Search results for: Omar F. Hamad
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 135

Search results for: Omar F. Hamad

105 Technology Adoption among Small and Medium Enterprises (SME's): A Research Agenda

Authors: Ramayah Thurasamy, Osman Mohamad, Azizah Omar, Malliga Marimuthu

Abstract:

This paper presents the research agenda that has been proposed to develop an integrated model to explain technology adoption of SMEs in Malaysia. SMEs form over 90% of all business entities in Malaysia and they have been contributing to the development of the nation. Technology adoption has been a thorn issue among SMEs as they require big outlay which might not be available to the SMEs. Although resource has been an issue among SMEs they cannot lie low and ignore the technological advancements that are taking place at a rapid pace. With that in mind this paper proposes a model to explain the technology adoption issue among SMEs.

Keywords: Technology adoption, integrated model, Small and Medium Enterprises (SME), Malaysia

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2499
104 Miniaturized Wideband Single-Feed Shorted-Edge Stacked Patch Antenna for C-Band Applications

Authors: Abdelheq Boukarkar, Omar Guermoua

Abstract:

In this paper, we propose a miniaturized and wideband patch antenna for C-band applications. The antenna miniaturization is obtained by loading shorting vias along one patch edge. At the same time, the wideband performance is achieved by combining two resonances using one feed line. The measured results reveal that the antenna covers the frequency band 4.32 GHz to 6.52 GHz (41%) with a peak gain and a peak efficiency of 5.5 dBi and 87%, respectively. The antenna occupies a relatively small size of only 26 x 22 x 5.6 mm3, making it suitable for compact wireless devices requiring a stable unidirectional gain over a wide frequency range.

Keywords: Miniaturized antennas, patch antennas, stable gain, wideband antennas.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 533
103 New Scheme in Determining nth Order Diagrams for Cross Multiplication Method via Combinatorial Approach

Authors: Sharmila Karim, Haslinda Ibrahim, Zurni Omar

Abstract:

In this paper, a new recursive strategy is proposed for determining $\frac{(n-1)!}{2}$ of $n$th order diagrams. The generalization of $n$th diagram for cross multiplication method were proposed by Pavlovic and Bankier but the specific rule of determining $\frac{(n-1)!}{2}$ of the $n$th order diagrams for square matrix is yet to be discovered. Thus using combinatorial approach, $\frac{(n-1)!}{2}$ of the $n$th order diagrams will be presented as $\frac{(n-1)!}{2}$ starter sets. These starter sets will be generated based on exchanging one element. The advantages of this new strategy are the discarding process was eliminated and the sign of starter set is alternated to each others.

Keywords: starter sets, permutation, exchanging one element, determinant

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1201
102 Data Migration Methodology from Relational to NoSQL Databases

Authors: Mohamed Hanine, Abdesadik Bendarag, Omar Boutkhoum

Abstract:

Currently, the field of data migration is very topical. As the number of applications developed rapidly, the ever-increasing volume of data collected has driven the architectural migration from Relational Database Management System (RDBMS) to NoSQL (Not Only SQL) database. This very recent technology is important enough in the field of database management. The main aim of this paper is to present a methodology for data migration from RDBMS to NoSQL database. To illustrate this methodology, we implement a software prototype using MySQL as a RDBMS and MongoDB as a NoSQL database. Although this is a hard engineering work, our results show that the proposed methodology can successfully accomplish the goal of this study.

Keywords: Data Migration, MySQL, RDBMS, NoSQL, MongoDB.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4364
101 Physical and Rheological Properties of Asphalt Modified with Cellulose Date Palm Fibers

Authors: Howaidi M. Al-Otaibi, Abdulrahman S. Al-Suhaibani, Hamad A. Alsoliman

Abstract:

Fibers are extensively used in civil engineering applications for many years. In this study, empty fruit bunch of date palm trees were used to produce cellulose fiber that were used as additives in the asphalt binder. Two sizes (coarse and fine) of cellulose fibers were pre-blended in PG64-22 binder with various contents of 1.5%, 3%, 4.5%, 6%, and 7.5% by weight of asphalt binder. The physical and rheological properties of fiber modified asphalt binders were tested by using conventional tests such as penetration, softening point and viscosity; and SHRP test such as dynamic shear rheometer. The results indicated that the fiber modified asphalt binders were higher in softening point, viscosity, and complex shear modulus, and lower in penetration compared to pure asphalt. The fiber modified binders showed an improvement in rheological properties since it was possible to raise the control binder (pure asphalt) PG from 64 to 70 by adding 6% (by weight) of either fine or coarse fibers. Such improvement in stiffness of fiber modified binder is expected to improve pavement resistance to rutting.

Keywords: Cellulose date palm fiber, fiber modified asphalt, physical properties, rheological properties.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1855
100 Kano’s Model for Clinical Laboratory

Authors: Khaled N. El-Hashmi, Omar K.Gnieber

Abstract:

The clinical laboratory has received considerable recognition globally due to the rapid development of advanced technology, economic demands and its role in a patient’s treatment cycle. Although various cross-domain experiments and practices with respect to clinical laboratory projects are ready for the full swing, the customer needs are still ambiguous and debatable. The purpose of this study is to apply Kano’s model and customer satisfaction matrix to categorize service quality attributes in order to see how well these attributes are able to satisfy customer needs. The result reveals that ten of the 26 service quality attributes have greater impacts on highly increasing customer’s satisfaction and should be taken in consideration firstly.

Keywords: Clinical laboratory, Customer satisfaction matrix, Kano’s Model, Quality Attributes, Voice of Customer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2827
99 The Effect of Dynamic Eccentricity on Induction Machine Stator Currents (Part A)

Authors: Saleh S. Hamad Elawgali

Abstract:

Current spectrums of a high power induction machine was calculated for the cases of full symmetry, static and dynamic eccentricity. The calculations involve integration of 93 electrical plus four mechanical ordinary differential equations. Electrical equations account for variable inductances affected by slotting and eccentricities. The calculations were followed by Fourier analysis of the stator currents in steady state operation. The paper presents the stator current spectrums in full symmetry, static and dynamic eccentricity cases, and demonstrates the harmonics present in each case. The effect of dynamic eccentricity is demonstrating via comparing the current spectrums related to dynamic eccentricity cases with the full symmetry one. The paper includes one case study, refers to dynamic eccentricity, to present the spectrum of the measured current and demonstrate the existence of the harmonics related to dynamic eccentricity. The zooms of current spectrums around the main slot harmonic zone are included to simplify the comparison and prove the existence of the dynamic eccentricity harmonics in both calculated and measured current spectrums.

Keywords: Current spectrum, diagnostics, harmonics, Induction machine

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2295
98 Adsorption of Phenol and 4-Hydroxybenzoic Acid onto Functional Materials

Authors: Mourad Makhlouf, Omar Bouchher, Messabih Sidi Mohamed, Benrachedi Khaled

Abstract:

The objective of this study was to investigate the removal of two organic pollutants; 4-hydroxybenzoic acid (p-hydroxybenzoic acid) and phenol from synthetic wastewater by the adsorption on mesoporous materials. In this context, the aim of this work is to study the adsorption of organic compounds phenol and 4AHB on MCM-41 and FSM-16 non-grafted (NG) and other grafted (G) by trimethylchlorosilane (TMCS). The results of phenol and 4AHB adsorption in aqueous solution show that the adsorption capacity tends to increase after grafting in relation to the increase in hydrophobicity. The materials are distinguished by a higher adsorption capacity to the other NG materials. The difference in the phenol is 14.43% (MCM-41), 14.55% (FSM-16), and 16.72% (MCM-41), 13.57% (FSM-16) in the 4AHB. Our adsorption results show that the grafted materials by TMCS are good adsorbent at 25 °C.

Keywords: MCM-41, FSM-16, TMCS, phenol, 4AHB.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1056
97 Online Metacognitive Reading Strategies Use by Postgraduate Libyan EFL Students

Authors: Najwa Alsayed Omar

Abstract:

With the increasing popularity of the Internet, online reading has become an essential source for EFL readers. Using strategies to comprehend information on online reading texts play a crucial role in students’ academic success. Metacognitive reading strategies are effective factors that enhance EFL learners reading comprehension. This study aimed at exploring the use of online metacognitive reading strategies by postgraduate Libyan EFL students. Quantitative data was collected using the Survey of Online Reading Strategies (OSORS). The findings revealed that the participants were moderate users of metacognitive online reading strategies. Problem solving strategies were the most frequently reported used strategies, while support reading strategies were the least. The five most and least frequently reported strategies were identified. Based on the findings, some future research recommendations were presented.

Keywords: Metacognitive strategies, Online reading, Online reading strategies, Postgraduate students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3101
96 Proposal of Design Method in the Semi-Acausal System Model

Authors: Junji Kaneko, Shigeyuki Haruyama, Ken Kaminishi, Tadayuki Kyoutani, Siti Ruhana Omar, Oke Oktavianty

Abstract:

This study is used as a definition method to the value and function in manufacturing sector. In concurrence of discussion about present condition of modeling method, until now definition of 1D-CAE is ambiguity and not conceptual. Across all the physic fields, those methods are defined with the formulation of differential algebraic equation which only applied time derivation and simulation. At the same time, we propose semi-acausal modeling concept and differential algebraic equation method as a newly modeling method which the efficiency has been verified through the comparison of numerical analysis result between the semi-acausal modeling calculation and FEM theory calculation.

Keywords: System Model, Physical Models, Empirical Models, Conservation Law, Differential Algebraic Equation, Object-Oriented.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2229
95 Comparison of Rheological Properties for Polymer Modified Asphalt Produced in Riyadh

Authors: Ali M. Babalghaith, Hamad A. Alsoliman, Abdulrahman S. Al-Suhaibani

Abstract:

Flexible pavement made with neat asphalt binder is not enough to resist heavy traffic loads as well as harsh environmental condition found in Riyadh region. Therefore, there is a need to modify asphalt binder with polymers to satisfy such conditions. There are several types of polymers that are used to modify asphalt binder. The objective of this paper is to compare the rheological properties of six polymer modified asphalt binders (Lucolast7010, Anglomak2144, Paveflex140, SBS KTR401, EE-2 and Crumb rubber) obtained from asphalt manufacturer plants. The rheological properties of polymer modified asphalt binders were tested using conventional tests such as penetration, softening point and viscosity; and SHRP tests such as dynamic shear rheometer and bending beam rheometer. The results have indicated that the polymer modified asphalt binders have lower penetration and higher softening point than neat asphalt indicating an improvement in stiffness of asphalt binder, and as a result, more resistant to rutting. Moreover, the dynamic shear rheometer results have shown that all modifiers used in this study improved the binder properties and satisfied the Superpave specifications except SBS KTR401 which failed to satisfy the rutting parameter (G*/sinδ).

Keywords: Polymer modified asphalt, rheological properties, SBS, crumb rubber, EE-2.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2407
94 Image Clustering Framework for BAVM Segmentation in 3DRA Images: Performance Analysis

Authors: FH. Sarieddeen, R. El Berbari, S. Imad, J. Abdel Baki, M. Hamad, R. Blanc, A. Nakib, Y.Chenoune

Abstract:

Brain ArterioVenous Malformation (BAVM) is an abnormal tangle of brain blood vessels where arteries shunt directly into veins with no intervening capillary bed which causes high pressure and hemorrhage risk. The success of treatment by embolization in interventional neuroradiology is highly dependent on the accuracy of the vessels visualization. In this paper the performance of clustering techniques on vessel segmentation from 3- D rotational angiography (3DRA) images is investigated and a new technique of segmentation is proposed. This method consists in: preprocessing step of image enhancement, then K-Means (KM), Fuzzy C-Means (FCM) and Expectation Maximization (EM) clustering are used to separate vessel pixels from background and artery pixels from vein pixels when possible. A post processing step of removing false-alarm components is applied before constructing a three-dimensional volume of the vessels. The proposed method was tested on six datasets along with a medical assessment of an expert. Obtained results showed encouraging segmentations.

Keywords: Brain arteriovenous malformation (BAVM), 3-D rotational angiography (3DRA), K-Means (KM) clustering, Fuzzy CMeans (FCM) clustering, Expectation Maximization (EM) clustering, volume rendering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1908
93 Open Jet Testing for Buoyant and Hybrid Buoyant Aerial Vehicles

Authors: A. U. Haque, W. Asrar, A. A. Omar, E. Sulaeman, J. S Mohamed Ali

Abstract:

Open jet testing is a valuable testing technique which provides the desired results with reasonable accuracy. It has been used in past for the airships and now has recently been applied for the hybrid ones, having more non-buoyant force coming from the wings, empennage and the fuselage. In the present review work, an effort has been done to review the challenges involved in open jet testing. In order to shed light on the application of this technique, the experimental results of two different configurations are presented. Although, the aerodynamic results of such vehicles are unique to its own design; however, it will provide a starting point for planning any future testing. Few important testing areas which need more attention are also highlighted. Most of the hybrid buoyant aerial vehicles are unconventional in shape and there experimental data is generated, which is unique to its own design.

Keywords: Open jet testing, aerodynamics, hybrid buoyant aerial vehicles, airships.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2303
92 Heat Transfer from a Cylinder in Cross-Flow of Single and Multiphase Flows

Authors: F. A. Hamad, S. He

Abstract:

In this paper, the average heat transfer characteristics for a cross flow cylinder of 16 mm diameter in a vertical pipe has been studied for single-phase flow (water/oil) and multicomponent (non-boiling) flow (water-air, water-oil, oil-air and water-oil-air). The cylinder is uniformly heated by electrical heater placed at the centre of the element. The results show that the values of average heat transfer coefficients for water are around four times the values for oil flow. Introducing air as a second phase with water has very little effect on heat transfer rate, while the heat transfer increased by 70% in case of oil. For water–oil flow, the heat transfer coefficient values are reflecting the percentage of water up to 50%, but increasing the water more than 50% leads to a sharp increase in the heat transfer coefficients to become close to the values of pure water. The enhancement of heat transfer by mixing two phases may be attributed to the changes in flow structure near to cylinder surface which lead to thinner boundary layer and higher turbulence. For three-phase flow, the heat transfer coefficients for all cases fall within the limit of single-phase flow of water and oil and are very close to pure water values. The net effect of the turbulence augmentation due to the introduction of air and the attenuation due to the introduction of oil leads to a thinner boundary layer of oil over the cylinder surface covered by a mixture of water and air bubbles.

Keywords: Circular cylinder, cross-flow, heat transfer, multicomponent multiphase flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2179
91 Intelligent Network-Based Stepping Stone Detection Approach

Authors: Mohd Nizam Omar, Rahmat Budiarto

Abstract:

This research intends to introduce a new usage of Artificial Intelligent (AI) approaches in Stepping Stone Detection (SSD) fields of research. By using Self-Organizing Map (SOM) approaches as the engine, through the experiment, it is shown that SOM has the capability to detect the number of connection chains that involved in a stepping stones. Realizing that by counting the number of connection chain is one of the important steps of stepping stone detection and it become the research focus currently, this research has chosen SOM as the AI techniques because of its capabilities. Through the experiment, it is shown that SOM can detect the number of involved connection chains in Network-based Stepping Stone Detection (NSSD).

Keywords: Artificial Intelligent, Self-Organizing Map (SOM), Stepping Stone Detection, Tracing Intruder.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1475
90 Evaluation of Multilevel Modulation Formats for 100Gbps Transmission with Direct Detection

Authors: Majed Omar Al-Dwairi

Abstract:

This paper evaluate the multilevel modulation for different techniques such as amplitude shift keying (M-ASK), MASK, differential phase shift keying (M-ASK-Bipolar), Quaternary Amplitude Shift Keying (QASK) and Quaternary Polarization-ASK (QPol-ASK) at a total bit rate of 107 Gbps. The aim is to find a costeffective very high speed transport solution. Numerical investigation was performed using Monte Carlo simulations. The obtained results indicate that some modulation formats can be operated at 100Gbps in optical communication systems with low implementation effort and high spectral efficiency.

Keywords: Optical communication, multilevel amplitude shift keying (M-ASK), Differential phase shift keying (DPSK), Quaternary Amplitude Shift Keying (QASK), Quaternary Polarization-ASK (QPol-ASK).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2258
89 Human Behavior Modeling in Video Surveillance of Conference Halls

Authors: Nour Charara, Hussein Charara, Omar Abou Khaled, Hani Abdallah, Elena Mugellini

Abstract:

In this paper, we present a human behavior modeling approach in videos scenes. This approach is used to model the normal behaviors in the conference halls. We exploited the Probabilistic Latent Semantic Analysis technique (PLSA), using the 'Bag-of-Terms' paradigm, as a tool for exploring video data to learn the model by grouping similar activities. Our term vocabulary consists of 3D spatio-temporal patch groups assigned by the direction of motion. Our video representation ensures the spatial information, the object trajectory, and the motion. The main importance of this approach is that it can be adapted to detect abnormal behaviors in order to ensure and enhance human security.

Keywords: Activity modeling, clustering, PLSA, video representation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 841
88 Methane Production from Biomedical Waste (Blood)

Authors: Fatima M. Kabbashi, Abdalla M. Abdalla, Hussam K. Hamad, Elias S. Hassan

Abstract:

This study investigates the production of renewable energy (biogas) from biomedical hazard waste (blood) and eco-friendly disposal. Biogas is produced by the bacterial anaerobic digestion of biomaterial (blood). During digestion process bacterial feeding result in breaking down chemical bonds of the biomaterial and changing its features, by the end of the digestion (biogas production) the remains become manure as known. That has led to the economic and eco-friendly disposal of hazard biomedical waste (blood). The samples (Whole blood, Red blood cells 'RBCs', Blood platelet and Fresh Frozen Plasma ‘FFP’) are collected and measured in terms of carbon to nitrogen C/N ratio and total solid, then filled in connected flasks (three flasks) using water displacement method. The results of trails showed that the platelet and FFP failed to produce flammable gas, but via a gas analyzer, it showed the presence of the following gases: CO, HC, CO₂, and NOX. Otherwise, the blood and RBCs produced flammable gases: Methane-nitrous CH₃NO (99.45%), which has a blue color flame and carbon dioxide CO₂ (0.55%), which has red/yellow color flame. Methane-nitrous is sometimes used as fuel for rockets, some aircraft and racing cars.

Keywords: Renewable energy, biogas, biomedical waste, blood, anaerobic digestion, eco-friendly disposal.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1216
87 Ballast Water Management Triad: Administration, Ship Owner and the Seafarer

Authors: Rajoo Balaji, Omar Yaakob

Abstract:

The Ballast Water Convention requires less than 5% of the world tonnage for ratification. Consequently, ships will have to comply with the requirements. Compliance evaluation and enforcement will become mandatory. Ship owners have to invest in treatment systems and shipboard personnel have to operate them and ensure compliance. The monitoring and enforcement will be the responsibilities of the Administrations. Herein, a review of the current status of the Ballast Water Management and the issues faced by these are projected. Issues range from efficacy and economics of the treatment systems to sampling and testing. Health issues of chemical systems, paucity of data for decision support etc., are other issues. It is emphasized that management of ballast water must be extended to ashore and sustainable solutions must be researched upon. An exemplar treatment system based on ship’s waste heat is also suggested.

Keywords: Ballast water management, Compliance evaluation, Compliance enforcement, Sustainability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2190
86 Enhanced Conference Organization Based On Correlation of Web Information and Ontology Based Expertise Search

Authors: Hassan Noureddine, Maria Sokhn, Iman Jarkass, Elena Mugellini, Omar Abou Khaled

Abstract:

From the importance of the conference and its constructive role in the studies discussion, there must be a strong organization that allows the exploitation of the discussions in opening new horizons. The vast amount of information scattered across the web, make it difficult to find experts, who can play a prominent role in organizing conferences. In this paper we proposed a new approach of extracting researchers- information from various Web resources and correlating them in order to confirm their correctness. As a validator of this approach, we propose a service that will be useful to set up a conference. Its main objective is to find appropriate experts, as well as the social events for a conference. For this application we us Semantic Web technologies like RDF and ontology to represent the confirmed information, which are linked to another ontology (skills ontology) that are used to present and compute the expertise.

Keywords: Expert finding, Information extraction, Ontologies, Semantic web, Social events.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1624
85 Study of Asphaltene Precipitation İnduced Formation Damage During CO2 Injection for a Malaysian Light Oil

Authors: Sima Sh. Alian, Abdul Aziz Omar, Ali F. Alta'ee, Irzie Hani

Abstract:

In this work, the precipitation of asphaltene from a Malaysian light oil reservoir was studies. A series of experiments were designed and carried out to examine the effect of CO2 injection on asphaltene precipitation. Different pressures of injections were used in Dynamic flooding experiment in order to investigate the effect of pressure versus injection pore volume of CO2. These dynamic displacement tests simulate reservoir condition. Results show that by increasing the pore volume of injected gas asphaltene precipitation will increases, also rise in injection pressure causes less precipitation. Sandstone core plug was used to represent reservoir formation during displacement test; therefore it made it possible to study the effect of present of asphaltene on formation. It is found out that the precipitated asphaltene can reduce permeability and porosity which is not favorable during oil production.

Keywords: Asphaltene, asphaltene precipitation, enhanced oil recovery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3848
84 Performance of Membrane Bioreactor (MBR) in High Phosphate Wastewater

Authors: Aida Isma M. I., Putri Razreena A. R., Rozita Omar, Azni Idris

Abstract:

This study presents the performance of membrane bioreactor in treating high phosphate wastewater. The laboratory scale MBR was operated at permeate flux of 25 L/m2.h with a hollow fiber membrane (polypropylene, approx. pore size 0.01 - 0.2 μm) at hydraulic retention time (HRT) of 12 hrs. Scanning electron microscopy (SEM) and energy diffusive X-ray (EDX) analyzer were used to characterize the membrane foulants. Results showed that the removal efficiencies of COD, TSS, NH3-N and PO4 3- were 93, 98, 80 and 30% respectively. On average 91% of influent soluble microbial products (SMP) were eliminated, with the eliminations of polysaccharides mostly above 80%. The main fouling resistance was cake resistance. It should be noted that SMP were found in major portions of mixed liquor that played a relatively significant role in membrane fouling. SEM and EDX analyses indicated that the foulants covering the membrane surfaces comprises not only organic substances but also inorganic elements including Mg, Ca, Al, K and P.

Keywords: Membrane bioreactor (MBR), membrane fouling, phosphates, soluble microbial products (SMP).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3369
83 Embedded Semi-Fragile Signature Based Scheme for Ownership Identification and Color Image Authentication with Recovery

Authors: M. Hamad Hassan, S.A.M. Gilani

Abstract:

In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Depending upon the channel selected two to three LSBs of each central 2×2 sub-block are set to zero to hold the ownership, authentication and recovery information. The size & position of sub-block is important for correct localization, enhanced security & fast computation. As YS ÔèÑ T so it is suitable to embed the recovery information apart from the ownership and authentication information, therefore 4×4 block of T channel along with ownership information is then deployed by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e. H(m)=H(m'). For recovery, intensity mean of 4x4 block of each channel is computed and encoded upto eight bits. For watermark embedding, key based mapping of blocks is performed using 2DTorus Automorphism. Our scheme is oblivious, generates highly imperceptible images with correct localization of tampering within reasonable time and has the ability to recover the original work with probability of near one.

Keywords: Hash Collision, LSB, MD5, PSNR, SHA160

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1517
82 Development of Knowledge Portal using Open Source Tools: A Case Study of FIIT, UNISEL

Authors: Nur Razia Mohd Suradi, Hema Subramaniam, Marina Hassan, Siti Fatimah Omar

Abstract:

Knowledge sharing culture contributes to a positive working environment. Currently, there is no platform for the Faculty of Industrial Information Technology (FIIT), Unisel academic staff to share knowledge among them. As it is done manually, the sharing process is through common meeting or by any offline discussions. There is no repository for future retrieval. However, with open source solution the development of knowledge based application may reduce the cost tremendously. In this paper we discuss about the domain on which this knowledge portal is being developed and also the deployment of open source tools such as JOOMLA, PHP programming language and MySQL. This knowledge portal is evidence that open source tools also reliable in developing knowledge based portal. These recommendations will be useful to the open source community to produce more open source products in future.

Keywords: Knowledge management, Portal, ContentManagement, JOOMLA.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2493
81 Existence of Periodic Solution for p-Laplacian Neutral Rayleigh Equation with Sign-variable Coefficient of Non Linear Term

Authors: Aomar Anane, Omar Chakrone, Loubna Moutaouekkil

Abstract:

As p-Laplacian equations have been widely applied in field of the fluid mechanics and nonlinear elastic mechanics, it is necessary to investigate the periodic solutions of functional differential equations involving the scalar p-Laplacian. By using Mawhin’s continuation theorem, we study the existence of periodic solutions for p-Laplacian neutral Rayleigh equation (ϕp(x(t)−c(t)x(t − r))) + f(x(t)) + g1(x(t − τ1(t, |x|∞))) + β(t)g2(x(t − τ2(t, |x|∞))) = e(t), It is meaningful that the functions c(t) and β(t) are allowed to change signs in this paper, which are different from the corresponding ones of known literature.

Keywords: periodic solution, neutral Rayleigh equation, variable sign, Deviating argument, p-Laplacian, Mawhin’s continuation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1378
80 Analytical Crack Propagation Scenario for Gear Teeth and Time-Varying Gear Mesh Stiffness

Authors: Omar D. Mohammed, Matti Rantatalo, Uday Kumar

Abstract:

In this paper an analytical crack propagation scenario is proposed which assumes that a crack propagates in the tooth root in both the crack depth direction and the tooth width direction, and which is more reasonable and realistic for non-uniform load distribution cases than the other presented scenarios. An analytical approach is used for quantifying the loss of time-varying gear mesh stiffness with the presence of crack propagation in the gear tooth root. The proposed crack propagation scenario can be applied for crack propagation modelling and monitoring simulation, but further research is required for comparison and evaluation of all the presented crack propagation scenarios from the condition monitoring point of view.

Keywords: Crack propagation, Gear tooth crack, Time varying gear mesh stiffness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2809
79 Optimal Embedded Generation Allocation in Distribution System Employing Real Coded Genetic Algorithm Method

Authors: Mohd Herwan Sulaiman, Omar Aliman, Siti Rafidah Abdul Rahim

Abstract:

This paper proposes a new methodology for the optimal allocation and sizing of Embedded Generation (EG) employing Real Coded Genetic Algorithm (RCGA) to minimize the total power losses and to improve voltage profiles in the radial distribution networks. RCGA is a method that uses continuous floating numbers as representation which is different from conventional binary numbers. The RCGA is used as solution tool, which can determine the optimal location and size of EG in radial system simultaneously. This method is developed in MATLAB. The effect of EG units- installation and their sizing to the distribution networks are demonstrated using 24 bus system.

Keywords: Embedded generation (EG), load flow study, optimal allocation, real coded genetic algorithm (RCGA).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1901
78 Saturated Gain of Doped Multilayer Quantum Dot Semiconductor Optical Amplifiers

Authors: Omar Qasaimeh

Abstract:

The effect of the number of quantum dot (QD) layers on the saturated gain of doped QD semiconductor optical amplifiers (SOAs) has been studied using multi-population coupled rate equations. The developed model takes into account the effect of carrier coupling between adjacent layers. It has been found that increasing the number of QD layers (K) increases the unsaturated optical gain for K<8 and approximately has no effect on the unsaturated gain for K ≥ 8. Our analysis shows that the optimum ptype concentration that maximizes the unsaturated optical gain of the ground state is NA Ôëê 0.75 ×1018cm-3 . On the other hand, it has been found that the saturated optical gain for both the ground state and the excited state are strong function of both the doping concentration and K where we find that it is required to dope the dots with n-type concentration for very large K at high photon energy.

Keywords: doping, multilayer, quantum dot optical amplifier, saturated gain.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1925
77 Subclasses of Bi-Univalent Functions Associated with Hohlov Operator

Authors: Rashidah Omar, Suzeini Abdul Halim, Aini Janteng

Abstract:

The coefficients estimate problem for Taylor-Maclaurin series is still an open problem especially for a function in the subclass of bi-univalent functions. A function f ϵ A is said to be bi-univalent in the open unit disk D if both f and f-1 are univalent in D. The symbol A denotes the class of all analytic functions f in D and it is normalized by the conditions f(0) = f’(0) – 1=0. The class of bi-univalent is denoted by  The subordination concept is used in determining second and third Taylor-Maclaurin coefficients. The upper bound for second and third coefficients is estimated for functions in the subclasses of bi-univalent functions which are subordinated to the function φ. An analytic function f is subordinate to an analytic function g if there is an analytic function w defined on D with w(0) = 0 and |w(z)| < 1 satisfying f(z) = g[w(z)]. In this paper, two subclasses of bi-univalent functions associated with Hohlov operator are introduced. The bound for second and third coefficients of functions in these subclasses is determined using subordination. The findings would generalize the previous related works of several earlier authors.

Keywords: Analytic functions, bi-univalent functions, Hohlov operator, subordination.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 945
76 Identify Features and Parameters to Devise an Accurate Intrusion Detection System Using Artificial Neural Network

Authors: Saman M. Abdulla, Najla B. Al-Dabagh, Omar Zakaria

Abstract:

The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage. For analyzing, the work deploys the Feedforward-Back propagation neural network to act as misuse intrusion detection system. It uses ten types if attacks as example for training and testing the neural network. It explains how the packets are analyzed to extract features. The work shows how selecting the right features, building correct vectors and how correct identification of the training methods with nodes- number in hidden layer of any neural network affecting the accuracy of system. In addition, the work shows how to get values of optimal weights and use them to initialize the Artificial Neural Network.

Keywords: Artificial Neural Network, Attack Features, MisuseIntrusion Detection System, Training Parameters.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2281