Search results for: Mohammed Hasan Salahat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1234

Search results for: Mohammed Hasan Salahat

904 To Study the Performance of FMS under Different Manufacturing Strategies

Authors: Mohammed Ali

Abstract:

A flexible manufacturing system has been studied under different manufacturing strategies. The aim of this paper is to test the impact of number of pallets and routing flexibility (design strategy) on system performance operating at different sequencing and dispatching rules (control strategies) at unbalanced load condition (planning strategies). A computer simulation model is developed to evaluate the effects of aforementioned strategies on the make-span time, which is taken as the system performance measure. The impact of number of pallets is shown with the different levels of routing flexibility. In this paper, the same manufacturing system is modeled under different combination of sequencing and dispatching rules. The result of the simulation shows that there is definite range of pallets for each level of routing flexibility at which the systems performs satisfactorily.

Keywords: flexible manufacturing system, manufacturing, strategy, makespan

Procedia PDF Downloads 645
903 Developed Text-Independent Speaker Verification System

Authors: Mohammed Arif, Abdessalam Kifouche

Abstract:

Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.

Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis

Procedia PDF Downloads 23
902 A Neural Approach for Color-Textured Images Segmentation

Authors: Khalid Salhi, El Miloud Jaara, Mohammed Talibi Alaoui

Abstract:

In this paper, we present a neural approach for unsupervised natural color-texture image segmentation, which is based on both Kohonen maps and mathematical morphology, using a combination of the texture and the image color information of the image, namely, the fractal features based on fractal dimension are selected to present the information texture, and the color features presented in RGB color space. These features are then used to train the network Kohonen, which will be represented by the underlying probability density function, the segmentation of this map is made by morphological watershed transformation. The performance of our color-texture segmentation approach is compared first, to color-based methods or texture-based methods only, and then to k-means method.

Keywords: segmentation, color-texture, neural networks, fractal, watershed

Procedia PDF Downloads 313
901 Effects of Different Fiber Orientations on the Shear Strength Performance of Composite Adhesive Joints

Authors: Ferhat Kadioglu, Hasan Puskul

Abstract:

A composite material with carbon fiber and polymer matrix has been used as adherent for manufacturing adhesive joints. In order to evaluate different fiber orientations on joint performance, the adherents with the 0°, ±15°, ±30°, ±45° fiber orientations were used in the single lap joint configuration. The joints with an overlap length of 25 mm were prepared according to the ASTM 1002 specifications and subjected to tensile loadings. The structural adhesive used was a two-part epoxy to be cured at 70°C for an hour. First, mechanical behaviors of the adherents were measured using three point bending test. In the test, considerations were given to stress to failure and elastic modulus. The results were compared with theoretical ones using rule of mixture. Then, the joints were manufactured in a specially prepared jig, after a proper surface preparation. Experimental results showed that the fiber orientations of the adherents affected the joint performance considerably; the joints with ±45° adherents experienced the worst shear strength, half of those with 0° adherents, and in general, there was a great relationship between the fiber orientations and failure mechanisms. Delamination problems were observed for many joints, which were thought to be due to peel effects at the ends of the overlap. It was proved that the surface preparation applied to the adherent surface was adequate. For further explanation of the results, a numerical work should be carried out using a possible non-linear analysis.

Keywords: composite materials, adhesive bonding, bonding strength, lap joint, tensile strength

Procedia PDF Downloads 347
900 Observing Vocabulary Teaching Strategies in English Classrooms in Saudi Schools

Authors: Mohammed Hassan Alshaikhi

Abstract:

Teaching vocabulary is a fundamental step in helping students to develop a good grasp of language. Exploring new strategies is an essential part of improving the teaching of vocabulary. The study aimed to explore the teaching vocabulary strategies in Saudi primary classrooms (aged 11 and 12 years old) in Jeddah, Saudi Arabia. The study was based on qualitative data collected from a large-scale case study, which utilised observations at eight male state and private primary schools during the academic year 2016-2017. The observations were transcribed, coded and entered into Nvivo software to be organised and analysed. Varying teaching vocabulary strategies were explored, and then they were circulated to many English teachers to be used in their classes.

Keywords: case study, English language, Saudi teachers, teaching vocabulary strategies

Procedia PDF Downloads 347
899 Lithium-Ion Battery State of Charge Estimation Using One State Hysteresis Model with Nonlinear Estimation Strategies

Authors: Mohammed Farag, Mina Attari, S. Andrew Gadsden, Saeid R. Habibi

Abstract:

Battery state of charge (SOC) estimation is an important parameter as it measures the total amount of electrical energy stored at a current time. The SOC percentage acts as a fuel gauge if it is compared with a conventional vehicle. Estimating the SOC is, therefore, essential for monitoring the amount of useful life remaining in the battery system. This paper looks at the implementation of three nonlinear estimation strategies for Li-Ion battery SOC estimation. One of the most common behavioral battery models is the one state hysteresis (OSH) model. The extended Kalman filter (EKF), the smooth variable structure filter (SVSF), and the time-varying smoothing boundary layer SVSF are applied on this model, and the results are compared.

Keywords: state of charge estimation, battery modeling, one-state hysteresis, filtering and estimation

Procedia PDF Downloads 412
898 Effect of Angles Collision, Absorption, Dash and Their Relationship with the Finale Results Case the Algerian Elite Team Triple Jump

Authors: Guebli Abdelkader, Zerf Mohammed, Mekkades Moulay Idriss, BenGoua Ali, Atouti Nouredinne, Habchi Nawel

Abstract:

The paper aims to show the influence of angles in the results of triple jump. Whereas our background confirms that a series of motions are characterized by complex angles in the properties phase (hop, step, and jump) as a combination of the pushed phase on ultimate phases in the result. For the purpose, our results are obtained from the National Athletics Championship 2013, which was filmed and analysis by the software kinovea. Based on the statistical analysis we confirm: there is a positive relationship between angle of the leg, hip angle, angle of the trunk in the collision during (hop, step, and jump), and there is a negative correlation to the angle of the knee relationship in a collision during.

Keywords: kinematics variables, the triple jump, the finale results, digital achievement

Procedia PDF Downloads 299
897 Survival and Hazard Maximum Likelihood Estimator with Covariate Based on Right Censored Data of Weibull Distribution

Authors: Al Omari Mohammed Ahmed

Abstract:

This paper focuses on Maximum Likelihood Estimator with Covariate. Covariates are incorporated into the Weibull model. Under this regression model with regards to maximum likelihood estimator, the parameters of the covariate, shape parameter, survival function and hazard rate of the Weibull regression distribution with right censored data are estimated. The mean square error (MSE) and absolute bias are used to compare the performance of Weibull regression distribution. For the simulation comparison, the study used various sample sizes and several specific values of the Weibull shape parameter.

Keywords: weibull regression distribution, maximum likelihood estimator, survival function, hazard rate, right censoring

Procedia PDF Downloads 414
896 Awareness for Air Pollution Impacts on Lung Cancer in Southern California: A Pilot Study for Designed Smartphone Application

Authors: M. Mohammed Raoof, A. Enkhtaivan, H. Aljuaid

Abstract:

This study follows the design science research methodology to design and implement a smartphone application artifact. The developed artifact was evaluated through three phases. The System Usability Scale (SUS) metric was used for the evaluation. The designed artifact aims to spread awareness about reducing air pollution, decreasing lung cancer development, and checking the air quality status in Southern California Counties. Participants have been drawn for a pilot study to facilitate awareness of air pollution. The study found that smartphone applications have a beneficial effect on the study’s aims.

Keywords: air pollution, design science research, indoor air pollution, lung cancer, outdoor air pollution, smartphone application

Procedia PDF Downloads 84
895 Multimodal Employee Attendance Management System

Authors: Khaled Mohammed

Abstract:

This paper presents novel face recognition and identification approaches for the real-time attendance management problem in large companies/factories and government institutions. The proposed uses the Minimum Ratio (MR) approach for employee identification. Capturing the authentic face variability from a sequence of video frames has been considered for the recognition of faces and resulted in system robustness against the variability of facial features. Experimental results indicated an improvement in the performance of the proposed system compared to the Previous approaches at a rate between 2% to 5%. In addition, it decreased the time two times if compared with the Previous techniques, such as Extreme Learning Machine (ELM) & Multi-Scale Structural Similarity index (MS-SSIM). Finally, it achieved an accuracy of 99%.

Keywords: attendance management system, face detection and recognition, live face recognition, minimum ratio

Procedia PDF Downloads 134
894 An Assessment of the Factors Affecting Green Building Technology (GBT) Adoption

Authors: Nuruddeen Usman, Usman Mohammed Gidado

Abstract:

A construction and post construction activity in buildings contributes to environmental degradation, because of the generation of solid waste during construction to the production of carbon dioxide by the occupants during utilization. These problems were caused as a result of lack of adopting green building technology during and after construction. However, this study aims at conceptualizing the factors that are affecting the adoption of green building technology with a view to suggest better ways for its successful adoption in the construction industry through developing a green building technology model. Thus, the research findings show that: Economic, social, cultural, and technological progresses are the factors affecting Green Building Technology Adoption. Therefore, identifying these factors and developing the model might help in the successful adoption of green building technology.

Keywords: green building technology, construction, post construction, degradation

Procedia PDF Downloads 623
893 Lean Philosophy towards the Enhancement of Maintenance Programs Efficiency with Particular Attention to Libyan Oil and Gas Scenario

Authors: Sulayman Adrees Mohammed, Ahmed Faraj Abd Alsameea

Abstract:

The ongoing hindrance for Libyan oil and gas companies is the persistent challenge of eradicating maintenance program failures that result in exorbitant costs and production setbacks. Accordingly, this research is prompted to introduce the concept of lean philosophy in maintenance, which aims to eliminate waste and enhance productivity in maintenance procedures through the identification and differentiation of value-adding (VA) and non-value-adding (NVA) activities. The purpose of this paper was to explore and describe the benefits that can be gained by adopting the Lean philosophy towards the enhancement of maintenance programs' efficiency from theoretical perspectives. The oil industry maintenance community in Libya now has an introduced tool by which they can effectively evaluate their maintenance program functionality and reduce the areas of non-value added activities within maintenance, thereby enhancing the availability of the equipment and the capacity of the oil and gas facilities.

Keywords: efficiency, lean philosophy, Libyan oil and gas scenario, maintenance programs

Procedia PDF Downloads 46
892 3D Printing Technology in Housing Projects Construction

Authors: Mohammed F. Haddad, Mohammad A. Albenayyan

Abstract:

Realistically, 3-D printing as a technology has not yet reached the required maturity level to handle construction housing projects for citizens on a country scale. However, potentially, it has all of the required elements for addressing this issue. There are two main high-level elements of this technology that need to be capitalized on in order for the technology to reach its full potential, technical and logistical. This paper aims to cover how 3-D printing can be a viable technical solution for housing projects and describe the impact of 3-D printing technical features on the logistical aspects of completing a housing project. Additionally, a perspective about 3-D printing in Saudi Arabia will be presented in order to give the reader an idea of where the kingdom stands in the deployment of this technology. Finally, a glimpse will be given regarding the potential utilization of this technology for space applications.

Keywords: large-scale 3-D printing, additive manufacturing, D- shape, contour crafting

Procedia PDF Downloads 102
891 Energy Saving Techniques for MIMO Decoders

Authors: Zhuofan Cheng, Qiongda Hu, Mohammed El-Hajjar, Basel Halak

Abstract:

Multiple-input multiple-output (MIMO) systems can allow significantly higher data rates compared to single-antenna-aided systems. They are expected to be a prominent part of the 5G communication standard. However, these decoders suffer from high power consumption. This work presents a design technique in order to improve the energy efficiency of MIMO systems; this facilitates their use in the next generation of battery-operated communication devices such as mobile phones and tablets. The proposed optimization approach consists of the use of low complexity lattice reduction algorithm in combination with an adaptive VLSI implementation. The proposed design has been realized and verified in 65nm technology. The results show that the proposed design is significantly more energy-efficient than conventional K-best MIMO systems.

Keywords: energy, lattice reduction, MIMO, VLSI

Procedia PDF Downloads 305
890 Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography

Authors: Mohammed Salem Atoum

Abstract:

The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB.

Keywords: XLSB, scrambling, audio steganography, security

Procedia PDF Downloads 344
889 Critical Success Factors for Successful Energy Management Implementation towards Sustainability in Malaysian Universities

Authors: A. Abdullah Saleh, A. H. Mohammed, M. N. Abdullah

Abstract:

Universities are increasingly consuming energy to support various activities. A large population of staff and students in Malaysian universities has led to excessive energy consumption which directly gives an impact to the environment. The key question then ascended "How well is an energy management (EM) been practiced in universities without taking the Critical Success Factors (CSFs) into consideration to ensure the management of university achieves the goals in reducing energy consumption". Review of past literature is carried out to establish CSFs for EM best practices. Thus, this paper highlighted the CSFs which have to be focused on by management of university to successfully measure the EM implementation and its performance. At the end of this paper, a theoretical framework is developed for EM success factors towards a sustainable university.

Keywords: critical success factors, energy management, sustainability, Malaysian universities

Procedia PDF Downloads 445
888 Rethinking Peace Journalism in Pakistan: A Critical Analysis of News Discourse on the Afghan Refugee Repatriation Conflict

Authors: Ayesha Hasan

Abstract:

This study offers unique perspectives and analyses of peace and conflict journalism through interpretative repertoire, media frames, and critical discourse analyses. Two major English publications in Pakistan, representing both long and short-form journalism, are investigated to uncover how the Afghan refugee repatriation from Pakistan in 2016-17 has been framed in Pakistani English media. Peace journalism focuses on concepts such as peace initiatives and peace building, finding common ground, and preventing further conflict. This study applies Jake Lynch’s Coding Criteria to guide the critical discourse analysis and Lee and Maslog’s Peace Journalism Quotient to examine the extent of peace journalism in each text. This study finds that peace journalism is missing in Pakistani English press, but represented, to an extent, in long-form print and online coverage. Two new alternative frames are also proposed. This study gives an in-depth understanding of if and how journalists in Pakistan are covering conflicts and framing stories that can be identified as peace journalism. This study represents significant contributions to the remarkably limited scholarship on peace and conflict journalism in Pakistan and extends Shabbir Hussain’s work on critical pragmatic perspectives on peace journalism in Pakistan.

Keywords: Afghan refugee repatriation, Critical discourse analysis, Media framing , Peace and conflict journalism

Procedia PDF Downloads 179
887 Mining the Proteome of Fusobacterium nucleatum for Potential Therapeutics Discovery

Authors: Abdul Musaweer Habib, Habibul Hasan Mazumder, Saiful Islam, Sohel Sikder, Omar Faruk Sikder

Abstract:

The plethora of genome sequence information of bacteria in recent times has ushered in many novel strategies for antibacterial drug discovery and facilitated medical science to take up the challenge of the increasing resistance of pathogenic bacteria to current antibiotics. In this study, we adopted subtractive genomics approach to analyze the whole genome sequence of the Fusobacterium nucleatum, a human oral pathogen having association with colorectal cancer. Our study divulged 1499 proteins of Fusobacterium nucleatum, which has no homolog in human genome. These proteins were subjected to screening further by using the Database of Essential Genes (DEG) that resulted in the identification of 32 vitally important proteins for the bacterium. Subsequent analysis of the identified pivotal proteins, using the KEGG Automated Annotation Server (KAAS) resulted in sorting 3 key enzymes of F. nucleatum that may be good candidates as potential drug targets, since they are unique for the bacterium and absent in humans. In addition, we have demonstrated the 3-D structure of these three proteins. Finally, determination of ligand binding sites of the key proteins as well as screening for functional inhibitors that best fitted with the ligands sites were conducted to discover effective novel therapeutic compounds against Fusobacterium nucleatum.

Keywords: colorectal cancer, drug target, Fusobacterium nucleatum, homology modeling, ligands

Procedia PDF Downloads 359
886 Influence of Decolourisation Condition on the Physicochemical Properties of Shea (Vitellaria paradoxa Gaertner F) Butter

Authors: Ahmed Mohammed Mohagir, Ahmat-Charfadine Mahamat, Nde Divine Bup, Richard Kamga, César Kapseu

Abstract:

In this investigation, kinetics studies of adsorption of colour material of shea butter showed a peak at the wavelength 440 nm and the equilibrium time was found to be 30 min. Response surface methodology applying Doehlert experimental design was used to investigate decolourisation parameters of crude shea butter. The decolourisation process was significantly influenced by three independent parameters: contact time, decolourisation temperature and adsorbent dose. The responses of the process were oil loss, acid value, peroxide value and colour index. Response surface plots were successfully made to visualise the effect of the independent parameters on the responses of the process.

Keywords: decolourisation, doehlert experimental design, physicochemical characterisation, RSM, shea butter

Procedia PDF Downloads 386
885 Faster, Lighter, More Accurate: A Deep Learning Ensemble for Content Moderation

Authors: Arian Hosseini, Mahmudul Hasan

Abstract:

To address the increasing need for efficient and accurate content moderation, we propose an efficient and lightweight deep classification ensemble structure. Our approach is based on a combination of simple visual features, designed for high-accuracy classification of violent content with low false positives. Our ensemble architecture utilizes a set of lightweight models with narrowed-down color features, and we apply it to both images and videos. We evaluated our approach using a large dataset of explosion and blast contents and compared its performance to popular deep learning models such as ResNet-50. Our evaluation results demonstrate significant improvements in prediction accuracy, while benefiting from 7.64x faster inference and lower computation cost. While our approach is tailored to explosion detection, it can be applied to other similar content moderation and violence detection use cases as well. Based on our experiments, we propose a "think small, think many" philosophy in classification scenarios. We argue that transforming a single, large, monolithic deep model into a verification-based step model ensemble of multiple small, simple, and lightweight models with narrowed-down visual features can possibly lead to predictions with higher accuracy.

Keywords: deep classification, content moderation, ensemble learning, explosion detection, video processing

Procedia PDF Downloads 23
884 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation

Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud

Abstract:

Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.

Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing

Procedia PDF Downloads 64
883 The Importance of Zakat in Struggle against Circle of Poverty and Income Redistribution

Authors: Hasan Bulent Kantarci

Abstract:

This paper examine how Zakat provide a fair income redistribution and struggle with poverty. To provide a fair income redistribution and struggle with poverty take place among the fundamental tasks of all countries. Each country seeks a solution for this problem according to their political, economical and administrative styles through applying various economic and financial policies. The same situation gets handled via zakat association in the Islam. Nowadays, we observe different versions of zakat in developed countries. The applications such as negative income tax denote merely a difference from the zakat being applied almost the same way under changed names. But the minimum values to donate the zakat (e.g. 85 gr. gold and 40 animals) get altered and various amounts are put into practice. It might be named as negative income tax instead of zakat, nonetheless, these applications are based on the Holy Koran and the hadith released 1400 years ago. Besides, considering the savage and slavery in the world at those times, we might easily recognize the true value of the zakat applied the first time then in Islamic system. Through zakat is enabled an income transfer by the government so that the poor could reach the minimum level of life standard. To whom the zakat would be donated was not left to people’s heart and encouraged to determine according to objective criteria. Since the zakat is obligatory, the transfer do not get forward by hand but via the government and get distributed, which requires a vast government organization. Through applying the zakat as it must be would achieve to reduce the poverty mostly and ensuring the fair income redistribution.

Keywords: Islamic finance, zakat, income redistribution, circle of poverty, negatif income tax

Procedia PDF Downloads 323
882 Causal Relationship between Macro-Economic Indicators and Fund Unit Price Behaviour: Evidence from Malaysian Equity Unit Trust Fund Industry

Authors: Anwar Hasan Abdullah Othman, Ahamed Kameel, Hasanuddeen Abdul Aziz

Abstract:

In this study, an attempt has been made to investigate the relationship specifically the causal relation between fund unit prices of Islamic equity unit trust fund which measure by fund NAV and the selected macro-economic variables of Malaysian economy by using VECM causality test and Granger causality test. Monthly data has been used from Jan, 2006 to Dec, 2012 for all the variables. The findings of the study showed that industrial production index, political election and financial crisis are the only variables having unidirectional causal relationship with fund unit price. However, the global oil prices is having bidirectional causality with fund NAV. Thus, it is concluded that the equity unit trust fund industry in Malaysia is an inefficient market with respect to the industrial production index, global oil prices, political election and financial crisis. However, the market is approaching towards informational efficiency at least with respect to four macroeconomic variables, treasury bill rate, money supply, foreign exchange rate and corruption index.

Keywords: fund unit price, unit trust industry, Malaysia, macroeconomic variables, causality

Procedia PDF Downloads 443
881 Endodontics Flare-Up

Authors: Khalid Mohammed Idrees

Abstract:

Endodontic treatment aims to reverse the disease process and thereby eliminate the associated signs of symptoms. When the treatment itself appears to initiate the onset of pain and /or swelling (endodontic flare-up), the result can be distressing to both the patient and the operator. Patient might even consider postoperative symptoms as a bench mark against which the clinician’s skills are measured. Obviously the treatment with the lowest prevalence of postoperative pain is usually the treatment of choice as long as effectiveness and cost are not compromised. Knowledge of the cause and mechanism behind intra appointment flare-up is of utmost importance for the clinician to properly prevent or manage this undesirable condition. This review lecture will discuss the causative factors of flare-up with special attention to the microorganism role, various modalities of preventive measures would be discussed. Those measures are based on scientific evidence combined with the long clinical experience of the lecturer.

Keywords: endodontic flare-up, causative factors, inflammatory mediators, preventive measures

Procedia PDF Downloads 108
880 Numerical Simulation of Fluid Structure Interaction Using Two-Way Method

Authors: Samira Laidaoui, Mohammed Djermane, Nazihe Terfaya

Abstract:

The fluid-structure coupling is a natural phenomenon which reflects the effects of two continuums: fluid and structure of different types in the reciprocal action on each other, involving knowledge of elasticity and fluid mechanics. The solution for such problems is based on the relations of continuum mechanics and is mostly solved with numerical methods. It is a computational challenge to solve such problems because of the complex geometries, intricate physics of fluids, and complicated fluid-structure interactions. The way in which the interaction between fluid and solid is described gives the largest opportunity for reducing the computational effort. In this paper, a problem of fluid structure interaction is investigated with two-way coupling method. The formulation Arbitrary Lagrangian-Eulerian (ALE) was used, by considering a dynamic grid, where the solid is described by a Lagrangian formulation and the fluid by a Eulerian formulation. The simulation was made on the ANSYS software.

Keywords: ALE, coupling, FEM, fluid-structure, interaction, one-way method, two-way method

Procedia PDF Downloads 650
879 Catalytic Deoxygenation of Propionic Acid in the Vapour Phase

Authors: Hossein Bayahia, Mohammed Saad Motlaq Al-Gahmdi

Abstract:

The gas-phase deoxygenation of propionic acid was investigated in the presence of Co-Mo catalysts in N2 or H2 flow at 200-400 °C. In the presence of N2 the main product was 3-pentanone with other deoxygenates and some light gases: ethane and ethene. Using H2 flow, the catalyst was active for decarboxylation and decarbonylation of acid and the yields of ethane and ethene. The decarboxylation and decarbonylation reactions increased with increasing temperature. Cobalt-molybdenum supported on alumina showed better performance than bulk catalyst, especially at 400 °C in the presence of N2 for the ketonisation of propionic acid to form 3-pentanone as the main product. Bulk and supported catalysts were characterized by surface area porosity (BET), thermogravimetric analysis (TGA) and diffuse reflectance infrared Fourier transform spectroscopy (DRIFTS) of pyridine adsorption.

Keywords: deoxygenation, propionic acid, gas-phase, catalyst

Procedia PDF Downloads 266
878 Acupuncture and Topiramat in Treatment of Migraine

Authors: Lazgeen Mohammed

Abstract:

The greatest advantage of acupuncture over western medicine is that it is safe . Unlike synthetic drugs, acupuncture has virtually no side effects, and the procedures for treating headaches are much less invasive. Migraine headaches are usually one-sided, pulsating or throbbing, and moderate or severe in intensity.. Some patients also experience auras, a neurological symptom that develops gradually over 5-20 minutes. The patient may see brief flashes or waves of light, or changes in their vision. Other common features of auras include vertigo, imbalance, confusion and numbness.Acupuncture had been used to treat 50 patients suffering from migraine ,topiramat (topamax) given to prevent the attacks, duration of treatment is 10 weeks , the patients were fallowed up for one year .Topiramat is called an anticonvulsant.Topiramat is also used to prevent migraine headaches in adults and teenagers who are at least 12 years old. This medicine will only prevent migraine headaches or reduce the number of attacks. It will not treat a headache that has already begun.

Keywords: acpuncture, migraine, topiramat, headache

Procedia PDF Downloads 46
877 Foreign News Coverage in Conservative and Liberal U.S. Newspapers: A Case Study of Saudi Arabia

Authors: Mohammed Huraysi

Abstract:

This research will investigate the historical coverage of foreign issues in U.S. newspapers. The study will focus on three main areas, which are coverage of wars, foreign leaders, and human rights in foreign countries, and analyze them by applying the framing theory to news stories about Saudi Arabia, used as a case study, within two different newspapers over some time Wall Street Journal and The New York Times will be investigated and representative of two distinct newspaper orientations, which are conservative and liberal ideological orientations. By the end of this research study, comprehensive coverage of these topics in U.S. newspapers from past to present will be provided, leading to an ability to discover consistency or lack thereof, explain the present, and devise future expectations.

Keywords: framing theory, US newspapers, historical research, Saudi Arabia

Procedia PDF Downloads 60
876 The Environmental Impact of Sustainability Dispersion of Chlorine Releases in Coastal Zone of Alexandra: Spatial-Ecological Modeling

Authors: Mohammed El Raey, Moustafa Osman Mohammed

Abstract:

The spatial-ecological modeling is relating sustainable dispersions with social development. Sustainability with spatial-ecological model gives attention to urban environments in the design review management to comply with Earth’s System. Naturally exchange patterns of ecosystems have consistent and periodic cycles to preserve energy flows and materials in Earth’s System. The probabilistic risk assessment (PRA) technique is utilized to assess the safety of industrial complex. The other analytical approach is the Failure-Safe Mode and Effect Analysis (FMEA) for critical components. The plant safety parameters are identified for engineering topology as employed in assessment safety of industrial ecology. In particular, the most severe accidental release of hazardous gaseous is postulated, analyzed and assessment in industrial region. The IAEA- safety assessment procedure is used to account the duration and rate of discharge of liquid chlorine. The ecological model of plume dispersion width and concentration of chlorine gas in the downwind direction is determined using Gaussian Plume Model in urban and ruler areas and presented with SURFER®. The prediction of accident consequences is traced in risk contour concentration lines. The local greenhouse effect is predicted with relevant conclusions. The spatial-ecological model is also predicted the distribution schemes from the perspective of pollutants that considered multiple factors of multi-criteria analysis. The data extends input–output analysis to evaluate the spillover effect, and conducted Monte Carlo simulations and sensitivity analysis. Their unique structure is balanced within “equilibrium patterns”, such as the biosphere and collective a composite index of many distributed feedback flows. These dynamic structures are related to have their physical and chemical properties and enable a gradual and prolonged incremental pattern. While this spatial model structure argues from ecology, resource savings, static load design, financial and other pragmatic reasons, the outcomes are not decisive in artistic/ architectural perspective. The hypothesis is an attempt to unify analytic and analogical spatial structure for development urban environments using optimization software and applied as an example of integrated industrial structure where the process is based on engineering topology as optimization approach of systems ecology.

Keywords: spatial-ecological modeling, spatial structure orientation impact, composite structure, industrial ecology

Procedia PDF Downloads 53
875 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 232