Search results for: Nacer Hamza
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 123

Search results for: Nacer Hamza

93 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 268
92 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 510
91 Modernist Trends in Ilahiyat Faculties (Islamic Studies Faculties) Turkey, Post-Coup 1980

Authors: Muhammad Hamza Tariq

Abstract:

The regrouping of the Islamists and the politics of religious education was the most common debate in the last decades of Turkish history. Religious schools were criticized to be influenced by partisan politics. Within this turmoil, the faculty of Ilahiyat which was established by the Republic to cherish Islamic modernism and to raise modern clergy also underwent a considerable change. This research studies the revisions in the curriculum of the faculty over the last few decades. A series of interviews were also conducted to observe the prevalent trends, especially modernist among the professors at the Ilahiyat faculties. Lastly, a survey was done among the freshman and final year students based on the similar questions to observe the changes of opinions with regards to their views on Islam, modernity, political Islam, interpretation, etc. A shift in the curriculum was noted though it cannot be overgeneralized whereas a degree of prevalence of modernist thoughts was also recorded among the teachers and the students.

Keywords: ilahiyat, divinity, religion, Islamization

Procedia PDF Downloads 324
90 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 591
89 Predicting Mobile Payment System Adoption in Nigeria: An Empirical Analysis

Authors: Aminu Hamza

Abstract:

This study examines the factors that play vital role in the adoption of mobile payment system among consumers in Nigeria. Technology Acceptance Model (TAM) was used with two additional variables to form the conceptual model. The study was conducted in three Universities in Kano state, Nigeria. Convenience sampling method was used with a total valid 202 respondents which involved the students of Bayero University Kano (BUK), Northwest University, and Kano University of Science and Technology (KUST) Wudil, Kano, Nigeria. Results of the regression analysis revealed that Perceived ease of use (PEOU) and Perceived usefulness (PU) have significant and positive correlation with the behavioral intention to adopt mobile payment system. The findings of this study would be useful to the policy makers Central Bank of Nigeria (CBN), mobile network operators and providers of the services.

Keywords: mobile payment system, Nigeria, technology adoption, technology acceptance model

Procedia PDF Downloads 276
88 Online Prediction of Nonlinear Signal Processing Problems Based Kernel Adaptive Filtering

Authors: Hamza Nejib, Okba Taouali

Abstract:

This paper presents two of the most knowing kernel adaptive filtering (KAF) approaches, the kernel least mean squares and the kernel recursive least squares, in order to predict a new output of nonlinear signal processing. Both of these methods implement a nonlinear transfer function using kernel methods in a particular space named reproducing kernel Hilbert space (RKHS) where the model is a linear combination of kernel functions applied to transform the observed data from the input space to a high dimensional feature space of vectors, this idea known as the kernel trick. Then KAF is the developing filters in RKHS. We use two nonlinear signal processing problems, Mackey Glass chaotic time series prediction and nonlinear channel equalization to figure the performance of the approaches presented and finally to result which of them is the adapted one.

Keywords: online prediction, KAF, signal processing, RKHS, Kernel methods, KRLS, KLMS

Procedia PDF Downloads 367
87 The Effect of Dopamine D2 Receptor TAQ A1 Allele on Sprinter and Endurance Athlete

Authors: Öznur Özge Özcan, Canan Sercan, Hamza Kulaksız, Mesut Karahan, Korkut Ulucan

Abstract:

Genetic structure is very important to understand the brain dopamine system which is related to athletic performance. Hopefully, there will be enough studies about athletics performance in the terms of addiction-related genetic markers in the future. In the present study, we intended to investigate the Receptor-2 Gene (DRD2) rs1800497, which is related to brain dopaminergic system. 10 sprinter and 10 endurance athletes were enrolled in the study. Real-Time Polymerase Chain Reaction method was used for genotyping. According to results, A1A1, A1A2 and A2A2 genotypes in athletes were 0 (%0), 3 (%15) and 17 (%85). A1A1 genotype was not found and A2 allele was counted as the dominating allele in our cohort. These findings show that dopaminergic mechanism effects on sport genetic may be explained by the polygenic and multifactorial view.

Keywords: addiction, athletic performance, genotype, sport genetics

Procedia PDF Downloads 185
86 Peculiar Implications of Self Perceived Identity as Policy Tool for Transgender Recognition in Pakistan

Authors: Hamza Iftikhar

Abstract:

The research study focuses on the transgender community's gender recognition challenges. It is one of the issues for the transgender community, interacting directly with the difficulties of gender identity and the lives of these people who are facing gender disapproval from society. This study investigates the major flaws of the transgender act. The study's goal is to look into the strange implications of self-perceived identity as a policy tool for transgender recognition. This policy tool jeopardises the rights of Pakistan's indigenous gender-variant people as well as the country's legal and social framework. Qualitative research using semi structured interviews will be carried out. This study proposes developing a scheme for mainstreaming gender-variant people on the basis of the Pakistani Constitution, Supreme Court guidelines, and internationally recognised principles of law. This would necessitate a thorough review of current law using a new approach and reference point.

Keywords: transgender act, self perceived identity, gender variant, policy tool

Procedia PDF Downloads 83
85 Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks

Authors: Eman I. Raslan, Haitham S. Hamza, Reda A. El-Khoribi

Abstract:

Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques.

Keywords: fiber-wireless (FiWi), dynamic bandwidth allocation (DBA), passive optical networks (PON), media access control (MAC)

Procedia PDF Downloads 490
84 Exoskeleton for Hemiplegic Patients: Mechatronic Approach to Move One Disabled Lower Limb

Authors: Alaoui Hamza, Moutacalli Mohamed Tarik, Chebak Ahmed

Abstract:

The number of people suffering from hemiplegia is growing each year. This lower limb disability affects all the aspects of their lives by taking away their autonomy. This implicates their close relatives, as well as the health system to provide the necessary care they need. The integration of exoskeletons in the medical field became a promising solution to resolve this issue. This paper presents an exoskeleton designed to help hemiplegic people get back the sensation and ability of normal walking. For this purpose, three step models have been created. The first step allows a simple forward movement of the leg. The second method is designed to overcome some obstacles in the patient path, and finally the third step model gives the patient total control over the device. Each of the control methods was designed to offer a solution to the challenges that the patients may face during the walking process.

Keywords: ability of normal walking, exoskeleton, hemiplegic patients, lower limb motion- mechatronics

Procedia PDF Downloads 123
83 Selecting Skyline Mash-Ups under Uncertainty

Authors: Aymen Gammoudi, Hamza Labbaci, Nizar Messai, Yacine Sam

Abstract:

Web Service Composition (Mash-up) has been considered as a new approach used to offer the user a set of Web Services responding to his request. These approaches can return a set of similar Mash-ups in a given context that makes users unable to select the perfect one. Recent approaches focus on computing the skyline over a set of Quality of Service (QoS) attributes. However, these approaches are not sufficient in a dynamic web service environment where the delivered QoS by a Web service is inherently uncertain. In this paper, we treat the problem of computing the skyline over a set of similar Mash-ups under certain dimension values. We generate dimensions for each Mash-up using aggregation operations applied to the QoS attributes. We then tackle the problem of computing the skyline under uncertain dimensions. We present each dimension value of mash-up using a frame of discernment and introduce the d-dominance using the Evidence Theory. Finally, we propose our experimental results that show both the effectiveness of the introduced skyline extensions and the efficiency of the proposed approaches.

Keywords: web services, uncertain QoS, mash-ups, uncertain dimensions, skyline, evidence theory, d-dominance

Procedia PDF Downloads 196
82 Enhancement of Growth Regulators to Callus Formation and Silymarin Content from Different Explants of Silybum marianum Seedling

Authors: M. A. Hamza, H. A. Bosila, M. A. Zewil, I. M. Harridy

Abstract:

Silymarin is one active component extracted from milk thistle Silybum marianum; it is flavonoid recognized for its ability to benefit people with liver disorders and as a protective compound against liver damaging agents. For this reason, this research aims to study the effect of growth regulators (BA+NAA) and explant type (cotyledon, hypocotyl, and root) to increase the growth and active ingredients (silymarin) in callus of S. mariaum plant. The results showed that cotyledon explant which have been cultured in MS medium supplemented with BA 0.4 mg/l. +NAA 0.25 mg/l. Led to obtain the best results in callus fresh weight (1.847a) and callus dry weight (0.155a). On the other hand, the same explant (cotyledon) cultured in MS medium supplemented with BA 1.6 mg/l. + NAA 0.5 mg/l. The suitable condition to silymarin content (0.132 mg/100 mg dry weight). And also, it turned out, lack of importance of the use of hypocotyl and root in the production of callus and silymarin compared to cotyledon.

Keywords: silybum, callus, tissue culture, cotyledon

Procedia PDF Downloads 168
81 Influence of Elicitors on Callus Growth and Active Ingredient in Echinacea purpurea

Authors: Mohamed Abdelfattah Meawad Hamza, H. A. Bosila, M. A. Zewil

Abstract:

This research aims to study the effect of different sources of elicitors for increase growth and active ingredients in callus of Echinacea purpurea plant. Callus that have been obtained from leaf explant, was used to conduct the following studies. A study of the impact of both the phenylalanine and tyrosine (50, 100,150 and 200 mg/l.) individually and casein hydrolysate (100, 200 and 300 mg/l.) supplemented to MS medium. Results show that Casein hydrolysate 100 mg/l. has achieved the better results in both callus fresh weight 1.881 g/explant after 8 weeks of the incubation period and callus growth rate 0.398 g/explant after 6 weeks of the incubation period, while gave add 200 mg/l. The best results in total carbohydrate 2.444 mg/ 100 mg dry weight. Phenylalanine 150 mg/l. has achieved the best results in callus dry weight 0.156 g/explant after 8 weeks of incubation period. Tyrosine 200 mg/l. recorded the best result for positive production of caffeic acid 0.460 mg/ 100 mg dry weight after 4 weeks incubation period.

Keywords: tissue culture, echinacea, tyrosine, casein

Procedia PDF Downloads 239
80 MIMO UWB Antenna for Exploring Body Centric Communication

Authors: Osama Aziz, Hamza Ahmad, Muhibur Rahman

Abstract:

The performance of wireless communication systems has been suggested to be improved by UWB MIMO antenna systems. However, creating a successful UWB MIMO antenna is a difficult undertaking that calls for resolving a number of design issues, including radiation efficiency, size, and frequency range. This study's primary objective is to create a novel, highly effective, small-sized, ultra-wideband (UWB) multiple-input multiple-output (MIMO) antenna and investigate its potential applications in body-centric communication. Two radiating elements, shared ground plane, circular stubs, and t-shaped isolation elements are used to achieve the MIMO antenna. Outstanding multiplexing efficiency, significant peak gain across the entire UWB frequency spectrum, extremely low mutual coupling (S21=-16 dB), high diversity gain (DG>9), and low envelop correlation are achieved. The proposed antenna will be one of the promising candidates for body centric communication.

Keywords: UWB communication, UWB MIMO antennas, body-centric communication, diversity gain

Procedia PDF Downloads 32
79 Cytotoxic Activity Of Major Iridoids From Barleria Trispinosa (Forssk.) Vahl. Growing In Saudi Arabia

Authors: Hamza Assiry, Gamal A. Mohamed, Sabrin R. M. Ibrahim, Hossam M. Abdallah

Abstract:

Chemical investigation of the aerial parts of Barleria trispinosa(Forssk.) Vahl. resulted in isolation of four major iridoids that were identified as 6,8-O,O-diacetylshanhiside methyl ester (acetyl barlerin) (1), 8-O-acetylshanzhiside methyl ester (barlerin) (2), shanzhiside methyl ester (3), and 6- ⍺ -L-rhamnopyranosyl-8-O-acetylshanzihiside methyl ester (4). The isolated compounds were confirmed by detailed one and two-dimensional NMR. Isolated compounds were tested for their cytotoxic activity on breast cancer (MCF-7, MDA-MB-231) and colon cancer (LS174T) cell linesusing sulphorhodamine B (SRB) assay. It is noteworthy that compound 1 demonstrated a significant cytotoxic potential towards MDA-MB-231 cell line with IC5016.7 ± 2.7µg / mL compared to doxorubicin whereas compounds 2, showed moderate cytotoxic potential with IC5021.2 ± 1.9µg / mL on MCF-7. The other compounds showed moderate activity on the tested cell lines.

Keywords: acanthaceae, cytotoxicity, metabolites, barleria trispinosa

Procedia PDF Downloads 117
78 A Hybrid Watermarking Model Based on Frequency of Occurrence

Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis

Abstract:

Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: authentication, copyright protection, information hiding, ownership, watermarking

Procedia PDF Downloads 541
77 Thermal Regeneration of CO2 Spent Palm Shell-Polyetheretherketone Activated Carbon Sorbents

Authors: Usman D. Hamza, Noor S. Nasri, Mohammed Jibril, Husna M. Zain

Abstract:

Activated carbons (M4P0, M4P2, and M5P2) used in this research were produced from palm shell and polyetherether ketone (PEEK) via carbonization, impregnation, and microwave activation. The adsorption/desorption process was carried out using static volumetric adsorption. Regeneration is important in the overall economy of the process and waste minimization. This work focuses on the thermal regeneration of the CO2 exhausted microwave activated carbons. The regeneration strategy adopted was thermal with nitrogen purge desorption with N2 feed flow rate of 20 ml/min for 1 h at atmospheric pressure followed by drying at 1500C. Seven successive adsorption/regeneration processes were carried out on the material. It was found that after seven adsorption regeneration cycles; the regeneration efficiency (RE) for CO2 activated carbon from palm shell only (M4P0) was more than 90% while that of hybrid palm shell-PEEK (M4P2, M5P2) was above 95%. The cyclic adsorption and regeneration shows the stability of the adsorbent materials.

Keywords: activated carbon, palm shell-PEEK, regeneration, thermal

Procedia PDF Downloads 460
76 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 346
75 A Dam Break Analysis Using MIKE11

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchahed

Abstract:

The consequences of a dam breach can be devastating; both in terms of lives lost and damaged infrastructure and property. Hydraulic modeling provides a clear picture of the possible consequences of partial or complete failure of a dam, which is the key to carry out emergency planning and conduct reliable risk assessments. In this paper, the MIKE11 model developed by the Danish Hydrologic Institute (DHI) was used to simulate the flood wave propagation associated with a potential failure analysis failure of Zardezas dam located in the city of Skikda in the North East of Algeria. MIKE11 results including inundation maps and the representative channel/valley cross-sections depicting flow depth and maximal flow velocities showed that Zardezas reservoir presents a significant risk to downstream areas in the event of a dam failure. These results can be used as the basis of the development of an Emergency Action Plan (EAP).The main objective of this plan is to predict the appropriate steps to avoid or at least decrease the consequences of unexpected failure of Zardezas dam.

Keywords: MIKE11, dam break, inundation maps, emergency action plan

Procedia PDF Downloads 416
74 Management of Obstructive Hydrocephalus Secondary to a Posterior Fossa Tumor in Children: About 24 Cases Operated at the Central Hospital of Army

Authors: Hakim Derradji, M’Hammedi Yousra, Sabrou Abdelmalek, Tabet Nacer

Abstract:

Introduction: This is a retrospective study carried out at the Central Hospital of Army from 2017 to 2022. Its objective is to demonstrate the best surgical method for the management of obstructive hydrocephalus secondary to a posterior fossa tumor in children, in pre, per, and post-operative. Patients and Methods: During this period, 24 children (over 1 year old) were admitted for treatment of the posterior fossa tumor with obstructive secondary hydrocephalus and the majority of whom benefited from VCS followed by surgery and excision, the rest, received after evacuation from other hospital structures, were managed there beforehand with ventriculoperitoneal diversion or external drainage. We found that the way hydrocephalus is managed has implications for subsequent management, hence the need for this study to determine the effectiveness of different surgical procedures used in the treatment of hydrocephalus in these patients. The evaluation is made on the basis of revision rate, complications, survival, and radiological evaluation. Results: 6 patients (25%) received a ventriculoperitoneal shunt (VPD), 15 patients (62%) underwent a ventriculocysternostomy (VCS), and 3 patients (12.5%) received temporary ventricular drainage before or during tumor excision. The post-operative results were almost similar. Nevertheless, a high failure rate (25%) was observed. No deaths are recorded. In total, 75% of children who had a DVP were reoperated. The revision by VCS was performed, in addition to the 4 patients benefiting from a DVP, with one patient having received external drainage, and only one revision of a VCS was recorded. In the two patients who received external drainage, restoration of CSF outflow was observed following tumor resection. Conclusion: VCS is indicated in the first intention in the treatment of hydrocephalus secondary to a posterior fossa tumor, in view of the satisfactory results obtained and the high failure rate in DVP, especially with the presence of metastatic cells in the peritoneum, but can be considered as a second-line treatment.

Keywords: posterior fossa tumor, obstructive hydrocephalus, DVP, VCS

Procedia PDF Downloads 82
73 Dambreak Flood Analysis Using HEC-RAS and GIS Technologies

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchehed

Abstract:

The potential risks associated with dam break flooding could be considerable and result in major damage, including loss of life and property destruction. In the past, Algeria experienced such flood disasters; let’s recall the failure of Fergoug dam in 1881, this accident cost 200 lives, many houses and bridges were destroyed by the flooding. Recently the Algerian government have obligated to dam owners the development of detailed dam break Emergency Action Plans for its 64 major dams. The research presented here was conducted within this framework, Zardezas dam which is located in the city of Skikda in the North East of Algeria was the case of study. The model HEC-RAS was used for the hydrodynamic routing of the dam break flood wave. In addition, Geographic Information System (GIS) was used to create inundation maps and produce a visualization of the flood propagation in the Saf-Saf River.The simulation results that demonstrate the significance of Zardezas dam break flooding; constitute a real tool for developing emergency response plans and assisting territorial communities in land use planning.

Keywords: dam break, HEC-RAS, GIS, inundation maps, Emergency Action Plan

Procedia PDF Downloads 361
72 Improved Processing Speed for Text Watermarking Algorithm in Color Images

Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari

Abstract:

Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.

Keywords: steganography, watermarking, time complexity measurements, private keys

Procedia PDF Downloads 118
71 The Influence of the Discharge Point Position on the Pollutant Dispersion

Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Said, Hervé Bournot, Georges Le Palec

Abstract:

The distribution characteristics of pollutants released at different vertical inlet positions of an open channel are investigated with a three-dimensional numerical model. Pollutants are injected from time-dependent sources in a turbulent free surface flow. Numerical computations were carried out using ANSYS Fluent which is based on the finite volume approach. The air/water interface was modeled with the volume of the fluid method (VOF). By focusing on investigating the influences of flow on pollutants, it is found that pollutant released from the bottom position of the channel takes more time to disperse in the longitudinal direction of the flow in comparison with the case of pollutant released near the free surface. On the other hand, the pollutant released from the bottom position generates a vertical dispersion with decreased amplitude. These findings may assist in cost-effective scientific countermeasures to be taken for accident or planned pollutant discharged into a river.

Keywords: numerical simulation, pollutant release, turbulent free surface flow, VOF model

Procedia PDF Downloads 485
70 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 320
69 Multiannual Trends of Toxic and Potentially Toxic Microalgae (Ostreopsis cf. ovata, Prorocentrum lima, and Coolia monotis) in Sfax Coasts (North of Gabes Gulf, Tunisia)

Authors: Moncer Malika, Ben Brahim Mounir, Bel Hassen Malika, Hamza Asma

Abstract:

During the last decades, microalgae communities have presented significant changes in their structure and taxa composition along the Mediterranean littoral shallow waters. The main purpose of this work was to evaluate possible changes, over a 17-year scale (1997–2013), in the diversity and abundance of three toxic and potentially toxic microalgae related to changes in environmental parameters on Sfax coasts, a pole of shellfish production in Tunisia. In this 17-year span, a chronological series of data showed that a clear disparity from one year to another was observed in the abundance of studied species. The distribution of these species has been subjected to a seasonal cycle. The studied microalgae, especially Prorocentrum lima, seem to have significant relationships with many physicochemicaland meteorological parameters.

Keywords: long-term monitoring HABs, physico-chemical parameters, meteorological parameters, Prorocentrum lima, Ostreopsis cf. ovata, Coolia monotis

Procedia PDF Downloads 90
68 Second Representation of Modules over Commutative Rings

Authors: Jawad Abuhlail, Hamza Hroub

Abstract:

Let R be a commutative ring. Representation theory studies the representation of R-modules as (possibly finite) sums of special types of R-submodules. Here we are interested in a class of R-modules between the class of semisimple R-modules and the class of R-modules that can be written as (possibly finite) sums of secondary R-submodules (we know that every simple R-submodule is secondary). We investigate R-modules which can be written as (possibly finite) sums of second R-submodules (we call those modules second representable). Moreover, we investigate the class of (main) second attached prime ideals related to a module with such representation. We provide sufficient conditions for an R-module M to get a (minimal) second representation. We also found the collection of second attached prime ideals for some types of second representable R-modules, in particular within the class of injective R-modules. As we know that every simple R-submodule is second and every second R-submodule is secondary, we can see the importance of the second representable R-module.

Keywords: lifting modules, second attached prime ideals, second representations, secondary representations, semisimple modules, second submodules

Procedia PDF Downloads 157
67 CFD Study of Free Surface Flows Resulting from a Dam-Breaking

Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Saïd, Hervé Bournot, Georges Le Palec

Abstract:

Free surface flows caused by dam breaks in channels or rivers is an attention-getting subject to the engineering practice, however, the studies are few to be reported. In this paper, a numerical investigation of unsteady free surface flows resulting from a dam-breaking in a rectangular channel is studied. Numerical computations were carried out using ANSYS Fluent which is based on the finite volume approach. The air/water interface was modeled with the volume of fluid method (VOF). Verification for a typical dam-break problem is analyzed by comparing the present results with others and very good agreement is obtained. The present approach is then used to predict the characteristics of free surface flow due to the dam breaking in channel. The characteristics of complex unsteady free surface flow in these examples are clearly explained. The numerical results show that the flow became more disturbed after impacting the vertical wall, then a recirculation zone, as well as turbulence phenomena, were created. At this instant, a cavity of air was included on the flow. The results agree well with the experimental data found in the literature.

Keywords: CFD, dam-break, free surface, turbulent flows, VOF

Procedia PDF Downloads 286
66 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 237
65 Translation and Ideology: New Perspectives

Authors: Hamza Salih

Abstract:

Since translation is no longer viewed as a mere replacement of linguistic codes from one language to another, it has increasingly been considered, especially with the advent of the cultural turn in the late 70's, in relation to the broader external context in which it takes place. According to scholars in the field, the translation process is determined by the political, economic and cultural values which exert external pressures on the translator. Correspondingly, the relationship between translation as an act of re-writing the original text and ideology has already been established. This paper addresses the issue of how ideology comes into play in the translational process and what strategies the translator adopts to foreground or circumvent ideological constraints. Along with this, the paper will touch upon the notions of censorship, manipulation, subversion and domestication which are deemed of relevance to this very topic. In fact, after the domination of the empirically-oriented linguistic approaches in translation studies, the relationship between translation and ideology has to be foregrounded to draw attention to the fact that the translation process is not a mere text-to-text linguistic transfer, but, on the contrary, takes place in the midst of economic, political, cultural and religious variables, which some scholars subsume under the category ideology.

Keywords: translation, language, ideology, subversion, censorship and manipulation

Procedia PDF Downloads 221
64 Combined Model Predictive Controller Technique for Enhancing NAO Gait Stabilization

Authors: Brahim Brahmi, Mohammed Hamza Laraki, Mohammad Habibur Rahman, Islam M. Rasedul, M. Assad Uz-Zaman

Abstract:

The humanoid robot, specifically the NAO robot must be able to provide a highly dynamic performance on the soccer field. Maintaining the balance of the humanoid robot during the required motion is considered as one of a challenging problems especially when the robot is subject to external disturbances, as contact with other robots. In this paper, a dynamic controller is proposed in order to ensure a robust walking (stabilization) and to improve the dynamic balance of the robot during its contact with the environment (external disturbances). The generation of the trajectory of the center of mass (CoM) is done by a model predictive controller (MPC) conjoined with zero moment point (ZMP) technique. Taking into account the properties of the rotational dynamics of the whole-body system, a modified previous control mixed with feedback control is employed to manage the angular momentum and the CoM’s acceleration, respectively. This latter is dedicated to provide a robust gait of the robot in the presence of the external disturbances. Simulation results are presented to show the feasibility of the proposed strategy.

Keywords: preview control, Nao robot, model predictive control

Procedia PDF Downloads 104