Search results for: Hanan Elsayed Zaghla
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 38

Search results for: Hanan Elsayed Zaghla

38 Impact of Standardized Therapeutic Hypothermia Protocol on Neurological Performance after Resuscitation from Cardiac Arrest

Authors: Tahsien Mohamed Okasha, Warda Youssef Mohamed Morsy, Hanan Elsayed Zaghla

Abstract:

We hypothesized that post cardiac arrest patients with Glasgow Coma Scale (GCS) score of less than 8 and who will be exposed to therapeutic hypothermia protocol will exhibit improvement in their neurological performance. 17 subjects were enrolled in this study all over one year. The study was carried out using Quasi-experimental research design. Four tools were used for data collection of this study: Demographic and medical data sheet, Post cardiac arrest health assessment sheet, Bedside Shivering Assessment Scale (BSAS), and Glasgow Pittsburgh cerebral performance category scale (CPC). The mean age was X̅ ± SD = 53 ± 8.122 years, 47.1% were arrested because of cardiac etiology. 35.3% subjects were initially arrested in form of ventricular tachycardia (VT), 23.5% initially arrested in form of ventricular fibrillation (VF), and 29.4% in form of A-Systole. Favorable neurological outcome was seen among 70.6%. There was significant statistical difference in WBC, Platelets, blood gases value, random blood sugar. Also, initial arrest rhythm, etiology of cardiac arrest, and shivering status were significantly correlated with cerebral performance categories score. Therapeutic hypothermia has positive effects on neurological performance among post cardiac arrest patients with GCS score of less than 8. Replication of the study on larger probability sample, with randomized control trial design is recommended with further study for suggesting nursing protocol for patients undergoing therapeutic hypothermia is recommended.

Keywords: Therapeutic hypothermia, neurological performance, after resuscitation from cardiac arrest, initial arrest rhythm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 292
37 Classification of Attaks over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: Cloud computing, security, classification, risk.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2082
36 Basic Evaluation for Polyetherimide Membrane Using Spectroscopy Techniques

Authors: Hanan Alenezi

Abstract:

Membrane performance depends on the kind of solvent used in preparation. A membrane made by Polyetherimide (PEI) was evaluated for gas separation using X-Ray Diffraction (XRD), Scanning electron microscope (SEM), and Energy Dispersive X-Ray Spectroscopy (EDS). The purity and the thickness are detected to evaluate the membrane in order to optimize PEI membrane preparation.

Keywords: Energy Dispersive X-Ray Spectroscopy, EDS, membrane, Polyetherimide, PEI, Scanning electron microscope, SEM, Solvent, X-Ray Diffraction, XRD.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 899
35 Ba‘albakī’s Influence on 1950s and 1960s Lebanese Women Writers

Authors: Khaled Igbaria

Abstract:

While Ba‘albakī ceased writing or publishing since 1964, it is considerable and significant to investigate Ba‘albakī’s influence on others. This paper examines her influence on three Lebanese women writers: Emily Nasrallah, Muná Jabbūr, and Hanan al-Shaykh. However, the aim is not simply to examine the influence of the writer on these three authors, but rather to note similarities and differences in the challenges they faced and the agendas they followed in their fiction writing. For each of these writers, this article will describe elements of their literature, and then sketch out the influence which Ba‘albakī has had on them. This paper relies on material from Sidawi because it includes interviews with the female writers discussed that are relevant to the current discussion. Sidawi asked them about Ba‘albakī and her influence on them, the challenges they faced, and how they coped with them. This paper points out their comments using their own words. To be clear, examining these writers' notes and works is beyond the scope of this paper. To sum up, there are significant parallels between the life and work of Ba‘albakī, and other Lebanese women writers such as Nasrallah, Jabbūr and al-Shaykh. Like Ba‘albakī, Nasrallah and al-Shaykh also suffered in their struggle against their families. Nasrallah and al-Shaykh, like Ba‘albakī, suffered because their society did not trust in their abilities and creativity. Ba‘albakī opted for isolation because of her conflict with patriarchal society including the Lebanese women’s groups, while Nasrallah’s isolation was because she preferred individualism and autonomy, and Jabbūr, as could be speculated, was not able to cope with the suffering caused by her role as a woman writer within Lebanese society. Whereas Ba‘albakī isolated herself from the Lebanese women’s groups, focusing instead on her feminist writing and joining the Shi'r group, Al-Shaykh and the Lebanese women’s groups are able to cooperate in harmony. Furthermore, while Nasrallah and Al-Shaykh continued to publish fiction, Ba‘albakī stopped publishing fiction in 1964. All of the above confirms not only that it is worthy to investigate deeply and academically both the biography and the works of Ba‘albakī, but also that she deserves to include her throughout the top great Arab female writers, at the time, like Al-Shaykh and Nawal El Saadawi.

Keywords: Feminist writing, Hanan Al-Shaykh, Laylá Ba‘albakī, Lebanese women writers, Muná Jabbūr.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2428
34 Imputation Technique for Feature Selection in Microarray Data Set

Authors: Younies Mahmoud, Mai Mabrouk, Elsayed Sallam

Abstract:

Analyzing DNA microarray data sets is a great challenge, which faces the bioinformaticians due to the complication of using statistical and machine learning techniques. The challenge will be doubled if the microarray data sets contain missing data, which happens regularly because these techniques cannot deal with missing data. One of the most important data analysis process on the microarray data set is feature selection. This process finds the most important genes that affect certain disease. In this paper, we introduce a technique for imputing the missing data in microarray data sets while performing feature selection.

Keywords: DNA microarray, feature selection, missing data, bioinformatics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2791
33 Fast Accurate Detection of Frequency Jumps Using Kalman Filter with Non Linear Improvements

Authors: Mahmoud E. Mohamed, Ahmed F. Shalash, Hanan A. Kamal

Abstract:

In communication systems, frequency jump is a serious problem caused by the oscillators used. Kalman filters are used to detect that jump, despite the tradeoff between the noise level and the speed of the detection. In this paper, an improvement is introduced in the Kalman filter, through a nonlinear change in the bandwidth of the filter. Simulation results show a considerable improvement in the filter speed with a very low noise level. Additionally, the effect on the response to false alarms is also presented and false alarm rate show improvement.

Keywords: Kalman Filter, Innovation, False Detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2226
32 Turing Pattern in the Oregonator Revisited

Authors: Elragig Aiman, Dreiwi Hanan, Townley Stuart, Elmabrook Idriss

Abstract:

In this paper, we reconsider the analysis of the Oregonator model. We highlight an error in this analysis which leads to an incorrect depiction of the parameter region in which diffusion driven instability is possible. We believe that the cause of the oversight is the complexity of stability analyses based on eigenvalues and the dependence on parameters of matrix minors appearing in stability calculations. We regenerate the parameter space where Turing patterns can be seen, and we use the common Lyapunov function (CLF) approach, which is numerically reliable, to further confirm the dependence of the results on diffusion coefficients intensities.

Keywords: Diffusion driven instability, common Lyapunov function (CLF), turing pattern, positive-definite matrix.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1048
31 On the Use of Correlated Binary Model in Social Network Analysis

Authors: Elsayed A. Habib Elamir

Abstract:

In social network analysis the mean nodal degree and density of the graph can be considered as a measure of the activity of all actors in the network and this is an important property of a graph and for making comparisons among networks. Since subjects in a family or organization are subject to common environment factors, it is prime interest to study the association between responses. Therefore, we study the distribution of the mean nodal degree and density of the graph under correlated binary units. The cross product ratio is used to capture the intra-units association among subjects. Computer program and an application are given to show the benefits of the method.

Keywords: Correlated Binary data, cross product ratio, densityof the graph, multiplicative binomial distribution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1451
30 1/Sigma Term Weighting Scheme for Sentiment Analysis

Authors: Hanan Alshaher, Jinsheng Xu

Abstract:

Large amounts of data on the web can provide valuable information. For example, product reviews help business owners measure customer satisfaction. Sentiment analysis classifies texts into two polarities: positive and negative. This paper examines movie reviews and tweets using a new term weighting scheme, called one-over-sigma (1/sigma), on benchmark datasets for sentiment classification. The proposed method aims to improve the performance of sentiment classification. The results show that 1/sigma is more accurate than the popular term weighting schemes. In order to verify if the entropy reflects the discriminating power of terms, we report a comparison of entropy values for different term weighting schemes.

Keywords: Sentiment analysis, term weighting scheme, 1/sigma.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 533
29 Improved FP-growth Algorithm with Multiple Minimum Supports Using Maximum Constraints

Authors: Elsayeda M. Elgaml, Dina M. Ibrahim, Elsayed A. Sallam

Abstract:

Association rule mining is one of the most important fields of data mining and knowledge discovery. In this paper, we propose an efficient multiple support frequent pattern growth algorithm which we called “MSFP-growth” that enhancing the FPgrowth algorithm by making infrequent child node pruning step with multiple minimum support using maximum constrains. The algorithm is implemented, and it is compared with other common algorithms: Apriori-multiple minimum supports using maximum constraints and FP-growth. The experimental results show that the rule mining from the proposed algorithm are interesting and our algorithm achieved better performance than other algorithms without scarifying the accuracy. 

Keywords: Association Rules, FP-growth, Multiple minimum supports, Weka Tool

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3318
28 A Fast Adaptive Content-based Retrieval System of Satellite Images Database using Relevance Feedback

Authors: Hanan Mahmoud Ezzat Mahmoud, Alaa Abd El Fatah Hefnawy

Abstract:

In this paper, we present a system for content-based retrieval of large database of classified satellite images, based on user's relevance feedback (RF).Through our proposed system, we divide each satellite image scene into small subimages, which stored in the database. The modified radial basis functions neural network has important role in clustering the subimages of database according to the Euclidean distance between the query feature vector and the other subimages feature vectors. The advantage of using RF technique in such queries is demonstrated by analyzing the database retrieval results.

Keywords: content-based image retrieval, large database of image, RBF neural net, relevance feedback

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1470
27 Discrete Breeding Swarm for Cost Minimization of Parallel Job Shop Scheduling Problem

Authors: Tarek Aboueldah, Hanan Farag

Abstract:

Parallel Job Shop Scheduling Problem (JSSP) is a multi-objective and multi constrains NP-optimization problem. Traditional Artificial Intelligence techniques have been widely used; however, they could be trapped into the local minimum without reaching the optimum solution. Thus, we propose a hybrid Artificial Intelligence (AI) model with Discrete Breeding Swarm (DBS) added to traditional AI to avoid this trapping. This model is applied in the cost minimization of the Car Sequencing and Operator Allocation (CSOA) problem. The practical experiment shows that our model outperforms other techniques in cost minimization.

Keywords: Parallel Job Shop Scheduling Problem, Artificial Intelligence, Discrete Breeding Swarm, Car Sequencing and Operator Allocation, cost minimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 610
26 Diagnostic Evaluation of Urinary Angiogenin (ANG) and Clusterin (CLU) as Biomarker for Bladder Cancer

Authors: Marwa I. Shabayek, Ola A. Said, Hanan A. Attaia, Heba A. Awida

Abstract:

Bladder carcinoma is an important worldwide health problem. Both cystoscopy and urine cytology used in detecting bladder cancer suffer from drawbacks where cystoscopy is an invasive method and urine cytology shows low sensitivity in low grade tumors. This study validates easier and less time-consuming techniques to evaluate the value of combined use of angiogenin and clusterin in comparison and combination with voided urine cytology in the detection of bladder cancer patients. This study includes malignant (bladder cancer patients, n= 50), benign (n=20) and healthy (n=20) groups. The studied groups were subjected to cystoscopic examination, detection of bilharzial antibodies, urine cytology, and estimation of urinary angiogenin and clusterin by ELISA. The overall sensitivity and specificity were 66% and 75% for angiogenin, 70% and 82.5% for clusterin and 46% and 80% for voided urine cytology. Combined sensitivity of angiogenin and clusterin with urine cytology increased from 82 to 88%. 

Keywords: Angiogenin, Bladder Cancer, Clusterin, Cytology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1835
25 Modeling of a Small Unmanned Aerial Vehicle

Authors: A. Elsayed Ahmed, A. Hafez, A. N. Ouda, H. Eldin Hussein Ahmed, H. Mohamed Abd-Elkader

Abstract:

Unmanned aircraft systems (UAS) are playing increasingly prominent roles in defense programs and defense strategies around the world. Technology advancements have enabled the development of it to do many excellent jobs as reconnaissance, surveillance, battle fighters, and communications relays. Simulating a small unmanned aerial vehicle (SUAV) dynamics and analyzing its behavior at the preflight stage is too important and more efficient. The first step in the UAV design is the mathematical modeling of the nonlinear equations of motion. . In this paper, a survey with a standard method to obtain the full non-linear equations of motion is utilized, and then the linearization of the equations according to a steady state flight condition (trimming) is derived. This modeling technique is applied to an Ultrastick-25e fixed wing UAV to obtain the valued linear longitudinal and lateral models. At the end the model is checked by matching between the behavior of the states of the nonlinear UAV and the resulted linear model with doublet at the control surfaces.

Keywords: Equations of motion, linearization, modeling, nonlinear model, UAV.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5611
24 Robust Image Registration Based on an Adaptive Normalized Mutual Information Metric

Authors: Huda Algharib, Amal Algharib, Hanan Algharib, Ali Mohammad Alqudah

Abstract:

Image registration is an important topic for many imaging systems and computer vision applications. The standard image registration techniques such as Mutual information/ Normalized mutual information -based methods have a limited performance because they do not consider the spatial information or the relationships between the neighbouring pixels or voxels. In addition, the amount of image noise may significantly affect the registration accuracy. Therefore, this paper proposes an efficient method that explicitly considers the relationships between the adjacent pixels, where the gradient information of the reference and scene images is extracted first, and then the cosine similarity of the extracted gradient information is computed and used to improve the accuracy of the standard normalized mutual information measure. Our experimental results on different data types (i.e. CT, MRI and thermal images) show that the proposed method outperforms a number of image registration techniques in terms of the accuracy.

Keywords: Image registration, mutual information, image gradients, Image transformations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 896
23 Feasibility Study of Air Conditioners Operated by Solar Energy in Saudi Arabia

Authors: Eman Simbawa, Budur Alasmri, Hanan Munahir, Hanin Munahir

Abstract:

Solar energy has become currently the subject of attention around the world and is undergoing many researches and studies. Using solar energy, which is a renewable energy, is aligned with the Saudi Vision 2030. People are more aware of it and are starting to use it more for environmental and economical reasons. A questionnaire was conducted in this paper to measure the awareness of people in Saudi Arabia regarding solar energy and their attitude towards it. Then, two kinds of air conditioners (one powered by electricity only and one powered by solar panels and electricity) are compared in terms of their cost over a period of 20 years. This will help the users to decide which kind of device to use depending on its cost. The result shows that as the electricity tariffs in Saudi Arabia increases, depending on the sector, the solar air conditioner is cheaper. In fact, if the tariff in the future increases to reach 50 Halalah/kWh, the solar air conditioner is more economical. This will influence users to buy more solar powered devices, and it will decrease the consumption of electricity. Therefore, the dependence on oil will decrease.

Keywords: Air conditioner, solar energy, photovoltaic cells, present value.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 741
22 Effectiveness of Crystallization Coating Materials on Chloride Ions Ingress in Concrete

Authors: Mona Elsalamawy, Ashraf Ragab Mohamed, Abdellatif Elsayed Abosen

Abstract:

This paper aims to evaluate the effectiveness of different crystalline coating materials concerning of chloride ions penetration. The concrete ages at the coating installation and its moisture conditions were addressed; where, these two factors may play a dominant role for the effectiveness of the used materials. Rapid chloride ions penetration test (RCPT) was conducted at different ages and moisture conditions according to the relevant standard. In addition, the contaminated area and the penetration depth of the chloride ions were investigated immediately after the RCPT test using chemical identifier, 0.1 M silver nitrate AgNO3 solution. Results have shown that, the very low chloride ions penetrability, for the studied crystallization materials, were investigated only with the old age concrete (G1). The significant reduction in chloride ions’ penetrability was illustrated after 7 days of installing the crystalline coating layers. Using imageJ is more reliable to describe the contaminated area of chloride ions, where the distribution of aggregate and heterogeneous of cement mortar was considered in the images analysis.

Keywords: Chloride permeability, contaminated area, crystalline waterproofing materials, RCPT, XRD.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1179
21 Affective Adaptation Design for Better Gaming Experiences

Authors: Ollie Hall, Salma ElSayed

Abstract:

Affective adaptation is a creative way for game designers to add an extra layer of engagement to their productions. When player’s emotions are an explicit factor in mechanics design, endless possibilities for imaginative gameplay emerge. Whilst gaining popularity, existing affective game research mostly runs controlled experiments in restrictive settings and rely on one or more specialist devices for measuring player’s emotional state. These conditions albeit effective, are not necessarily realistic. Moreover, the simplified narrative and intrusive wearables may not be suitable for players. This exploratory study investigates delivering an immersive affective experience in the wild with minimal requirements, in an attempt for the average developer to reach the average player. A puzzle game is created with rich narrative and creative mechanics. It employs both explicit and implicit adaptation and only requires a web camera. Participants played the game on their own machines in various settings. Whilst it was rated feasible, very engaging and enjoyable, it remains questionable whether a fully immersive experience was delivered due to the limited sample size.

Keywords: affective games, dynamic adaptation, emotion recognition, game design

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 845
20 Unsupervised Clustering Methods for Identifying Rare Events in Anomaly Detection

Authors: Witcha Chimphlee, Abdul Hanan Abdullah, Mohd Noor Md Sap, Siriporn Chimphlee, Surat Srinoy

Abstract:

It is important problems to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). Although preventative techniques such as access control and authentication attempt to prevent intruders, these can fail, and as a second line of defence, intrusion detection has been introduced. Rare events are events that occur very infrequently, detection of rare events is a common problem in many domains. In this paper we propose an intrusion detection method that combines Rough set and Fuzzy Clustering. Rough set has to decrease the amount of data and get rid of redundancy. Fuzzy c-means clustering allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. The experimental results on Knowledge Discovery and Data Mining-(KDDCup 1999) Dataset show that the method is efficient and practical for intrusion detection systems.

Keywords: Network and security, intrusion detection, fuzzy cmeans, rough set.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2861
19 A Study on Vulnerability of Alahsa Governorate to Generate Urban Heat Islands

Authors: Ilham S. M. Elsayed

Abstract:

The purpose of this study is to investigate Alahsa Governorate status and its vulnerability to generate urban heat islands. Alahsa Governorate is a famous oasis in the Arabic Peninsula including several oil centers. Extensive literature review was done to collect previous relative data on the urban heat island of Alahsa Governorate. Data used for the purpose of this research were collected from authorized bodies who control weather station networks over Alahsa Governorate, Eastern Province, Saudi Arabia. Although, the number of weather station networks within the region is very limited and the analysis using GIS software and its techniques is difficult and limited, the data analyzed confirm an increase in temperature for more than 2 °C from 2004 to 2014. Such increase is considerable whenever human health and comfort are the concern. The increase of temperature within one decade confirms the availability of urban heat islands. The study concludes that, Alahsa Governorate is vulnerable to create urban heat islands and more attention should be drawn to strategic planning of the governorate that is developing with a high pace and considerable increasing levels of urbanization.

Keywords: Urban heat island, Alahsa Governorate, weather station, population density.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1128
18 Comparison of Classical and Ultrasound-Assisted Extractions of Hyphaene thebaica Fruit and Evaluation of Its Extract as Antibacterial Activity in Reducing Severity of Erwinia carotovora

Authors: Hanan Moawad, Naglaa M. Abd EL-Rahman

Abstract:

Erwinia carotovora var. carotovora is the main cause of soft rot in potatoes. Hyphaene thebaica was studied for biocontrol of E. carotovora which inhibited growth of E. carotovora on solid medium, a comparative study of classical and ultrasound-assisted extractions of Hyphaene thebaica fruit. The use of ultrasound decreased significant the total time of treatment and increase the total amount of crude extract. The crude extract was subjected to determine the in vitro, by a bioassay technique revealed that the treatment of paper disks with ultrasound extraction of Hyphaene thebaica reduced the growth of pathogen and produced inhibition zones up to 38mm in diameter. The antioxidant activity of ultrasound-ethanolic extract of Doum fruits (Hyphaene thebaica) was determined. Data obtained showed that the extract contains the secondary metabolites such as Tannins, Saponin, Flavonoids, Phenols, Steroids, Terpenoids, Glycosides and Alkaloids.

Keywords: Ultrasound, classical extract, Biological control, Erwinia carotovora, Hyphaene thebaica.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2810
17 Effect of Abdominal Exercises versus Abdominal Supporting Belt on Post-Partum Abdominal Efficiency and Rectus Separation

Authors: Hanan S. El-Mekawy, Abeer M. Eldeeb, Marzouk A. El- Lythy, Adel F. El-Begawy

Abstract:

This study was conducted to determine the effect of abdominal exercises versus abdominal supporting belt on abdominal efficiency and inter-recti separation following vaginal delivery.30 primiparous post-natal women participated in this study. Their age ranged from (25 - 35) years and their BMI < 30 Kg/m2. Participants were assigned randomly into 2groups, participants of group (A) used abdominal belt from the 2nd day following delivery, till the end of puerperium (6 weeks), while participants of group (B) engaged into abdominal exercises program from the 2nd day following delivery for 6 weeks. The results of the present study revealed that although there was no statistical difference in waist circumference between both groups, participation in abdominal exercise program produced a pronounced reduction in waist/hip ratio, and inter-recti separation and also caused significant increase in abdominal muscles strength (peak torque, maximum repetition total work and average power) higher than the use of abdominal belt.

Keywords: Abdominal exercise, Abdominal supporting belt, Postnatal abdominal weakness, Rectus Diastases.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11132
16 Comparison of Conventional Control and Robust Control on Double-Pipe Heat Exchanger

Authors: Hanan Rizk

Abstract:

Heat exchanger is a device used to mix liquids having different temperatures. In this case, the temperature control becomes a critical objective. This research work presents the temperature control of the double-pipe heat exchanger (multi-input multi-output (MIMO) system), which is modeled as first-order coupled hyperbolic partial differential equations (PDEs), using conventional and advanced control techniques, and develops appropriate robust control strategy to meet stability requirements and performance objectives. We designed the proportional–integral–derivative (PID) controller and H-infinity controller for a heat exchanger (HE) system. Frequency characteristics of sensitivity functions and open-loop and closed-loop time responses are simulated using MATLAB software and the stability of the system is analyzed using Kalman's test. The simulation results have demonstrated that the H-infinity controller is more efficient than PID in terms of robustness and performance.

Keywords: heat exchanger, multi-input multi-output system, MATLAB simulation, partial differential equations, PID controller, robust control

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 695
15 An Ant Colony Optimization for Dynamic JobScheduling in Grid Environment

Authors: Siriluck Lorpunmanee, Mohd Noor Sap, Abdul Hanan Abdullah, Chai Chompoo-inwai

Abstract:

Grid computing is growing rapidly in the distributed heterogeneous systems for utilizing and sharing large-scale resources to solve complex scientific problems. Scheduling is the most recent topic used to achieve high performance in grid environments. It aims to find a suitable allocation of resources for each job. A typical problem which arises during this task is the decision of scheduling. It is about an effective utilization of processor to minimize tardiness time of a job, when it is being scheduled. This paper, therefore, addresses the problem by developing a general framework of grid scheduling using dynamic information and an ant colony optimization algorithm to improve the decision of scheduling. The performance of various dispatching rules such as First Come First Served (FCFS), Earliest Due Date (EDD), Earliest Release Date (ERD), and an Ant Colony Optimization (ACO) are compared. Moreover, the benefit of using an Ant Colony Optimization for performance improvement of the grid Scheduling is also discussed. It is found that the scheduling system using an Ant Colony Optimization algorithm can efficiently and effectively allocate jobs to proper resources.

Keywords: Grid computing, Distributed heterogeneous system, Ant colony optimization algorithm, Grid scheduling, Dispatchingrules.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2706
14 An Efficient Multi Join Algorithm Utilizing a Lattice of Double Indices

Authors: Hanan A. M. Abd Alla, Lilac A. E. Al-Safadi

Abstract:

In this paper, a novel multi join algorithm to join multiple relations will be introduced. The novel algorithm is based on a hashed-based join algorithm of two relations to produce a double index. This is done by scanning the two relations once. But instead of moving the records into buckets, a double index will be built. This will eliminate the collision that can happen from a complete hash algorithm. The double index will be divided into join buckets of similar categories from the two relations. The algorithm then joins buckets with similar keys to produce joined buckets. This will lead at the end to a complete join index of the two relations. without actually joining the actual relations. The time complexity required to build the join index of two categories is Om log m where m is the size of each category. Totaling time complexity to O n log m for all buckets. The join index will be used to materialize the joined relation if required. Otherwise, it will be used along with other join indices of other relations to build a lattice to be used in multi-join operations with minimal I/O requirements. The lattice of the join indices can be fitted into the main memory to reduce time complexity of the multi join algorithm.

Keywords: Multi join, Relation, Lattice, Join indices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1299
13 Effect of Ginger and L-Carnitine on the Reproductive Performance of Male Rats

Authors: Ismail I. Abo-Ghanema, El-Nasharty M.A., El-Far A. H., Hanan A.Ghonium

Abstract:

In this study, we investigated the effects of ginger and L-carnitine on the reproductive performance of male rats with respect to semen parameters, male sex hormones and the testicular antioxidant system. A total of sixty mature male albino rats were divided into four groups of fifteen rats. The control group received saline, whereas the other three groups received ginger (100 mg kg-1 d- 1.), L-carnitine (150 mg kg-1 d-1.) or a combination of both ginger (100 mg kg-1 d-1.) and L-carnitine (150 mg kg-1 d-1.) via a stomach tube daily for one month. At the end of the treatment period, the rats were sacrificed, and their sperm characteristics (count, motility and viability), antioxidant enzyme factors levels (reduced glutathione, catalase, superoxide dismutase and total antioxidant capacity) and sex hormone levels (testosterone, Follicle stimulating hormone(FSH) and luteinizing hormone (LH) were analysed. Our results showed that the three experimental treatments improved sperm parameters, antioxidant enzyme activity and testosterone hormone levels; the most pronounced positive effects were observed in the group that received a combination of both ginger and L-carnitine. Therefore, the administration of a combination of ginger and L-carnitine may be beneficial for improving male sexual performance.

Keywords: Ginger, L-Carnitine, Spermatogenesis, Rats.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3433
12 A Novel In-Place Sorting Algorithm with O(n log z) Comparisons and O(n log z) Moves

Authors: Hanan Ahmed-Hosni Mahmoud, Nadia Al-Ghreimil

Abstract:

In-place sorting algorithms play an important role in many fields such as very large database systems, data warehouses, data mining, etc. Such algorithms maximize the size of data that can be processed in main memory without input/output operations. In this paper, a novel in-place sorting algorithm is presented. The algorithm comprises two phases; rearranging the input unsorted array in place, resulting segments that are ordered relative to each other but whose elements are yet to be sorted. The first phase requires linear time, while, in the second phase, elements of each segment are sorted inplace in the order of z log (z), where z is the size of the segment, and O(1) auxiliary storage. The algorithm performs, in the worst case, for an array of size n, an O(n log z) element comparisons and O(n log z) element moves. Further, no auxiliary arithmetic operations with indices are required. Besides these theoretical achievements of this algorithm, it is of practical interest, because of its simplicity. Experimental results also show that it outperforms other in-place sorting algorithms. Finally, the analysis of time and space complexity, and required number of moves are presented, along with the auxiliary storage requirements of the proposed algorithm.

Keywords: Auxiliary storage sorting, in-place sorting, sorting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1909
11 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: Access controls, cloud computing, confidentiality, identity and access management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 728
10 Influence of Bilateral and Unilateral Flatfoot on Pelvic Alignment

Authors: Mohamed Taher Eldesoky, Enas Elsayed Abutaleb

Abstract:

Background: The change in foot posture can possibly generate changes in the pelvic alignment. There is still a lack of evidence about the effects of bilateral and unilateral flatfoot on possible changes in pelvic alignment. The purpose of this study was to investigate the effect of flatfoot on the sagittal and frontal planes of pelvic postures. Materials and Methods: 56 subjects, aged 18–40 years, were assigned into three groups: 20 healthy subjects, 19 subjects with bilateral flexible second-degree flat foot, and 17 subjects with unilateral flexible second-degree flat foot. 3D assessment of the pelvis using the formetric-II device was used to evaluate pelvic alignment in the frontal and sagittal planes by measuring pelvic inclination and pelvic tilt angles. Results: ANOVA test with LSD test were used for statistical analysis. Both Unilateral and bilateral second degree flatfoot produced significant (P<0.05) pelvic anteversion, in comparison to the healthy subjects (P<0.05). But the bilateral flatfoot subjects seemed to have more anteversion than the unilateral subjects. Unilateral flatfoot caused a significant (P<0.05) lateral pelvic tilt in the direction of the affected side in comparison to the healthy and bilateral flatfoot subjects. Conclusion: The bilateral and unilateral second degree flatfoot changes pelvic alignment. Both of them lead to increases of pelvic anteversion while the unilateral one caused lateral pelvic tilt toward the affected side. Thus, foot posture should be considered when assessing patients with pelvic misalignment and disorders.

Keywords: Bilateral flatfoot, foot posture, pelvic alignment, unilateral flatfoot.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3326
9 Optimum Replacement Policies for Kuwait Passenger Transport Company Busses: Case Study

Authors: Hilal A. Abdelwali, Elsayed E.M. Ellaimony, Ahmad E.M. Murad, Jasem M.S. Al-Rajhi

Abstract:

Due to the excess of a vehicle operation through its life, some elements may face failure and deteriorate with time. This leads us to carry out maintenance, repair, tune up or full overhaul. After a certain period, the vehicle elements deteriorations increase with time which causes a very high increase of doing the maintenance operations and their costs. However, the logic decision at this point is to replace the current vehicle by a new one with minimum failure and maximum income. The importance of studying vehicle replacement problems come from the increase of stopping days due to many deteriorations in the vehicle parts. These deteriorations increase year after year causing an increase of operating costs and decrease the vehicle income. Vehicle replacement aims to determine the optimum time to keep, maintain, overhaul, renew and replace vehicles. This leads to an improvement in vehicle income, total operating costs, maintenance cost, fuel and oil costs, ton-kilometers, vehicle and engine performance, vehicle noise, vibration, and pollution. The aim of this paper is to find the optimum replacement policies of Kuwait Passenger Transport Company (KPTCP) fleet of busses. The objective of these policies is to maximize the busses pure profits. The dynamic programming (D.P.) technique is used to generate the busses optimal replacement policies

Keywords: Replacement Problem, Automotive Replacement, Dynamic Programming, Equipment Replacement, K.P.T.C.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1530