Search results for: Adnan Ahmed Khan
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 777

Search results for: Adnan Ahmed Khan

477 Optimal Transmission Network Usage and Loss Allocation Using Matrices Methodology and Cooperative Game Theory

Authors: Baseem Khan, Ganga Agnihotri

Abstract:

Restructuring of Electricity supply industry introduced many issues such as transmission pricing, transmission loss allocation and congestion management. Many methodologies and algorithms were proposed for addressing these issues. In this paper a power flow tracing based method is proposed which involves Matrices methodology for the transmission usage and loss allocation for generators and demands. This method provides loss allocation in a direct way because all the computation is previously done for usage allocation. The proposed method is simple and easy to implement in a large power system. Further it is less computational because it requires matrix inversion only a single time. After usage and loss allocation cooperative game theory is applied to results for finding efficient economic signals. Nucleolus and Shapely value approach is used for optimal allocation of results. Results are shown for the IEEE 6 bus system and IEEE 14 bus system.

Keywords: Modified Kirchhoff Matrix, Power flow tracing, Transmission Pricing, Transmission Loss Allocation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2573
476 Single Phase Fluid Flow in Series of Microchannel Connected via Converging-Diverging Section with or without Throat

Authors: Abhishek Kumar Chandra, Kaushal Kishor, Wasim Khan, Dhananjay Singh, M. S. Alam

Abstract:

Single phase fluid flow through series of uniform microchannels connected via transition section (converging-diverging section with or without throat) was analytically and numerically studied to characterize the flow within the channel and in the transition sections. Three sets of microchannels of diameters 100, 184, and 249 μm were considered for investigation. Each set contains 10 numbers of microchannels of length 20 mm, connected to each other in series via transition sections. Transition section consists of either converging-diverging section with throat or without throat. The effect of non-uniformity in microchannels on pressure drop was determined by passing water/air through the set of channels for Reynolds number 50 to 1000. Compressibility and rarefaction effects in transition sections were also tested analytically and numerically for air flow. The analytical and numerical results show that these configurations can be used in enhancement of transport processes. However, converging-diverging section without throat shows superior performance over with throat configuration.

Keywords: Contraction-expansion flow, integrated microchannel, microchannel network, single phase flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 889
475 Technique for Processing and Preservation of Human Amniotic Membrane for Ocular Surface Reconstruction

Authors: Irfan Z. Qureshi, Fareeha A., Wajid A. Khan

Abstract:

Human amniotic membrane (HAM) is a useful biological material for the reconstruction of damaged ocular surface. The processing and preservation of HAM is critical to prevent the patients undergoing amniotic membrane transplant (AMT) from cross infections. For HAM preparation human placenta is obtained after an elective cesarean delivery. Before collection, the donor is screened for seronegativity of HCV, Hbs Ag, HIV and Syphilis. After collection, placenta is washed in balanced salt solution (BSS) in sterile environment. Amniotic membrane is then separated from the placenta as well as chorion while keeping the preparation in BSS. Scrapping of HAM is then carried out manually until all the debris is removed and clear transparent membrane is acquired. Nitrocellulose membrane filters are then placed on the stromal side of HAM, cut around the edges with little membrane folded towards other side making it easy to separate during surgery. HAM is finally stored in solution of glycerine and Dulbecco-s Modified Eagle Medium (DMEM) in 1:1 ratio containing antibiotics. The capped borosil vials containing HAM are kept at -80°C until use. This vial is thawed to room temperature and opened under sterile operation theatre conditions at the time of surgery.

Keywords: HAM, AMT, ocular transplant

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3529
474 Geometrical Based Unequal Droplet Splitting Using Microfluidic Y-Junction

Authors: Bahram Talebjedi, Amirmohammad Sattari, Ahmed Zoher Sihorwala, Mina Hoorfar

Abstract:

Among different droplet manipulations, controlled droplet-splitting is of great significance due to its ability to increase throughput and operational capability. Furthermore, unequal droplet-splitting can provide greater flexibility and a wider range of dilution factors. In this study, we developed two-dimensional, time-dependent complex fluid dynamics simulations to model droplet formation in a flow focusing device, followed by splitting in a Y-shaped junction with sub-channels of unequal widths. From the results obtained from the numerical study, we correlated the diameters of the droplets in the sub-channels to the Weber number, thereby demarcating the droplet splitting and non-splitting regimes.

Keywords: Microfluidics, unequal droplet splitting, two phase flow, flow focusing device.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 745
473 Preliminary Study for Separation of Heavy Rare Earth Concentrates from Egyptian Crude Monazite

Authors: Sherien H. Ahmed, Osama S. Helaly, Mohamed S. Abd El-Ghany

Abstract:

Heavy rare earth (HRE) oxalate concentrates were prepared from the Egyptian crude monazite sand (graded about 47%). The concentrates were specified quantitatively for their constituents of individual rare earth elements using ion chromatograph (IC) and qualitatively by scanning electron microscope (SEM) for the other major constituents. The 1st concentrate was composed of 10.5% HREE where 7.25% of them represented yttrium. The 2nd concentrate contained about 41.7% LREE, 17.5% HREE and 13.6% Th. The LREE involved 18.3% Ce, 10.5% La and 8% Nd while the HREE were 8.7% Y, 3.5% Gd and 2.9% Dy. The 3rd concentrate was containing about 8.0% LREE (3.7% Ce, 2.0% La and 1.5% Nd), 10.2% HREE (6.4% yttrium and 2.0% Dy) and 2.1% uranium. The final concentrate comprised 0.84% uranium beside iron, chromium and traces of REE.

Keywords: Oxalic Acid Precipitation, Rare Earth Concentrates, Thorium, Uranium.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3554
472 Macro Corruption: A Conceptual Analysis of Its Dimensions and Forward and Backward Linkages

Authors: Ahmed Sakr Ashour, Hoda Saad AboRemila

Abstract:

An attempt was made to fill the gap in the macro analysis of corruption by suggesting a conceptual framework that differentiates four types of macro corruption: state capture, political, bureaucratic and financial/corporate. The economic consequences or forward linkages (growth, inclusiveness and sustainability of development) and macro institutional determinants constituting the backward linkages of each type were delineated. The research implications of the macro perspective and proposed framework were discussed. Implications of the findings for theory, research and reform policies addressing macro corruption issues were discussed.

Keywords: Economic growth, Inclusive growth, macro corruption, sustainable development.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 812
471 Using Secure-Image Mechanism to Protect Mobile Agent Against Malicious Hosts

Authors: Tarig Mohamed Ahmed

Abstract:

The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protect mobile agents against malicious hosts. . SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. It assists the mobile agents to continue their journey normally incase attacks occurred.

Keywords: Agent protection, cryptography, mobile agent security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1900
470 Modeling And Analysis of Simple Open Cycle Gas Turbine Using Graph Networks

Authors: Naresh Yadav, I.A. Khan, Sandeep Grover

Abstract:

This paper presents a unified approach based graph theory and system theory postulates for the modeling and analysis of Simple open cycle Gas turbine system. In the present paper, the simple open cycle gas turbine system has been modeled up to its subsystem level and system variables have been identified to develop the process subgraphs. The theorems and algorithms of the graph theory have been used to represent behavioural properties of the system like rate of heat and work transfers rates, pressure drops and temperature drops in the involved processes of the system. The processes have been represented as edges of the process subgraphs and their limits as the vertices of the process subgraphs. The system across variables and through variables has been used to develop terminal equations of the process subgraphs of the system. The set of equations developed for vertices and edges of network graph are used to solve the system for its process variables.

Keywords: Simple open cycle gas turbine, Graph theoretic approach, process subgraphs, gas turbines system modeling, systemtheory

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2609
469 A Taxonomy of Internal Attacks in Wireless Sensor Network

Authors: Muhammad R Ahmed, Xu Huang, Dharmendra Sharma

Abstract:

Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.

Keywords: Wireless sensor network, internal attacks, security, OSI model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3004
468 Gender Component in the National Project of Kazakhstan

Authors: D.Nuketaeva, A.Kanagatova, I.Khan, B.Kylyshbayeva, G.Bektenova

Abstract:

This article describes the aspects of the formation of the national idea and national identity through the prism of gender control and its contradistinction to the obsolete, Soviet component. The role of females in ethnic and national projects is considered from the point of view of Dr. Nira Yuval-Davis: as biological reproducers of the ethnic communities- members; as reproducers of the boarders of ethnic/national groups; as central participants in the ideological reproduction of community and transducers of its culture; as symbols in ideology, reproduction and transformation of ethnic/national categories; and as participants of national, economical, political and military combats. The society of the transitional type uses the symbolic resources of the formation of gender component in the national project. The gender patterns act like cultural codes, executing the important ideological function in formation of the national female- image, i.e. the discussion on hijab - it-s not just the discussion on control over the female body, it-s the discussion on the metaphor of social order.

Keywords: nation, gender, hijab, Islam, ideology, politics, national idea, national identity, society of the transitional type

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2000
467 Assessing and Evaluating the Course Outcomes of Electrical Circuit Course for Bachelor of Science in Electrical and Electronic Engineering Program

Authors: Muhibul Haque Bhuyan, Sher Shermin Azmiri Khan

Abstract:

At present, it is an imperative and stimulating task to grow the concepts and skills of undergraduate students in any course. Educators must build up students' higher-order complex and critical thinking abilities. But many of them find it difficult to assess and evaluate these abilities of students who undertake their courses during undergraduate studies. In this research work, a simple assessment and evaluation process for the electrical circuit course of the undergraduate Electrical and Electronic Engineering (EEE) program is reported using the Outcome-Based Education (OBE) approach. The methodology of the work, course contents design, course outcomes (COs) preparation and mapping it with program outcomes (POs), question setting following Bloom's taxonomy, assessment strategy of the students, CO and PO evaluation records, statistics, and charts have been reported for a student-cohort of electrical circuit course taken in Spring 2019 Semester at EEE Department of Southeast University (SEU). It is found that the benchmark fixed by the course instructor has been achieved by the students of that course through CO assessment and evaluation. Recommendations of the course teacher for further quality enhancement based on CO achievement are also presented.

Keywords: OBE, COs, POs, assessment and evaluation, electrical circuit course.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 593
466 Implementation of RC5 Block Cipher Algorithm for Image Cryptosystems

Authors: Hossam El-din H. Ahmed, Hamdy M. Kalash, Osama S. Farag Allah

Abstract:

This paper examines the implementation of RC5 block cipher for digital images along with its detailed security analysis. A complete specification for the method of application of the RC5 block cipher to digital images is given. The security analysis of RC5 block cipher for digital images against entropy attack, bruteforce, statistical, and differential attacks is explored from strict cryptographic viewpoint. Experiments and results verify and prove that RC5 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC5 block cipher algorithm.

Keywords: Image encryption, security analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3650
465 Generic Multimedia Database Architecture

Authors: Mohib ur Rehman, Imran Ihsan, Mobin Uddin Ahmed, Nadeem Iftikhar, Muhammad Abdul Qadir

Abstract:

Multimedia, as it stands now is perhaps the most diverse and rich culture around the globe. One of the major needs of Multimedia is to have a single system that enables people to efficiently search through their multimedia catalogues. Many Domain Specific Systems and architectures have been proposed but up till now no generic and complete architecture is proposed. In this paper, we have suggested a generic architecture for Multimedia Database. The main strengths of our architecture besides being generic are Semantic Libraries to reduce semantic gap, levels of feature extraction for more specific and detailed feature extraction according to classes defined by prior level, and merging of two types of queries i.e. text and QBE (Query by Example) for more accurate yet detailed results.

Keywords: Multimedia Database Architecture, Semantics, Feature Extraction, Ontology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1762
464 Discontinuous Galerkin Method for 1D Shallow Water Flow with Water Surface Slope Limiter

Authors: W. Lai, A. A. Khan

Abstract:

A water surface slope limiting scheme is tested and compared with the water depth slope limiter for the solution of one dimensional shallow water equations with bottom slope source term. Numerical schemes based on the total variation diminishing Runge- Kutta discontinuous Galerkin finite element method with slope limiter schemes based on water surface slope and water depth are used to solve one-dimensional shallow water equations. For each slope limiter, three different Riemann solvers based on HLL, LF, and Roe flux functions are used. The proposed water surface based slope limiter scheme is easy to implement and shows better conservation property compared to the slope limiter based on water depth. Of the three flux functions, the Roe approximation provides the best results while the LF function proves to be least suitable when used with either slope limiter scheme.

Keywords: Discontinuous finite element, TVD Runge-Kuttascheme, slope limiters, Riemann solvers, shallow water flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2582
463 Investigation of Chaotic Behavior in DC-DC Converters

Authors: Sajid Iqbal, Masood Ahmed, Suhail Aftab Qureshi

Abstract:

DC-DC converters are widely used in regulated switched mode power supplies and in DC motor drive applications. There are several sources of unwanted nonlinearity in practical power converters. In addition, their operation is characterized by switching that gives birth to a variety of nonlinear dynamics. DC-DC buck and boost converters controlled by pulse-width modulation (PWM) have been simulated. The voltage waveforms and attractors obtained from the circuit simulation have been studied. With the onset of instability, the phenomenon of subharmonic oscillations, quasi-periodicity, bifurcations, and chaos have been observed. This paper is mainly motivated by potential contributions of chaos theory in the design, analysis and control of power converters, in particular and power electronics circuits, in general.

Keywords: Buck converter, boost converter, period- doubling, chaos, bifurcation, strange attractor.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3628
462 Level of Service Based Methodology for Municipal Infrastructure Management

Authors: Z. Khan, O. Moselhi, T. Zayed

Abstract:

Development of levels of service in municipal context is a flexible vehicle to assist in performing quality-cost trade-off analysis for municipal services. This trade-off depends on the willingness of a community to pay as well as on the condition of the assets. Community perspective of the performance of an asset from service point of view may be quite different from the municipality perspective of the performance of the same asset from condition point of view. This paper presents a three phased level of service based methodology for water mains that consists of :1)development of an Analytical Hierarchy model of level of service 2) development of Fuzzy Weighted Sum model of water main condition index and 3) deriving a Fuzzy logic based function that maps level of service to asset condition index. This mapping will assist asset managers in quantifying condition improvement requirement to meet service goals and to make more informed decisions on interventions and relayed priorities.

Keywords: Asset Management, Level of Service, Condition Index, Analytical Hierarchy, Fuzzy Logic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1933
461 A New Load Frequency Controller based on Parallel Fuzzy PI with Conventional PD (FPI-PD)

Authors: Aqeel S. Jaber, Abu Zaharin Ahmad, Ahmed N. Abdalla

Abstract:

The artificial intelligent controller in power system plays as most important rule for many applications such as system operation and its control specially Load Frequency Controller (LFC). The main objective of LFC is to keep the frequency and tie-line power close to their decidable bounds in case of disturbance. In this paper, parallel fuzzy PI adaptive with conventional PD technique for Load Frequency Control system was proposed. PSO optimization method used to optimize both of scale fuzzy PI and tuning of PD. Two equal interconnected power system areas were used as a test system. Simulation results show the effectiveness of the proposed controller compared with different PID and classical fuzzy PI controllers in terms of speed response and damping frequency.

Keywords: Load frequency control, PSO, fuzzy control.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2009
460 Implementing Learner-Centered Teaching Approach in Higher Education

Authors: Iman Ali Ahmed Al-Rashed

Abstract:

This paper directs attention to the limitations of the teacher-centered strategy in teaching. The aim of this study is to draw more educational attention to learner-centered strategy in order to shift the emphasis from the traditional concept of teaching to a new concept in teaching. To begin bridging the traditional concept of teaching and the new concept, the study will explore the new concept of teaching to support teaching in Arab World generally and in Iraq specifically. A qualitative case study orientation was used to collect data in the form of classroom observations, interviews and field notes. The teaching practices used by three university instructors are investigated and according to the findings, some explanations and recommendations are made.

Keywords: Case study, learner-centered strategy, qualitative study, teacher-centered strategy, traditional teaching.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1959
459 Causality between the Construction Industry and the GDP in the United Arab Emirates

Authors: Hasan S. Mahmoud, Salwa M. Beheiry, Vian Ahmed

Abstract:

In light of the repercussions of the 2008 global economic crisis, the response of the United Arab Emirates economy and growth, and the vast construction activities that are undergoing, there is a need to investigate the relationship between construction activities and the Gross Domestic Product (GDP). This study aims to investigate the causality relationship between the construction industry in the United Arab Emirates and the GDP of the country in the last decade. For that, this study will investigate the relationship between the growth of the GDP and the growth of construction activities and their value addition to the economy. To ascertain this relationship, Granger Causality method is used to identify the causality between the time-dependent series.

Keywords: Construction value addition, Granger causality, Growth of GDP, UAE.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1253
458 Influence of Wall Stiffness and Embedment Depth on Excavations Supported by Cantilever Walls

Authors: Muhammad Naseem Baig, Abdul Qudoos Khan, Jamal Ali

Abstract:

Ground deformations in deep excavations are affected by wall stiffness and pile embedment ratio. This paper presents the findings of a parametric study of a 64-ft deep excavation in mixed stiff soil conditions supported by cantilever pile wall. A series of finite element analysis has been carried out in Plaxis 2D by varying the pile embedment ratio and wall stiffness. It has been observed that maximum wall deflections decrease by increasing the embedment ratio up to 1.50; however, any further increase in pile length does not improve the performance of the wall. Similarly, increasing wall stiffness reduces the wall deformations and affects the deflection patterns of the wall. The finite element analysis results are compared with the field data of 25 case studies of cantilever walls. Analysis results fall within the range of normalized wall deflections of the 25 case studies. It has been concluded that deep excavations can be supported by cantilever walls provided the system stiffness is increased significantly.

Keywords: Excavations, support systems, wall stiffness, cantilever walls.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 411
457 Effects of Intake Temperature and Intake Pressure on Combustion and Exhaust Emissions of HCCI Engine

Authors: Fridhi Hadia, Soua Wadhah, Hidouri Ammar, Omri Ahmed

Abstract:

In this paper, the effect of the intake temperature (IT) and intake pressure (IP) on ignition timing and pollutants emission of Homogeneous Charge Compression Ignition (HCCI) engine is investigated. Numerical computations are performed using the CHEMKIN computer code. The numerical temperature obtained using different boundary conditions is compared to published data and a good agreement is assigned. Results show that the HCCI combustion engine is significantly improved by increasing the IT. With a value of IT lower than 390 K, combustion cannot occur. However, with an IT greater than 420 K, the cylinder pressure decreases. An optimum crank rotation angle is achieved by using IT of 420 K. So, we can conclude that the variation of the IT and IP influence notably the emission concentration.

Keywords: HCCI engine, CEMKIN, intake temperature, intake pressure.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1057
456 Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain

Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: Hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1595
455 A Frugal Bidding Procedure for Replicating WWW Content

Authors: Samee Ullah Khan, C. Ardil

Abstract:

Fine-grained data replication over the Internet allows duplication of frequently accessed data objects, as opposed to entire sites, to certain locations so as to improve the performance of largescale content distribution systems. In a distributed system, agents representing their sites try to maximize their own benefit since they are driven by different goals such as to minimize their communication costs, latency, etc. In this paper, we will use game theoretical techniques and in particular auctions to identify a bidding mechanism that encapsulates the selfishness of the agents, while having a controlling hand over them. In essence, the proposed game theory based mechanism is the study of what happens when independent agents act selfishly and how to control them to maximize the overall performance. A bidding mechanism asks how one can design systems so that agents- selfish behavior results in the desired system-wide goals. Experimental results reveal that this mechanism provides excellent solution quality, while maintaining fast execution time. The comparisons are recorded against some well known techniques such as greedy, branch and bound, game theoretical auctions and genetic algorithms.

Keywords: Internet, data content replication, static allocation, mechanism design, equilibrium.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1386
454 Cloud Effect on Power Generation of Grid Connected Small PV Systems

Authors: Yehya Abdellatif, Ahmed Alsalaymeh, Iyad Muslih, Ali Alshduifat

Abstract:

Photovoltaic (PV) power generation systems, mainly small scale, are rapidly being deployed in Jordan. The impact of these systems on the grid has not been studied or analyzed. These systems can cause many technical problems such as reverse power flows and voltage rises in distribution feeders, and real and reactive power transients that affect the operation of the transmission system. To fully understand and address these problems, extensive research, simulation, and case studies are required. To this end, this paper studies the cloud shadow effect on the power generation of a ground mounted PV system installed at the test field of the Renewable Energy Center at the Applied Science University.

Keywords: Photovoltaic, cloud effect, MPPT, power transients.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2989
453 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: Proxy signature, fault tolerance, improved RSA, key agreement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1241
452 Contrast Enhancement of Color Images with Color Morphing Approach

Authors: Javed Khan, Aamir Saeed Malik, Nidal Kamel, Sarat Chandra Dass, Azura Mohd Affandi

Abstract:

Low contrast images can result from the wrong setting of image acquisition or poor illumination conditions. Such images may not be visually appealing and can be difficult for feature extraction. Contrast enhancement of color images can be useful in medical area for visual inspection. In this paper, a new technique is proposed to improve the contrast of color images. The RGB (red, green, blue) color image is transformed into normalized RGB color space. Adaptive histogram equalization technique is applied to each of the three channels of normalized RGB color space. The corresponding channels in the original image (low contrast) and that of contrast enhanced image with adaptive histogram equalization (AHE) are morphed together in proper proportions. The proposed technique is tested on seventy color images of acne patients. The results of the proposed technique are analyzed using cumulative variance and contrast improvement factor measures. The results are also compared with decorrelation stretch. Both subjective and quantitative analysis demonstrates that the proposed techniques outperform the other techniques.

Keywords: Contrast enhancement, normalized RGB, adaptive histogram equalization, cumulative variance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1087
451 Establishing a New Simple Formula for Buckling Length Factor (K) of Rigid Frames Columns

Authors: Ehab Hasan Ahmed Hasan Ali

Abstract:

The calculation of buckling length factor (K) for steel frames columns is a major and governing processes to determine the dimensions steel frame columns cross sections during design. The buckling length of steel frames columns has a direct effect on the cost (weight) of using cross section. A new formula is required to determine buckling length factor (K) by simplified way. In this research a new formula for buckling length factor (K) was established to determine by accurate method for a limited interval of columns ends rigidity (GA, GB). The new formula can be used ease to evaluate the buckling length factor without needing to complicated equations or difficult charts.

Keywords: Buckling length, New formula, Curve fitting, Simplification, Steel column design.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2227
450 Residents’ Perceptions towards the Application of Vertical Landscape in Cairo, Egypt

Authors: Yomna Amr Ahmed Lotfi Koraim, Dalia Moati Rasmi Elkhateeb

Abstract:

Vertical landscape is introduced in this study as an alternative innovative technology for urban sustainable developments for its diverse environmental, economic, and psycho-social advantages. The main aim is to investigate the social acceptance of vertical landscape in Cairo, Egypt. The study objectives were to explore the perceptions of residents concerning this certain phenomenon and their opinions about its implementation. Survey questionnaires were administrated to 60 male and female residents from the Greater Cairo area. Despite the various concerns expressed about the application of vertical landscape, there was a clear majority of approval about its suitability. This is quite encouraging for the prospect of vertical landscape implementation in Cairo, Egypt.

Keywords: Vertical landscape, green facades, social acceptance, sustainable urban development.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1037
449 A Fast Replica Placement Methodology for Large-scale Distributed Computing Systems

Authors: Samee Ullah Khan, C. Ardil

Abstract:

Fine-grained data replication over the Internet allows duplication of frequently accessed data objects, as opposed to entire sites, to certain locations so as to improve the performance of largescale content distribution systems. In a distributed system, agents representing their sites try to maximize their own benefit since they are driven by different goals such as to minimize their communication costs, latency, etc. In this paper, we will use game theoretical techniques and in particular auctions to identify a bidding mechanism that encapsulates the selfishness of the agents, while having a controlling hand over them. In essence, the proposed game theory based mechanism is the study of what happens when independent agents act selfishly and how to control them to maximize the overall performance. A bidding mechanism asks how one can design systems so that agents- selfish behavior results in the desired system-wide goals. Experimental results reveal that this mechanism provides excellent solution quality, while maintaining fast execution time. The comparisons are recorded against some well known techniques such as greedy, branch and bound, game theoretical auctions and genetic algorithms.

Keywords: Data replication, auctions, static allocation, pricing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1677
448 Wireless Sensor Network: Characteristics and Architectures

Authors: Muhammad R Ahmed, Xu Huang, Dharmandra Sharma, Hongyan Cui

Abstract:

An information procuring and processing emerging technology wireless sensor network (WSN) Consists of autonomous nodes with versatile devices underpinned by applications. Nodes are equipped with different capabilities such as sensing, computing, actuation and wireless communications etc. based on application requirements. A WSN application ranges from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. The nodes are deployed independently to cooperatively monitor the physical and environmental conditions. The architecture of WSN differs based on the application requirements and focus on low cost, flexibility, fault tolerance capability, deployment process as well as conserve energy. In this paper we have present the characteristics, architecture design objective and architecture of WSN

Keywords: wireless sensor network, characteristics, architecture

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7779