subject to the engineering practice, however, the studies are few to be reported. In this paper, a numerical investigation of unsteady free surface flows resulting from a dam-breaking in a rectangular channel is studied. Numerical computations were carried out using ANSYS Fluent which is based on the finite volume approach. The air/water interface was modeled with the volume of fluid method (VOF). Verification for a typical dam-break problem is analyzed by comparing the present results with others and very good agreement is obtained. The present approach is then used to predict the characteristics of free surface flow due to the dam breaking in channel. The characteristics of complex unsteady free surface flow in these examples are clearly explained. The numerical results show that the flow became more disturbed after impacting the vertical wall, then a recirculation zone, as well as turbulence phenomena, were created. At this instant, a cavity of air was included on the flow. The results agree well with the experimental data found in the literature.

Keywords: CFD, dam-break, free surface, turbulent flows, VOF

Procedia PDF Downloads 293
110 Battery Control with Moving Average Algorithm to Smoothen the Intermittent Output Power of Photovoltaic Solar Power Plants in Off-Grid Configuration

Authors: Muhammad Gillfran Samual, Rinaldy Dalimi, Fauzan Hanif Jufri, Budi Sudiarto, Ismi Rosyiana Fitri

Abstract:

Solar energy is increasingly recognized as an important future energy source due to its abundant availability and renewable nature. However, the intermittent nature of solar energy can cause fluctuations in the electricity produced, making it difficult to guarantee a stable and reliable electricity supply. One solution that can be implemented is to use batteries in a photovoltaic solar power plant system with a Moving Average control algorithm, which can help smooth and reduce fluctuations in solar power output power. The parameter that can be adjusted in the Moving Average algorithm is the window size or the arithmetic average width of the photovoltaic output power over time. This research evaluates the effect of a change of window size parameter in the Moving Average algorithm on the resulting smoothed photovoltaic output power and the technical effects on batteries, i.e., power and energy usage. Based on the evaluation, it is found that the increase of window size parameter will slow down the response of photovoltaic output power to changes in irradiation and increase the smoothing quality of the intermittent photovoltaic output power. In addition, increasing the window size will reduce the maximum power received on the load side, and the amount of energy used by the battery during the power smoothing process will increase, which, in turn, increases the required battery capacity.

Keywords: battery, intermittent, moving average, photovoltaic, power smoothing

Procedia PDF Downloads 29
109 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 251
108 Translation and Ideology: New Perspectives

Authors: Hamza Salih

Abstract:

Since translation is no longer viewed as a mere replacement of linguistic codes from one language to another, it has increasingly been considered, especially with the advent of the cultural turn in the late 70's, in relation to the broader external context in which it takes place. According to scholars in the field, the translation process is determined by the political, economic and cultural values which exert external pressures on the translator. Correspondingly, the relationship between translation as an act of re-writing the original text and ideology has already been established. This paper addresses the issue of how ideology comes into play in the translational process and what strategies the translator adopts to foreground or circumvent ideological constraints. Along with this, the paper will touch upon the notions of censorship, manipulation, subversion and domestication which are deemed of relevance to this very topic. In fact, after the domination of the empirically-oriented linguistic approaches in translation studies, the relationship between translation and ideology has to be foregrounded to draw attention to the fact that the translation process is not a mere text-to-text linguistic transfer, but, on the contrary, takes place in the midst of economic, political, cultural and religious variables, which some scholars subsume under the category ideology.

Keywords: translation, language, ideology, subversion, censorship and manipulation

Procedia PDF Downloads 229