Search results for: Fatma Ahmed
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 547

Search results for: Fatma Ahmed

487 Study of Cross Flow Air-Cooling Process via Water-Cooled Wing-Shaped Tubes in Staggered Arrangement at Different Angles of Attack, Part 2: Heat Transfer Characteristics and Thermal Performance Criteria

Authors: Sayed Ahmed E. Sayed Ahmed, Emad Z. Ibrahiem, Osama M. Mesalhy, Mohamed A. Abdelatief

Abstract:

An experimental and numerical study has been conducted to clarify heat transfer characteristics and effectiveness of a cross-flow heat exchanger employing staggered wing-shaped tubes at different angels of attack. The water-side Rew and the air-side Rea were at 5 x 102 and at from 1.8 x 103 to 9.7 x 103, respectively. The tubes arrangements were employed with various angles of attack θ1,2,3 from 0° to 330° at the considered Rea range. Correlation of Nu, St, as well as the heat transfer per unit pumping power (ε) in terms of Rea, design parameters for the studied bundle were presented. The temperature fields around the staggered wing-shaped tubes bundle were predicted by using commercial CFD FLUENT 6.3.26 software package. Results indicated that the heat transfer was increased by increasing the angle of attack from 0° to 45°, while the opposite was true for angles of attack from 135° to 180°. The best thermal performance and hence η of studied bundle was occurred at the lowest Rea and/or zero angle of attack. Comparisons between the experimental and numerical results of the present study and those, previously, obtained for similar available studies showed good agreements.

Keywords: Wing-shaped tubes, Cross-flow cooling, Staggered arrangement, and CFD.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2033
486 Application of Rapid Prototyping to Create Additive Prototype Using Computer System

Authors: Meftah O. Bashir, Fatma A. Karkory

Abstract:

Rapid prototyping is a new group of manufacturing processes, which allows fabrication of physical of any complexity using a layer by layer deposition technique directly from a computer system. The rapid prototyping process greatly reduces the time and cost necessary to bring a new product to market. The prototypes made by these systems are used in a range of industrial application including design evaluation, verification, testing, and as patterns for casting processes. These processes employ a variety of materials and mechanisms to build up the layers to build the part. The present work was to build a FDM prototyping machine that could control the X-Y motion and material deposition, to generate two-dimensional and three-dimensional complex shapes. This study focused on the deposition of wax material. This work was to find out the properties of the wax materials used in this work in order to enable better control of the FDM process. This study will look at the integration of a computer controlled electro-mechanical system with the traditional FDM additive prototyping process. The characteristics of the wax were also analysed in order to optimise the model production process. These included wax phase change temperature, wax viscosity and wax droplet shape during processing.

Keywords: Rapid prototyping, wax, manufacturing processes, additive prototyping.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1641
485 An Optimal Unsupervised Satellite image Segmentation Approach Based on Pearson System and k-Means Clustering Algorithm Initialization

Authors: Ahmed Rekik, Mourad Zribi, Ahmed Ben Hamida, Mohamed Benjelloun

Abstract:

This paper presents an optimal and unsupervised satellite image segmentation approach based on Pearson system and k-Means Clustering Algorithm Initialization. Such method could be considered as original by the fact that it utilised K-Means clustering algorithm for an optimal initialisation of image class number on one hand and it exploited Pearson system for an optimal statistical distributions- affectation of each considered class on the other hand. Satellite image exploitation requires the use of different approaches, especially those founded on the unsupervised statistical segmentation principle. Such approaches necessitate definition of several parameters like image class number, class variables- estimation and generalised mixture distributions. Use of statistical images- attributes assured convincing and promoting results under the condition of having an optimal initialisation step with appropriated statistical distributions- affectation. Pearson system associated with a k-means clustering algorithm and Stochastic Expectation-Maximization 'SEM' algorithm could be adapted to such problem. For each image-s class, Pearson system attributes one distribution type according to different parameters and especially the Skewness 'β1' and the kurtosis 'β2'. The different adapted algorithms, K-Means clustering algorithm, SEM algorithm and Pearson system algorithm, are then applied to satellite image segmentation problem. Efficiency of those combined algorithms was firstly validated with the Mean Quadratic Error 'MQE' evaluation, and secondly with visual inspection along several comparisons of these unsupervised images- segmentation.

Keywords: Unsupervised classification, Pearson system, Satellite image, Segmentation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1995
484 Performance Evaluation of GPS \ INS Main Integration Approach

Authors: Othman Maklouf, Ahmed Adwaib

Abstract:

This paper introduces a comparative study between the main GPS\INS coupling schemes, this will include the loosely coupled and tightly coupled configurations, several types of situations and operational conditions, in which the data fusion process is done using Kalman filtering. This will include the importance of sensors calibration as well as the alignment of the strap down inertial navigation system. The limitations of the inertial navigation systems are investigated.

Keywords: GPS, INS, Kalman Filter.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2763
483 Using Satellite Images Datasets for Road Intersection Detection in Route Planning

Authors: Fatma El-zahraa El-taher, Ayman Taha, Jane Courtney, Susan Mckeever

Abstract:

Understanding road networks plays an important role in navigation applications such as self-driving vehicles and route planning for individual journeys. Intersections of roads are essential components of road networks. Understanding the features of an intersection, from a simple T-junction to larger multi-road junctions is critical to decisions such as crossing roads or selecting safest routes. The identification and profiling of intersections from satellite images is a challenging task. While deep learning approaches offer state-of-the-art in image classification and detection, the availability of training datasets is a bottleneck in this approach. In this paper, a labelled satellite image dataset for the intersection recognition  problem is presented. It consists of 14,692 satellite images of Washington DC, USA. To support other users of the dataset, an automated download and labelling script is provided for dataset replication. The challenges of construction and fine-grained feature labelling of a satellite image dataset are examined, including the issue of how to address features that are spread across multiple images. Finally, the accuracy of detection of intersections in satellite images is evaluated.

Keywords: Satellite images, remote sensing images, data acquisition, autonomous vehicles, robot navigation, route planning, road intersections.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 652
482 Biochemical and Multiplex PCR Analysis of Toxic Crystal Proteins to Determine Genes in Bacillus thuringiensis Mutants

Authors: Fatma N. Talkhan, H. H. Abo-Assy, K. A. Soliman, Marwa M. Azzam, A. Z. E. Abdelsalam, A. S. Abdel-Razek

Abstract:

The Egyptian Bacillus thuringiensis isolate (M5) produce crystal proteins that is toxic against insects was irradiated with UV light to induce mutants. Upon testing 10 of the resulting mutants for their toxicity against cotton leafworm larvae, the three mutants 62, 64 and 85 proved to be the most toxic ones. Upon testing these mutants along with their parental isolate by SDS-PAGE analysis of spores-crystals proteins as well as vegetative cells proteins, new induced bands appeared in the three mutants by UV radiation and also they showed disappearance of some other bands as compared with the wild type isolate. Multiplex PCR technique, with five sets of specific primers, was used to detect the three types of cryI genes cryIAa, cryIAb and cryIAc. Results showed that these three genes exist, as distinctive bands, in the wild type isolate (M5) as well as in mutants 62 and 85, while the mutant 64 had two distinctive bands of cryIAb and cryIAc genes, and a faint band of cryI Aa gene. Finally, these results revealed that mutant 62 is considered as the promising mutant since it is UV resistant, highly toxic against Spodoptera littoralis and active against a wide range of Lepidopteran insects.

Keywords: Bacillus thuringiensis, biological control, cry1 genes, multiplex PC, SDS- PAGE analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1900
481 Impact of Hepatitis C Virus Chronic Infection on Quality of Life in Egypt

Authors: Ammal M. Metwally, Ghada A. Abdel-Latif, Walaa A. Fouad, Thanaa M. Rabah, Amira Mohsen, Fatma A. Shaaban, Iman I. Salama

Abstract:

The study aimed at determining the impact of chronic hepatitis C virus (HCV) infection on patients’ Quality of Life (QoL), its relation to geographical characteristics of patients, awareness of the disease, treatment regimen, co-morbid psychiatric or other diseases. 457 patients were randomly selected from ten National Treatment Reference Centers of Ministry of Health hospitals from four community locations representing Egypt. Health related QoL assessment questionnaire with the 36-item Short Form used for assessment of the enrolled patients. The study showed no significant difference between HCV patients in different governorates as regards total QoL. Females, illiterate patients and those had bilharziasis, diabetes mellitus, hypertension or were depressed had significantly the lowest QoL score. HCV patients who knew the danger of the disease had significant lower mean score of physical and mental health components. Optimal care of overall well-being of HCV patients requires adequate knowledge of their neurological and psychological status. It is important to know how to cope with having a family member with hepatitis C and more importantly to know what should you say and what shouldn’t you say as a positive hopeful attitude is essential for combating HCV chronic infection.

Keywords: Hepatitis C virus chronic infection, physical health component and mental health component of QoL, total quality of life.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2015
480 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 639
479 Biodegradation of Malathion by Acinetobacter baumannii Strain AFA Isolated from Domestic Sewage in Egypt

Authors: Ahmed F. Azmy , Amal E. Saafan, Tamer M. Essam, Magdy A. Amin, Shaban H. Ahmed

Abstract:

Bacterial strains capable of degradation of malathion from the domestic sewage were isolated by an enrichment culture technique. Three bacterial strains were screened and identified as Acinetobacter baumannii (AFA), Pseudomonas aeruginosa (PS1), and Pseudomonas mendocina (PS2) based on morphological, biochemical identification and 16S rRNA sequence analysis. Acinetobacter baumannii AFA was the most efficient malathion degrading bacterium, so used for further biodegradation study. AFA was able to grow in mineral salt medium (MSM) supplemented with malathion (100 mg/l) as a sole carbon source, and within 14 days, 84% of the initial dose was degraded by the isolate measured by high performance liquid chromatography. Strain AFA could also degrade other organophosphorus compounds including diazinon, chlorpyrifos and fenitrothion. The effect of different culture conditions on the degradation of malathion like inoculum density, other carbon or nitrogen sources, temperature and shaking were examined. Degradation of malathion and bacterial cell growth were accelerated when culture media were supplemented with yeast extract, glucose and citrate. The optimum conditions for malathion degradation by strain AFA were; an inoculum density of 1.5x 10^12CFU/ml at 30°C with shaking. A specific polymerase chain reaction primers were designed manually using multiple sequence alignment of the corresponding carboxylesterase enzymes of Acinetobacter species. Sequencing result of amplified PCR product and phylogenetic analysis showed low degree of homology with the other carboxylesterase enzymes of Acinetobacter strains, so we suggested that this enzyme is a novel esterase enzyme. Isolated bacterial strains may have potential role for use in bioremediation of malathion contaminated.

Keywords: Acinetobacter baumannii, biodegradation, Malathion, organophosphate pesticides.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3469
478 Bio Fuel Production from Waste of Starting Dates in South Algeria

Authors: Insaf Mehani, Ahmed Boulal, Bachir Bouchekima

Abstract:

Renewable energy, including bio energy are an alternative to fossil fuel depletion and a way to fight against the harmful effects of climate change. It is possible to develop common dates of low commercial value, and put on the local and international market a new generation of products with high added values ​​such as bio ethanol. Besides its use in chemical synthesis, bio ethanol can be blended with gasoline to produce a clean fuel while improving the octane.

Keywords: Bio energy, dates, bio ethanol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2252
477 Improvement of Data Transfer over Simple Object Access Protocol (SOAP)

Authors: Khaled Ahmed Kadouh, Kamal Ali Albashiri

Abstract:

This paper presents a designed algorithm involves improvement of transferring data over Simple Object Access Protocol (SOAP). The aim of this work is to establish whether using SOAP in exchanging XML messages has any added advantages or not. The results showed that XML messages without SOAP take longer time and consume more memory, especially with binary data.

Keywords: JAX-WS, SMTP, SOAP, Web service, XML.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2095
476 Cheiloscopy and Dactylography in Relation to ABO Blood Groups: Egyptian vs. Malay Populations

Authors: Manal Hassan Abdel Aziz, Fatma Mohamed Magdy Badr El Dine, Nourhan Mohamed Mohamed Saeed

Abstract:

Establishing association between lip print patterns and those of fingerprints as well as blood groups is of fundamental importance in the forensic identification domain. The first aim of the current study was to determine the prevalent types of ABO blood groups, lip prints and fingerprints patterns in both studied populations. Secondly, to analyze any relation found between the different print patterns and the blood groups, which would be valuable in identification purposes. The present study was conducted on 60 healthy volunteers, (30 males and 30 females) from each of the studied population. Lip prints and fingerprints were obtained and classified according to Tsuchihashi's classification and Michael Kuchen’s classification, respectively. The results show that the ulnar loop was the most frequent among both populations. Blood group A was the most frequent among Egyptians, while blood groups O and B were the predominant among Malaysians. Significant relations were observed between lip print patterns and fingerprint (in the second quadrant for Egyptian males and the first one for Malaysian). For Malaysian females, a statistically significant association was proved in the fourth quadrant. Regarding the blood groups, 89.5% of ulnar loops were significantly related to blood group A among Egyptian males. The results proved an association between the fingerprint pattern and the lip prints, as well as between the ABO blood group and the pattern of fingerprints. However, further researches with larger sample sizes need to be directed to approve the current results.

Keywords: ABO, cheiloscopy, dactylography, Egyptians, Malaysians.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 828
475 Ant Colony Optimization for Feature Subset Selection

Authors: Ahmed Al-Ani

Abstract:

The Ant Colony Optimization (ACO) is a metaheuristic inspired by the behavior of real ants in their search for the shortest paths to food sources. It has recently attracted a lot of attention and has been successfully applied to a number of different optimization problems. Due to the importance of the feature selection problem and the potential of ACO, this paper presents a novel method that utilizes the ACO algorithm to implement a feature subset search procedure. Initial results obtained using the classification of speech segments are very promising.

Keywords: Ant Colony Optimization, ant systems, feature selection, pattern recognition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3096
474 AES and ECC Mixed for ZigBee Wireless Sensor Security

Authors: Saif Al-alak, Zuriati Ahmed, Azizol Abdullah, Shamala Subramiam

Abstract:

In this paper, we argue the security protocols of ZigBee wireless sensor network in MAC layer. AES 128-bit encryption algorithm in CCM* mode is secure transferred data; however, AES-s secret key will be break within nearest future. Efficient public key algorithm, ECC has been mixed with AES to rescue the ZigBee wireless sensor from cipher text and replay attack. Also, the proposed protocol can parallelize the integrity function to increase system performance.

Keywords: AES, ECC, Multi-level security, ZigBee

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3336
473 Load Transfer Mechanism Based Unified Strut-and-Tie Modeling for Design of Concrete Beams

Authors: Ahmed, M., Yasser A., Mahmoud H., Ahmed, A., Abdulla M. S., Nazar, S.

Abstract:

Strut-and-Tie Models (STM) for the design of concrete beams, comprising of struts, ties, nodes as the basic tools, is conceptually simple, but its realization for complex concrete structure is not straightforward and depends on flow of internal forces in the structure. STM technique has won wide acceptance for deep member and shear design. STM technique is a unified approach that considers all load effects (bending, axial, shear, and torsion) simultaneously, not just applicable to shear loading only. The present study is to portray Strut-and-Tie Modeling based on Load-Transfer-Mechanisms as a unified method to analyze, design and detailing for deep and slender concrete beams. Three shear span- effective depth ratio (a/ d) are recommended for the modeling of STM elements corresponding to dominant load paths. The study also discusses the research work conduct on effective stress of concrete, tie end anchorage, and transverse reinforcement demand under different load transfer mechanism. It is also highlighted that to make the STM versatile tool for design of beams applicable to all shear spans, the effective stress of concrete and, transverse reinforcement demand, inclined angle of strut, and anchorage requirements of tie bars is required to be correlated with respect to load transfer mechanism. The country code provisions are to be modified and updated to apply for generalized design of concrete deep and slender member using load transfer mechanism based STM technique. Examples available in literature are reanalyzed with refined STM based on load transfer mechanisms and results are compared. It is concluded from the results that proposed approach will require true reinforcement demand depending on dominant force transfer action in concrete beam.

Keywords: Deep member, Load transfer mechanism, Strut-and-Tie Model, Strut, Truss.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5949
472 Applications of Genetic Programming in Data Mining

Authors: Saleh Mesbah Elkaffas, Ahmed A. Toony

Abstract:

This paper details the application of a genetic programming framework for induction of useful classification rules from a database of income statements, balance sheets, and cash flow statements for North American public companies. Potentially interesting classification rules are discovered. Anomalies in the discovery process merit further investigation of the application of genetic programming to the dataset for the problem domain.

Keywords: Genetic programming, data mining classification rule.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1517
471 Democracy in Pakistan: A Critical Review Through the Lens of Dr. Israr Ahmed and Western Philosophers

Authors: Zoaib Mirza

Abstract:

Pakistan is an Islamic country that got its partition from India in 1947 so that the people could practice the religion of Islam. The political slogan to strive for independence was “What does Pakistan mean? There is no God but Allah”. The ideology of Pakistan was based on the notion that sovereignty only belonged to God Almighty (in Arabic, God means “Allah”), and Muslims will live in accordance with Islam principles. The Quran (Holy Book) and Sunnah (authentic practices of Prophet Mohammad, Peace Be Upon Him, that explains the application of the Quran) are foundations of the Islamic principles. It has been over 75 years, but unfortunately, Pakistan, due to its own political, social, and economic mistakes, is responsible for not being able to become a true Islamic nation to justify its partition from India. The rationale for writing this paper is to analyze the factors that led to changes in the democratic movements impacting the country's political, social, and economic growth. The methodology to examine the historical and political context of Pakistan’s history is by referencing the scholarly work of Israr Ahmed. He focused on Islamic theology, philosophy, and studies, offering insights into the historical and political context of the country. While from a Western perspective, Karl Marx, Mar Weber, Hannah Arendt, Sheldon Wolin, Paulo Freire, and Jacques Ranciere's philosophies specific to totalitarianism, politics, military rule, religion, capitalism, and superpower are used as the framework to analyze Pakistan’s democracy. The study's findings conclude that Pakistan's democracy is unstable and has been impacted by military and civilian governance, which led to political, social, and economic downfall. To improve the current situation, the citizens of Pakistan have to realize that the success of a nation is only dependent on the level of consciousness of the leader and not the political system. Therefore, it is the responsibility of every citizen to be conscious of how they select their leader and take responsibility for the current situation in Pakistan.

Keywords: Pakistan, Islam, democracy, totalitarianism, military, religion, capitalism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 297
470 DMC with Adaptive Weighted Output

Authors: Ahmed Abbas, M.R. M Rizk, Mohamed El-Sayed

Abstract:

This paper presents a new adaptive DMC controller that improves the controller performance in case of plant-model mismatch. The new controller monitors the plant measured output, compares it with the model output and calculates weights applied to the controller move. Simulations show that the new controller can help improve control performance and avoid instability in case of severe model mismatches.

Keywords: Adaptive control, dynamic matrix control, DMC, model predictive control

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2192
469 CFD Study for Normal and Rifled Tube with a Convergence Check

Authors: Sharfi Dirar, Shihab Elhaj, Ahmed El Fatih

Abstract:

Computational fluid dynamics were used to simulate and study the heated water boiler tube for both normal and rifled tube with a refinement of the mesh to check the convergence. The operation condition was taken from GARRI power station and used in a boundary condition accordingly. The result indicates the rifled tube has higher heat transfer efficiency than the normal tube.

Keywords: Boiler tube, Convergence Check, Normal Tube, Rifled Tube.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1418
468 Application of MoM-GEC Method for Electromagnetic Study of Planar Microwave Structures: Shielding Application

Authors: Ahmed Nouainia, Mohamed Hajji, Taoufik Aguili

Abstract:

In this paper, an electromagnetic analysis is presented for describing the influence of shielding in a rectangular waveguide. A hybridization based on the method of moments combined to the generalized equivalent circuit MoM-GEC is used to model the problem. This is validated by applying the MoM-GEC hybridization to investigate a diffraction structure. It consists of electromagnetic diffraction by an iris in a rectangular waveguide. Numerical results are shown and discussed and a comparison with FEM and Marcuvitz methods is achieved.

Keywords: Inductive irises, MoM-GEC, waveguide, shielding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1109
467 Quality Culture Framework Proposal for Libyan Industrial Companies

Authors: Mostafa Ahmed Shokshok

Abstract:

Libyan industrial companies face many challenges in today's competitive market. Quality management culture approaches is one of these challenges which may furnish the road to the Libyan industrial companies to effectively empower their employees and improve their ability to respond to the international competition. The primary objective of this paper is to design a practical approach to guide Libyan industrial companies toward successful quality culture implementation.

Keywords: Libyan manufacturing industries, TQM, Quality culture, Quality framework.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2108
466 Levenberg-Marquardt Algorithm for Karachi Stock Exchange Share Rates Forecasting

Authors: Syed Muhammad Aqil Burney, Tahseen Ahmed Jilani, C. Ardil

Abstract:

Financial forecasting is an example of signal processing problems. A number of ways to train/learn the network are available. We have used Levenberg-Marquardt algorithm for error back-propagation for weight adjustment. Pre-processing of data has reduced much of the variation at large scale to small scale, reducing the variation of training data.

Keywords: Gradient descent method, jacobian matrix.Levenberg-Marquardt algorithm, quadratic error surfaces,

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2435
465 Optimal Path Planner for Autonomous Vehicles

Authors: M. Imran Akram, Ahmed Pasha, Nabeel Iqbal

Abstract:

In this paper a real-time trajectory generation algorithm for computing 2-D optimal paths for autonomous aerial vehicles has been discussed. A dynamic programming approach is adopted to compute k-best paths by minimizing a cost function. Collision detection is implemented to detect intersection of the paths with obstacles. Our contribution is a novel approach to the problem of trajectory generation that is computationally efficient and offers considerable gain over existing techniques.

Keywords: dynamic programming, graph search, path planning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1972
464 Toward a New Simple Analytical Formulation of Navier-Stokes Equations

Authors: Gunawan Nugroho, Ahmed M. S. Ali, Zainal A. Abdul Karim

Abstract:

Incompressible Navier-Stokes equations are reviewed in this work. Three-dimensional Navier-Stokes equations are solved analytically. The Mathematical derivation shows that the solutions for the zero and constant pressure gradients are similar. Descriptions of the proposed formulation and validation against two laminar experiments and three different turbulent flow cases are reported in this paper. Even though, the analytical solution is derived for nonreacting flows, it could reproduce trends for cases including combustion.

Keywords: Navier-Stokes Equations, potential function, turbulent flows.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2100
463 Analysis of Gamma-Ray Spectra Using Levenberg-Marquardt Method

Authors: A. H. Fatah, A. H. Ahmed

Abstract:

Levenberg-Marquardt method (LM) was proposed to be applied as a non-linear least-square fitting in the analysis of a natural gamma-ray spectrum that was taken by the Hp (Ge) detector. The Gaussian function that composed of three components, main Gaussian, a step background function and tailing function in the lowenergy side, has been suggested to describe each of the y-ray lines mathematically in the spectrum. The whole spectrum has been analyzed by determining the energy and relative intensity for the strong y-ray lines.

Keywords: Gamma-Ray, Spectrum analysis, Non-linear leastsquare fitting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2375
462 Financial Ethics: A Review of 2010 Flash Crash

Authors: Omer Farooq, Salman Ahmed Khan, Sadaf Khalid

Abstract:

Modern day stock markets have almost entirely became automated. Even though it means increased profits for the investors by algorithms acting upon the slightest price change in order of microseconds, it also has given birth to many ethical dilemmas in the sense that slightest mistake can cause people to lose all of their livelihoods. This paper reviews one such event that happened on May 06, 2010 in which $1 trillion dollars disappeared from the Dow Jones Industrial Average. We are going to discuss its various aspects and the ethical dilemmas that have arisen due to it.

Keywords: Flash Crash, Market Crash, Stock Market, Stock Market Crash.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1826
461 Using Genetic Algorithm to Improve Information Retrieval Systems

Authors: Ahmed A. A. Radwan, Bahgat A. Abdel Latef, Abdel Mgeid A. Ali, Osman A. Sadek

Abstract:

This study investigates the use of genetic algorithms in information retrieval. The method is shown to be applicable to three well-known documents collections, where more relevant documents are presented to users in the genetic modification. In this paper we present a new fitness function for approximate information retrieval which is very fast and very flexible, than cosine similarity fitness function.

Keywords: Cosine similarity, Fitness function, Genetic Algorithm, Information Retrieval, Query learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2715
460 Sensorless PM Motor with Multi Degree of Freedom Fuzzy Control

Authors: Faeka M. H. Khater, Farouk I. Ahmed, Mohamed I. Abu El- Sebah

Abstract:

This paper introduces application of multi degree of freedom fuzzy(MDOFF) controller in permanent magnet (PM)drive system. The drive system model is developed for FO control. Simulation of the system is carried out to predict the performance at NL and under load,. The results indicate that application of MDOFF controller is effective for sensorless PM drive system.

Keywords: Sensorless FO controller, PM drives system, MDOFF controller.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1660
459 Analysis of Poverty Reduction Strategies as Mechanism for Development in Nigeria from 1999-2014

Authors: Ahmed Usman Egye, Hamza Muhammad

Abstract:

Poverty alleviation is one of the most difficult challenges facing third world countries in their development efforts. Evidences in Nigeria showed that the number of those in poverty has continued to increase. This paper is aimed at analyzing the performance of poverty alleviation measures undertaken by successive administrations in Nigeria with a view to addressing the quagmire. The study identified the whole gamut of factors that served as stumbling blocks to the implementation of each of the strategies and recommended the involvement of local people in the identification and design of projects so that sufficient participation could be achieved.

Keywords: Poverty, development, strategies, Nigeria.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2724
458 Computer Software for Calculating Electron Mobility of Semiconductors Compounds; Case Study for N-Gan

Authors: Emad A. Ahmed

Abstract:

Computer software to calculate electron mobility with respect to different scattering mechanism has been developed. This software is adopted completely Graphical User Interface (GUI) technique and its interface has been designed by Microsoft Visual basic 6.0. As a case study the electron mobility of n-GaN was performed using this software. The behavior of the mobility for n-GaN due to elastic scattering processes and its relation to temperature and doping concentration were discussed. The results agree with other available theoretical and experimental data.

Keywords: Electron mobility, relaxation time, GaN, Scattering, Computer software, computation physics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3828