Search results for: Amani Hassan Yousef Abu Atieh
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 770

Search results for: Amani Hassan Yousef Abu Atieh

770 The Ideology of the Jordanian Media Women’s Discourse: Lana Mamkgh as an Example

Authors: Amani Hassan Abu Atieh

Abstract:

This study aims at examining the patterns of ideology reflected in the written discourse of women writers in the media of Jordan; Lana Mamkgh is taken as an example. This study critically analyzes the discursive, linguistic, and cognitive representations that she employs as an agent in the institutionalized discourse of the media. Grounded in van Dijk’s critical discourse analysis approach to Sociocognitive Discourse Studies, the present study builds a multilayer framework that encompasses van Dijk’s triangle: discourse, society, and cognition. Specifically, the study attempts to analyze, at both micro and macro levels, the underlying cognitive processes and structures, mainly ideology and discursive strategies, which are functional in the production of women’s discourse in terms of meaning, forms, and functions. Cognitive processes that social actors adopt are underlined by experience/context and semantic mental models on the one hand and social cognition on the other. This study is based on qualitative research and adopts purposive sampling, taking as an example a sample of an opinion article written by Lana Mamkgh in the Arabic Jordanian Daily, Al Rai. Taking her role as an agent in the public sphere, she stresses the National and feminist ideologies, demonstrating the use of assertive, evaluative, and expressive linguistic and rhetorical devices that appeal to the logic, ethics, and emotions of the addressee. Highlighting the agency of Jordanian writers in the media, the study sought to achieve the macro goal of dispensing political and social justice to the underprivileged. Further, the study seeks to prove that the voice of Jordanian women, viewed as underrepresented and invisible in the public arena, has come through clearly.

Keywords: critical discourse analysis, sociocognitive theory, ideology, women discourse, media

Procedia PDF Downloads 72
769 Regional Pole Placement by Saturated Power System Stabilizers

Authors: Hisham M. Soliman, Hassan Yousef

Abstract:

This manuscript presents new results on design saturated power system stabilizers (PSS) to assign system poles within a desired region for achieving good dynamic performance. The regional pole placement is accomplished against model uncertainties caused by different load conditions. The design is based on a sufficient condition in the form of linear matrix inequalities (LMI) which forces the saturated nonlinear controller to lie within the linear zone. The controller effectiveness is demonstrated on a single machine infinite bus system.

Keywords: power system stabilizer, saturated control, robust control, regional pole placement, linear matrix inequality (LMI)

Procedia PDF Downloads 535
768 The Dynamics of Jordanian Socio-Political Satire after the Arab Spring

Authors: Yousef Barahmeh

Abstract:

There is a wide cultural belief that Jordanians are po-faced and unable to produce humour and satire. However, in the light of the harbingers of the Arab Spring in the early 2011, socio-political satire has thrived notably in social media as a rigorous act of critique and dissent against the institutionalized discourse. This paper seeks to explore the case study of Ahmad Hassan al-Zou’bi’s satirical articles and Facebook posts in the context of theories of satire and digital politics. Al-Zou’bi is the most prominent and prolific Jordanian satirist who rose to prominence after the Arab Spring. The analysis shows that his satirical articles provide a vintage point to the rhetoric behind the socio-political and economic reform programs as much as the adverse impact of neoliberal governments in the modern history of Jordan.

Keywords: Arab Spring, digital politics, humour and socio-political satire

Procedia PDF Downloads 423
767 Utilization of Low-Cost Adsorbent Fly Ash for the Removal of Phenol from Water

Authors: Ihsanullah, Muataz Ali Atieh

Abstract:

In this study, a low-cost adsorbent carbon fly ash (CFA) was used for the removal of Phenol from the water. The adsorbent characteristics were observed by the Thermogravimetric Analysis (TGA), BET specific surface area analyzer, Zeta Potential and Field Emission Scanning Electron Microscopy (FE-SEM). The effect of pH, agitation speed, contact time, adsorbent dosage, and initial concentration of phenol were studied on the removal of phenol from the water. The optimum values of these variables for maximum removal of phenol were also determined. Both Freundlich and Langmuir isotherm models were successfully applied to describe the experimental data. Results showed that low-cost adsorbent phenol can be successfully applied for the removal of Phenol from the water.

Keywords: phenol, fly ash, adsorption, carbon adsorbents

Procedia PDF Downloads 290
766 Radon Concentration in the Water Samples of Hassan District, Karnataka, India

Authors: T. S. Shashikumar

Abstract:

Radon is a radioactive gas emitted from radium, a daughter product of uranium that occurs naturally in rocks and soil. Radon, together with its decay products, emits alpha particles that can damage lung tissue. The activity concentration of 222Ra has been analyzed in water samples collected from borewells and rivers in and around Hassan city, Karnataka State, India. The measurements were performed by Emanometry technique. The concentration of 222Rn in borewell waters varies from 18.49±1.89 to 397.26±12.3 Bql-1 with geometric mean 120.48±12.87 Bql-1 and in river waters it varies from 92.63±9.31 to 93.98±9.51 Bql-1 with geometric mean of 93.16±9.33 Bql-1. In the present study, the radon concentrations are higher in Adarshanagar and Viveka Nagar which are found to be 397.26±12.3 Bql-1 and 325.78±32.56 Bql-1. Most of the analysed samples show a 222Rn concentration more than 100 Bql-1 and this can be attributed to the geology of the area where the ground waters are located, which is predominantly of granitic characteristic. The average inhalation dose and ingestion dose in the borewell water are found to be 0.405 and 0.033 µSvy-1; and in river water it is found to be 0.234 and 0.019 µSvy-1, respectively. The average total effective dose rate in borewell waters and river waters are found to be 0.433 and 0.253 µSvy-1, which does not cause any health risk to the population of Hassan region.

Keywords: borewell, effective dose, emanometry, 222Rn

Procedia PDF Downloads 402
765 Surveillance of Adverse Events Following Immunization during New Vaccines Introduction in Cameroon: A Cross-Sectional Study on the Role of Mobile Technology

Authors: Andreas Ateke Njoh, Shalom Tchokfe Ndoula, Amani Adidja, Germain Nguessan Menan, Annie Mengue, Eric Mboke, Hassan Ben Bachir, Sangwe Clovis Nchinjoh, Yauba Saidu, Laurent Cleenewerck De Kiev

Abstract:

Vaccines serve a great deal in protecting the population globally. Vaccine products are subject to rigorous quality control and approval before use to ensure safety. Even if all actors take the required precautions, some people could still have adverse events following immunization (AEFI) caused by the vaccine composition or an error in its administration. AEFI underreporting is pronounced in low-income settings like Cameroon. The Country introduced electronic platforms to strengthen surveillance. With the introduction of many novel vaccines, like COVID-19 and the novel Oral Polio Vaccine (nOPV) 2, there was a need to monitor AEFI in the Country. A cross-sectional study was conducted from July to December 2022. Data on AEFI per region of Cameroon were reviewed for the past five years. Data were analyzed with MS Excel, and the results were presented in proportions. AEFI reporting was uncommon in Cameroon. With the introduction of novel vaccines in 2021, the health authorities engaged in new tools and training to capture cases. AEFI detected almost doubled using the open data kit (ODK) compared to previous platforms, especially following the introduction of the nOPV2 and COVID-19 vaccines. The AEFI rate was 1.9 and 160 per administered 100 000 doses of nOPV2 and COVID-19 vaccines, respectively. This mobile tool captured individual information for people with AEFI from all regions. The platform helped to identify common AEFI following the use of these new vaccines. The ODK mobile technology was vital in improving AEFI reporting and providing data to monitor using new vaccines in Cameroon.

Keywords: adverse events following immunization, cameroon, COVID-19 vaccines, nOPV, ODK

Procedia PDF Downloads 44
764 Socioeconomic Values and Administration in Northern Nigeria: An Examination of the Impacts of Dearth of Values

Authors: Hassan Alhaji Hassan, Inuwa Abdu Ibrahim

Abstract:

The research looks at the decaying socioeconomic values in northern Nigeria, which is directly affecting the administration of service at different levels. The aim is to establish the consequence of a valueless society on individual and public life at different levels. The result of governments’ continued neglect of education, societal values, which have negatively affected societal development and indeed development in general. Therefore, focus is on governments’ poor performance in Nigeria, using secondary sources of data. In conclusion, the research asserts the need for the application of the values of some traditional values as personal principles and good governance as the way out of the present deteriorating conditions.

Keywords: socioeconomic, values, education, Northern Nigeria, good governance

Procedia PDF Downloads 351
763 Bacterial Flora of the Anopheles Fluviatilis S. L. in an Endemic Malaria Area in Southeastern Iran for Candidate Paraterasgenesis Strains

Authors: Seyed Hassan Moosa-kazemi, Jalal Mohammadi Soleimani, Hassan Vatandoost, Mohammad Hassan Shirazi, Sara Hajikhani, Roonak Bakhtiari, Morteza Akbari, Siamak Hydarzadeh

Abstract:

Malaria is an infectious disease and considered most important health problems in the southeast of Iran. Iran is elimination malaria phase and new tool need to vector control. Paraterasgenesis is a new way to cut of life cycle of the malaria parasite. In this study, the microflora of the surface and gut of various stages of Anopheles fluviatilis James as one of the important malaria vector was studied using biochemical and molecular techniques during 2013-2014. Twelve bacteria species were found including; Providencia rettgeri, Morganella morganii, Enterobacter aerogenes, Pseudomonas oryzihabitans, Citrobacter braakii، Citrobacter freundii، Aeromonas hydrophila، Klebsiella oxytoca, Citrobacter koseri, Serratia fonticola، Enterobacter sakazakii and Yersinia pseudotuberculosis. The species of Alcaligenes faecalis, Providencia vermicola and Enterobacter hormaechei were identified in various stages of the vector and confirmed by biochemical and molecular techniques. We found Providencia rettgeri proper candidate for paratransgenesis.

Keywords: Anopheles fluviatilis, bacteria, malaria, Paraterasgenesis, Southern Iran

Procedia PDF Downloads 446
762 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 430
761 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 381
760 Clinical Outcomes of Critically Ill Patients with Sepsis Receiving Extended and Standard Meropenem Infusion in Malaysian Hospitals

Authors: Fahmi Hassan, Noorizan Abdul Aziz, Yahaya Hassan, Hazlinda Abu Hassan

Abstract:

Sepsis incidence in critical care settings is a major problem in health care. Extended antibiotic infusion is thought to be superior to traditional dosing especially when treating critically ill patients with sepsis. We compared clinical outcomes of critically ill patients with sepsis receiving 30-minute meropenem infusion and three-hour meropenem infusion. A retrospective case-control study was conducted among septic patients treated with meropenem infusion in ICUs of three hospitals. Patients included in the study received either extended or standard meropenem infusion as per the practice of individual settings. Outcomes and clinical data were retrospectively collected from the electronic databases and patients’ files. A total of 108 patients received extended meropenem infusion while another 117 patients received standard meropenem infusion. Patients receiving the extended meropenem infusion were found to have a significantly lower shorter length of hospital and ICU stay. It was also found that among those receiving extended meropenem infusion, 54.7% (64/117) had a reduction of SAPS II score, while only 44% (48/108) of patients receiving standard meropenem infusion had reduced scores. This study will strengthen the evidence in using extended meropenem infusion as a standard practice in critical care settings. As this is the first study of its kind done in Malaysia, it proves that prolonged meropenem infusion may be beneficial to critically ill patients with sepsis. However, randomized clinical trials with large sample size should be carried out in local settings in order to minimize other confounders that may influence with the result of the study.

Keywords: antibiotics, beta lactams, critical care, extended infusion, meropenem

Procedia PDF Downloads 371
759 Modeling the Risk Perception of Pedestrians Using a Nested Logit Structure

Authors: Babak Mirbaha, Mahmoud Saffarzadeh, Atieh Asgari Toorzani

Abstract:

Pedestrians are the most vulnerable road users since they do not have a protective shell. One of the most common collisions for them is pedestrian-vehicle at intersections. In order to develop appropriate countermeasures to improve safety for them, researches have to be conducted to identify the factors that affect the risk of getting involved in such collisions. More specifically, this study investigates factors such as the influence of walking alone or having a baby while crossing the street, the observable age of pedestrian, the speed of pedestrians and the speed of approaching vehicles on risk perception of pedestrians. A nested logit model was used for modeling the behavioral structure of pedestrians. The results show that the presence of more lanes at intersections and not being alone especially having a baby while crossing, decrease the probability of taking a risk among pedestrians. Also, it seems that teenagers show more risky behaviors in crossing the street in comparison to other age groups. Also, the speed of approaching vehicles was considered significant. The probability of risk taking among pedestrians decreases by increasing the speed of approaching vehicle in both the first and the second lanes of crossings.

Keywords: pedestrians, intersection, nested logit, risk

Procedia PDF Downloads 147
758 Islamization of Knowledge with Special Reference to Mohd Kamal Hassan's Perspective

Authors: Abdul Latheef O. Mavukkandy

Abstract:

Islamization of knowledge (IOK) is an intellectual movement emerged in the middle of 1970s to address the threats by modern western civilizational onslaughts. This paper analyzes the discourse of Islamization of knowledge with special reference to the views of Kamal Hassan who prefers an alternative term called 'Islamicization'. First of all the theoretical and practical outlines of IOK movement were presented by Ismail Raji al-Faruqi in his book 'Islamization of Knowledge; General Principles and Work Plan' in 1982. He identified that the educational system in the Muslim world accounted for the decline of Muslim Ummah through de-Islamization and demoralization. So, the need for IOK was an academic challenge to reconstruct the Ummah. Kamal Hassan kept just different view from Ismail Raji al-Faruqi and Muhammed Naquib al-Attas that he coined the terms 'Relevantization and Contextualization'. So, he wanted the 'Islamization of Islamic Revealed Knowledge'. So, he used Islamization of Human Knowledge (IOHK) instead of IOK. As part of this movement, the IOK identified that the textbooks used in Muslim educational institutions systematically keep the students estranged from Islam and its heritage. Furthermore, the modern secular knowledge develops secular attitude devoid of Islamic moral philosophy and the sense of mission in life. Based upon the content analysis of some of the sources, this study found that Islamization of Knowledge is an important movement in Islamic world, but the IOK project is not practicable completely because of the lack of trained teachers and resources. Although, the project resulted in the foundation of some universities and publishing more works, journals and doctoral thesis on different dimensions of Islamization of Knowledge.

Keywords: Islamization, Islamicization, releventization, human knowledge

Procedia PDF Downloads 372
757 Effect of Preparation Temperature on Producing Graphene Oxide by Chemical Oxidation Approach

Authors: Rashad Al-Gaashani, Muataz A. Atieh

Abstract:

In this study, the effect of preparation temperature, namely room temperature (RT), 40, 60, and 85°C, on producing of high-quality graphene oxide (GO) has been investigated. GO samples have been prepared by chemical oxidation of graphite via a safe improved chemical technique using a blend of two deferent acids: sulphuric acid (H₂SO₄) and phosphoric acid (H₃PO₄) with volume ratio 4:1, respectively. potassium permanganate (KMnO₄) and hydrogen peroxide (H₂O₂) were applied as oxidizing agents. In this work, sodium nitrate (NaNO₃) was excluded, so the emission of hazardous explosive gases such as NO₂ and N₂O₂ was shunned. Ice and oil baths were used to carefully control the temperature. Several characterization instruments including X-Ray diffraction, transmission electron microscopy, scanning electron microscopy, electron dispersive spectroscopy, Fourier transform infrared spectroscopy, X-ray photoelectron spectroscopy, and UV-vis spectroscopy were used to study and compare the synthesized samples. The results indicated that GO can be prepared at RT with graphite oxide, and the purity of GO increased with rising of the solvent temperature. Optical properties of GO samples were studied using UV-vis absorption spectra.

Keywords: chemical method, graphite, graphene oxide, optical properties

Procedia PDF Downloads 124
756 Cavitating Jet Design for Enhanced Drilling Performance

Authors: Abdullah Ababtain, Mouhammad El Hassan, Hassan Assoum, Anas Sakout

Abstract:

In this paper, a brief literature review on cavitation jets is presented in order to introduce the cavitation mechanism, strategies to assess when cavitation occurs, and the factors that influence cavitation in cavitating jets. The objectivity of the cavitation number often used to predict cavitation is also discussed. The results show that cavitation cannot be foreseen just using the cavitation number. Therefore, more efforts are needed to innovate and develop a self-resonating jet geometry that would be maintains the flow and the pressure in the cavitation condition just earlier than the flow acts on the target that would be used in such operating conditions. This study focused on a particular aspect related to improving drilling efficiency and the rate of penetration (ROP). In addition, a discussion on the methods used to measure cavitation and the factors that affect cavitation occurrence will be discussed. Two different types of cavitation nozzles were designed and tested. It has been shown that the self-resonating cavitation nozzle presents greater performance than standard non-resonating nozzle. It is thus concluded that a self-resonating cavitation jet present a high potential for improving drilling performance.

Keywords: cavitating jet, erosion, cavitation number, rate of penetration (ROP)

Procedia PDF Downloads 153
755 Rabih Alameddine's Appropriation of Shakespeare's The Tempest

Authors: Yousef Abu Amrieh

Abstract:

This paper explores how Arab American novelist Rabih Alameddine's recent novel The Angel of History (2016) appropriates certain motifs, tropes, and themes from Shakespeare's The Tempest. In particular, Alameddine's novel re-tells the story of Caliban and his mother from the perspective of a Yemeni bastard whose mis/fortunes take him to the US shores in the eighties of the previous century. The novel, specifically, re-writes the scene in which Caliban is gazed at by European travelers like Stephano and Trinculo whose first reaction to seeing him is to consider how to sell him or give him as a gift when they safely return to Europe. The novel contests Shakespeare's representation of Caliban as 'marketable' through depicting his daily experiences in modern day America.

Keywords: appropriation, Alameddine, Shakespeare, The Tempest

Procedia PDF Downloads 142
754 The Formation of the Diminutive in Colloquial Jordanian Arabic

Authors: Yousef Barahmeh

Abstract:

This paper is a linguistic and pragmatic analysis of the use of the diminutive in Colloquial Jordanian Arabic (CJA). It demonstrates a peculiar form of the diminutive in CJA inflected by means of feminine plural ends with -aat suffix. The analysis shows that the pragmatic function(s) of the diminutive in CJA refers primarily to ‘littleness’ while the morphological inflection conveys the message of ‘the plethora’. Examples of this linguistic phenomenon are intelligible and often include a large number of words that are culture-specific to the rural dialect in the north of Jordan. In both cases, the diminutive in CJA is an adaptive strategy relative to its pragmatic and social contexts.

Keywords: Colloquial Jordanian Arabic, diminutive, morphology, pragmatics

Procedia PDF Downloads 233
753 Investigation of Neutral Axis Shifting and Wall Thickness Distribution of Bent Tubes Produced by Rotary Draw Bending

Authors: Bernd Engel, Hassan Raheem Hassan

Abstract:

Rotary draw bending is a method used for tube forming. During the tube bending process, the neutral axis moves towards the inner arc and the wall thickness changes in the cross section of the tube. Wall thinning of the tube takes place at the extrados, whereas wall thickening of the tube occurs at the intrados. This paper investigates the tube bending with rotary draw bending process using thick-walled tubes and different material properties (16Mo3 and 10CrMo9-10). The experimental tests and finite element simulations are used to calculate the variable characteristics (wall thickness distribution, neutral axis shifting and longitudinal strain distribution). These results are compared with results of a plasto-mechanical model. Moreover, the cross section distortion is investigated in this study. This study helped to get bends with smaller wall factor for different material properties.

Keywords: rotary draw bending, thick wall tube, material properties, material influence

Procedia PDF Downloads 579
752 Weed Classification Using a Two-Dimensional Deep Convolutional Neural Network

Authors: Muhammad Ali Sarwar, Muhammad Farooq, Nayab Hassan, Hammad Hassan

Abstract:

Pakistan is highly recognized for its agriculture and is well known for producing substantial amounts of wheat, cotton, and sugarcane. However, some factors contribute to a decline in crop quality and a reduction in overall output. One of the main factors contributing to this decline is the presence of weed and its late detection. This process of detection is manual and demands a detailed inspection to be done by the farmer itself. But by the time detection of weed, the farmer will be able to save its cost and can increase the overall production. The focus of this research is to identify and classify the four main types of weeds (Small-Flowered Cranesbill, Chick Weed, Prickly Acacia, and Black-Grass) that are prevalent in our region’s major crops. In this work, we implemented three different deep learning techniques: YOLO-v5, Inception-v3, and Deep CNN on the same Dataset, and have concluded that deep convolutions neural network performed better with an accuracy of 97.45% for such classification. In relative to the state of the art, our proposed approach yields 2% better results. We devised the architecture in an efficient way such that it can be used in real-time.

Keywords: deep convolution networks, Yolo, machine learning, agriculture

Procedia PDF Downloads 68
751 Cluster Based Ant Colony Routing Algorithm for Mobile Ad-Hoc Networks

Authors: Alaa Eddien Abdallah, Bajes Yousef Alskarnah

Abstract:

Ant colony based routing algorithms are known to grantee the packet delivery, but they su ffer from the huge overhead of control messages which are needed to discover the route. In this paper we utilize the network nodes positions to group the nodes in connected clusters. We use clusters-heads only on forwarding the route discovery control messages. Our simulations proved that the new algorithm has decreased the overhead dramatically without affecting the delivery rate.

Keywords: ad-hoc network, MANET, ant colony routing, position based routing

Procedia PDF Downloads 390
750 Change Point Analysis in Average Ozone Layer Temperature Using Exponential Lomax Distribution

Authors: Amjad Abdullah, Amjad Yahya, Bushra Aljohani, Amani Alghamdi

Abstract:

Change point detection is an important part of data analysis. The presence of a change point refers to a significant change in the behavior of a time series. In this article, we examine the detection of multiple change points of parameters of the exponential Lomax distribution, which is broad and flexible compared with other distributions while fitting data. We used the Schwarz information criterion and binary segmentation to detect multiple change points in publicly available data on the average temperature in the ozone layer. The change points were successfully located.

Keywords: binary segmentation, change point, exponentialLomax distribution, information criterion

Procedia PDF Downloads 144
749 WormHex: Evidence Retrieval Tool of Social Media from Volatile Memory

Authors: Norah Almubairik, Wadha Almattar, Amani Alqarni

Abstract:

Social media applications are increasingly being used in our everyday communications. These applications utilise end-to-end encryption mechanisms, which make them suitable tools for criminals to exchange messages. These messages are preserved in the volatile memory until the device is restarted. Therefore, volatile forensics has become an important branch of digital forensics. In this study, the WormHex tool was developed to inspect the memory dump files of Windows and Mac-based workstations. The tool supports digital investigators to extract valuable data written in Arabic and English through web-based WhatsApp and Twitter applications. The results verify that social media applications write their data into the memory regardless of the operating system running the application, with there being no major differences between Windows and Mac.

Keywords: volatile memory, REGEX, digital forensics, memory acquisition

Procedia PDF Downloads 148
748 Study of Parameters Affecting the Electrostatic Attractions Force

Authors: Vahid Sabermand, Yousef Hojjat, Majid Hasanzadeh

Abstract:

This paper contains two main parts. In the first part of paper we simulated and studied three type of electrode patterns used in various industries for suspension and handling of the semiconductor and glass and we selected the best pattern by evaluating the electrostatic force, which was comb pattern electrode. In the second part, we investigated the parameters affecting the amount of electrostatic force such as the gap between surface and electrode (g), the electrode width (w), the gap between electrodes (t), the surface permittivity and electrode Length and methods of improvement of adhesion force by changing these values.

Keywords: electrostatic force, electrostatic adhesion, electrostatic chuck, electrostatic application in industry, electroadhesive grippers

Procedia PDF Downloads 365
747 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 448
746 Analytical Determination of Electromechanical Coupling Effects on Interlaminar Stresses of Generally Laminated Piezoelectric Plates

Authors: Atieh Andakhshideh, S. Maleki, Sayed Sadegh Marashi

Abstract:

In this paper, the interlaminar stresses of generally laminated piezoelectric plates are presented. The electromechanical coupling effect of the piezoelectric plate is considered and the governing equations and boundary conditions are derived using the principle of minimum total potential energy. The solution procedure is a three-dimensional multi-term extended Kantorovich method (3DMTEKM). The objective of this paper is to accurately study coupling influence on the edge effects of piezolaminated plates with finite dimensions, arbitrary lamination lay-ups and under uniform axial strain. These results can provide a benchmark for checking the accuracy of the other numerical method or two-dimensional laminate theories. To verify the accuracy of the 3DMTEKM, first examples are simplified to special cases such as cross-ply or symmetric laminations and are compared with other analytical solutions available in the literature. Excellent agreement is achieved in validation test and other numerical results are presented for general cases. Numerical examples indicate the singular behavior of interlaminar normal/shear stresses and electric field strength components near the edges of the piezolaminated plates. The coupling influence on the free edge effect with respect to lamination lay-ups of piezoelectric plate is studied in several examples.

Keywords: electromechanical coupling, generally laminated piezoelectric plates, Kantorovich method, edge effect, interlaminar stresses

Procedia PDF Downloads 114
745 Nonclassical Antifolates: Synthesis, Biological Evaluation and Molecular Modeling Study of Some New Quinazolin-4-One Analogues as Dihydrofolate Reductase Inhibitors

Authors: Yomna Ibrahim El-Gazzar, Hussien Ibrahim El-Subbagh, Hanan Hanaa Georgey, Ghada S. Hassan Hassan

Abstract:

Dihydrofolate reductase (DHFR) is an enzyme that has pivotal importance in biochemistry and medicinal chemistry. It catalyzes the reduction of dihydrofolate to tetrahydrofolate and intimately couples with thymidylate synthase. Thymidylate synthase is a crucial enzyme that catalyzes the reductive methylation of (dUMP) to (dTMP) utilizing N5, N10-methylenetetrahydrofolate as a cofactor. A new series of 2-substituted thio-quinazolin-4-one analogs was designed that possessed electron withdrawing or donating functional groups (Cl or OCH3) at position 6- or 7-, 4-methoxyphenyl function at position 3-.The thiol function is used to connect to either 1,2,4-triazole, or 1,3,4-thiadiazole via a methylene bridge. Most of the functional groups designed to be accommodated on the quinazoline ring such as thioether, alkyl to increase lipid solubility of polar compounds, a character very much needed in the nonclassical DHFR inhibitors. The target compounds were verified with spectral data and elemental analysis. DHFR inhibitions, as well as antitumor activity, were applied on three cell lines (MCF-7, CACO-2, HEPG-2).

Keywords: nonclassical antifolates, DHFR Inhibitors, antitumor activity, quinazoline ring

Procedia PDF Downloads 354
744 Current Status of Mosquitoes Vector Research and Control in Iran

Authors: Seyed Hassan Moosa-kazemi, Hassan Vatandoost

Abstract:

Malaria, Dirofilaria immitis (dog heart worm), and D. repens (dirofilariasis), which are transmitted by mosquitoes, have been reported in Iran. The Iranian mosquito fauna includes seven genera, 65 species, and three subspecies. Aedes albopictus has been reported since. West Nile, Sindbis, Dengue, Japanese encephalitis viruses, and the nematode Setaria (setariasis) has been reported in the country but there are no information about their vectors in Iran. Iran is malaria elimination phase. Insecticides residual spraying (IRS), distributed of insecticides long lasting treated nets (ITNs), fogging, release of larvivours fishes and Bacillus thuringiensis, chemical larviciding, as well as case finding and manipulation and modification of breeding places carried out thought the IVM program in the country. Prolonged exposure to insecticides over several generations of the vectors, develop resistance, a capacity to survive contact with insecticides. However, use of insecticides in agriculture has often been implicated as contributing to resistance in mosquito’s vectors. Resistance of mosquitoes to some insecticides has been documented just within a few years after the insecticides were introduced. Some enzymes such as monooxygenases, esterases and glutathione S-transferases have been considered as a reason for resistance to pyrethroid insecticides. In conclusion, regarding to documented resistance and tolerance of mosquitoes vectors to some insecticides, resistance management is suggested by using new insecticide with novel mode of action.

Keywords: control, Iran, resistance, vector

Procedia PDF Downloads 273
743 Improvement a Lower Bound of Energy for Some Family of Graphs, Related to Determinant of Adjacency Matrix

Authors: Saieed Akbari, Yousef Bagheri, Amir Hossein Ghodrati, Sima Saadat Akhtar

Abstract:

Let G be a simple graph with the vertex set V (G) and with the adjacency matrix A (G). The energy E (G) of G is defined to be the sum of the absolute values of all eigenvalues of A (G). Also let n and m be number of edges and vertices of the graph respectively. A regular graph is a graph where each vertex has the same number of neighbours. Given a graph G, its line graph L(G) is a graph such that each vertex of L(G) represents an edge of G; and two vertices of L(G) are adjacent if and only if their corresponding edges share a common endpoint in G. In this paper we show that for every regular graphs and also for every line graphs such that (G) 3 we have, E(G) 2nm + n 1. Also at the other part of the paper we prove that 2 (G) E(G) for an arbitrary graph G.

Keywords: eigenvalues, energy, line graphs, matching number

Procedia PDF Downloads 196
742 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 319
741 Cloud-Based Mobile-to-Mobile Computation Offloading

Authors: Ebrahim Alrashed, Yousef Rafique

Abstract:

Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges.

Keywords: computational offloading, power conservation, cloud, sandboxing

Procedia PDF Downloads 358