Search results for: Hamza Iftikhar
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 156

Search results for: Hamza Iftikhar

126 Global Best Practice Paradox; the Failure of One Size Fits All Approach to Development a Case Study of Pakistan

Authors: Muhammad Naveed Iftikhar, Farah Khalid

Abstract:

Global best practices as ordained by international organizations comprise a broader top-down approach to development problems, without taking into account country-specific factors. The political economy of each country is extremely different and the failure of several attempts of international organizations to implement global best practice models in developing countries each with its unique set of variables, goes on to show that this is not the most efficient solution to development problems. This paper is a humble attempt at shedding light on some specific examples of failures of the global best practices. Pakistan has its unique set of problems and unless those are added to the broader equation of development, country-specific reform and growth will continue to pose a challenge to reform programs initiated by international organizations. The three case studies presented in this paper are just a few prominent examples of failure of the global best practice, top-down, universalistic approach to development as ordained by international organizations. Development and reform can only be achieved if local dynamics are given their due importance. The modus operandi of international organizations needs to be tailored according to each country’s unique politico-economic environment.

Keywords: best practice, development, context

Procedia PDF Downloads 436
125 Evaluating Antifungal Potential of Respiratory Inhibitors against Phyto-Pathogenic Fungi

Authors: Sehrish Iftikhar, Ahmad Ali Shahid, Kiran Nawaz, Waheed Anwar

Abstract:

Discovery and development of new compounds require intense studies in chemistry, biochemistry. Numerous experiments under laboratory-, greenhouse- and field conditions can be performed to select suitable candidates and to understand their full potential. Novel fungicides are fundamental to combat plant diseases. Fusarium solani is important plant pathogen. New broad spectrum foliar fungicides against complex II were designed in this study. Complex II, namely succinate dehydrogenase (SDH), or succinate quinone oxidoreductase (SQR) is a multi-subunit enzyme at the crossroads of TCA and ETC at the inner mitochondrial membrane. The need for new and innovative fungicides is driven by resistance management, regulatory hurdles and increasing customer expectations amongst others. Fungicidal activity was assessed for the effect on mycelial growth and spore germination of the fungi using fungicide amended media assay. In mycelial growth assay compounds C10 and C6 were highly active against all the isolates. The compounds C1 and C10 were found most potent in spore germination test. It fully proved that the SDHIs designed in this paper displayed as good inhibitory effects against Fusarium solani.

Keywords: Wilt, Fusarium, SDH, antifungal

Procedia PDF Downloads 226
124 An Ontology for Semantic Enrichment of RFID Systems

Authors: Haitham S. Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, Kamilia Hosny

Abstract:

Radio Frequency Identification (RFID) has become a key technology in the margining concept of Internet of Things (IoT). Naturally, business applications would require the deployment of various RFID systems that are developed by different vendors and use various data formats. This heterogeneity poses a real challenge in developing large-scale IoT systems with RFID as integration is becoming very complex and challenging. Semantic integration is a key approach to deal with this challenge. To do so, ontology for RFID systems need to be developed in order to annotated semantically RFID systems, and hence, facilitate their integration. Accordingly, in this paper, we propose ontology for RFID systems. The proposed ontology can be used to semantically enrich RFID systems, and hence, improve their usage and reasoning. The usage of the proposed ontology is explained through a simple scenario in the health care domain.

Keywords: RFID, semantic technology, ontology, sparql query language, heterogeneity

Procedia PDF Downloads 439
123 Pollutant Dispersion in Coastal Waters

Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Saïd, Hervé Bournot, Georges Le Palec

Abstract:

This paper spots light on the effect of a point source pollution on streams, stemming out from intentional release caused by unconscious facts. The consequences of such contamination on ecosystems are very serious. Accordingly, effective tools are highly demanded in this respect, which enable us to come across an accurate progress of pollutant and anticipate different measures to be applied in order to limit the degradation of the environmental surrounding. In this context, we are eager to model a pollutant dispersion of a free surface flow which is ejected by an outfall sewer of an urban sewerage network in coastal water taking into account the influence of climatic parameters on the spread of pollutant. Numerical results showed that pollutant dispersion is merely due to the presence of vortices and turbulence. Hence, it was realized that the pollutant spread in seawater is strongly correlated with climatic conditions in this region.

Keywords: coastal waters, numerical simulation, pollutant dispersion, turbulent flows

Procedia PDF Downloads 473
122 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 268
121 Experimental and Computational Fluid Dynamics Analysis of Horizontal Axis Wind Turbine

Authors: Saim Iftikhar Awan, Farhan Ali

Abstract:

Wind power has now become one of the most important resources of renewable energy. The machine which extracts kinetic energy from wind is wind turbine. This work is all about the electrical power analysis of horizontal axis wind turbine to check the efficiency of different configurations of wind turbines to get maximum output and comparison of experimental and Computational Fluid Dynamics (CFD) results. Different experiments have been performed to obtain that configuration with the help of which we can get the maximum electrical power output by changing the different parameters like the number of blades, blade shape, wind speed, etc. in first step experimentation is done, and then the similar configuration is designed in 3D CAD software. After a series of experiments, it has been found that the turbine with four blades at an angle of 75° gives maximum power output and increase in wind speed increases the power output. The models designed on CAD software are imported on ANSYS-FLUENT to predict mechanical power. This mechanical power is then converted into electrical power, and the results were approximately the same in both cases. In the end, a comparison has been done to compare the results of experiments and ANSYS-FLUENT.

Keywords: computational analysis, power efficiency, wind energy, wind turbine

Procedia PDF Downloads 123
120 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 510
119 Modernist Trends in Ilahiyat Faculties (Islamic Studies Faculties) Turkey, Post-Coup 1980

Authors: Muhammad Hamza Tariq

Abstract:

The regrouping of the Islamists and the politics of religious education was the most common debate in the last decades of Turkish history. Religious schools were criticized to be influenced by partisan politics. Within this turmoil, the faculty of Ilahiyat which was established by the Republic to cherish Islamic modernism and to raise modern clergy also underwent a considerable change. This research studies the revisions in the curriculum of the faculty over the last few decades. A series of interviews were also conducted to observe the prevalent trends, especially modernist among the professors at the Ilahiyat faculties. Lastly, a survey was done among the freshman and final year students based on the similar questions to observe the changes of opinions with regards to their views on Islam, modernity, political Islam, interpretation, etc. A shift in the curriculum was noted though it cannot be overgeneralized whereas a degree of prevalence of modernist thoughts was also recorded among the teachers and the students.

Keywords: ilahiyat, divinity, religion, Islamization

Procedia PDF Downloads 324
118 Interfacial Investigation and Chemical Bonding in Graphene Reinforced Alumina Ceramic Nanocomposites

Authors: Iftikhar Ahmad, Mohammad Islam

Abstract:

Thermally exfoliated graphene nanomaterial was reinforced into Al2O3 ceramic and the nanocomposites were consolidated using rapid high-frequency induction heat sintering route. The resulting nanocomposites demonstrated higher mechanical properties due to efficient GNS incorporation and chemical interaction with the Al2O3 matrix grains. The enhancement in mechanical properties is attributed to (i) uniformly-dispersed GNS in the consolidated structure (ii) ability of GNS to decorate Al2O3 nanoparticles and (iii) strong GNS/Al2O3 chemical interaction during colloidal mixing and pullout/crack bridging toughening mechanisms during mechanical testing. The GNS/Al2O3 interaction during different processing stages was thoroughly examined by thermal and structural investigation of the interfacial area. The formation of an intermediate aluminum oxycarbide phase (Al2OC) via a confined carbothermal reduction reaction at the GNS/Al2O3 interface was observed using advanced electron microscopes. The GNS surface roughness improves GNS/Al2O3 mechanical locking and chemical compatibility. The sturdy interface phase facilitates efficient load transfer and delayed failure through impediment of crack propagation. The resulting nanocomposites, therefore, offer superior toughness.

Keywords: ceramics, nanocomposites, interfaces, nanostructures, electron microscopy, Al2O3

Procedia PDF Downloads 328
117 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 591
116 Role of Social Capital on Consumer Attitudes, Peer Influence and Behavioral Intentions: A Social Media Perspective

Authors: Qazi Mohammed Ahmed, Osman Sadiq Paracha, Iftikhar Hussain

Abstract:

The study aims to explore the unaddressed relationship between social capital and consumers’ underlying behavioral intentions. The study postulates that this association is mediated by the role of attitudes and peer influence. The research attains evidence from a usable sample of 673 responses. The majority consists of the young and energetic social media users of Pakistan that utilize virtual communities as a way of life. A variance based structural equation modeling has been applied through SmartPLS 3. The results reveal that social capital exerts a statistically supportive association with both attitudes and peer influence. Contrastingly, this predictor variable shows an insignificant linkage with behavioral intentions but this relationship is fully mediated by consumer attitudes and peer influence. The paper enhances marketing literature with respect to an unexplored society of Pakistan. It also provides a lens for the contemporary advertisers, in terms of supporting their social media campaigns with affiliative and cohesive elements. The study also identifies a series of predictor variables that could further be tested with attitudes, subjective norms and behavioral responses.

Keywords: social capital, consumer attitudes, peer influence, behavioral intentions

Procedia PDF Downloads 99
115 Political Discourse Used in the TV Talk Shows of Pakistani Media

Authors: Hafiz Sajjad Hussain, Asad Razzaq

Abstract:

The study aims to explore the relationship between application of speech and discourse used by the political workers and their leaders for maintaining authoritative approach and dialog power. The representation of these relationships between ideology and language in the analysis of discourse and spoken text following Van Dijk Socio-Cognitive model. Media and political leaders are two pillars of a state and their role is so important for development and effects on the society. Media has become an industry in the recent years in the globe, and especially, the private sector developed a lot in the last decade in Pakistan. Media is the easiest way of communication with the large community in a short time and used discourse independently. The prime time of the news channels in Pakistan presents the political programs on most favorite story or incident of the day. The current program broadcasted by a private channel ARY News July 6, 2014 covered the most top story of the day. The son of Ex. CJ Arslan Iftikhar moves an application to Election Commission of Pakistan about the daughter of the most popular political leader and chairman PTI Imran Khan. This movement turns the whole scenario of the political parties and media got a hot issue form discussion. This study also shows that the ideology and meanings which are presented by the TV channels not always obvious for readers.

Keywords: electronic media, political discourse, ideology of media, power, authoritative approach

Procedia PDF Downloads 493
114 Predicting Mobile Payment System Adoption in Nigeria: An Empirical Analysis

Authors: Aminu Hamza

Abstract:

This study examines the factors that play vital role in the adoption of mobile payment system among consumers in Nigeria. Technology Acceptance Model (TAM) was used with two additional variables to form the conceptual model. The study was conducted in three Universities in Kano state, Nigeria. Convenience sampling method was used with a total valid 202 respondents which involved the students of Bayero University Kano (BUK), Northwest University, and Kano University of Science and Technology (KUST) Wudil, Kano, Nigeria. Results of the regression analysis revealed that Perceived ease of use (PEOU) and Perceived usefulness (PU) have significant and positive correlation with the behavioral intention to adopt mobile payment system. The findings of this study would be useful to the policy makers Central Bank of Nigeria (CBN), mobile network operators and providers of the services.

Keywords: mobile payment system, Nigeria, technology adoption, technology acceptance model

Procedia PDF Downloads 277
113 Online Prediction of Nonlinear Signal Processing Problems Based Kernel Adaptive Filtering

Authors: Hamza Nejib, Okba Taouali

Abstract:

This paper presents two of the most knowing kernel adaptive filtering (KAF) approaches, the kernel least mean squares and the kernel recursive least squares, in order to predict a new output of nonlinear signal processing. Both of these methods implement a nonlinear transfer function using kernel methods in a particular space named reproducing kernel Hilbert space (RKHS) where the model is a linear combination of kernel functions applied to transform the observed data from the input space to a high dimensional feature space of vectors, this idea known as the kernel trick. Then KAF is the developing filters in RKHS. We use two nonlinear signal processing problems, Mackey Glass chaotic time series prediction and nonlinear channel equalization to figure the performance of the approaches presented and finally to result which of them is the adapted one.

Keywords: online prediction, KAF, signal processing, RKHS, Kernel methods, KRLS, KLMS

Procedia PDF Downloads 367
112 Encryption and Decryption of Nucleic Acid Using Deoxyribonucleic Acid Algorithm

Authors: Iftikhar A. Tayubi, Aabdulrahman Alsubhi, Abdullah Althrwi

Abstract:

The deoxyribonucleic acid text provides a single source of high-quality Cryptography about Deoxyribonucleic acid sequence for structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to encrypt and decrypt Deoxy Ribonucleic Acid sequence text. It includes complex, securing by using Algorithm to encrypt and decrypt Deoxy Ribonucleic Acid sequence. The utility of this Deoxy Ribonucleic Acid Sequence Text is that, it can provide a user-friendly interface for users to Encrypt and Decrypt store the information about Deoxy Ribonucleic Acid sequence. These interfaces created in this project will satisfy the demands of the scientific community by providing fully encrypt of Deoxy Ribonucleic Acid sequence during this website. We have adopted a methodology by using C# and Active Server Page.NET for programming which is smart and secure. Deoxy Ribonucleic Acid sequence text is a wonderful piece of equipment for encrypting large quantities of data, efficiently. The users can thus navigate from one encoding and store orange text, depending on the field for user’s interest. Algorithm classification allows a user to Protect the deoxy ribonucleic acid sequence from change, whether an alteration or error occurred during the Deoxy Ribonucleic Acid sequence data transfer. It will check the integrity of the Deoxy Ribonucleic Acid sequence data during the access.

Keywords: algorithm, ASP.NET, DNA, encrypt, decrypt

Procedia PDF Downloads 202
111 The Effect of Dopamine D2 Receptor TAQ A1 Allele on Sprinter and Endurance Athlete

Authors: Öznur Özge Özcan, Canan Sercan, Hamza Kulaksız, Mesut Karahan, Korkut Ulucan

Abstract:

Genetic structure is very important to understand the brain dopamine system which is related to athletic performance. Hopefully, there will be enough studies about athletics performance in the terms of addiction-related genetic markers in the future. In the present study, we intended to investigate the Receptor-2 Gene (DRD2) rs1800497, which is related to brain dopaminergic system. 10 sprinter and 10 endurance athletes were enrolled in the study. Real-Time Polymerase Chain Reaction method was used for genotyping. According to results, A1A1, A1A2 and A2A2 genotypes in athletes were 0 (%0), 3 (%15) and 17 (%85). A1A1 genotype was not found and A2 allele was counted as the dominating allele in our cohort. These findings show that dopaminergic mechanism effects on sport genetic may be explained by the polygenic and multifactorial view.

Keywords: addiction, athletic performance, genotype, sport genetics

Procedia PDF Downloads 185
110 Government (Big) Data Ecosystem: Definition, Classification of Actors, and Their Roles

Authors: Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis

Abstract:

Organizations, including governments, generate (big) data that are high in volume, velocity, veracity, and come from a variety of sources. Public Administrations are using (big) data, implementing base registries, and enforcing data sharing within the entire government to deliver (big) data related integrated services, provision of insights to users, and for good governance. Government (Big) data ecosystem actors represent distinct entities that provide data, consume data, manipulate data to offer paid services, and extend data services like data storage, hosting services to other actors. In this research work, we perform a systematic literature review. The key objectives of this paper are to propose a robust definition of government (big) data ecosystem and a classification of government (big) data ecosystem actors and their roles. We showcase a graphical view of actors, roles, and their relationship in the government (big) data ecosystem. We also discuss our research findings. We did not find too much published research articles about the government (big) data ecosystem, including its definition and classification of actors and their roles. Therefore, we lent ideas for the government (big) data ecosystem from numerous areas that include scientific research data, humanitarian data, open government data, industry data, in the literature.

Keywords: big data, big data ecosystem, classification of big data actors, big data actors roles, definition of government (big) data ecosystem, data-driven government, eGovernment, gaps in data ecosystems, government (big) data, public administration, systematic literature review

Procedia PDF Downloads 128
109 Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks

Authors: Eman I. Raslan, Haitham S. Hamza, Reda A. El-Khoribi

Abstract:

Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques.

Keywords: fiber-wireless (FiWi), dynamic bandwidth allocation (DBA), passive optical networks (PON), media access control (MAC)

Procedia PDF Downloads 491
108 Exoskeleton for Hemiplegic Patients: Mechatronic Approach to Move One Disabled Lower Limb

Authors: Alaoui Hamza, Moutacalli Mohamed Tarik, Chebak Ahmed

Abstract:

The number of people suffering from hemiplegia is growing each year. This lower limb disability affects all the aspects of their lives by taking away their autonomy. This implicates their close relatives, as well as the health system to provide the necessary care they need. The integration of exoskeletons in the medical field became a promising solution to resolve this issue. This paper presents an exoskeleton designed to help hemiplegic people get back the sensation and ability of normal walking. For this purpose, three step models have been created. The first step allows a simple forward movement of the leg. The second method is designed to overcome some obstacles in the patient path, and finally the third step model gives the patient total control over the device. Each of the control methods was designed to offer a solution to the challenges that the patients may face during the walking process.

Keywords: ability of normal walking, exoskeleton, hemiplegic patients, lower limb motion- mechatronics

Procedia PDF Downloads 123
107 Government Big Data Ecosystem: A Systematic Literature Review

Authors: Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis

Abstract:

Data that is high in volume, velocity, veracity and comes from a variety of sources is usually generated in all sectors including the government sector. Globally public administrations are pursuing (big) data as new technology and trying to adopt a data-centric architecture for hosting and sharing data. Properly executed, big data and data analytics in the government (big) data ecosystem can be led to data-driven government and have a direct impact on the way policymakers work and citizens interact with governments. In this research paper, we conduct a systematic literature review. The main aims of this paper are to highlight essential aspects of the government (big) data ecosystem and to explore the most critical socio-technical factors that contribute to the successful implementation of government (big) data ecosystem. The essential aspects of government (big) data ecosystem include definition, data types, data lifecycle models, and actors and their roles. We also discuss the potential impact of (big) data in public administration and gaps in the government data ecosystems literature. As this is a new topic, we did not find specific articles on government (big) data ecosystem and therefore focused our research on various relevant areas like humanitarian data, open government data, scientific research data, industry data, etc.

Keywords: applications of big data, big data, big data types. big data ecosystem, critical success factors, data-driven government, egovernment, gaps in data ecosystems, government (big) data, literature review, public administration, systematic review

Procedia PDF Downloads 180
106 Comparative Demography of Lady Beetle, Coccinella septempunctata Linnaeus (Coleoptera: Coccinellidae) with Respect to Different Aphid Species

Authors: Muhammad Farooq, Muhammad R. Shahid, M. Shakeel, A. Iftikhar, M. Sagheer, Riaz A. Kainth

Abstract:

Comparative demography of Coccinella septempunctata Linnaeus (Coleoptera: Coccinellidae) was studied with respect to four host aphid species viz; Rhopalosiphum padi, Rhopalosiphum maidis, Sitobion avenae, and Shizaphis graminum under laboratory conditions using Two-sex Age-stage life table instead of traditional age specific life table which considers only female. Results revealed that developmental period from egg to adult of C. septempunctata were shorter on R. padi (16.49 days) whereas longer on R. maidis (22.83 days). Net reproductive rate varied from 110.01 offspring on R. maidis to 288.78 offspring on R. padi. Mean generation time (T) ranged from 29.02 d on R. padi to 39.788 d on R. maidis. Highest to lowest values of intrinsic rate of increase (rm) were recorded on R. padi, S. graminum, S. avenae, and R. maidis (0.194, 0.143, 0.140 and 0.117 d⁻¹, respectively). Highest finite rate of increase was observed on R. padi (1.214 d⁻¹) followed by S. graminum (1.154 d⁻¹) whereas lowest values were obtained on R. maidis and S. avenae (1.124 and 1.150 d⁻¹, respectively). In this study, the data on the life table of both predator and prey provide useful information in the mass rearing and practical application of a natural agent to biological control systems.

Keywords: C. septempunctata, two-sex age-stage life table, population parameters, aphid species

Procedia PDF Downloads 168
105 Selecting Skyline Mash-Ups under Uncertainty

Authors: Aymen Gammoudi, Hamza Labbaci, Nizar Messai, Yacine Sam

Abstract:

Web Service Composition (Mash-up) has been considered as a new approach used to offer the user a set of Web Services responding to his request. These approaches can return a set of similar Mash-ups in a given context that makes users unable to select the perfect one. Recent approaches focus on computing the skyline over a set of Quality of Service (QoS) attributes. However, these approaches are not sufficient in a dynamic web service environment where the delivered QoS by a Web service is inherently uncertain. In this paper, we treat the problem of computing the skyline over a set of similar Mash-ups under certain dimension values. We generate dimensions for each Mash-up using aggregation operations applied to the QoS attributes. We then tackle the problem of computing the skyline under uncertain dimensions. We present each dimension value of mash-up using a frame of discernment and introduce the d-dominance using the Evidence Theory. Finally, we propose our experimental results that show both the effectiveness of the introduced skyline extensions and the efficiency of the proposed approaches.

Keywords: web services, uncertain QoS, mash-ups, uncertain dimensions, skyline, evidence theory, d-dominance

Procedia PDF Downloads 196
104 Enhancement of Growth Regulators to Callus Formation and Silymarin Content from Different Explants of Silybum marianum Seedling

Authors: M. A. Hamza, H. A. Bosila, M. A. Zewil, I. M. Harridy

Abstract:

Silymarin is one active component extracted from milk thistle Silybum marianum; it is flavonoid recognized for its ability to benefit people with liver disorders and as a protective compound against liver damaging agents. For this reason, this research aims to study the effect of growth regulators (BA+NAA) and explant type (cotyledon, hypocotyl, and root) to increase the growth and active ingredients (silymarin) in callus of S. mariaum plant. The results showed that cotyledon explant which have been cultured in MS medium supplemented with BA 0.4 mg/l. +NAA 0.25 mg/l. Led to obtain the best results in callus fresh weight (1.847a) and callus dry weight (0.155a). On the other hand, the same explant (cotyledon) cultured in MS medium supplemented with BA 1.6 mg/l. + NAA 0.5 mg/l. The suitable condition to silymarin content (0.132 mg/100 mg dry weight). And also, it turned out, lack of importance of the use of hypocotyl and root in the production of callus and silymarin compared to cotyledon.

Keywords: silybum, callus, tissue culture, cotyledon

Procedia PDF Downloads 168
103 Influence of Elicitors on Callus Growth and Active Ingredient in Echinacea purpurea

Authors: Mohamed Abdelfattah Meawad Hamza, H. A. Bosila, M. A. Zewil

Abstract:

This research aims to study the effect of different sources of elicitors for increase growth and active ingredients in callus of Echinacea purpurea plant. Callus that have been obtained from leaf explant, was used to conduct the following studies. A study of the impact of both the phenylalanine and tyrosine (50, 100,150 and 200 mg/l.) individually and casein hydrolysate (100, 200 and 300 mg/l.) supplemented to MS medium. Results show that Casein hydrolysate 100 mg/l. has achieved the better results in both callus fresh weight 1.881 g/explant after 8 weeks of the incubation period and callus growth rate 0.398 g/explant after 6 weeks of the incubation period, while gave add 200 mg/l. The best results in total carbohydrate 2.444 mg/ 100 mg dry weight. Phenylalanine 150 mg/l. has achieved the best results in callus dry weight 0.156 g/explant after 8 weeks of incubation period. Tyrosine 200 mg/l. recorded the best result for positive production of caffeic acid 0.460 mg/ 100 mg dry weight after 4 weeks incubation period.

Keywords: tissue culture, echinacea, tyrosine, casein

Procedia PDF Downloads 239
102 MIMO UWB Antenna for Exploring Body Centric Communication

Authors: Osama Aziz, Hamza Ahmad, Muhibur Rahman

Abstract:

The performance of wireless communication systems has been suggested to be improved by UWB MIMO antenna systems. However, creating a successful UWB MIMO antenna is a difficult undertaking that calls for resolving a number of design issues, including radiation efficiency, size, and frequency range. This study's primary objective is to create a novel, highly effective, small-sized, ultra-wideband (UWB) multiple-input multiple-output (MIMO) antenna and investigate its potential applications in body-centric communication. Two radiating elements, shared ground plane, circular stubs, and t-shaped isolation elements are used to achieve the MIMO antenna. Outstanding multiplexing efficiency, significant peak gain across the entire UWB frequency spectrum, extremely low mutual coupling (S21=-16 dB), high diversity gain (DG>9), and low envelop correlation are achieved. The proposed antenna will be one of the promising candidates for body centric communication.

Keywords: UWB communication, UWB MIMO antennas, body-centric communication, diversity gain

Procedia PDF Downloads 34
101 Cytotoxic Activity Of Major Iridoids From Barleria Trispinosa (Forssk.) Vahl. Growing In Saudi Arabia

Authors: Hamza Assiry, Gamal A. Mohamed, Sabrin R. M. Ibrahim, Hossam M. Abdallah

Abstract:

Chemical investigation of the aerial parts of Barleria trispinosa(Forssk.) Vahl. resulted in isolation of four major iridoids that were identified as 6,8-O,O-diacetylshanhiside methyl ester (acetyl barlerin) (1), 8-O-acetylshanzhiside methyl ester (barlerin) (2), shanzhiside methyl ester (3), and 6- ⍺ -L-rhamnopyranosyl-8-O-acetylshanzihiside methyl ester (4). The isolated compounds were confirmed by detailed one and two-dimensional NMR. Isolated compounds were tested for their cytotoxic activity on breast cancer (MCF-7, MDA-MB-231) and colon cancer (LS174T) cell linesusing sulphorhodamine B (SRB) assay. It is noteworthy that compound 1 demonstrated a significant cytotoxic potential towards MDA-MB-231 cell line with IC5016.7 ± 2.7µg / mL compared to doxorubicin whereas compounds 2, showed moderate cytotoxic potential with IC5021.2 ± 1.9µg / mL on MCF-7. The other compounds showed moderate activity on the tested cell lines.

Keywords: acanthaceae, cytotoxicity, metabolites, barleria trispinosa

Procedia PDF Downloads 117
100 A Hybrid Watermarking Model Based on Frequency of Occurrence

Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis

Abstract:

Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: authentication, copyright protection, information hiding, ownership, watermarking

Procedia PDF Downloads 541
99 Thermal Regeneration of CO2 Spent Palm Shell-Polyetheretherketone Activated Carbon Sorbents

Authors: Usman D. Hamza, Noor S. Nasri, Mohammed Jibril, Husna M. Zain

Abstract:

Activated carbons (M4P0, M4P2, and M5P2) used in this research were produced from palm shell and polyetherether ketone (PEEK) via carbonization, impregnation, and microwave activation. The adsorption/desorption process was carried out using static volumetric adsorption. Regeneration is important in the overall economy of the process and waste minimization. This work focuses on the thermal regeneration of the CO2 exhausted microwave activated carbons. The regeneration strategy adopted was thermal with nitrogen purge desorption with N2 feed flow rate of 20 ml/min for 1 h at atmospheric pressure followed by drying at 1500C. Seven successive adsorption/regeneration processes were carried out on the material. It was found that after seven adsorption regeneration cycles; the regeneration efficiency (RE) for CO2 activated carbon from palm shell only (M4P0) was more than 90% while that of hybrid palm shell-PEEK (M4P2, M5P2) was above 95%. The cyclic adsorption and regeneration shows the stability of the adsorbent materials.

Keywords: activated carbon, palm shell-PEEK, regeneration, thermal

Procedia PDF Downloads 460
98 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 346
97 A Dam Break Analysis Using MIKE11

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchahed

Abstract:

The consequences of a dam breach can be devastating; both in terms of lives lost and damaged infrastructure and property. Hydraulic modeling provides a clear picture of the possible consequences of partial or complete failure of a dam, which is the key to carry out emergency planning and conduct reliable risk assessments. In this paper, the MIKE11 model developed by the Danish Hydrologic Institute (DHI) was used to simulate the flood wave propagation associated with a potential failure analysis failure of Zardezas dam located in the city of Skikda in the North East of Algeria. MIKE11 results including inundation maps and the representative channel/valley cross-sections depicting flow depth and maximal flow velocities showed that Zardezas reservoir presents a significant risk to downstream areas in the event of a dam failure. These results can be used as the basis of the development of an Emergency Action Plan (EAP).The main objective of this plan is to predict the appropriate steps to avoid or at least decrease the consequences of unexpected failure of Zardezas dam.

Keywords: MIKE11, dam break, inundation maps, emergency action plan

Procedia PDF Downloads 416