Search results for: Alaoui Hamza
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 126

Search results for: Alaoui Hamza

96 Sustainable Underground Structures Through Soil-Driven Bio-Protection of Concrete

Authors: Abdurahim Abogdera, Omar Hamza, David Elliott

Abstract:

The soil bacteria can be affected by some factors such as pH, calcium ions and Electrical conductivity. Fresh concrete has high pH value, which is between 11 and 13 and these values will be prevented the bacteria to produce CO₂ to participate with Calcium ions that released from the concrete to get calcite. In this study we replaced 15% and 25% of cement with Fly ash as the fly ash reduce the value of the pH at the concrete. The main goal of this study was investigated whether bacteria can be used on the soil rather than in the concrete to avoid the challenges and limitations of containing bacteria inside the concrete. This was achieved by incubating cracked cement mortar specimens into fully saturated sterilized and non-sterilized soil. The crack sealing developed in the specimens during the incubation period in both soil conditions were evaluated and compared. Visual inspection, water absorption test, scanning electron microscopy (SEM), and Energy Dispersive X-ray (EDX) were conducted to evaluate the healing process.

Keywords: pH, calcium ions, MICP, salinity

Procedia PDF Downloads 84
95 An Ontology for Semantic Enrichment of RFID Systems

Authors: Haitham S. Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, Kamilia Hosny

Abstract:

Radio Frequency Identification (RFID) has become a key technology in the margining concept of Internet of Things (IoT). Naturally, business applications would require the deployment of various RFID systems that are developed by different vendors and use various data formats. This heterogeneity poses a real challenge in developing large-scale IoT systems with RFID as integration is becoming very complex and challenging. Semantic integration is a key approach to deal with this challenge. To do so, ontology for RFID systems need to be developed in order to annotated semantically RFID systems, and hence, facilitate their integration. Accordingly, in this paper, we propose ontology for RFID systems. The proposed ontology can be used to semantically enrich RFID systems, and hence, improve their usage and reasoning. The usage of the proposed ontology is explained through a simple scenario in the health care domain.

Keywords: RFID, semantic technology, ontology, sparql query language, heterogeneity

Procedia PDF Downloads 439
94 Pollutant Dispersion in Coastal Waters

Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Saïd, Hervé Bournot, Georges Le Palec

Abstract:

This paper spots light on the effect of a point source pollution on streams, stemming out from intentional release caused by unconscious facts. The consequences of such contamination on ecosystems are very serious. Accordingly, effective tools are highly demanded in this respect, which enable us to come across an accurate progress of pollutant and anticipate different measures to be applied in order to limit the degradation of the environmental surrounding. In this context, we are eager to model a pollutant dispersion of a free surface flow which is ejected by an outfall sewer of an urban sewerage network in coastal water taking into account the influence of climatic parameters on the spread of pollutant. Numerical results showed that pollutant dispersion is merely due to the presence of vortices and turbulence. Hence, it was realized that the pollutant spread in seawater is strongly correlated with climatic conditions in this region.

Keywords: coastal waters, numerical simulation, pollutant dispersion, turbulent flows

Procedia PDF Downloads 473
93 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 268
92 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 510
91 Modernist Trends in Ilahiyat Faculties (Islamic Studies Faculties) Turkey, Post-Coup 1980

Authors: Muhammad Hamza Tariq

Abstract:

The regrouping of the Islamists and the politics of religious education was the most common debate in the last decades of Turkish history. Religious schools were criticized to be influenced by partisan politics. Within this turmoil, the faculty of Ilahiyat which was established by the Republic to cherish Islamic modernism and to raise modern clergy also underwent a considerable change. This research studies the revisions in the curriculum of the faculty over the last few decades. A series of interviews were also conducted to observe the prevalent trends, especially modernist among the professors at the Ilahiyat faculties. Lastly, a survey was done among the freshman and final year students based on the similar questions to observe the changes of opinions with regards to their views on Islam, modernity, political Islam, interpretation, etc. A shift in the curriculum was noted though it cannot be overgeneralized whereas a degree of prevalence of modernist thoughts was also recorded among the teachers and the students.

Keywords: ilahiyat, divinity, religion, Islamization

Procedia PDF Downloads 324
90 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 591
89 Predicting Mobile Payment System Adoption in Nigeria: An Empirical Analysis

Authors: Aminu Hamza

Abstract:

This study examines the factors that play vital role in the adoption of mobile payment system among consumers in Nigeria. Technology Acceptance Model (TAM) was used with two additional variables to form the conceptual model. The study was conducted in three Universities in Kano state, Nigeria. Convenience sampling method was used with a total valid 202 respondents which involved the students of Bayero University Kano (BUK), Northwest University, and Kano University of Science and Technology (KUST) Wudil, Kano, Nigeria. Results of the regression analysis revealed that Perceived ease of use (PEOU) and Perceived usefulness (PU) have significant and positive correlation with the behavioral intention to adopt mobile payment system. The findings of this study would be useful to the policy makers Central Bank of Nigeria (CBN), mobile network operators and providers of the services.

Keywords: mobile payment system, Nigeria, technology adoption, technology acceptance model

Procedia PDF Downloads 277
88 Online Prediction of Nonlinear Signal Processing Problems Based Kernel Adaptive Filtering

Authors: Hamza Nejib, Okba Taouali

Abstract:

This paper presents two of the most knowing kernel adaptive filtering (KAF) approaches, the kernel least mean squares and the kernel recursive least squares, in order to predict a new output of nonlinear signal processing. Both of these methods implement a nonlinear transfer function using kernel methods in a particular space named reproducing kernel Hilbert space (RKHS) where the model is a linear combination of kernel functions applied to transform the observed data from the input space to a high dimensional feature space of vectors, this idea known as the kernel trick. Then KAF is the developing filters in RKHS. We use two nonlinear signal processing problems, Mackey Glass chaotic time series prediction and nonlinear channel equalization to figure the performance of the approaches presented and finally to result which of them is the adapted one.

Keywords: online prediction, KAF, signal processing, RKHS, Kernel methods, KRLS, KLMS

Procedia PDF Downloads 367
87 The Effect of Dopamine D2 Receptor TAQ A1 Allele on Sprinter and Endurance Athlete

Authors: Öznur Özge Özcan, Canan Sercan, Hamza Kulaksız, Mesut Karahan, Korkut Ulucan

Abstract:

Genetic structure is very important to understand the brain dopamine system which is related to athletic performance. Hopefully, there will be enough studies about athletics performance in the terms of addiction-related genetic markers in the future. In the present study, we intended to investigate the Receptor-2 Gene (DRD2) rs1800497, which is related to brain dopaminergic system. 10 sprinter and 10 endurance athletes were enrolled in the study. Real-Time Polymerase Chain Reaction method was used for genotyping. According to results, A1A1, A1A2 and A2A2 genotypes in athletes were 0 (%0), 3 (%15) and 17 (%85). A1A1 genotype was not found and A2 allele was counted as the dominating allele in our cohort. These findings show that dopaminergic mechanism effects on sport genetic may be explained by the polygenic and multifactorial view.

Keywords: addiction, athletic performance, genotype, sport genetics

Procedia PDF Downloads 185
86 Peculiar Implications of Self Perceived Identity as Policy Tool for Transgender Recognition in Pakistan

Authors: Hamza Iftikhar

Abstract:

The research study focuses on the transgender community's gender recognition challenges. It is one of the issues for the transgender community, interacting directly with the difficulties of gender identity and the lives of these people who are facing gender disapproval from society. This study investigates the major flaws of the transgender act. The study's goal is to look into the strange implications of self-perceived identity as a policy tool for transgender recognition. This policy tool jeopardises the rights of Pakistan's indigenous gender-variant people as well as the country's legal and social framework. Qualitative research using semi structured interviews will be carried out. This study proposes developing a scheme for mainstreaming gender-variant people on the basis of the Pakistani Constitution, Supreme Court guidelines, and internationally recognised principles of law. This would necessitate a thorough review of current law using a new approach and reference point.

Keywords: transgender act, self perceived identity, gender variant, policy tool

Procedia PDF Downloads 83
85 Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks

Authors: Eman I. Raslan, Haitham S. Hamza, Reda A. El-Khoribi

Abstract:

Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques.

Keywords: fiber-wireless (FiWi), dynamic bandwidth allocation (DBA), passive optical networks (PON), media access control (MAC)

Procedia PDF Downloads 491
84 Selecting Skyline Mash-Ups under Uncertainty

Authors: Aymen Gammoudi, Hamza Labbaci, Nizar Messai, Yacine Sam

Abstract:

Web Service Composition (Mash-up) has been considered as a new approach used to offer the user a set of Web Services responding to his request. These approaches can return a set of similar Mash-ups in a given context that makes users unable to select the perfect one. Recent approaches focus on computing the skyline over a set of Quality of Service (QoS) attributes. However, these approaches are not sufficient in a dynamic web service environment where the delivered QoS by a Web service is inherently uncertain. In this paper, we treat the problem of computing the skyline over a set of similar Mash-ups under certain dimension values. We generate dimensions for each Mash-up using aggregation operations applied to the QoS attributes. We then tackle the problem of computing the skyline under uncertain dimensions. We present each dimension value of mash-up using a frame of discernment and introduce the d-dominance using the Evidence Theory. Finally, we propose our experimental results that show both the effectiveness of the introduced skyline extensions and the efficiency of the proposed approaches.

Keywords: web services, uncertain QoS, mash-ups, uncertain dimensions, skyline, evidence theory, d-dominance

Procedia PDF Downloads 196
83 Enhancement of Growth Regulators to Callus Formation and Silymarin Content from Different Explants of Silybum marianum Seedling

Authors: M. A. Hamza, H. A. Bosila, M. A. Zewil, I. M. Harridy

Abstract:

Silymarin is one active component extracted from milk thistle Silybum marianum; it is flavonoid recognized for its ability to benefit people with liver disorders and as a protective compound against liver damaging agents. For this reason, this research aims to study the effect of growth regulators (BA+NAA) and explant type (cotyledon, hypocotyl, and root) to increase the growth and active ingredients (silymarin) in callus of S. mariaum plant. The results showed that cotyledon explant which have been cultured in MS medium supplemented with BA 0.4 mg/l. +NAA 0.25 mg/l. Led to obtain the best results in callus fresh weight (1.847a) and callus dry weight (0.155a). On the other hand, the same explant (cotyledon) cultured in MS medium supplemented with BA 1.6 mg/l. + NAA 0.5 mg/l. The suitable condition to silymarin content (0.132 mg/100 mg dry weight). And also, it turned out, lack of importance of the use of hypocotyl and root in the production of callus and silymarin compared to cotyledon.

Keywords: silybum, callus, tissue culture, cotyledon

Procedia PDF Downloads 168
82 Influence of Elicitors on Callus Growth and Active Ingredient in Echinacea purpurea

Authors: Mohamed Abdelfattah Meawad Hamza, H. A. Bosila, M. A. Zewil

Abstract:

This research aims to study the effect of different sources of elicitors for increase growth and active ingredients in callus of Echinacea purpurea plant. Callus that have been obtained from leaf explant, was used to conduct the following studies. A study of the impact of both the phenylalanine and tyrosine (50, 100,150 and 200 mg/l.) individually and casein hydrolysate (100, 200 and 300 mg/l.) supplemented to MS medium. Results show that Casein hydrolysate 100 mg/l. has achieved the better results in both callus fresh weight 1.881 g/explant after 8 weeks of the incubation period and callus growth rate 0.398 g/explant after 6 weeks of the incubation period, while gave add 200 mg/l. The best results in total carbohydrate 2.444 mg/ 100 mg dry weight. Phenylalanine 150 mg/l. has achieved the best results in callus dry weight 0.156 g/explant after 8 weeks of incubation period. Tyrosine 200 mg/l. recorded the best result for positive production of caffeic acid 0.460 mg/ 100 mg dry weight after 4 weeks incubation period.

Keywords: tissue culture, echinacea, tyrosine, casein

Procedia PDF Downloads 239
81 MIMO UWB Antenna for Exploring Body Centric Communication

Authors: Osama Aziz, Hamza Ahmad, Muhibur Rahman

Abstract:

The performance of wireless communication systems has been suggested to be improved by UWB MIMO antenna systems. However, creating a successful UWB MIMO antenna is a difficult undertaking that calls for resolving a number of design issues, including radiation efficiency, size, and frequency range. This study's primary objective is to create a novel, highly effective, small-sized, ultra-wideband (UWB) multiple-input multiple-output (MIMO) antenna and investigate its potential applications in body-centric communication. Two radiating elements, shared ground plane, circular stubs, and t-shaped isolation elements are used to achieve the MIMO antenna. Outstanding multiplexing efficiency, significant peak gain across the entire UWB frequency spectrum, extremely low mutual coupling (S21=-16 dB), high diversity gain (DG>9), and low envelop correlation are achieved. The proposed antenna will be one of the promising candidates for body centric communication.

Keywords: UWB communication, UWB MIMO antennas, body-centric communication, diversity gain

Procedia PDF Downloads 34
80 Cytotoxic Activity Of Major Iridoids From Barleria Trispinosa (Forssk.) Vahl. Growing In Saudi Arabia

Authors: Hamza Assiry, Gamal A. Mohamed, Sabrin R. M. Ibrahim, Hossam M. Abdallah

Abstract:

Chemical investigation of the aerial parts of Barleria trispinosa(Forssk.) Vahl. resulted in isolation of four major iridoids that were identified as 6,8-O,O-diacetylshanhiside methyl ester (acetyl barlerin) (1), 8-O-acetylshanzhiside methyl ester (barlerin) (2), shanzhiside methyl ester (3), and 6- ⍺ -L-rhamnopyranosyl-8-O-acetylshanzihiside methyl ester (4). The isolated compounds were confirmed by detailed one and two-dimensional NMR. Isolated compounds were tested for their cytotoxic activity on breast cancer (MCF-7, MDA-MB-231) and colon cancer (LS174T) cell linesusing sulphorhodamine B (SRB) assay. It is noteworthy that compound 1 demonstrated a significant cytotoxic potential towards MDA-MB-231 cell line with IC5016.7 ± 2.7µg / mL compared to doxorubicin whereas compounds 2, showed moderate cytotoxic potential with IC5021.2 ± 1.9µg / mL on MCF-7. The other compounds showed moderate activity on the tested cell lines.

Keywords: acanthaceae, cytotoxicity, metabolites, barleria trispinosa

Procedia PDF Downloads 117
79 A Hybrid Watermarking Model Based on Frequency of Occurrence

Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis

Abstract:

Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: authentication, copyright protection, information hiding, ownership, watermarking

Procedia PDF Downloads 541
78 Thermal Regeneration of CO2 Spent Palm Shell-Polyetheretherketone Activated Carbon Sorbents

Authors: Usman D. Hamza, Noor S. Nasri, Mohammed Jibril, Husna M. Zain

Abstract:

Activated carbons (M4P0, M4P2, and M5P2) used in this research were produced from palm shell and polyetherether ketone (PEEK) via carbonization, impregnation, and microwave activation. The adsorption/desorption process was carried out using static volumetric adsorption. Regeneration is important in the overall economy of the process and waste minimization. This work focuses on the thermal regeneration of the CO2 exhausted microwave activated carbons. The regeneration strategy adopted was thermal with nitrogen purge desorption with N2 feed flow rate of 20 ml/min for 1 h at atmospheric pressure followed by drying at 1500C. Seven successive adsorption/regeneration processes were carried out on the material. It was found that after seven adsorption regeneration cycles; the regeneration efficiency (RE) for CO2 activated carbon from palm shell only (M4P0) was more than 90% while that of hybrid palm shell-PEEK (M4P2, M5P2) was above 95%. The cyclic adsorption and regeneration shows the stability of the adsorbent materials.

Keywords: activated carbon, palm shell-PEEK, regeneration, thermal

Procedia PDF Downloads 460
77 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 346
76 Mycorrhizal Autochthonous Consortium Induced Defense-Related Mechanisms of Olive Trees against Verticillium dahliae

Authors: Hanane Boutaj, Abdelilah Meddich, Said Wahbi, Zainab El Alaoui-Talibi, Allal Douira, Abdelkarim Filali-Maltouf, Cherkaoui El Modafar

Abstract:

The present work aims to investigate the effect of arbuscular mycorrhizal fungi (AMF) in improving the olive tree resistance to Verticillium wilt caused by Verticillium dahliae. Inoculated plants with a mycorrhizal autochthonous consortium 'Rhizolive consortium' and pure strain 'Glomus irregulare' were infected after three months with V. dahliae. The improving of olive tree resistance was determined through disease severity, incidence, and defoliation. On the other hand, the defense mechanisms of olive plants were evaluated through lignin content, phenylalanine ammonia lyase (PAL) activity, and polyphenol content. The results revealed that both AMF significantly (p < 0.05) reduced disease development and the rate of defoliation in infected olive plants. Moreover, the contents of lignin were boosted after mycorrhizal inoculation in both the roots and the stems of olive plants, which remained significantly (p < 0.001) higher after the 90th days of V. dahliae inoculation. PAL activity was increased after V. dahliae inoculation in the stems of 'Rhizolive consortium' treatment that were 17 times higher than those in the roots of olive plants. The polyphenol content in the stems was about twice higher than those in the roots. The reduction of disease severity was accompanied by increased levels of lignin content, PAL activity, and polyphenol content, particularly in the stems of olive plants, indicating the strengthening of the olive plant immune system against V. dahliae.

Keywords: olive tree, Mycorrhizal autochthonous consortium, Glomus irregulare, Verticillium dahliae, defense mechanisms

Procedia PDF Downloads 81
75 A Dam Break Analysis Using MIKE11

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchahed

Abstract:

The consequences of a dam breach can be devastating; both in terms of lives lost and damaged infrastructure and property. Hydraulic modeling provides a clear picture of the possible consequences of partial or complete failure of a dam, which is the key to carry out emergency planning and conduct reliable risk assessments. In this paper, the MIKE11 model developed by the Danish Hydrologic Institute (DHI) was used to simulate the flood wave propagation associated with a potential failure analysis failure of Zardezas dam located in the city of Skikda in the North East of Algeria. MIKE11 results including inundation maps and the representative channel/valley cross-sections depicting flow depth and maximal flow velocities showed that Zardezas reservoir presents a significant risk to downstream areas in the event of a dam failure. These results can be used as the basis of the development of an Emergency Action Plan (EAP).The main objective of this plan is to predict the appropriate steps to avoid or at least decrease the consequences of unexpected failure of Zardezas dam.

Keywords: MIKE11, dam break, inundation maps, emergency action plan

Procedia PDF Downloads 416
74 Dambreak Flood Analysis Using HEC-RAS and GIS Technologies

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchehed

Abstract:

The potential risks associated with dam break flooding could be considerable and result in major damage, including loss of life and property destruction. In the past, Algeria experienced such flood disasters; let’s recall the failure of Fergoug dam in 1881, this accident cost 200 lives, many houses and bridges were destroyed by the flooding. Recently the Algerian government have obligated to dam owners the development of detailed dam break Emergency Action Plans for its 64 major dams. The research presented here was conducted within this framework, Zardezas dam which is located in the city of Skikda in the North East of Algeria was the case of study. The model HEC-RAS was used for the hydrodynamic routing of the dam break flood wave. In addition, Geographic Information System (GIS) was used to create inundation maps and produce a visualization of the flood propagation in the Saf-Saf River.The simulation results that demonstrate the significance of Zardezas dam break flooding; constitute a real tool for developing emergency response plans and assisting territorial communities in land use planning.

Keywords: dam break, HEC-RAS, GIS, inundation maps, Emergency Action Plan

Procedia PDF Downloads 362
73 Improved Processing Speed for Text Watermarking Algorithm in Color Images

Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari

Abstract:

Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.

Keywords: steganography, watermarking, time complexity measurements, private keys

Procedia PDF Downloads 118
72 The Influence of the Discharge Point Position on the Pollutant Dispersion

Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Said, Hervé Bournot, Georges Le Palec

Abstract:

The distribution characteristics of pollutants released at different vertical inlet positions of an open channel are investigated with a three-dimensional numerical model. Pollutants are injected from time-dependent sources in a turbulent free surface flow. Numerical computations were carried out using ANSYS Fluent which is based on the finite volume approach. The air/water interface was modeled with the volume of the fluid method (VOF). By focusing on investigating the influences of flow on pollutants, it is found that pollutant released from the bottom position of the channel takes more time to disperse in the longitudinal direction of the flow in comparison with the case of pollutant released near the free surface. On the other hand, the pollutant released from the bottom position generates a vertical dispersion with decreased amplitude. These findings may assist in cost-effective scientific countermeasures to be taken for accident or planned pollutant discharged into a river.

Keywords: numerical simulation, pollutant release, turbulent free surface flow, VOF model

Procedia PDF Downloads 485
71 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 320
70 Multiannual Trends of Toxic and Potentially Toxic Microalgae (Ostreopsis cf. ovata, Prorocentrum lima, and Coolia monotis) in Sfax Coasts (North of Gabes Gulf, Tunisia)

Authors: Moncer Malika, Ben Brahim Mounir, Bel Hassen Malika, Hamza Asma

Abstract:

During the last decades, microalgae communities have presented significant changes in their structure and taxa composition along the Mediterranean littoral shallow waters. The main purpose of this work was to evaluate possible changes, over a 17-year scale (1997–2013), in the diversity and abundance of three toxic and potentially toxic microalgae related to changes in environmental parameters on Sfax coasts, a pole of shellfish production in Tunisia. In this 17-year span, a chronological series of data showed that a clear disparity from one year to another was observed in the abundance of studied species. The distribution of these species has been subjected to a seasonal cycle. The studied microalgae, especially Prorocentrum lima, seem to have significant relationships with many physicochemicaland meteorological parameters.

Keywords: long-term monitoring HABs, physico-chemical parameters, meteorological parameters, Prorocentrum lima, Ostreopsis cf. ovata, Coolia monotis

Procedia PDF Downloads 90
69 Biochemical and Pomological Variability among 14 Moroccan and Foreign Cultivars of Prunus dulcis

Authors: H. Hanine, H. H'ssaini, M. Ibno Alaoui, A. Nablousi, H. Zahir, S. Ennahli, H. Latrache, H. Zine Abidine

Abstract:

Biochemical and pomological variability among 14 cultivars of Prunus dulcis planted in a germoplasm collection site in Morocco were evaluated. Almond samples from six local and eight foreign cultivars (France, Italy, Spain, and USA) were characterized. Biochemical and pomological data revealed significant genetic variability among the 14 cultivars; local cultivars exhibited higher total polyphenol content. Oil content ranged from 35 to 57% among cultivars; both Texas and Toundout genotypes recorded the highest oil content. Total protein concentration from select cultivars ranged from 50 mg/g in Ferraduel to 105 mg/g in Rizlane1 cultivars. Antioxidant activity of almond samples was examined by a DPPH (1,1-diphenyl-2-picrylhydrazyl) radical-scavenging assay; the antioxidant activity varied significantly within the cultivars, with IC50 (the half-maximal inhibitory concentration) values ranging from 2.25 to 20 mg/ml. Autochthonous cultivars originated from the Oujda region exhibited higher tegument total polyphenol and amino acid content compared to others. The genotype Rizlane2 recorded the highest flavonoid content. Pomological traits revealed a large variability within the almond germplasms. The hierarchical clustering analysis of all the data regarding pomological traits distinguished two groups with some particular genotypes as distinct cultivars, and groups of cultivars as polyclone varieties. These results strongly exhibit a potential use of Moroccan-originated almonds as potential clones for future selection due to their nutritional values and pomological traits compared to well-established cultivars.

Keywords: antioxidant activity, DDPH, Moroccan almonds, Prunus dulcis

Procedia PDF Downloads 212
68 Second Representation of Modules over Commutative Rings

Authors: Jawad Abuhlail, Hamza Hroub

Abstract:

Let R be a commutative ring. Representation theory studies the representation of R-modules as (possibly finite) sums of special types of R-submodules. Here we are interested in a class of R-modules between the class of semisimple R-modules and the class of R-modules that can be written as (possibly finite) sums of secondary R-submodules (we know that every simple R-submodule is secondary). We investigate R-modules which can be written as (possibly finite) sums of second R-submodules (we call those modules second representable). Moreover, we investigate the class of (main) second attached prime ideals related to a module with such representation. We provide sufficient conditions for an R-module M to get a (minimal) second representation. We also found the collection of second attached prime ideals for some types of second representable R-modules, in particular within the class of injective R-modules. As we know that every simple R-submodule is second and every second R-submodule is secondary, we can see the importance of the second representable R-module.

Keywords: lifting modules, second attached prime ideals, second representations, secondary representations, semisimple modules, second submodules

Procedia PDF Downloads 157
67 CFD Study of Free Surface Flows Resulting from a Dam-Breaking

Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Saïd, Hervé Bournot, Georges Le Palec

Abstract:

Free surface flows caused by dam breaks in channels or rivers is an attention-getting subject to the engineering practice, however, the studies are few to be reported. In this paper, a numerical investigation of unsteady free surface flows resulting from a dam-breaking in a rectangular channel is studied. Numerical computations were carried out using ANSYS Fluent which is based on the finite volume approach. The air/water interface was modeled with the volume of fluid method (VOF). Verification for a typical dam-break problem is analyzed by comparing the present results with others and very good agreement is obtained. The present approach is then used to predict the characteristics of free surface flow due to the dam breaking in channel. The characteristics of complex unsteady free surface flow in these examples are clearly explained. The numerical results show that the flow became more disturbed after impacting the vertical wall, then a recirculation zone, as well as turbulence phenomena, were created. At this instant, a cavity of air was included on the flow. The results agree well with the experimental data found in the literature.

Keywords: CFD, dam-break, free surface, turbulent flows, VOF

Procedia PDF Downloads 286