Search results for: Sarah Mahmoud Ali Kaooh
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 598

Search results for: Sarah Mahmoud Ali Kaooh

538 Black Bodies Matter: The Contemporary Manifestation of Saartjie Baartman

Authors: Rokeshia Renné Ashley

Abstract:

The purpose of this study is to understand the perception of historical figure Saartjie 'Sara/Sarah' Baartman from a cross cultural perspective of black women in the United States and black women in South Africa. Semi-structured interviews (n = 30) uncover that many women in both countries did not have an accurate representation, recollection, or have been exposed to the story of Baartman. Nonetheless, those who were familiar with Baartman’s story, those participants compared her to modern examples of black women who are showcased in a contemporary familiarity. The women are described by participants as women who reveal their bodies in a sexualized manner and have the curves that are similar to Baartman’s historic figure. This comparison emphasized a connection to popular images of black women who represent the curvaceous ideal. Findings contribute to social comparison theory by providing a lens for examining black women’s body image.

Keywords: black women, body modification, media, South Africa

Procedia PDF Downloads 281
537 Circular Economy: An Overview of Principles, Strategies, and Case Studies

Authors: Dina Mohamed Ahmed Mahmoud Bakr

Abstract:

The concept of a circular economy is gaining increasing attention as a way to promote sustainable economic growth and reduce the environmental impact of human activities. The circular economy is a systemic approach that aims to keep materials and resources in use for as long as possible, minimize waste and pollution, and regenerate natural systems. The purpose of this article is to present a summary of the principles and tactics employed in the circular economy, along with examples of prosperous circular economy projects implemented in different sectors across Japan, Austria, the Netherlands, South Africa, Germany, and the United States. The paper concludes with a discussion of the challenges and opportunities associated with the transition to a circular economy and the policy interventions that can support this transition.

Keywords: circular economy, waste reduction, sustainable development, recycling

Procedia PDF Downloads 58
536 The Influence of Trait of Personality, Stress and Driver Behavior on Road Accident among Bas Driver in Indonesia

Authors: Fikri, Rozmi Ismail, Fatimah Wati Halim, Sarah Waheeda

Abstract:

The aim of this research is to investigate the influence of personality and driver behavior on road accident among bus driver who have the high risk behavior on road accident in Riau Province. The hypotheses proposed this research is there are has a significant influences of Treat of Personality and Driver Behavior among bus driver in Riau Province Indonesia. Subject participated in this research are 100 bus driver in Riau Province. This study using the purposive random sampling technique and quantitative design. The data is collected using the Big Five Personality questionnaires, Driver Behavior questionnaires and Road Accident Inventory. Research found that there are significant influence of personality and driver behavior on road accident among bus driver in Riau Province Indonesia.

Keywords: personality, driver behavior, driver stress, road accident

Procedia PDF Downloads 443
535 Transform to Succeed: An Empirical Analysis of Digital Transformation in Firms

Authors: Sarah E. Stief, Anne Theresa Eidhoff, Markus Voeth

Abstract:

Despite all progress firms are facing the increasing need to adapt and assimilate digital technologies to transform their business activities in order to pursue business development. By using new digital technologies, firms can implement major business improvements in order to stay competitive and foster new growth potentials. The corresponding phenomenon of digital transformation has received some attention in previous literature in respect to industries such as media and publishing. Nevertheless, there is a lack of understanding of the concept and its organization within firms. With the help of twenty-three in-depth field interviews with German experts responsible for their company’s digital transformation, we examined what digital transformation encompasses, how it is organized and which opportunities and challenges arise within firms. Our results indicate that digital transformation is an inevitable task for all firms, as it bears the potential to comprehensively optimize and reshape established business activities and can thus be seen as a strategy of business development.

Keywords: business development, digitalization, digital strategies, digital transformation

Procedia PDF Downloads 372
534 Genetic Algorithm Optimization of Multiple Resources for Multi-Projects

Authors: A. Samer Ezeldin, Sarah A. Fotouh

Abstract:

Optimization of resources is very important in all fields, as in construction management. Project managers have to face problems regarding management of cost, time and available resources of single projects and more problems arise when managing multiple projects. Most of the studies focused on optimization of resources for a single project, but, this paper will discuss the design and modeling of multiple resources optimization for multiple projects using Genetic Algorithm. Most of the companies in construction industry optimize the resources for single projects only, but with the presence of several mega projects in several developing countries running at the same time, there is a need for a model to enhance the efficiency of available resources and decreases the fluctuation as much as possible. The proposed model calculates the cost of each resource, tries to minimize the cost of extra resources as much as possible and generates the schedule of each project within a selected program.

Keywords: construction management, genetic algorithm, multiple projects, multiple resources, optimization

Procedia PDF Downloads 413
533 A Variable Incremental Conductance MPPT Algorithm Applied to Photovoltaic Water Pumping System

Authors: Sarah Abdourraziq, Rachid Elbachtiri

Abstract:

The use of solar energy as a source for pumping water is one of the promising areas in the photovoltaic (PV) application. The energy of photovoltaic pumping systems (PVPS) can be widely improved by employing an MPPT algorithm. This will lead consequently to maximize the electrical motor speed of the system. This paper presents a modified incremental conductance (IncCond) MPPT algorithm with direct control method applied to a standalone PV pumping system. The influence of the algorithm parameters on system behavior is investigated and compared with the traditional (INC) method. The studied system consists of a PV panel, a DC-DC boost converter, and a PMDC motor-pump. The simulation of the system by MATLAB-SIMULINK is carried out. Simulation results found are satisfactory.

Keywords: photovoltaic pumping system (PVPS), incremental conductance (INC), MPPT algorithm, boost converter

Procedia PDF Downloads 360
532 EEG-Based Screening Tool for School Student’s Brain Disorders Using Machine Learning Algorithms

Authors: Abdelrahman A. Ramzy, Bassel S. Abdallah, Mohamed E. Bahgat, Sarah M. Abdelkader, Sherif H. ElGohary

Abstract:

Attention-Deficit/Hyperactivity Disorder (ADHD), epilepsy, and autism affect millions of children worldwide, many of which are undiagnosed despite the fact that all of these disorders are detectable in early childhood. Late diagnosis can cause severe problems due to the late treatment and to the misconceptions and lack of awareness as a whole towards these disorders. Moreover, electroencephalography (EEG) has played a vital role in the assessment of neural function in children. Therefore, quantitative EEG measurement will be utilized as a tool for use in the evaluation of patients who may have ADHD, epilepsy, and autism. We propose a screening tool that uses EEG signals and machine learning algorithms to detect these disorders at an early age in an automated manner. The proposed classifiers used with epilepsy as a step taken for the work done so far, provided an accuracy of approximately 97% using SVM, Naïve Bayes and Decision tree, while 98% using KNN, which gives hope for the work yet to be conducted.

Keywords: ADHD, autism, epilepsy, EEG, SVM

Procedia PDF Downloads 149
531 Social Space or the Art of Belonging: The Socio-Spatial Approach in the Field of Residential Facilities for Persons with Disabilities

Authors: Sarah Reker

Abstract:

The Convention on the Rights of Persons with Disabilities (CRPD) provides the basis of this study. For all countries which have ratified the convention since its entry into force in 2007, the effective implementation of the requirements often leads to considerable challenges. Furthermore, missing indicators make it difficult to measure progress. Therefore, the aim of the research project is to contribute to analyze the consequences of the implementation process on the inclusion and exclusion conditions for people with disabilities in Germany. Disabled People’s Organisations and other associations consider the social space to be relevant for the successful implementation of the CRPD. Against this background, the research project wants to focus on the relationship between a barrier-free access to the social space and the “full and effective participation and inclusion” (Art. 3) of persons with disabilities. The theoretical basis of the study is the sociological theory of social space (“Sozialraumtheorie”).

Keywords: decentralisation, qualitative research, residential facilities, social space

Procedia PDF Downloads 323
530 Photovoltaic Water Pumping System Application

Authors: Sarah Abdourraziq

Abstract:

Photovoltaic (PV) water pumping system is one of the most used and important applications in the field of solar energy. However, the cost and the efficiency are still a concern, especially with continued change of solar radiation and temperature. Then, the improvement of the efficiency of the system components is a good solution to reducing the cost. The use of maximum power point tracking (MPPT) algorithms to track the output maximum power point (MPP) of the PV panel is very important to improve the efficiency of the whole system. In this paper, we will present a definition of the functioning of MPPT technique, and a detailed model of each component of PV pumping system with Matlab-Simulink, the results shows the influence of the changing of solar radiation and temperature in the output characteristics of PV panel, which influence in the efficiency of the system. Our system consists of a PV generator, a boost converter, a motor-pump set, and storage tank.

Keywords: PV panel, boost converter, MPPT, MPP, PV pumping system

Procedia PDF Downloads 357
529 First and Second Order Gm-C Filters

Authors: Rana Mahmoud

Abstract:

This study represents a systematic study of the Operational Transconductance Amplifiers capacitance (OTA-C) filters or as it is often called Gm-C filters. OTA-C filters have been paid a great attention for the last decades. As Gm-C filters operate in an open loop topology, this makes them flexible to perform in low and high frequencies. As such, Gm-C filters can be used in various wireless communication applications. Another property of Gm-C filters is its electronic tunability, thus different filter frequency characteristics can be obtained without changing the inductance and resistance values. This can be achieved by an OTA (Operational Transconductance Amplifier) and a capacitor. By tuning the OTA transconductance, the cut-off frequency will be tuned and different frequency responses are achieved. Different high-order analog filters can be design using Gm-C filters including low pass, high pass and band pass filters. 1st and 2nd order low pass, high pass and band pass filters are presented in this paper.

Keywords: Gm-C, filters, low-pass, high-pass, band-pass

Procedia PDF Downloads 84
528 Robust Fault Diagnosis for Wind Turbine Systems Subjected to Multi-Faults

Authors: Sarah Odofin, Zhiwei Gao, Sun Kai

Abstract:

Operations, maintenance and reliability of wind turbines have received much attention over the years due to rapid expansion of wind farms. This paper explores early fault diagnosis scale technique based on a unique scheme of a 5MW wind turbine system that is optimized by genetic algorithm to be very sensitive to faults and resilient to disturbances. A quantitative model based analysis is pragmatic for primary fault diagnosis monitoring assessment to minimize downtime mostly caused by components breakdown and exploit productivity consistency. Simulation results are computed validating the wind turbine model which demonstrates system performance in a practical application of fault type examples. The results show the satisfactory effectiveness of the applied performance investigated in a Matlab/Simulink/Gatool environment.

Keywords: disturbance robustness, fault monitoring and detection, genetic algorithm, observer technique

Procedia PDF Downloads 343
527 Observer-based Robust Diagnosis for Wind Turbine System

Authors: Sarah Odofin, Zhiwei Gao

Abstract:

Operations and maintenance of wind turbine have received much attention by researcher due to rapid expansion of wind farms. This paper explores a novel fault diagnosis that is designed and optimized to be very sensitive to faults and robust to disturbances. The faults considered are the sensor faults of which the augmented observer is considered to enlarge faults and to be robust to disturbance. A qualitative model based analysis is proposed for early fault diagnosis to minimize downtime mostly caused by components breakdown and exploit productivity. Simulation results are computed validating the models provided which demonstrates system performance using practical application of fault type examples. The results demonstrate the effectiveness of the developed techniques investigated in a Matlab/Simulink environment.

Keywords: wind turbine, condition monitoring, genetic algorithm, fault diagnosis, augmented observer, disturbance robustness, fault estimation, sensor monitoring

Procedia PDF Downloads 457
526 A Rare Case of Acquired Benign Tracheoesophageal Fistula: Case Report and Literature Review

Authors: Sarah Bouayyad, Ajay Nigam, Meera Beena

Abstract:

Acquired benign tracheoesophageal fistula is a rare medical condition that usually results from trauma, foreign bodies, or granulomatous infections. This is an unusual presentation of a male patient with a history of laryngectomy who had had over a period of several years inappropriately and vigorously used valve cleaning brushes to clean tracheal secretions, which had led to the formation of a tracheoesophageal fistula. Due to the patient’s obsessive habit, we couldn’t manage him using conventional surgical methods. Instead, we opted for the placement of a salivary bypass tube, which yielded good results and recovery. To the best of our knowledge, no other case of similar etiology has been published. We would like to highlight the importance of appropriate patient selection and education prior to performing a tracheoesophageal puncture to avoid developing life-threatening complications as demonstrated in our case report.

Keywords: tracheoesophageal fistula, speech valve, endoscopic insertion of salivary bypass tube, head and neck malignancies

Procedia PDF Downloads 88
525 Multiple Fault Diagnosis in Digital Circuits using Critical Path Tracing and Enhanced Deduction Algorithm

Authors: Mohamed Mahmoud

Abstract:

This paper has developed an effect-cause analysis technique for fault diagnosis in digital circuits. The main algorithm of our technique is based on the Enhanced Deduction Algorithm, which processes the real response of the CUT to the applied test T to deduce the values of the internal lines. An experimental version of the algorithm has been implemented in C++. The code takes about 7592 lines. The internal values are determined based on the logic values under the permanent stuck-fault model. Using a backtracking strategy guarantees that the actual values are covered by at least one solution, or no solution is found.

Keywords: enhanced deduction algorithm, backtracking strategy, automatic test equipment, verfication

Procedia PDF Downloads 86
524 Media (Il) Literacy: An Evaluation of the Curriculum and Implementation of the Department of Education's Special Program in Journalism

Authors: Sarah Isabelle S. Torres

Abstract:

This study evaluated the curriculum and implementation of the Special Program in Journalism (SPJ). By conducting surveys, focus group discussions, and interviews and by analyzing the school publication of five national high schools, the researcher found out that SPJ is ineffective in instilling media literacy to the students. Media Literacy will help the students understand how media operates, thus, they will be able to produce outputs that are socially relevant, critical, and in-depth. For one, the curriculum includes lessons and activities that are mostly technical in nature. There are no theoretical topics such as ethics, history of the press, or media ownership. Second, most of the SPJ teachers have little background on Journalism and they are not trained enough to teach the program effectively. Third, most of the students are not really inclined in Journalism and do not see themselves as media practitioners in the future. Lastly, the Department of Education’s budget for the program is far from what the curriculum needs. All of these lead to the low Media Literacy levels of the students. SPJ, therefore, has to be reevaluated and amended. In conclusion, Media Literacy should be added in the curriculum so the students will not only be equipped with technical skills but with theoretical knowledge, as well.

Keywords: education, journalism, media, media literacy

Procedia PDF Downloads 364
523 InfoMiracles in the Qur’an and a Mathematical Proof to the Existence of God

Authors: Mohammad Mahmoud Mandurah

Abstract:

The existence of InfoMiracles in scripture is evidence that the scripture has a divine origin. It is also evidence to the existence of God. An InfoMiracle is an information-based miracle. The basic component of an InfoMiracle is a piece of information that could not be obtained by a human except through a divine channel. The existence of a sufficient number of convincing InfoMiracles in a scripture necessitates the existence of the divine source to these InfoMiracles. A mathematical equation is developed to prove that the Qur’an has a divine origin, and hence, prove the existence of God. The equation depends on a single variable only, which is the number of InfoMiracles in the Qur’an. The Qur’an is rich with InfoMiracles. It is shown that the existence of less than 30 InfoMiracles in the Qur’an is sufficient proof to the existence of God and that the Qur’an is a revelation from God.

Keywords: InfoMiracle, God, mathematical proof, miracle, probability

Procedia PDF Downloads 181
522 Effect of Ginger, Red Pepper, and Their Mixture in Diet on Growth Performance and Body Composition of Oscar, Astronotus ocellatus

Authors: Sarah Jorjani, Afshin Ghelichi, Mazyar Kamali

Abstract:

The aim of this study was to estimate the effect of addition of ginger and red pepper and their mixture in diet on growth performance, survival rate and body composition of Astronotus ocellatus (Oscar fish). This study had been carried out for 8 weeks. For this reason 132 oscar fishes with intial weight of 2.44±0.26 (gr) were divided into 4 treatments with three replicate as compeletly randomize design test and fed by 100% Biomar diet (T1), Biomar + red pepper (55 mg/kg) (T2), Biomar + ginger (1%) (T3) and Biomar + mixture of red pepper and ginger (T4).The fish were fed in 5% of their body weight. The results showed T2 have significant differences in most of growth parameters in compare with other treatments, such as PBWI, SGR, PER and SR (P < 0.05), but there were no significant differences between treatments in FCR and FE (P > 0.05).

Keywords: red pepper, ginger, oscar fish, growth performance, body composition

Procedia PDF Downloads 384
521 Polymerization: An Alternative Technology for Heavy Metal Removal

Authors: M. S. Mahmoud

Abstract:

In this paper, the adsorption performance of a novel environmental friendly material, calcium alginate gel beads as a non-conventional technique for the successful removal of copper ions from aqueous solution are reported on. Batch equilibrium studies were carried out to evaluate the adsorption capacity and process parameters such as pH, adsorbent dosages, initial metal ion concentrations, stirring rates and contact times. It was observed that the optimum pH for maximum copper ions adsorption was at pH 5.0. For all contact times, an increase in copper ions concentration resulted in decrease in the percent of copper ions removal. Langmuir and Freundlich's isothermal models were used to describe the experimental adsorption. Adsorbent was characterization using Fourier transform-infrared (FT-IR) spectroscopy and Transmission electron microscopy (TEM).

Keywords: adsorption, alginate polymer, isothermal models, equilibrium

Procedia PDF Downloads 414
520 Analyzing the Effect of Ambient Temperature and Loads Power Factor on Electric Generator Power Rating

Authors: Ahmed Elsebaay, Maged A. Abu Adma, Mahmoud Ramadan

Abstract:

This study presents a technique clarifying the effect of ambient air temperature and loads power factor changing from standard values on electric generator power rating. The study introduces an optimized technique for selecting the correct electric generator power rating for certain application and operating site ambient temperature. The de-rating factors due to the previous effects will be calculated to be applied on a generator to select its power rating accurately to avoid unsafe operation and save its lifetime. The information in this paper provides a simple, accurate, and general method for synchronous generator selection and eliminates common errors.

Keywords: ambient temperature, de-rating factor, electric generator, power factor

Procedia PDF Downloads 315
519 Optimal Planning of Dispatchable Distributed Generators for Power Loss Reduction in Unbalanced Distribution Networks

Authors: Mahmoud M. Othman, Y. G. Hegazy, A. Y. Abdelaziz

Abstract:

This paper proposes a novel heuristic algorithm that aims to determine the best size and location of distributed generators in unbalanced distribution networks. The proposed heuristic algorithm can deal with the planning cases where power loss is to be optimized without violating the system practical constraints. The distributed generation units in the proposed algorithm is modeled as voltage controlled node with the flexibility to be converted to constant power factor node in case of reactive power limit violation. The proposed algorithm is implemented in MATLAB and tested on the IEEE 37 -node feeder. The results obtained show the effectiveness of the proposed algorithm.

Keywords: distributed generation, heuristic approach, optimization, planning

Procedia PDF Downloads 481
518 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 33
517 Non-factoid Arabic Question-Answering Systems: A Review of Existing Studies, Research Issues, and Future Trends

Authors: Aya Mousa, Mahmoud Alsaheb

Abstract:

Question Answering System (QAS) aims to provide the most suitable answer to the user's question in any natural language. In the recent future, it will be a future version of web search. Much research has already been done on answering Arabic factoid questions and achieved good accuracy. In contrast, the progress in research on Arabic non-factoid question answering is still immature. In this survey, we summarize, discuss, and compare the existing Arab non-factoid question-answering systems to identify the limitations and the achievements that were accomplished. Furthermore, we investigate the challenges in developing non-factoid Arabic QAS and the possible future improvements. The survey is written to help the researchers to understand the field of Arabic non-factoid QAS and to motivate them to utilize different approaches to develop and enhance the Non-factoid Arabic QAS

Keywords: Arabic question answering system, non-factoid question answering, Arabic NLP, question answering

Procedia PDF Downloads 49
516 Selection of Endophytcs Fungi Isolated from Date Palm, Halotolerants and Productors of Secondary Metabolite

Authors: Fadila Mohamed Mahmoud., Derkaoui I., Krimi Z.

Abstract:

Date palm is a plant which presents a very good adaptation to the difficult conditions of the environment in particular to the drought and saline stress even at high temperatures. This adaptation is related on the biology of the plant and to the presence of a microflora endophyte which live inside its tissues. Fifteen endophytics fungi isolated from date palm were tested in vitro in the presence of various NaCl concentrations to select halotolerantes isolates. These same endophytes were tested for their colonizing capacity by the description of the production of secondary metabolites more particularly the enzymes (pectinases, proteases, and phosphorylases), and the production of antibiotics and growth hormones. Significant difference was observed between the isolates with respect to the tests carried out.

Keywords: Date palm, Halotolerantes, endophyte, Secondary metabolites.

Procedia PDF Downloads 472
515 Improvement of Antibacterial Activity for Ceftazidime by Partially Purified Tannase from Penicillium expansum

Authors: Sahira N. Muslim, Alaa N. Mohammed, Saba Saadoon Khazaal, Batool Kadham Salman, Israa M. S. AL-Kadmy, Sraa N. Muslim, Ahmed S. Dwaish, Sawsan Mohammed Kareem, Sarah N. Aziz, Ruaa A. Jasim

Abstract:

Tannase has wide applications in food, beverage, brewing, cosmetics and chemical industries and one of the major applications of tannase is the production of gallic acid. Gallic acid is used for manufacturing of trimethoprim. In the present study, a local fungal strain of Penicillium expansum A4 isolated from spoilt apple samples gave the highest production level of tannase. Tannase was partially purified with a recovery yield of 92.52% and 6.32 fold of purification by precipitation using ammonium sulfate at 50% saturation. Tannase led to increased antimicrobial activity of ceftazidime against Pseudomonas aeruginosa and S. aureus and had a synergism effect at low concentrations of ceftazidime, and thus, tannase may be a useful adjuvant agent for the treatment of many bacterial infections in combination with ceftazidime.

Keywords: ceftazidime, Penicillium expansum, tannase, antimicrobial activity

Procedia PDF Downloads 687
514 Hybrid Subspace Approach for Time Delay Estimation in MIMO Systems

Authors: Mojtaba Saeedinezhad, Sarah Yousefi

Abstract:

In this paper, we present a hybrid subspace approach for Time Delay Estimation (TDE) in multivariable systems. While several methods have been proposed for time delay estimation in SISO systems, delay estimation in MIMO systems were always a big challenge. In these systems the existing TDE methods have significant limitations because most of procedures are just based on system response estimation or correlation analysis. We introduce a new hybrid method for TDE in MIMO systems based on subspace identification and explicit output error method; and compare its performance with previously introduced procedures in presence of different noise levels and in a statistical manner. Then the best method is selected with multi objective decision making technique. It is shown that the performance of new approach is much better than the existing methods, even in low signal-to-noise conditions.

Keywords: system identification, time delay estimation, ARX, OE, merit ratio, multi variable decision making

Procedia PDF Downloads 296
513 Diagnosis Of Static, Dynamic, And Mixed Eccentricity In Line Start Permanent Magnet Synchronous Motor By Using FEM

Authors: Mohamed Moustafa Mahmoud Sedky

Abstract:

In line start permanent magnet synchronous motor, eccentricity is a common fault that can make it necessary to remove the motor from the production line. However, because the motor may be inaccessible, diagnosing the fault is not easy. This paper presents an FEM that identifies different models, static eccentricity, dynamic eccentricity, and mixed eccentricity, at no load and full load. The method overcomes the difficulty of applying FEMs to transient behavior. It simulates motor speed, torque and flux density distribution along the air gap for SE, DE, and ME. This paper represents the various effects of different eccentricities types on the transient performance.

Keywords: line start permanent magnet, synchronous machine, static eccentricity, dynamic eccentricity, mixed eccentricity

Procedia PDF Downloads 333
512 Study on Parallel Shear Stress of Cement-Wood Composites Using Pinus sp. and Eucalyptus sp. in natura and Treated with CCA

Authors: Rodrigo D. S. Oliveira, Sarah David-Muzel, Maristela Gava, Victor A. De Araujo, Glaucia A. Prates, Juliana Cortez-Barbosa

Abstract:

Improper disposal of treated wood waste is a problem of the timber sector, since this residue is toxic, due to the harmful characteristics of the preservative substances. An environmentally friendly alternative is the use of this waste for the production of cement-wood composites. The aim of this work was to study the possibility of using wood treated with CCA (Chromated Cooper Arsenate) in cement-wood. Specimens of Pinus sp. and Eucalyptus sp. were produced with wood raw in natura and treated with CCA. A test was performed to determine the parallel shear stress of samples after 14 days of drying, according to the Brazilian Standard NBR-7215/97. Based on the analyzed results it is concluded that the use of wood treated with CCA is not feasible in cement-wood production, because the composite samples of treated wood showed lower mechanical strength in shear stress than those with wood in natura.

Keywords: waste recovery, wood composites, cement-wood, wood preservation, chromated copper arsenate

Procedia PDF Downloads 572
511 Different Biological and Chemical Parameters that Influence the Polyphenols from Some Medicinal Plants in Western Algeria

Authors: Mustapha Mahmoud, Fouzia Toumi Benali, Mohamed Benyahia, Sofiane Bouazza

Abstract:

This work focuses on the influences of biological and chemical parameters on the phenolic compounds such as flavonoids and tannins in different medicinal plants in western Algeria (Papaver rhoeas, Daphnegnidium, Lavandula multifida, Lavandula dentata, Lavandula stoicha, ...). Thus we look the difference between species of the same genus, difference between the different organs of the same species, the influence of environment all temperature influences, time, percentage of solvent on the extraction. Quantification of the phenolic compounds was performed by spectrophotometric method then treated with statistics tools such as variance analysis, multivariant analyzes, response surface methodology). The results show that the polyphenols are influenced by the parameters mentioned.

Keywords: polyphenols, influences, medicinal plants, west Algeria

Procedia PDF Downloads 252
510 Demand for Domestic Marine and Coastal Tourism and Day Trips on an Island Nation

Authors: John Deely, Stephen Hynes, Mary Cawley, Sarah Hogan

Abstract:

Domestic marine and coastal tourism have increased in importance over the last number of years due to the impacts of international travel, environmental concerns, associated health benefits and COVID-19 related travel restrictions. Consequently, this paper conceptualizes domestic marine and coastal tourism within an economic framework. Two logit models examine the factors that influence participation in the coastal day trips and overnight stays markets, respectively. Two truncated travel cost models are employed to explore trip duration, one analyzing the number of day trips taken and the other examining the number of nights spent in marine and coastal areas. Although a range of variables predicts participation, no one variable had a significant and consistent effect on every model. A division in access to domestic marine and coastal tourism is also observed based on variation in household income. The results also indicate a vibrant day trip market and large consumer surpluses.

Keywords: domestic marine and coastal tourism, day tripper, participation models, truncated travel cost model

Procedia PDF Downloads 94
509 The Impact of Gender Inequality on Corruption:Evidence from Politics and Labor Market

Authors: Mahmoud Salari

Abstract:

Corruption and gender inequality are the main topics of interest for both economists and policymakers. This study develops various static and dynamic estimation models to examine the impact of gender inequality in politics and the labor market on corruption using data of 170 countries from 1998 to 2014. This study uses two most reliable corruption indexes, including Corruption Perceptions Index (CPI) and Corruption Control (CC), to evaluate corruption levels across countries. The results indicate that gender inequality in politics has a strong impact on corruption level, and those countries that have larger/smaller gender inequality in their parliaments are faced with higher/lower corruption, respectively. Meanwhile, there is no enough evidence that supports the relationship between gender inequality in the labor market and corruption, and the results indicate that gender inequality in the labor market is not directly linked to the corruption level.

Keywords: corruption, female labor force participation, politics, gender inequality

Procedia PDF Downloads 151