Search results for: Ibrahim M. Hussain
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 331

Search results for: Ibrahim M. Hussain

241 Enhancement of the Performance of Al-Qatraneh 33-kV Transmission Line Using STATCOM: A Case Study

Authors: Ali Hamad, Ibrahim Al-Drous, Saleh Al-Jufout

Abstract:

This paper presents a case study of using STATCOM to enhance the performance of Al-Qatraneh 33-kV transmission line. The location of the STATCOM was identified by maintaining minimum voltage drops at the 110 load nodes. The transmission line and the 110 load nodes have been modeled by MATLAB/Simulink. The suggested STATCOM and its location will increase the transmission capability of this transmission line and overcome the overload expected in the year 2020. The annual percentage loading rise has been considered as 14.35%. A graphical representation of the line-to-line voltages and the voltage drops at different load nodes is illustrated.

Keywords: FACTS, MATLAB, STATCOM, transmission line, voltage drop.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2079
240 Profit Efficiency and Competitiveness of Commercial Banks in Malaysia

Authors: Rosita Suhaimi, Firdaus Abdullah, Chong Fen Nee, Nurhani Aba Ibrahim

Abstract:

This paper attempts to identify the significance of Information and Communications Technology (ICT) and competitiveness to the profit efficiency of commercial banks in Malaysia. The profit efficiency of commercial banks in Malaysia, the dependent variable, was estimated using the Stochastic Frontier Approach (SFA) on a sample of unbalanced panel data, covering 23 commercial banks, between 1995 to 2007. Based on the empirical results, ICT was not found to exert a significant impact on profit efficiency, whereas competitiveness, non ICT stock expenditure and ownership were significant contributors. On the other hand, the size of banks was found to have significantly reduced profit efficiency, opening up for various interpretations of the interrelated role of ICT and competition.

Keywords: Competitiveness, Profit Efficiency, Stochastic Frontier Analysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2824
239 A Study of Students’ Perceptions Regarding the Effectiveness of Semester and Annual Examination System at Institute of Education and Research

Authors: Ayesha Batool, Saghir Ahmad, Abid Hussain Ch.

Abstract:

The art of the examination is probably the most difficult one in the whole range of educational practices. Semester system is the system of examination, which is set with an institute by its own teachers. Annual system is the system of examination, which is constructed and administrated by some agency outside the institute, it enables the teacher to estimate the effectiveness of the instruction, and students to estimate the progress made by them. On the other hand, semester system of examinations requires following the curriculum strictly and methods of teaching are to be employed by the choice of teachers. The main purpose of the study was to investigate university students’ perceptions regarding the effectiveness of semester system and annual system. The study was quantitative in nature. The sample consisted of 200 students. A five point Likert type scale was used to collect the data. The statistical measures like frequencies, mean, standard deviation, and One Way ANOVA test were applied to analyze the data. The major findings of the study indicated that in semester system students do not spend much time in political activities and develop their study habits. It also revealed that annual system of examination does not satisfy the educational aspirations of the students.

Keywords: Effectiveness, semester system, annual system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 885
238 Investigating the Effects of Hydrogen on Wet Cement for Underground Hydrogen Storage Applications in Oil and Gas Wells

Authors: Hamoud Al-Hadrami, Hossein Emadi, Athar Hussain

Abstract:

Green hydrogen is quickly emerging as a new source of the renewable energy for the world. Hydrogen production using water electrolysis is deemed as an environmentally friendly and safe source of energy for transportation and other industries. However, storing high volumes of hydrogen seems to be a significant challenge. Abandoned hydrocarbon reservoirs are considered as viable hydrogen storage options because of the availability of the required infrastructure such as wells and surface facilities. However, long-term wellbore integrity in these wells could be a serious challenge. The aim of this research is to investigate the effect of stored hydrogen on the wellbore integrity such as casing cement. The methodology is to experimentally expose hydrogen to wet and dry cement and measure the impact on cement rheological and mechanical properties. Hydrogen reduces the compressive strength of a set cement if it gets in contact with the cement slurry. Also, mixing hydrogen with cement slurry slightly increases its density and rheological properties which need to be considered to have a successful primary cementing operation.

Keywords: Green hydrogen, underground storage, wellbore integrity, cement, compressive strength.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 499
237 New Scheme in Determining nth Order Diagrams for Cross Multiplication Method via Combinatorial Approach

Authors: Sharmila Karim, Haslinda Ibrahim, Zurni Omar

Abstract:

In this paper, a new recursive strategy is proposed for determining $\frac{(n-1)!}{2}$ of $n$th order diagrams. The generalization of $n$th diagram for cross multiplication method were proposed by Pavlovic and Bankier but the specific rule of determining $\frac{(n-1)!}{2}$ of the $n$th order diagrams for square matrix is yet to be discovered. Thus using combinatorial approach, $\frac{(n-1)!}{2}$ of the $n$th order diagrams will be presented as $\frac{(n-1)!}{2}$ starter sets. These starter sets will be generated based on exchanging one element. The advantages of this new strategy are the discarding process was eliminated and the sign of starter set is alternated to each others.

Keywords: starter sets, permutation, exchanging one element, determinant

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1159
236 Using Support Vector Machine for Prediction Dynamic Voltage Collapse in an Actual Power System

Authors: Muhammad Nizam, Azah Mohamed, Majid Al-Dabbagh, Aini Hussain

Abstract:

This paper presents dynamic voltage collapse prediction on an actual power system using support vector machines. Dynamic voltage collapse prediction is first determined based on the PTSI calculated from information in dynamic simulation output. Simulations were carried out on a practical 87 bus test system by considering load increase as the contingency. The data collected from the time domain simulation is then used as input to the SVM in which support vector regression is used as a predictor to determine the dynamic voltage collapse indices of the power system. To reduce training time and improve accuracy of the SVM, the Kernel function type and Kernel parameter are considered. To verify the effectiveness of the proposed SVM method, its performance is compared with the multi layer perceptron neural network (MLPNN). Studies show that the SVM gives faster and more accurate results for dynamic voltage collapse prediction compared with the MLPNN.

Keywords: Dynamic voltage collapse, prediction, artificial neural network, support vector machines

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1770
235 An Evaluation of Requirements Management and Traceability Tools

Authors: Muhammad Shahid, Suhaimi Ibrahim, Mohd Naz'ri Mahrin

Abstract:

Requirements management is critical to software delivery success and project lifecycle. Requirements management and their traceability provide assistance for many software engineering activities like impact analysis, coverage analysis, requirements validation and regression testing. In addition requirements traceability is the recognized component of many software process improvement initiatives. Requirements traceability also helps to control and manage evolution of a software system. This paper aims to provide an evaluation of current requirements management and traceability tools. Management and test managers require an appropriate tool for the software under test. We hope, evaluation identified here will help to select the efficient and effective tool.

Keywords: Requirements Traceability, Requirements TraceabilityTools; Requirements Management, Requirement Engineering

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3975
234 Investigation of the Effects of Sampling Frequency on the THD of 3-Phase Inverters Using Space Vector Modulation

Authors: Khattab Ibrahim Al Qaisi, Nicholas Bowring

Abstract:

This paper presents the simulation results of the effects of sampling frequency on the total harmonic distortion (THD) of three-phase inverters using the space vector pulse width modulation (SVPWM) and space vector control (SVC) algorithms. The relationship between the variables was studied using curve fitting techniques, and it has been shown that, for 50 Hz inverters, there is an exponential relation between the sampling frequency and THD up to around 8500 Hz, beyond which the performance of the model becomes irregular, and there is an negative exponential relation between the sampling frequency and the marginal improvement to the THD. It has also been found that the performance of SVPWM is better than that of SVC with the same sampling frequency in most frequency range, including the range where the performance of the former is irregular.

Keywords: SVPWM, THD, DC-AC Inverter, Sampling Frequency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2932
233 SIP Authentication Scheme using ECDH

Authors: Aytunc Durlanik, Ibrahim Sogukpinar

Abstract:

SIP (Session Initiation Protocol), using HTML based call control messaging which is quite simple and efficient, is being replaced for VoIP networks recently. As for authentication and authorization purposes there are many approaches and considerations for securing SIP to eliminate forgery on the integrity of SIP messages. On the other hand Elliptic Curve Cryptography has significant advantages like smaller key sizes, faster computations on behalf of other Public Key Cryptography (PKC) systems that obtain data transmission more secure and efficient. In this work a new approach is proposed for secure SIP authentication by using a public key exchange mechanism using ECC. Total execution times and memory requirements of proposed scheme have been improved in comparison with non-elliptic approaches by adopting elliptic-based key exchange mechanism.

Keywords: SIP, Elliptic Curve Cryptography, voice over IP.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2466
232 Electromyographic Activity of the Medial Gastrocnemius and Lateral Gastrocnemius Muscle during Salat-s and Specific Exercise

Authors: M. K. M. Safee, W. A. B. Wan Abas, N. A. Abu Osman, F. Ibrahim

Abstract:

This paper investigates the activity of the gastrocnemius (Gas) muscle in healthy subjects during salat (ruku- position) and specific exercise [Unilateral Plantar Flexion Exercise (UPFE)] using electromyography (EMG). Both lateral and medial Gas muscles were assessed. A group of undergraduates aged between 19 to 25 years voluntarily participated in this study. The myoelectric activity of the muscles were recorded and analyzed. The finding indicated that there were contractions of the muscles during the salat and exercise with almost same EMG-s level. From the result, Wilcoxon-s Rank Sum test showed no significant difference between ruku- and UPFE for both medial (p=0.082) and lateral (p=0.226) of GAS muscles. Therefore, salat may be useful in strengthening exercise and also in rehabilitation programs for lower limb activities.

Keywords: Electromyography, salat, exercise, muscle.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2096
231 Critical Success Factors of Information Technology Projects

Authors: Md. Athar Imtiaz, Abduljalil S. Al-Mudhary, Md. Taha Mirhashemi, Roslina Ibrahim

Abstract:

Information Technology (IT) is being used by almost all organizations throughout the world. However its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study previous literatures that have looked into these success promoting factors have been critically reviewed and analyzed. 15 Critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.

Keywords: Critical Success Factors, CSF, IT Projects, IS Projects, Software Development Projects.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12378
230 Scene Adaptive Shadow Detection Algorithm

Authors: Mohammed Ibrahim M, Anupama R.

Abstract:

Robustness is one of the primary performance criteria for an Intelligent Video Surveillance (IVS) system. One of the key factors in enhancing the robustness of dynamic video analysis is,providing accurate and reliable means for shadow detection. If left undetected, shadow pixels may result in incorrect object tracking and classification, as it tends to distort localization and measurement information. Most of the algorithms proposed in literature are computationally expensive; some to the extent of equalling computational requirement of motion detection. In this paper, the homogeneity property of shadows is explored in a novel way for shadow detection. An adaptive division image (which highlights homogeneity property of shadows) analysis followed by a relatively simpler projection histogram analysis for penumbra suppression is the key novelty in our approach.

Keywords: homogeneity, penumbra, projection histogram, shadow correction

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1850
229 Image Segment Matching Using Affine- Invariant Regions

Authors: Ibrahim El rube'

Abstract:

In this paper, a method for matching image segments using triangle-based (geometrical) regions is proposed. Triangular regions are formed from triples of vertex points obtained from a keypoint detector (SIFT). However, triangle regions are subject to noise and distortion around the edges and vertices (especially acute angles). Therefore, these triangles are expanded into parallelogramshaped regions. The extracted image segments inherit an important triangle property; the invariance to affine distortion. Given two images, matching corresponding regions is conducted by computing the relative affine matrix, rectifying one of the regions w.r.t. the other one, then calculating the similarity between the reference and rectified region. The experimental tests show the efficiency and robustness of the proposed algorithm against geometrical distortion.

Keywords: Image matching, key point detection, affine invariant, triangle-shaped segments.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1842
228 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector

Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid

Abstract:

For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.

Keywords: Energy security, electricity, energy policy, renewable energy, energy efficiency, Malaysia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1786
227 Optimal Control of Piezo-Thermo-Elastic Beams

Authors: Marwan Abukhaled, Ibrahim Sadek

Abstract:

This paper presents the vibrations suppression of a thermoelastic beam subject to sudden heat input by a distributed piezoelectric actuators. An optimization problem is formulated as the minimization of a quadratic functional in terms of displacement and velocity at a given time and with the least control effort. The solution method is based on a combination of modal expansion and variational approaches. The modal expansion approach is used to convert the optimal control of distributed parameter system into the optimal control of lumped parameter system. By utilizing the variational approach, an explicit optimal control law is derived and the determination of the corresponding displacement and velocity is reduced to solving a set of ordinary differential equations.

Keywords: Optimal control, Thermoelastic beam, variational approach, modal expansion approach

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1357
226 ReSeT : Reverse Engineering System Requirements Tool

Authors: Rosziati Ibrahim, Tiu Kian Yong

Abstract:

Reverse Engineering is a very important process in Software Engineering. It can be performed backwards from system development life cycle (SDLC) in order to get back the source data or representations of a system through analysis of its structure, function and operation. We use reverse engineering to introduce an automatic tool to generate system requirements from its program source codes. The tool is able to accept the Cµ programming source codes, scan the source codes line by line and parse the codes to parser. Then, the engine of the tool will be able to generate system requirements for that specific program to facilitate reuse and enhancement of the program. The purpose of producing the tool is to help recovering the system requirements of any system when the system requirements document (SRD) does not exist due to undocumented support of the system.

Keywords: System Requirements, Reverse Engineering, SourceCodes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1618
225 On the Comparison of Several Goodness of Fit tests under Simple Random Sampling and Ranked Set Sampling

Authors: F. Azna A. Shahabuddin, Kamarulzaman Ibrahim, Abdul Aziz Jemain

Abstract:

Many works have been carried out to compare the efficiency of several goodness of fit procedures for identifying whether or not a particular distribution could adequately explain a data set. In this paper a study is conducted to investigate the power of several goodness of fit tests such as Kolmogorov Smirnov (KS), Anderson-Darling(AD), Cramer- von- Mises (CV) and a proposed modification of Kolmogorov-Smirnov goodness of fit test which incorporates a variance stabilizing transformation (FKS). The performances of these selected tests are studied under simple random sampling (SRS) and Ranked Set Sampling (RSS). This study shows that, in general, the Anderson-Darling (AD) test performs better than other GOF tests. However, there are some cases where the proposed test can perform as equally good as the AD test.

Keywords: Empirical distribution function, goodness-of-fit, order statistics, ranked set sampling

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1670
224 Effects of Polluted Water on the Metallic Water Pipelines

Authors: Abdul-Khaliq M. Hussain, Bashir A. Tantosh, El-Sadeg A. Abdalla

Abstract:

Corrosion of metallic water pipelines buried below ground surface is a function of the nature of the surrounding soil and groundwater. This gives the importance of knowing the physical and chemical characteristics of the pipe-s surrounding environment. The corrosion of externally – unprotected metallic water pipelines, specially ductile iron pipes, in localities with aggressive soil conditions is becoming a significant problem. Anticorrosive protection for metallic water pipelines, their fittings and accessories is very important, because they may be attached by corrosion with time. The tendency of a metallic substrate to corrode is a function of the surface characteristics of the metal and of the metal/protective film interface, the physical, electrical and electrochemical properties of the film, and the nature of the environment in which the pipelines system is placed. In this work the authors have looked at corrosion problems of water pipelines and their control. The corrosive properties of groundwater and soil environments are reviewed, and parameters affecting corrosion are discussed. The purpose of this work is to provide guidelines for materials selection in water and soil environments, and how the water pipelines can be protected against metallic corrosion.

Keywords: Corrosion, Drinking Water, Metallic WaterPipelines, Polluted Water.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1747
223 Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain

Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: Hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1541
222 Harris Extraction and SIFT Matching for Correlation of Two Tablets

Authors: Ali Alzaabi, Georges Alquié, Hussain Tassadaq, Ali Seba

Abstract:

This article presents the developments of efficient algorithms for tablet copies comparison. Image recognition has specialized use in digital systems such as medical imaging, computer vision, defense, communication etc. Comparison between two images that look indistinguishable is a formidable task. Two images taken from different sources might look identical but due to different digitizing properties they are not. Whereas small variation in image information such as cropping, rotation, and slight photometric alteration are unsuitable for based matching techniques. In this paper we introduce different matching algorithms designed to facilitate, for art centers, identifying real painting images from fake ones. Different vision algorithms for local image features are implemented using MATLAB. In this framework a Table Comparison Computer Tool “TCCT" is designed to facilitate our research. The TCCT is a Graphical Unit Interface (GUI) tool used to identify images by its shapes and objects. Parameter of vision system is fully accessible to user through this graphical unit interface. And then for matching, it applies different description technique that can identify exact figures of objects.

Keywords: Harris Extraction and SIFT Matching

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1691
221 Parallel Block Backward Differentiation Formulas for Solving Ordinary Differential Equations

Authors: Khairil Iskandar Othman, Zarina Bibi Ibrahim, Mohamed Suleiman

Abstract:

A parallel block method based on Backward Differentiation Formulas (BDF) is developed for the parallel solution of stiff Ordinary Differential Equations (ODEs). Most common methods for solving stiff systems of ODEs are based on implicit formulae and solved using Newton iteration which requires repeated solution of systems of linear equations with coefficient matrix, I - hβJ . Here, J is the Jacobian matrix of the problem. In this paper, the matrix operations is paralleled in order to reduce the cost of the iterations. Numerical results are given to compare the speedup and efficiency of parallel algorithm and that of sequential algorithm.

Keywords: Backward Differentiation Formula, block, ordinarydifferential equations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1953
220 Tuberculin, Tetanus Immunoglobulin and DPT Vaccine as an Avian in vivo T- Lymphocyte Mitogens

Authors: Ibrahim Mohammed Saeed Shnawa

Abstract:

The avian phytohaemagglutinin skin test is being proved as an in vivo system for the evaluation an avian in vivo T cell mitogenicity. The test system was one week old Gallus domesticus broiler Chickens. Five replicates were done for each of the whole, 1:10 dilutions of each of 0.05 IU tuberculin, tetanus immunoglobulin and DPT vaccine as test materials. The evaluation parameters were the skin indurations and lymphoblast percentages in bone marrow lymphocytes. Tuberculin indurations were 2.06 and 1.26mm for 0.05 IU respectively while lymphoblast percent were 0.234 and 0.1 accordingly. The skin indurations of 135mg/ml and 1.35mg/ml tetanus immunoglobulin were 4.86 and 3.96mm while lymphoblast percentages were 0.3 and 0.14 respectively. The whole DPT and 1:10 concentration were with 4.5 and 3.2mm while their lymphoblast percentages were 0.28 and 0.12 accordingly. Thus the mitogenicity of the test materials was of dependant type.

Keywords: DPT, Mitogenicity, Tetenus, immunoglobulin, Tubercular.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1588
219 Design Channel Non-Persistent CSMA MAC Protocol Model for Complex Wireless Systems Based on SoC

Authors: Ibrahim A. Aref, Tarek El-Mihoub, Khadiga Ben Musa

Abstract:

This paper presents Carrier Sense Multiple Access (CSMA) communication models based on SoC design methodology. Such a model can be used to support the modeling of the complex wireless communication systems. Therefore, the use of such communication model is an important technique in the construction of high-performance communication. SystemC has been chosen because it provides a homogeneous design flow for complex designs (i.e. SoC and IP-based design). We use a swarm system to validate CSMA designed model and to show how advantages of incorporating communication early in the design process. The wireless communication created through the modeling of CSMA protocol that can be used to achieve communication between all the agents and to coordinate access to the shared medium (channel).

Keywords: SystemC, modeling, simulation, CSMA.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1605
218 A Cooperative Weighted Discriminator Energy Detector Technique in Fading Environment

Authors: Muhammad R. Alrabeiah, Ibrahim S. Alnomay

Abstract:

The need in cognitive radio system for a simple, fast, and independent technique to sense the spectrum occupancy has led to the energy detection approach. Energy detector is known by its dependency on noise variation in the system which is one of its major drawbacks. In this paper, we are aiming to improve its performance by utilizing a weighted collaborative spectrum sensing, it is similar to the collaborative spectrum sensing methods introduced previously in the literature. These weighting methods give more improvement for collaborative spectrum sensing as compared to no weighting case. There is two method proposed in this paper: the first one depends on the channel status between each sensor and the primary user while the second depends on the value of the energy measured in each sensor.

Keywords: Cognitive radio, Spectrum sensing, Collaborative sensors, Weighted Decisions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1681
217 Influence of Reaction Temperature and Water Content on Wheat Straw Pyrolysis

Authors: N.Ibrahim, Peter A. Jensen, K. Dam-Johansen, Roshafima.R. Ali, Rafiziana.M. Kasmani

Abstract:

The aim of this study was to investigate the influence of reaction temperature and wheat straw moisture content on the pyrolysis product yields, in the temperature range of 475-575 °C. Samples of straw with moisture contents from 1.5 wt % to 15.0 wt % were fed to a bench scale Pyrolysis Centrifuge Reactor (PCR). The experimental results show that the changes in straw moisture content have no significant effect on the distribution of pyrolysis product yields. The maximum bio-oil yields approximately 60 (wt %, on dry ash free feedstock basis) was observed around 525 °C - 550 °C for all straw moisture levels. The water content in the wet straw bio-oil was the highest. The heating value of bio-oil and solid char were measured and the percentages of its energy distribution were calculated. The energy distributions of bio-oil, char and gas were 56- 69 % 24-33 %, and 2-19 %, respectively.

Keywords: Flash pyrolysis, moisture content, wheat straw, biooil.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3240
216 A New Iterative Method for Solving Nonlinear Equations

Authors: Ibrahim Abu-Alshaikh

Abstract:

In this study, a new root-finding method for solving nonlinear equations is proposed. This method requires two starting values that do not necessarily bracketing a root. However, when the starting values are selected to be close to a root, the proposed method converges to the root quicker than the secant method. Another advantage over all iterative methods is that; the proposed method usually converges to two distinct roots when the given function has more than one root, that is, the odd iterations of this new technique converge to a root and the even iterations converge to another root. Some numerical examples, including a sine-polynomial equation, are solved by using the proposed method and compared with results obtained by the secant method; perfect agreements are found.

Keywords: Iterative method, root-finding method, sine-polynomial equations, nonlinear equations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1636
215 Improved FP-growth Algorithm with Multiple Minimum Supports Using Maximum Constraints

Authors: Elsayeda M. Elgaml, Dina M. Ibrahim, Elsayed A. Sallam

Abstract:

Association rule mining is one of the most important fields of data mining and knowledge discovery. In this paper, we propose an efficient multiple support frequent pattern growth algorithm which we called “MSFP-growth” that enhancing the FPgrowth algorithm by making infrequent child node pruning step with multiple minimum support using maximum constrains. The algorithm is implemented, and it is compared with other common algorithms: Apriori-multiple minimum supports using maximum constraints and FP-growth. The experimental results show that the rule mining from the proposed algorithm are interesting and our algorithm achieved better performance than other algorithms without scarifying the accuracy. 

Keywords: Association Rules, FP-growth, Multiple minimum supports, Weka Tool

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3262
214 Fabrication and Characterization of Sawdust Composite Biodegradable Film

Authors: M.Z. Norashikin, M.Z. Ibrahim

Abstract:

This report shows the performance of composite biodegradable film from chitosan, starch and sawdust fiber. The main objectives of this research are to fabricate and characterize composite biodegradable film in terms of morphology and physical properties. The film was prepared by casting method. Sawdust fiber was used as reinforcing agent and starch as polymer matrix in the casting solution. The morphology of the film was characterized using atomic force microscope (AFM). The result showed that the film has smooth structure. Chemical composition of the film was investigated using Fourier transform infrared (FTIR) where the result revealed present of starch in the film. The thermal properties were characterized using thermal gravimetric analyzer (TGA) and differential scanning calorimetric (DSC) where the results showed that the film has small difference in melting and degradation temperature.

Keywords: Sawdust, composite, film, biodegradable.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2540
213 Fifth Order Variable Step Block Backward Differentiation Formulae for Solving Stiff ODEs

Authors: S.A.M. Yatim, Z.B. Ibrahim, K.I. Othman, F. Ismail

Abstract:

The implicit block methods based on the backward differentiation formulae (BDF) for the solution of stiff initial value problems (IVPs) using variable step size is derived. We construct a variable step size block methods which will store all the coefficients of the method with a simplified strategy in controlling the step size with the intention of optimizing the performance in terms of precision and computation time. The strategy involves constant, halving or increasing the step size by 1.9 times the previous step size. Decision of changing the step size is determined by the local truncation error (LTE). Numerical results are provided to support the enhancement of method applied.

Keywords: Backward differentiation formulae, block backwarddifferentiation formulae, stiff ordinary differential equation, variablestep size.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2186
212 Towards Creating a Nation of Engineerpreneur

Authors: Rosnani Jusoh, Afifuddin Husairi Hussain, Fadzilah Abdul Rahman, Adi Irfan Che Ani, Haziyah Hussin

Abstract:

New conceptualizations were introduced to address the emerging need to develop innovativeness and creativity attitudes in future engineering professional. Thus, entrepreneurial engineering education needs an environment where future engineers can be formed through practical learning and the interaction with forces, ideas and inspirations, in the final perspective of effectively identifying, acquiring, developing, and transferring technology into new business products and services. This paper aims to investigate the characteristics of a successful entrepreneur for engineering students. A questionnaire was used to measure the level of entrepreneurial competencies. The questionnaire was based on the Personal Entrepreneurial Competence Model, developed by McClelland Individual. Participants were recruited from the final year students of eight programs under the Faculty of Engineering. Of the 432 questionnaires distributed, 210 were collected back, giving a response rate of approximately 49%. Findings suggest that final year engineering students have respectable entrepreneurial attitudes and behaviors, and are competent to be engineerpreneur. The study also recommended that we need an environment that does not insist that engineers become entrepreneurs, but one where the two can meet, and business leaders can organize our nation effectively.

Keywords: Engineerpreneur, entrepreneurship, engineering students, higher education institutions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2106