Search results for: Jerina Majeed
19 Functionalized Nanoparticles as Sorbents for Removal of Toxic Species
Authors: Jerina Majeed, Jayshree Ramkumar, S. Chandramouleeswaran, A. K. Tyagi
Abstract:
Removal of various toxic species from aqueous streams is of great importance. Sorption is one of the important remediation procedures as it involves the use of cheap and easily available materials. Also the advantage of regeneration of the sorbent involves the possibility of using novel sorbents. Nanosorbents are very important as the removal is based on the surface phenomena and this is greatly affected by surface charge and area. Functionalization has been very important to bring about the removal of metal ions with greater selectivity.
Keywords: Mercury, lead, thiol functionalization, ZnO NPs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 223918 Microbiological Contamination of Outdoor Air in Marine Durres's Harbour, Albania
Authors: Laura Gjyli, Pirro Prifti, Lindita Mukli, Silvana Gjyli, Irida Ikonomi, Jerina Kolitari
Abstract:
Microbial air contamination of the outdoor air in Marine Durres-s Harbour (Durres, Albania) was estimated by sedimentation technique in August-October 2008. The sampling areas were: Ferry Terminal (FT), Fishery Harbor (FH), East Zone (EZ), Fuel Quay (FQ) and Apollonian Beach (AB). The aim of this study was to measure the number of aerobic plate count (mesophilic aerobic bacteria) and fungi (yeasts and molds) in the outdoor air in these areas. The number of colonies that were formed determines the number of cells at the moment in the outdoor air; respectively the number of mesophilic aerobic bacteria and yeasts and molds. The measure of bacteria and fungi used is CFU (Colony Forming Units) per Petri dish. It is said that marine harbours are very polluted areas. The aim of study was the definition of mesophilic aerobic bacteria and yeasts and molds number, and the comparison of microorganisms number in air sampling areas.
Keywords: Air microbiology, colony forming units, Marine Durres's Harbour, mesophilic aerobic bacteria, outdoor air, yeasts and molds.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 274117 Nonlinearity and Spectrum Analysis of Drill Strings with Component Mass Unbalance
Authors: F. Abdul Majeed, H. Karki, Y. Abdel Magid, M. Karkoub
Abstract:
This paper analyses the non linear properties exhibited by a drill string system under various un balanced mass conditions. The drill string is affected by continuous friction in the form of drill bit and well bore hole interactions. This paper proves the origin of limit cycling and increase of non linearity with increase in speed of the drilling in the presence of friction. The spectrum of the frequency response is also studied to detect the presence of vibration abnormalities arising during the drilling process.Keywords: Drill strings, Nonlinear, Spectrum analysis, Unbalanced mass
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 172316 Development of Monitoring Blood Bank Center Based PIC Microcontroller Using CAN Communication
Authors: Kaiwan S. Ismael, Ergun Ercelebi, Majeed Nader
Abstract:
This paper describes the design and implementation of a hardware setup for online monitoring of 24 refrigerators inside blood bank center using the microcontroller and CAN bus for communications between each node. Due to the security of locations in the blood bank hall and difficulty of monitoring of each refrigerator separately, this work proposes a solution to monitor all the blood bank refrigerators in one location. CAN-bus system is used because it has many applications and advantages, especially for this system due to easy in use, low cost, providing a reduction in wiring, fast to repair and easily expanding the project without a problem.
Keywords: Control Area Network (CAN), monitoring blood bank center, PIC microcontroller, MPLAB IDE.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 248315 Use of Technology to Improve Students’ Attitude in Learning Mathematics of Non-Mathematics Undergraduate Students
Authors: Asia Majeed
Abstract:
This paper will investigate a form of learning mathematics by integrating technology in mathematics specifically for the university first-year calculus class to support students’ engagement in learning which influences students' conceptual and procedural understanding of the calculus content in a better way. The students with good grades in high school calculus generally struggle in first-year university calculus classes in learning mathematical analysis concepts. This problem has to be addressed. If this problem is not resolved, then most likely students with less ability to do mathematics might not able to complete their degrees. In this work, MATLAB is used to help students in learning and in improving calculus concepts.
Keywords: Calculus, first-year university students, teaching strategies, MATLAB.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 39714 Design of a CMOS Differential Operational Transresistance Amplifier in 90 nm CMOS Technology
Authors: Hafiz Muhammad Obaid, Umais Tayyab, Shabbir Majeed Ch.
Abstract:
In this paper, a CMOS differential operational transresistance amplifier (OTRA) is presented. The amplifier is designed and implemented in a standard umc90-nm CMOS technology. The differential OTRA provides wider bandwidth at high gain. It also shows much better rise and fall time and exhibits a very good input current dynamic range of 50 to 50 μA. The OTRA can be used in many analog VLSI applications. The presented amplifier has high gain bandwidth product of 617.6 THz Ω. The total power dissipation of the presented amplifier is also very low and it is 0.21 mW.
Keywords: CMOS, differential, operational transresistance amplifier, OTRA, 90 nm, VLSI.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 113813 Towards for Admission Control in WIMAX Relay Station Mesh Network for Mobile Stations out of Coverage Using Ad-Hoc
Authors: Anas Majeed, A. A. Zaidan, B. B. Zaidan, Laiha Mat Kiah
Abstract:
WIMAX relay station mesh network has been approved by IEEE 802.16j as a standard to provide a highly data rate transmission, the RS was implemented to extend the coverage zone of the BS, for instance the MSs previously were out of the coverage of the BS they become in the coverage of the RS, therefore these MSs can have Admission control from the BS through the RS. This paper describe a problem in the mesh network Relay station, for instance the problem of how to serve the mobile stations (MSs) which are out of the Relay station coverage. This paper also proposed a solution for mobile stations out of the coverage of the WIMAX Relay stations mesh Network. Therefore Ad-hoc network defined as a solution by using its admission control schema and apply it on the mobiles inside and outside the Relay station coverage.
Keywords: WIMAX, relay station, mesh network, ad-hoc, WiFi, generic algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 175712 An Electrically Small Silver Ink Printed FR4 Antenna for RF Transceiver Chip CC1101
Authors: F. Majeed, D. V. Thiel, M. Shahpari
Abstract:
An electrically small meander line antenna is designed for impedance matching with RF transceiver chip CC1101. The design provides the flexibility of tuning the reactance of the antenna over a wide range of values: highly capacitive to highly inductive. The antenna was printed with silver ink on FR4 substrate using the screen printing design process. The antenna impedance was perfectly matched to CC1101 at 433 MHz. The measured radiation efficiency of the antenna was 81.3% at resonance. The 3 dB and 10 dB fractional bandwidth of the antenna was 14.5% and 4.78%, respectively. The read range of the antenna was compared with a copper wire monopole antenna over a distance of five meters. The antenna, with a perfect impedance match with RF transceiver chip CC1101, shows improvement in the read range compared to a monopole antenna over the specified distance.Keywords: Meander line antenna, RFID, Silver ink printing, Impedance matching.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 128311 Preserved Relative Differences between Regions of Different Thermal Scans
Authors: Tahir Majeed, Michael Handschuh, René Meier
Abstract:
Rheumatoid Arthritis patients have swelling and pain in joints of the hand. The regions where the patient feels pain also show increased body temperature. Thermal cameras can be used to detect the rise in temperature of the affected regions. To monitor the progression of Rheumatoid Arthritis, patients must visit the clinic regularly for scanning and examination. After scanning and evaluation, the dosage of the medicine is regulated accordingly. To monitor the disease progression over time, the correlation of the images between different visits must be established. It has been observed that the thermal measurements do not remain the same over time, even within a single scanning, when low-cost thermal cameras are used. In some situations, temperatures can vary as much as 2◦C within the same scanning sequence. In this paper, it has been shown that although the absolute temperature varies over time, the relative difference between different regions remains similar. Results have been computed over four scanning sequences and are presented.
Keywords: Relative thermal difference, rheumatoid arthritis, thermal imaging, thermal sensors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 50810 Assessing Secondary School Curricula in the Light of Developing Quality of Life Standards of High School Students
Authors: O. Ali Alghtani, Y. Abdul-Ekhalq Ali, A. Abdul-Ekhalq Ali, A. Al Sadiq Abdul Majeed, N. Attian Al-Mohammadi, O. Mozel Alharbi, S. Mohamed Ismail, O. Ibrahim Asiri
Abstract:
This study assessed the curricula of secondary schools given requirements to enhance the quality of life of students. The components of quality of life were described to build a list of standards and indicators. A questionnaire assessing the dimensions of mental (cognitive and emotional), physical, digital, and social health, and environmental awareness was prepared. A descriptive-analytical approach was used on a sample of 258 teachers and educational supervisors in Tabuk. The results indicated shortcomings in the secondary school curricula regarding developing standards and indicators of components of quality of life. Results also indicated that secondary school curricula incorporated few practices to improve student’s quality of life. No significant differences were found regarding the core subject, job, gender, and years of experience.
Keywords: Assessing curricula, teacher practices, quality of life, Secondary School.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1489 In vitro Anti-tubercular Screening of Newly Synthesized Benzimidazole Derivatives
Authors: M. Shahar Yar, M. Mustaqeem Abdullah, Jaseela Majeed
Abstract:
A series of 1-(1H-benzimidazol-2-yl)-3-(substituted phenyl)-2-propen-1-one were allowed to react with hydrazine hydrate and phenyl hydrazine in submitted reactions to get pyrazoline and phenyl pyrazoline derivatives. All the compounds entered for screening at the Tuberculosis Antimicrobial Acquisition and Coordinating Facility (TAACF) for their in vitro antibacterial activity against Mycobacterium tuberculosis H37Rv strain (ATCC 27294) using Microplate Alamar Blue Assay (MABA) susceptibility test. The results expressed as MIC (minimum inhibitory concentration) in μg/mL. Among the fifteen compounds, eight compounds were found to have MIC values less than 10 μg/mL. These were subjected for cytotoxicity assay in VERO cells to determine CC50 (cytotoxic concentration 50%) values and finally SI (Selectivity Index) were calculated. Compound (XV) 2-[5-(4- fluorophenyl)-1-phenyl-4,5-dihydro-1H-3-pyrazolyl]-1Hbenzimidazole was considered the best candidate of the series that could be a good starting point to develop new lead compounds in the fight against tuberculosis.
Keywords: anti-tubercular activity, benzimidazole, pyrazoline.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18978 Flow of a Second Order Fluid through Constricted Tube with Slip Velocity at Wall Using Integral Method
Authors: Nosheen Zareen Khan, Abdul Majeed Siddiqui, Muhammad Afzal Rana
Abstract:
The steady flow of a second order fluid through constricted tube with slip velocity at wall is modeled and analyzed theoretically. The governing equations are simplified by implying no slip in radial direction. Based on Karman Pohlhausen procedure polynomial solution for axial velocity profile is presented. Expressions for pressure gradient, shear stress, separation and reattachment points, and radial velocity are also calculated. The effect of slip and no slip velocity on magnitude velocity, shear stress, and pressure gradient are discussed and depicted graphically. It is noted that when Reynolds number increases magnitude velocity of the fluid decreases in both slip and no slip conditions. It is also found that the wall shear stress, separation, and reattachment points are strongly affected by Reynolds number.Keywords: Approximate solution, constricted tube, non-Newtonian fluids, Reynolds number.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17267 Enhancement Throughput of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC)
Authors: Ahmed K. Hasan, A. A. Zaidan, Anas Majeed, B. B. Zaidan, Rosli Salleh, Omar Zakaria, Ali Zuheir
Abstract:
Wireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solution for next generation wireless networking to provide wide-area wideband internet access to a significant number of users. The deployment of these wireless mesh networks may be within different authorities and without any planning, they are potentially overlapped partially or completely in the same service area. The aim of the proposed model is design a new model to Enhancement Throughput of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), the unplanned deployment of WMNs are determinates there performance. We use throughput optimization approach to model the unplanned WMNs deployment problem based on partitioning hierarchical cluster (PHC) based architecture, in this paper the researcher used bridge node by allowing interworking traffic between these WMNs as solution for performance degradation.Keywords: Wireless Mesh Networks, 802.11s Internetworking, partitioning Hierarchical Cluste.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15326 Blockchain for IoT Security and Privacy in Healthcare Sector
Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab
Abstract:
The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain and how various stakeholders will interact with the system.
Keywords: Internet of Things, IoT, blockchain, data integrity, authentication, data privacy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4095 An Analysis of Innovative Cloud Model as Bridging the Gap between Physical and Virtualized Business Environments: The Customer Perspective
Authors: Asim Majeed, Rehan Bhana, Mak Sharma, Rebecca Goode, Nizam Bolia, Mike, Lloyd-Williams
Abstract:
This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.Keywords: Innovation, virtualization, cloud computing, organizational flexibility
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17554 Application of ANN for Estimation of Power Demand of Villages in Sulaymaniyah Governorate
Abstract:
Before designing an electrical system, the estimation of load is necessary for unit sizing and demand-generation balancing. The system could be a stand-alone system for a village or grid connected or integrated renewable energy to grid connection, especially as there are non–electrified villages in developing countries. In the classical model, the energy demand was found by estimating the household appliances multiplied with the amount of their rating and the duration of their operation, but in this paper, information exists for electrified villages could be used to predict the demand, as villages almost have the same life style. This paper describes a method used to predict the average energy consumed in each two months for every consumer living in a village by Artificial Neural Network (ANN). The input data are collected using a regional survey for samples of consumers representing typical types of different living, household appliances and energy consumption by a list of information, and the output data are collected from administration office of Piramagrun for each corresponding consumer. The result of this study shows that the average demand for different consumers from four villages in different months throughout the year is approximately 12 kWh/day, this model estimates the average demand/day for every consumer with a mean absolute percent error of 11.8%, and MathWorks software package MATLAB version 7.6.0 that contains and facilitate Neural Network Toolbox was used.
Keywords: Artificial neural network, load estimation, regional survey, rural electrification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13593 Tom Stoppard: The Amorality of the Artist
Authors: Majeed Mohammed Midhin, Clare Finburgh
Abstract:
To maintain a healthy balanced loyalty, whether to art or society, posits a debatable issue. The artist is always on the look out for the potential tension between those two realms. Therefore, one of the most painful dilemmas the artist finds is how to function in a society without sacrificing the aesthetic values of his/her work. In other words, the life-long awareness of failure which derives from the concept of the artist as caught between unflattering social realities and the need to invent genuine art forms becomes a fertilizing soil for the artists to be tackled. Thus, within the framework of this dilemma, the question of the responsibility of the artist and the relationship of the art to politics will be illuminating. To a larger extent, however, in drama, this dilemma is represented by the fictional characters of the play. The present paper tackles the idea of the amorality of the artist in selected plays by Tom Stoppard. However, Stoppard’s awareness of his situation as a refugee has led him to keep at a distance from politics. He tried hard to avoid any intervention into the realms of political debate, especially in his earliest work. On the one hand, it is not meant that he did not interest in politics as such, but rather he preferred to question it than to create a fixed ideological position. On the other hand, Stoppard’s refusal to intervene in politics is ascribed to his feeling of gratitude to Britain where he settled. As a result, Stoppard has frequently been criticized for a lack of political engagement and also for not leaning too much for the left when he does engage. His reaction to these public criticisms finds expression in his self-conscious statements which defensively stressed the artifice of his work. He, like Oscar Wilde thinks that the responsibility of the artist is devoted to the realm of his/her art. Consequently, his consciousness for the role of the artist is truly reflected in his two plays, Artist Descending a Staircase (1972) and Travesties (1974).
Keywords: Amorality, responsibility, politics, ideology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17132 The Study of Implications on Modern Businesses Performances by Digital Communities: Case of Data Leak
Authors: Asim Majeed, Anwar Ul Haq, Mike, Lloyd-Williams, Arshad Jamal, Usman Butt
Abstract:
This study aims to investigate the impact of data leak of M&S customers on digital communities. Modern businesses are using digital communities as an important public relations tool for marketing purposes. This form of communication helps companies to build better relationship with their customers which also act as another source of information. The communication between the customers and the organizations is not regulated so users may post positive and negative comments. There are new platforms being developed on a daily basis and it is very crucial for the businesses to not only get themselves familiar with those but also know how to reach their existing and perspective consumers. The driving force of marketing and communication in modern businesses is the digital communities and these are continuously increasing and developing. This phenomenon is changing the way marketing is conducted. The current research has discussed the implications on M&S business performance since the data was exploited on digital communities; users contacted M&S and raised the security concerns. M&S closed down its website for few hours to try to resolve the issue. The next day M&S made a public apology about this incidence. This information was proliferated on various digital communities and it has impacted negatively on M&S brand name, sales and customers. The content analysis approach is being used to collect qualitative data from 100 digital bloggers including social media communities such as Facebook and Twitter. The results and finding provide useful new insights into the nature and form of security concerns of digital users. Findings have theoretical and practical implications. This research will showcase a large corporation utilizing various digital community platforms and can serve as a model for future organizations.
Keywords: Digital, communities, performance, dissemination, implications, data, exploitation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18171 High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm
Authors: A. A. Zaidan, Anas Majeed, B. B. Zaidan
Abstract:
Nowadays, the rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threatens. It-s a big security and privacy issue with the large flood of information and the development of the digital format, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Nowadays protection system classified with more specific as hiding information, encryption information, and combination between hiding and encryption to increase information security, the strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this research becomes difficult. In this paper, a new system of information hiding is presented. The proposed system aim to hidden information (data file) in any execution file (EXE) and to detect the hidden file and we will see implementation of steganography system which embeds information in an execution file. (EXE) files have been investigated. The system tries to find a solution to the size of the cover file and making it undetectable by anti-virus software. The system includes two main functions; first is the hiding of the information in a Portable Executable File (EXE), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). The system has achieved the main goals, such as make the relation of the size of the cover file and the size of information independent and the result file does not make any conflict with anti-virus software.Keywords: Cryptography, Steganography, Portable ExecutableFile.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1801