Search results for: Heba Gamal Abd Elhaleem Elsayed
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 191

Search results for: Heba Gamal Abd Elhaleem Elsayed

191 Green Synthesis Approach for Renewable Textile Coating and Their Mechanical and Thermal Properties

Authors: Heba Gamal Abd Elhaleem Elsayed, Nour F Attia

Abstract:

The extensive use of textile and textile based materials in various applications including industrial applications are increasing regularly due to their interesting properties which require rapid development in their functions to be adapted to these applications [1-3]. Herein, green, new and renewable smart coating was developed for furniture textile fabrics. Facile and single step method was used for synthesis of green coating based on mandarin peel and chitosan. As, the mandarin peel as fruit waste material was dried, grinded and directly dispersed in chitosan solution producing new green coating composite and then coated on textile fabrics. The mass loadings of green mandarin peel powder was varied on 20-70 wt% and optimized. Thermal stability of coated textile fabrics was enhanced and char yield was improved compared to uncoated one. The charring effect of mandarin peel powder coated samples was significantly enhanced anticipating good flame retardancy effect. The tensile strength of the coated textile fabrics was improved achieved 35% improvement compared to uncoated sample. The interaction between the renewable coating and textile was evaluated. The morphology of uncoated and coated textile fabrics was studied using microscopic technique. Additionally, based on thermal properties of mandarin peel powder it could be promising flame retardant for textile fabrics. This study open new avenues for finishing textile fabrics with enhanced thermal, flame retardancy and mechanical properties with cost-effective and renewable green and effective coating

Keywords: flame retardant , Thermal Properties, Textile Coating , Renewable Textile

Procedia PDF Downloads 110
190 CAG Repeat Polymorphism of Androgen Receptor and Female Sexual Functions in Egyptian Female Population

Authors: Azza Gaber Farag, Yasser Atta Shehata, Sara Elsayed Elghazouly, Mustafa Elsayed Elshaib, Nesreen Gamal Elden Elhelbawy

Abstract:

Background: Androgen receptor (AR) polymorphism in cytosine adenineguanine (CAG) repeat has an effect on the functional capacity of AR in males. However, little researches in this field are available regarding female sexual function. Aim: To investigate the possible link between polymorphism in the CAG repeat of AR gene and female sexual function in a sample of the Egyptian population. Materials and methods: 500 Egyptian married females completed a questionnaire regarding sociodemographic, reproductive, and sexual data. AR CAG repeat length was analyzed for those having female sexual dysfunctions (FSD) using real-time PCR. Results: The most sensitive domain to AR CAG repeat length was the orgasm domain that showed significant positive correlations with short allele (p=0.001), long allele (p=.015), biallellic mean (p=.000), and X weighted biallelic mean (p=.000). The satisfaction domain had significant positive correlations with the biallelic mean (p=.035), and the X weighted biallelic mean (p=. 032). However, the pain domain was of significant negative correlations with AR polymorphism of short allele (p=.002), biallelic mean (p=.013), and X weighted biallelic mean (p = . 011). Conclusions: AR polymorphism could represent a non-negligible aspect in female sexual function. The lower AR CAG repeat polymorphism was of significant impact on FSD, affecting mainly female orgasm followed by pain disorders that finally reflected On her sexual satisfaction.

Keywords: female sexual dysfunction, androgen receptor, CAG repeat polymorphism, androgen

Procedia PDF Downloads 142
189 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 216
188 Fructooligosaccharide Prebiotics: Optimization of Different Cultivation Parameters on Their Microbial Production

Authors: Elsayed Ahmed Elsayed, Azza Noor El-Deen, Mohamed A. Farid, Mohamed A. Wadaan

Abstract:

Recently, a great attention has been paid to the use of dietary carbohydrates as prebiotic functional foods. Among the new commercially available products, fructooligosaccharides (FOS), which are microbial produced from sucrose, have attracted special interest due to their valuable properties and, thus, have a great economic potential for the sugar industrial branch. They are non-cariogenic sweeteners of low caloric value, as they are not hydrolyzed by the gastro-intestinal enzymes, promoting selectively the growth of the bifidobacteria in the colon, helping to eliminate the harmful microbial species to human and animal health and preventing colon cancer. FOS has been also found to reduce cholesterol, phospholipids and triglyceride levels in blood. FOS has been mainly produced by microbial fructosyltransferase (FTase) enzymes. The present work outlines bioprocess optimization for different cultivation parameters affecting the production of FTase by Penicillium aurantiogriseum AUMC 5605. The optimization involves both traditional as well as fractional factorial design approaches. Additionally, the production process will be compared under batch and fed-batch conditions. Finally, the optimized process conditions will be applied to 5-L stirred tank bioreactor cultivations.

Keywords: prebiotics, fructooligosaccharides, optimization, cultivation

Procedia PDF Downloads 357
187 A Novel Multi-Objective Park and Ride Control Scheme Using Renewable Energy Sources: Cairo Case Study

Authors: Mohammed Elsayed Lotfy Elsayed Abouzeid, Tomonobu Senjyu

Abstract:

A novel multi-objective park and ride control approach is presented in this research. Park and ride will encourage the owners of the vehicles to leave their cars in the nearest points (on the edges of the crowded cities) and use public transportation facilities (train, bus, metro, or mon-rail) to reach their work inside the crowded city. The proposed control scheme is used to design electric vehicle charging stations (EVCS) to charge 1000 electric vehicles (EV) during their owners' work time. Cairo, Egypt is used as a case study. Photovoltaic (PV) and battery energy storage system (BESS) are used to meet the EVCS demand. Two multi-objective optimization techniques (MOGA and epsilon-MOGA) are utilized to get the optimal sizes of PV and BESS so as to meet the load demand and minimize the total life cycle cost. Detailed analysis and comparison are held to investigate the performance of the proposed control scheme using MATLAB.

Keywords: Battery Energy Storage System, Electric Vehicle, Park and Ride, Photovoltaic, Multi-objective

Procedia PDF Downloads 101
186 Antioxidants Reveal Protection against the Biochemical Changes in Liver, Kidney, and Blood Profiles after Clindamycin/Ibuprofen Administration in Dental Patients

Authors: Gouda K. Helal, Marwa I. Shabayek, Heba A. El-Ramly, Heba A. Awida

Abstract:

The adverse effects of Clindamycin (Clind.) / Ibuprofen (Ibu.) combination on liver, kidney, blood elements and the significances of antioxidants (N-acetylcysteine and Zinc) against these effects were evaluated. The study includes: Group I; control n=30, Group II; patients on Clind.300mg/Ibu.400mg twice daily for a week n=30, Group III; patients on Clind.300mg/Ibu.400mg+N-acetylcysteine 200mg twice daily for a week n=15 and Group IV; patients on Clind.300mg/Ibu.400mg+Zinc50mg twice daily for a week n=15. Serum malondialdehyde (MDA), alanine transferase (ALT), aspartate transferase (AST), γ glutamyl transferase (GGT), creatinine, blood urea nitrogen (BUN) were measured. Applying one way ANOVA followed by Tuckey Kramer post test, Group II showed significant increase in ALT, AST, GGT, BUN and decrease in Hb, RBCs, platelets than Group I. Group III showed significant decrease in ALT, AST, GGT, BUN than Group II. Moreover, Group IV showed significant decrease in ALT, AST, GGT and increase in Hb, RBCs, and platelets than Group II. Conclusively, Adding Zinc or N-acetylcysteine buffer the oxidative stress and improve the therapeutic outcome of Clindamycin/Ibuprofen combination.

Keywords: clindamycin, ibuprofen, adverse effects, antioxidant, zinc, N-acetylcysteine

Procedia PDF Downloads 332
185 History on the Screen: Nasser and the Biographical Film in Egyptian Cinema

Authors: Omar Khalifah

Abstract:

The emergence of Muhammad Fadel’s 1996 film ‘Nasser 56’ ushered in a new era in Egyptian cinema. Not only was it the first biographical film of late Egyptian president Gamal ‘Abdel Nasser (1918-1970); it also broke a long-accepted taboo against cinematic depiction of modern political leaders. Passionately received by Egyptians and Arabs throughout the world, the success of ‘Nasser 56’ empowered other filmmakers to follow Fadel’s suit. Interestingly, the three biographical films that followed had, completely or partially, a Nasser dimension. In addition to another biographical film of Nasser, Anwar al-Qawadri’s ‘Gamal ‘Abdel Nasser’ (1999); Muhammad Khan’s ‘Ayyam al-Sadat (Days of Sadat)’ (2001), and Sherif Arafa’s ‘Halim (Halim)’ (2006) portray, as the titles clearly suggest, two significant figures whose lives thoroughly intersected with Nasser’s - Nasser’s successor Anwar al-Sadat and the legendary singer Abdel Halim Hafiz. Expectedly, therefore, Nasser himself is abundantly referenced in those films, albeit differently. This paper seeks to examine the ways in which Egyptian filmmakers impersonate Nasser on the screen. Starting with scholarly definitions of the biopic, the paper will first ponder the reasons that have made the biopic an unattractive genre to Egyptian filmmakers. It will then argue that the popularity of Nasser and his wide appeal to the public has transformed the status of the biopic genre in Egyptian cinema. However, the impersonation of Nasser in the four films above proved a daunting mission to filmmakers. As this paper will show, unless he is the main character, the reenactment of Nasser in films will constantly pose dilemmas to filmmakers, a few of which will be discussed in this paper.

Keywords: Ahmad Zaki, bio-pictures, Egyptian cinema, Nasser, Nasser 56

Procedia PDF Downloads 382
184 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 503
183 Computational Pipeline for Lynch Syndrome Detection: Integrating Alignment, Variant Calling, and Annotations

Authors: Rofida Gamal, Mostafa Mohammed, Mariam Adel, Marwa Gamal, Marwa kamal, Ayat Saber, Maha Mamdouh, Amira Emad, Mai Ramadan

Abstract:

Lynch Syndrome is an inherited genetic condition associated with an increased risk of colorectal and other cancers. Detecting Lynch Syndrome in individuals is crucial for early intervention and preventive measures. This study proposes a computational pipeline for Lynch Syndrome detection by integrating alignment, variant calling, and annotation. The pipeline leverages popular tools such as FastQC, Trimmomatic, BWA, bcftools, and ANNOVAR to process the input FASTQ file, perform quality trimming, align reads to the reference genome, call variants, and annotate them. It is believed that the computational pipeline was applied to a dataset of Lynch Syndrome cases, and its performance was evaluated. It is believed that the quality check step ensured the integrity of the sequencing data, while the trimming process is thought to have removed low-quality bases and adaptors. In the alignment step, it is believed that the reads were accurately mapped to the reference genome, and the subsequent variant calling step is believed to have identified potential genetic variants. The annotation step is believed to have provided functional insights into the detected variants, including their effects on known Lynch Syndrome-associated genes. The results obtained from the pipeline revealed Lynch Syndrome-related positions in the genome, providing valuable information for further investigation and clinical decision-making. The pipeline's effectiveness was demonstrated through its ability to streamline the analysis workflow and identify potential genetic markers associated with Lynch Syndrome. It is believed that the computational pipeline presents a comprehensive and efficient approach to Lynch Syndrome detection, contributing to early diagnosis and intervention. The modularity and flexibility of the pipeline are believed to enable customization and adaptation to various datasets and research settings. Further optimization and validation are believed to be necessary to enhance performance and applicability across diverse populations.

Keywords: Lynch Syndrome, computational pipeline, alignment, variant calling, annotation, genetic markers

Procedia PDF Downloads 36
182 Performance Analysis of SAC-OCDMA System using Different Detectors

Authors: Somaya A. Abd El Mottaleb, Ahmed Abd El Aziz, Heba A. Fayed, Moustafa H. Aly

Abstract:

In this paper, we present the performance of spectral amplitude coding optical code division multiple access using different detectors at different transmission distances using single photodiode detection technique. Modified double weight codes are used as signature codes. Simulation results show that the system using avalanche photo detector can move distance longer than that using positive intrinsic negative photo detector.

Keywords: avalanche photodiode, modified double weight, multiple access technique, single photodiode.

Procedia PDF Downloads 570
181 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 442
180 Decision Support System for Solving Multi-Objective Routing Problem

Authors: Ismail El Gayar, Ossama Ismail, Yousri El Gamal

Abstract:

This paper presented a technique to solve one of the transportation problems that faces us in real life which is the Bus Scheduling Problem. Most of the countries using buses in schools, companies and traveling offices as an example to transfer multiple passengers from many places to specific place and vice versa. This transferring process can cost time and money, so we build a decision support system that can solve this problem. In this paper, a genetic algorithm with the shortest path technique is used to generate a competitive solution to other well-known techniques. It also presents a comparison between our solution and other solutions for this problem.

Keywords: bus scheduling problem, decision support system, genetic algorithm, shortest path

Procedia PDF Downloads 368
179 The Impact of Varying the Detector and Modulation Types on Inter Satellite Link (ISL) Realizing the Allowable High Data Rate

Authors: Asmaa Zaki M., Ahmed Abd El Aziz, Heba A. Fayed, Moustafa H. Aly

Abstract:

ISLs are the most popular choice for deep space communications because these links are attractive alternatives to present day microwave links. This paper explored the allowable high data rate in this link over different orbits, which is affected by variation in modulation scheme and detector type. Moreover, the objective of this paper is to optimize and analyze the performance of ISL in terms of Q-factor and Minimum Bit Error Rate (Min-BER) based on different detectors comprising some parameters.

Keywords: free space optics (FSO), field of view (FOV), inter satellite link (ISL), optical wireless communication (OWC)

Procedia PDF Downloads 363
178 Reclaiming The Sahara as a Bridge to Afro-Arab solidarity

Authors: Radwa Saad

Abstract:

The Sahara is normatively treated as a barrier separating “two Africas"; one to the North with closer affinity to the Arab world, and one to the South that encompasses a diverse range of racial, ethnic and religious groups, commonly referred to as "Sub-Saharan Africa". This dichotomy however was challenged by many anticolonial leaders and intellectuals seeking to advance counter-hegemonic narratives that treat the Sahara as a bridge facilitating a long history of exchange, collaboration, and fusion between different civilizations on the continent. This paper reexamines the discourses governing the geographic distinction between North Africa and Sub-Saharan Africa. It argues that demarcating the African continent along the lines of the Sahara is part-and-parcel of a Euro-centric spatial imaginary that has served to enshrine a racialized global hierarchy of power. By drawing on Edward Said’s concept of ‘imagined geography’ and Charles Mill’s notion of “the racial contract”, it demonstrates how spatial boundaries often coincide with racial epistemologies to reinforce certain geopolitical imaginaries, whilst silencing others. It further draws on the works of two notable post-colonial figures - Gamal Abdel Nasser and Leopold Senghor - to explore alternative spatial imaginaries while highlighting some of the tensions embedded in advancing a trans-Saharan political project. Firstly, it deconstructs some of the normative claims used to justify the distinction between North and “sub-Saharan” Africa across political, literary and disciplinary boundaries. Secondly, it draws parallels between Said’s and Mills’ work to demonstrate how geographical boundaries and demarcations have been constructed to create racialized subjects and reinforce a hierarchy of color that favors European standpoints and epistemologies. Third, it draw on Leopard Senghor’s The Foundations of Africanité and Gamal Abdel Nasser’s The Philosophy of the Egyptian Revolution to examine some of the competing strands of unity that emerged out of the Saharan discourse. In these texts, one can identify a number of convergences and divergences in how post-colonial African elites attempts to reclaim and rearticulate the function of the Sahara along different epistemic, political and cultural premises. It concludes with reflections on some of the policy challenges that emerge from reinforcing the Saharan divide, particularly in the realm of peace and security.

Keywords: regional integration, politics of knowledge production, arab-african relations, african solutions to african problems

Procedia PDF Downloads 49
177 Imputation Technique for Feature Selection in Microarray Data Set

Authors: Younies Saeed Hassan Mahmoud, Mai Mabrouk, Elsayed Sallam

Abstract:

Analysing DNA microarray data sets is a great challenge, which faces the bioinformaticians due to the complication of using statistical and machine learning techniques. The challenge will be doubled if the microarray data sets contain missing data, which happens regularly because these techniques cannot deal with missing data. One of the most important data analysis process on the microarray data set is feature selection. This process finds the most important genes that affect certain disease. In this paper, we introduce a technique for imputing the missing data in microarray data sets while performing feature selection.

Keywords: DNA microarray, feature selection, missing data, bioinformatics

Procedia PDF Downloads 530
176 A Simulation Modeling Approach for Optimization of Storage Space Allocation in Container Terminal

Authors: Gamal Abd El-Nasser A. Said, El-Sayed M. El-Horbaty

Abstract:

Container handling problems at container terminals are NP-hard problems. This paper presents an approach using discrete-event simulation modeling to optimize solution for storage space allocation problem, taking into account all various interrelated container terminal handling activities. The proposed approach is applied on a real case study data of container terminal at Alexandria port. The computational results show the effectiveness of the proposed model for optimization of storage space allocation in container terminal where 54% reduction in containers handling time in port is achieved.

Keywords: container terminal, discrete-event simulation, optimization, storage space allocation

Procedia PDF Downloads 294
175 Urban Land Cover from GF-2 Satellite Images Using Object Based and Neural Network Classifications

Authors: Lamyaa Gamal El-Deen Taha, Ashraf Sharawi

Abstract:

China launched satellite GF-2 in 2014. This study deals with comparing nearest neighbor object-based classification and neural network classification methods for classification of the fused GF-2 image. Firstly, rectification of GF-2 image was performed. Secondly, a comparison between nearest neighbor object-based classification and neural network classification for classification of fused GF-2 was performed. Thirdly, the overall accuracy of classification and kappa index were calculated. Results indicate that nearest neighbor object-based classification is better than neural network classification for urban mapping.

Keywords: GF-2 images, feature extraction-rectification, nearest neighbour object based classification, segmentation algorithms, neural network classification, multilayer perceptron

Procedia PDF Downloads 350
174 Comparison between Transient Elastography (FibroScan) and Liver Biopsy for Diagnosis of Hepatic Fibrosis in Chronic Hepatitis C Genotype 4

Authors: Gamal Shiha, Seham Seif, Shahera Etreby, Khaled Zalata, Waleed Samir

Abstract:

Background: Transient Elastography (TE; FibroScan®) is a non-invasive technique to assess liver fibrosis. Aim: To compare TE and liver biopsy in hepatitis C virus (HCV) patients, genotype IV and evaluate the effect of steatosis and schistosomiasis on FibroScan. Methods: The fibrosis stage (METAVIR Score) TE, was assessed in 519 patients. The diagnostic performance of FibroScan is assessed by calculating the area under the receiver operating characteristic curves (AUROCs). Results: The cut-off value of ≥ F2 was 8.55 kPa, ≥ F3 was 10.2 kPa and cirrhosis = F4 was 16.3 kPa. The positive predictive value and negative predictive value were 70.1% and 81.7% for the diagnosis of ≥ F2, 62.6% and 96.22% for F ≥ 3, and 27.7% and 100% for F4. No significant difference between schistosomiasis, steatosis degree and FibroScan measurements. Conclusion: Fibroscan could accurately predict liver fibrosis.

Keywords: chronic hepatitis C, FibroScan, liver biopsy, liver fibrosis

Procedia PDF Downloads 370
173 Improving Listening Comprehension for EFL Pre-Intermediate Students through a Blended Learning Strategy

Authors: Heba Mustafa Abdullah

Abstract:

The research aimed at examining the effect of using a suggested blended learning (BL) strategy on developing EFL pre- intermediate students. The study adopted the quasi-experimental design. The sample of the research consisted of a group of 26 EFL pre- intermediate students. Tools of the study included a listening comprehension checklist and a pre-post listening comprehension test. Results were discussed in relation to several factors that affected the language learning process. Finally, the research provided beneficial contributions in relation to manipulating BL strategy with respect to language learning process in general and oral language learning in particular.

Keywords: blended learning, english as a foreign language, listening comprehension, oral language instruction

Procedia PDF Downloads 520
172 Enhancing Functional Properties of Sport Wears Interlock Fabrics by Mercerization

Authors: Manar Y. Abd El-Aziz, Alyaa E. Morgham, Amira A. El-Fallal, Heba Tolla E. Abo El Naga

Abstract:

Sport wears almost preferred with knitted fabrics, specially interlock construction. But, there is a need for higher comfortability and functional properties for fabrics to be more fitted to this application. This study compared cotton and polyester microfibers and blended them to improve the functional activity of interlock in sport wear by mercerized and non-mercerized. also, fabric dyeing and dyeability are affected by mercerization. Many functional properties, such as UV protection as well as antimicrobial activity. The changes in different mechanical as well as physical properties were investigated. The washing fastness properties of the dyed fabrics are also given. The changes in moisture regain, loss in weight, and burst and burst elongation for all mercerized fabrics have been studied.

Keywords: interlock, mercirization, dyeability, function properties, moisture management

Procedia PDF Downloads 42
171 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 382
170 Real Activities Manipulation vs. Accrual Earnings Management: The Effect of Political Risk

Authors: Heba Abdelmotaal, Magdy Abdel-Kader

Abstract:

Purpose: This study explores whether a firm’s effective political risk management is preventing real and accrual earnings management . Design/methodology/approach: Based on a sample of 130 firms operating in Egypt during the period 2008-2013, two hypotheses are tested using the panel data regression models. Findings: The empirical findings indicate a significant relation between real and accrual earnings management and political risk. Originality/value: This paper provides a statistically evidence on the effects of the political risk management failure on the mangers’ engagement in the real and accrual earnings management practices, and its impact on the firm’s performance.

Keywords: political risk, risk management failure, real activities manipulation, accrual earnings management

Procedia PDF Downloads 398
169 Improved FP-Growth Algorithm with Multiple Minimum Supports Using Maximum Constraints

Authors: Elsayeda M. Elgaml, Dina M. Ibrahim, Elsayed A. Sallam

Abstract:

Association rule mining is one of the most important fields of data mining and knowledge discovery. In this paper, we propose an efficient multiple support frequent pattern growth algorithm which we called “MSFP-growth” that enhancing the FP-growth algorithm by making infrequent child node pruning step with multiple minimum support using maximum constrains. The algorithm is implemented, and it is compared with other common algorithms: Apriori-multiple minimum supports using maximum constraints and FP-growth. The experimental results show that the rule mining from the proposed algorithm are interesting and our algorithm achieved better performance than other algorithms without scarifying the accuracy.

Keywords: association rules, FP-growth, multiple minimum supports, Weka tool

Procedia PDF Downloads 446
168 An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: proxy signature, warrant partial delegation, key agreement, discrete logarithm

Procedia PDF Downloads 307
167 High Frequency Sonochemistry: A New Field of Cavitation‐Free Acoustic Materials Synthesis and Manipulation

Authors: Amgad Rezk, Heba Ahmed, Leslie Yeo

Abstract:

Ultrasound presents a powerful means for material synthesis. In this talk, we showcase a new field demonstrating the possibility for harnessing sound energy sources at considerably higher frequencies (10 MHz to 1 GHz) compared to conventional ultrasound (kHz and up to ~2 MHz) for crystalising and manipulating a variety of nanoscale materials. At these frequencies, cavitation—which underpins most sonochemical processes—is largely absent, suggesting that altogether fundamentally different mechanisms are at dominant. Examples include the crystallization of highly oriented structures, quasi-2D metal-organic frameworks and nanocomposites. These fascinating examples reveal how the highly nonlinear electromechanical coupling associated with high-frequency surface vibration gives rise to molecular ordering and assembly on the nano and microscale.

Keywords: high-frequency acoustics, microfluidics, crystallisation, composite nanomaterials

Procedia PDF Downloads 87
166 Optimal Sizing and Placement of Distributed Generators for Profit Maximization Using Firefly Algorithm

Authors: Engy Adel Mohamed, Yasser Gamal-Eldin Hegazy

Abstract:

This paper presents a firefly based algorithm for optimal sizing and allocation of distributed generators for profit maximization. Distributed generators in the proposed algorithm are of photovoltaic and combined heat and power technologies. Combined heat and power distributed generators are modeled as voltage controlled nodes while photovoltaic distributed generators are modeled as constant power nodes. The proposed algorithm is implemented in MATLAB environment and tested the unbalanced IEEE 37-node feeder. The results show the effectiveness of the proposed algorithm in optimal selection of distributed generators size and site in order to maximize the total system profit.

Keywords: distributed generators, firefly algorithm, IEEE 37-node feeder, profit maximization

Procedia PDF Downloads 405
165 Reducing Inventory Costs by Reducing Inventory Levels: Kuwait Flour Mills and Bakeries Company

Authors: Dana Al-Qattan, Faiza Goodarzi, Heba Al-Resheedan, Kawther Shehab, Shoug Al-Ansari

Abstract:

This project involves working with different types of forecasting methods and facility planning tools to help the company we have chosen to improve and reduce its inventory, increase its sales, and decrease its wastes and losses. The methods that have been used by the company have shown no improvement in decreasing the annual losses. The research made in the company has shown that no interest has been made in exploring different techniques to help the company. In this report, we introduce several methods and techniques that will help the company make more accurate forecasts and use of the available space efficiently. We expect our approach to reduce costs without affecting the quality of the product, and hence making production more viable.

Keywords: production planning, inventory management, inventory control, simulation, facility planning and design, engineering economy and costs

Procedia PDF Downloads 536
164 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: proxy signature, fault tolerance, rsa, key agreement protocol

Procedia PDF Downloads 253
163 Photocatalytic Conversion of Water/Methanol Mixture into Hydrogen Using Cerium/Iron Oxides Based Structures

Authors: Wael A. Aboutaleb, Ahmed M. A. El Naggar, Heba M. Gobara

Abstract:

This research work reports the photocatalytic production of hydrogen from water-methanol mixture using three different 15% ceria/iron oxide catalysts. The catalysts were prepared by physical mixing, precipitation, and ultrasonication methods and labeled as catalysts A-C. The structural and texture properties of the obtained catalysts were confirmed by X-ray diffraction (XRD), BET-surface area analysis and transmission electron microscopy (TEM). The photocatalytic activity of the three catalysts towards hydrogen generation was then tested. Promising hydrogen productivity was obtained by the three catalysts however different gases compositions were obtained by each type of catalyst. Specifically, catalyst A had produced hydrogen mixed with CO₂ while the composite structure (catalyst B) had generated only pure H₂. In the case of catalyst C, syngas made of H₂ and CO was revealed, as a novel product, for the first time, in such process.

Keywords: hydrogen production, water splitting, photocatalysts, clean energy

Procedia PDF Downloads 208
162 Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: discrete logarithm, factoring, proxy signature, key agreement

Procedia PDF Downloads 267