JPC – Journal of Planar Chromatography – Modern TLC
The importance of the binary mixtures of the novel oral anticoagulants (NOACs): apixaban (APX), e... more The importance of the binary mixtures of the novel oral anticoagulants (NOACs): apixaban (APX), edoxaban tosylate (EDX) and rivaroxaban (RIV) with the lipid-lowering statin, rosuvastatin calcium (ROS) is highly emerging to save lives of cardiovascular patients as these combinations are used in prophylaxis from stroke. A high-performance thin-layer chromatography (HPTLC) method was developed for the quantitative assay of these life-saving mixtures in tablets and human plasma. Two mobile phases were developed for the assay in bulk and tablets; the first one: toluene‒ethyl acetate‒methanol‒25% ammonia (3.5:4.5:2:0.2, V/V) (method I) used for the three mixtures, and the second one: methanol‒25% ammonia (9.95:0.05, V/V) (method II) used for EDX/ROS mixture only. For analysis in human plasma, APX was used as internal standard in RIV/ROS and EDX/ROS mixtures using methods I and II, respectively, while RIV was used as internal standard in APX/ROS mixture using method I; the methods were val...
In this paper, the periodic signal tracking and the disturbance rejection problems are considered... more In this paper, the periodic signal tracking and the disturbance rejection problems are considered for a class of time-varying delay nonlinear systems with unknown exogenous disturbances under limited communication resources. The Takagi–Sugeno (T-S) fuzzy model is used to approximate the nonlinear system. The developed scheme achieves periodic reference tracking and improves the performance of periodic and aperiodic unknown disturbances rejection effectiveley. This can be operated by incorporating the equivalent-input-disturbance (EID) estimator with the modified repetitive controller (MRC) scheme. Moreover, a fuzzy periodic event-triggered feedback observer (FPETFO) is proposed for the purpose of reducing the computational burden, energy consumption and saving communication resources. The periodic event-triggered technique is designed to observe the occurrence of an event which is described by an error signal. When this error signal exceeds a prescribed threshold, the event occurs a...
Proceedings of the International Conference on Wireless Information Networks and Systems, 2008
In principle, service orientation is a suitable paradigm to allow for effective resource sharing ... more In principle, service orientation is a suitable paradigm to allow for effective resource sharing in wireless ad hoc networks. However, special attention needs to be paid to ensure a high service availability since this is the basis for reliable service execution. Unfortunately, typical characteristics of ad hoc networks like everchanging topology and limited resources have a dramatic negative effect on service availability. Therefore, special measures are needed to cope with this problem. In general, replication for services as well as data represents an efficient solution when the availability of some resource needs to be ensured. In this paper, we extend the service replication and distribution protocol presented in our prior work which is based on the interest of clients and providers of a specified service by taking into account not just one but all partitions of the network. By elaborating an extensive detailed simulation, the efficiency of replication and the allocation correctness are being examined. The results show that relying on our protocol is feasible. Since our protocol utilizes high level (application level) information about the available services in the ad hoc network only and does not rely on lower level information like network or protocol specifics, it is applicable in a wide range of settings.
This paper proposes control in the loop (CIL) for the synchronization between two nonlinear chaot... more This paper proposes control in the loop (CIL) for the synchronization between two nonlinear chaotic systems at the existence of uncertainties and disturbances using an adaptive intuitionistic neuro-fuzzy (AINF) control scheme. The chaotic systems have been subedited as one is the master and the other is the slave. They both have different initial conditions and parameters. The variation in the initial conditions leads to the butterfly effect, the concept that is well known in the chaos field and means that both systems diverge over time. Therefore, AINF control scheme has been proposed in this paper as a powerful scheme to get over this problem effectively. The main objective of using the AINF control scheme is that it collects the features of its contents. As the intuitionistic fuzzy gives the system flexibility and helps the controller collecting more information about the problem. The neural networks give the controller the ability to learn over time. The experimental results wer...
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for t... more With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath transmission, signal inferences, bandwidth limitation and so on. In addition to these degradation factors, the wireless transmission is not a secure environment. The information might be leaked during the transmission. Currently , the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer. Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. Within information theoretic security characterizes the fundamental ability of the physical layer to provide a secure transmission. Hence, this work concentrates on the secure cooperative ...
All-electric buildings are playing an important role in the electrification plan towards energy-n... more All-electric buildings are playing an important role in the electrification plan towards energy-neutral smart cities. Batteries are key components in all-electric buildings that can help the demand-side energy management as a flexibility asset and improve the building survivability in the case of power outages as an active survivability asset. This paper introduces a novel methodology and indexes for determining cost-effective battery sizes. It also explores the possible trade-off between energy flexibility and the survivability of all-electric buildings. The introduced methodology uses IDA-ICE 4.8 as a building performance simulation tool and MATLAB® 2017 as a post-processing calculation tool for quantifying building energy flexibility and survivability indexes. The proposed methodology is applied to a case study of a Norwegian single-family house, where 10 competitive designs, 16 uncertainty scenarios, and 3 dynamic pricing tariffs suggested by the Norwegian regulators are investi...
Security must be addressed in the phase of planning and designing of egovernment system. Manageme... more Security must be addressed in the phase of planning and designing of egovernment system. Management process is needed to assess security control, where management allows departments and agencies to maintain and measure the extent of data security depending on the mechanism of revealing the security weak points .Revealing the weak points is done by using a series of standards built on the application of machine learning methods specifically Using the Neural Networks Model, and intelligent data analysis. All these techniques are useful in monitoring and measuring the extent of the secured data and the provided services. The applied results on the data site of ”Cairo cleanliness and beautification authority for cleaning” in Egypt showed that measurement qualifications were adequate, proper ,preaching, and can be generalized. The proposed approach of monitoring is very comprehensive where it limits the risk of information security that affect organizations’ risk management decisions.
Authentication as a security key issue is required for securing the inter-vehicle communication. ... more Authentication as a security key issue is required for securing the inter-vehicle communication. Mostly, authentication schemes that depend on the network infrastructure Road Side Unit (RSU) had been proven to have low computation and communication overhead. RSUs may become unavailable due to congestion or failure conditions. Replicating authentication service offered by RSUs to trusted vehicles in their ranges may present novel alternative to support the availability of such services. A complement to our previous replication protocol Central Push-based Replication Protocol (CPRP) is presented in this work. Two new replica allocation techniques are proposed to spawn new replicas in order to improve the authentication service availability that are offered from RSUs. The optimality (Correctness) of these techniques has been evaluated with different ratios of RSU failures in different realistic scenarios. The results showed that both techniques improve CPRP in increasing the authentica...
One of the biggest problems in applying machine learning (ML) in the energy and buildings field i... more One of the biggest problems in applying machine learning (ML) in the energy and buildings field is the lack of experience of ML users in implementing each ML algorithm in real-life applications the right way, because each algorithm has prerequisites to be used and specific problems or applications to be implemented. Hence, this paper introduces a generic pipeline to the ML users in the specified field to guide them to select the best-fitting algorithm based on their particular applications and to help them to implement the selected algorithm correctly to achieve the best performance. The introduced pipeline is built on (1) reviewing the most popular trails to put ML pipelines for the energy and building, with a declaration for each trial drawbacks to avoid it in the proposed pipeline; (2) reviewing the most popular ML algorithms in the energy and buildings field and linking them with possible applications in the energy and buildings field in one layout; (3) a full description of the...
A MATLAB program was developed to estimate the hydrodynamic forces due to wave and current on an ... more A MATLAB program was developed to estimate the hydrodynamic forces due to wave and current on an un-trenched submarine cable of diameter 9 in resting at the bottom of a 14-m depth sea, utilizing the Fourier decomposition method. The aim of this part of the research is to provide an accurate estimation of the hydrodynamic forces acting on the cable and to present a comparison between the Morison force model and Fourier decomposition force model. In addition, investigating the methods of fixation for submarine pipes and cables as the commonly used methods is of high cost for both manufacturing and installation and maintenance processes has many drawbacks. This research is concerned with the ability of the cable to be stable on the seabed using its own weight and, if required, estimating extra chain weight to be added helping stabilize the cable on the seabed. A validation of the developed program with UWAHYDRO program developed in the Western Australia University is introduced in this...
Mantle melts provide a window on processes related to global plate tectonics. The composition of ... more Mantle melts provide a window on processes related to global plate tectonics. The composition of chromian spinel (Cr-spinel) from mafic-ultramafic rocks has been widely used for tracing the geotectonic environments, the degree of mantle melting and the rate of mid-ocean ridge spreading. The assumption is that Cr-spinel’s core composition (Cr# = Cr/(Cr + Al)) is homogenous, insensitive to post-formation modification and therefore a robust petrogenetic indicator. However, we demonstrate that the composition of Cr-spinel can be modified by fluid/melt-rock interactions in both sub-arc and sub-mid oceanic mantle. Metasomatism can produce Al-Cr heterogeneity in Cr-spinel that lowers the Cr/Al ratio, and therefore modifies the Cr#, making Cr# ineffective as a geotectonic and mantle melting indicator. Our analysis also demonstrates that Cr-spinel is a potential sink for fluid-mobile elements, especially in subduction zone environments. The heterogeneity of Cr# in Cr-spinel can, therefore, b...
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Optimal ventilation strategies are fundamental to achieve net/nearly-zero energy buildings. In th... more Optimal ventilation strategies are fundamental to achieve net/nearly-zero energy buildings. In this study, three hybrid ventilation control strategies are proposed to minimize the cooling need in an open-plan office building, located in the center of Glasgow (Scotland). The performance of the three proposals is assessed by IDA ICE (a whole building performance simulation tool) and compared to a traditional fully mechanical ventilation system. The performance comparison includes different criteria, i.e., indoor temperature and predicted percentage of dissatisfied (PPD) for assessing the indoor comfort, and CO 2 level for assessing the indoor air quality (IAQ). The results show that the three proposed hybrid ventilation strategies are able to minimize the cooling need to zero. They can also imply a drastic reduction of AHU heating power, compared with a mechanical ventilation system without heat recovery (or with low efficiency heat recovery). In addition, they significantly save the fan energy. The only drawback of the proposed strategies is that they might increase space heating demand. For instance, the first and second strategies save about 75 and 50% of AHU (air handling unit) fan energy; however, the space heating increases by about 4.2 and 2.2 kWh/m 2 a, respectively. The third strategy features as the best proposal because it saves around 68% of fan energy with less increase (1.3 kWh/m 2 a) in heating demand. Moreover, it ensures higher thermal comfort and IAQ levels compared to the first and second proposals.
Green façades or vertical greenery systems (VGSs) are continuously gaining attention among urbani... more Green façades or vertical greenery systems (VGSs) are continuously gaining attention among urbanists for improving the living comfort and energy efficiency in urban areas. However, modelling and simulating the thermal response of VGSs remains a research topic. This paper introduces a novel inverse modeling approach for modeling the thermal response of VGSs on building envelopes. The modelling approach considers the VGSs as a homogeneous layer with apparent thermo-physical properties. The approach optimizes the apparent thermo-physical properties by calibrating the inverse model using data generated by a detailed thermal response model of VGS or experimental data. It is shown that the predicted temperature of VGS deviates by less than ± 1.3 °C, while the heat flux on the inner side of the building envelope deviates by less than ± 0.3 W/m² compared to the measured values.
This paper proposes an adaptive fuzzy logic control scheme for a class of strict-feedback nonline... more This paper proposes an adaptive fuzzy logic control scheme for a class of strict-feedback nonlinear systems with unknown backlash-like hysteresis. The proposed controller exploits the properties of the newly developed L 1 adaptive control in conjunction with the approximation capability of fuzzy systems. The developed controller is fast, the adaptation can be as fast as the CPU permits, and robust by virtue of the L 1 adaptive control structure and the direct estimation of the system nonlinear functions via fuzzy logic systems. As a result, the proposed L 1 adaptive fuzzy controller has a simpler form and requires fewer adaptation parameters. The inverted pendulum and Duffing forced oscillation systems are used in simulation studies to verify the effectiveness of the proposed L 1 adaptive fuzzy control scheme.
A validated and highly selective high-performance thin-layer chromatography (HPTLC) method was de... more A validated and highly selective high-performance thin-layer chromatography (HPTLC) method was developed for the determination of ketorolac tromethamine (KTC) with phenylephrine hydrochloride (PHE) (Mixture 1) and with febuxostat (FBX) (Mixture 2) in bulk drug and in combined dosage forms. The proposed method was based on HPTLC separation of the drugs followed by densitometric measurements of their spots at 273 and 320 nm for Mixtures 1 and 2, respectively. The separation was carried out on Merck HPTLC aluminum sheets of silica gel 60 F254 using chloroform-methanol-ammonia (7:3:0.1, v/v) and (7.5:2.5:0.1, v/v) as mobile phase for KTC/PHE and KTC/FBX mixtures, respectively. Linear regression lines were obtained over the concentration ranges 0.20-0.60 and 0.60-1.95 µg band(-1) for KTC and PHE (Mixture 1), respectively, and 0.10-1.00 and 0.25-2.50 µg band(-1) for KTC and FBX (Mixture 2), respectively, with correlation coefficients higher than 0.999. The method was successfully applied ...
7th International Conference on Mobile Data Management (MDM'06), 2006
In this paper, we argue why service-orientation is the appropriate computing paradigm to use in m... more In this paper, we argue why service-orientation is the appropriate computing paradigm to use in mobile and wireless environments. We explain how the limitations of mobile devices can be overcome by functionality sharing via service-orientation. We identify some key areas that need to be addressed in order for this vision to become a reality. We survey existing approaches in these areas and discuss what is still missing.
DOI to the publisher's website. • The final author version and the galley proof are versions of t... more DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the "Taverne" license above, please follow below link for the End User Agreement:
Advances in Information Security, Privacy, and Ethics, 2015
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime ... more Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection. Market: This premier publication is essential for all academic and research library reference collections. It is a crucial tool for academicians, researchers, and practitioners. Ideal for classroom use.
JPC – Journal of Planar Chromatography – Modern TLC
The importance of the binary mixtures of the novel oral anticoagulants (NOACs): apixaban (APX), e... more The importance of the binary mixtures of the novel oral anticoagulants (NOACs): apixaban (APX), edoxaban tosylate (EDX) and rivaroxaban (RIV) with the lipid-lowering statin, rosuvastatin calcium (ROS) is highly emerging to save lives of cardiovascular patients as these combinations are used in prophylaxis from stroke. A high-performance thin-layer chromatography (HPTLC) method was developed for the quantitative assay of these life-saving mixtures in tablets and human plasma. Two mobile phases were developed for the assay in bulk and tablets; the first one: toluene‒ethyl acetate‒methanol‒25% ammonia (3.5:4.5:2:0.2, V/V) (method I) used for the three mixtures, and the second one: methanol‒25% ammonia (9.95:0.05, V/V) (method II) used for EDX/ROS mixture only. For analysis in human plasma, APX was used as internal standard in RIV/ROS and EDX/ROS mixtures using methods I and II, respectively, while RIV was used as internal standard in APX/ROS mixture using method I; the methods were val...
In this paper, the periodic signal tracking and the disturbance rejection problems are considered... more In this paper, the periodic signal tracking and the disturbance rejection problems are considered for a class of time-varying delay nonlinear systems with unknown exogenous disturbances under limited communication resources. The Takagi–Sugeno (T-S) fuzzy model is used to approximate the nonlinear system. The developed scheme achieves periodic reference tracking and improves the performance of periodic and aperiodic unknown disturbances rejection effectiveley. This can be operated by incorporating the equivalent-input-disturbance (EID) estimator with the modified repetitive controller (MRC) scheme. Moreover, a fuzzy periodic event-triggered feedback observer (FPETFO) is proposed for the purpose of reducing the computational burden, energy consumption and saving communication resources. The periodic event-triggered technique is designed to observe the occurrence of an event which is described by an error signal. When this error signal exceeds a prescribed threshold, the event occurs a...
Proceedings of the International Conference on Wireless Information Networks and Systems, 2008
In principle, service orientation is a suitable paradigm to allow for effective resource sharing ... more In principle, service orientation is a suitable paradigm to allow for effective resource sharing in wireless ad hoc networks. However, special attention needs to be paid to ensure a high service availability since this is the basis for reliable service execution. Unfortunately, typical characteristics of ad hoc networks like everchanging topology and limited resources have a dramatic negative effect on service availability. Therefore, special measures are needed to cope with this problem. In general, replication for services as well as data represents an efficient solution when the availability of some resource needs to be ensured. In this paper, we extend the service replication and distribution protocol presented in our prior work which is based on the interest of clients and providers of a specified service by taking into account not just one but all partitions of the network. By elaborating an extensive detailed simulation, the efficiency of replication and the allocation correctness are being examined. The results show that relying on our protocol is feasible. Since our protocol utilizes high level (application level) information about the available services in the ad hoc network only and does not rely on lower level information like network or protocol specifics, it is applicable in a wide range of settings.
This paper proposes control in the loop (CIL) for the synchronization between two nonlinear chaot... more This paper proposes control in the loop (CIL) for the synchronization between two nonlinear chaotic systems at the existence of uncertainties and disturbances using an adaptive intuitionistic neuro-fuzzy (AINF) control scheme. The chaotic systems have been subedited as one is the master and the other is the slave. They both have different initial conditions and parameters. The variation in the initial conditions leads to the butterfly effect, the concept that is well known in the chaos field and means that both systems diverge over time. Therefore, AINF control scheme has been proposed in this paper as a powerful scheme to get over this problem effectively. The main objective of using the AINF control scheme is that it collects the features of its contents. As the intuitionistic fuzzy gives the system flexibility and helps the controller collecting more information about the problem. The neural networks give the controller the ability to learn over time. The experimental results wer...
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for t... more With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath transmission, signal inferences, bandwidth limitation and so on. In addition to these degradation factors, the wireless transmission is not a secure environment. The information might be leaked during the transmission. Currently , the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer. Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. Within information theoretic security characterizes the fundamental ability of the physical layer to provide a secure transmission. Hence, this work concentrates on the secure cooperative ...
All-electric buildings are playing an important role in the electrification plan towards energy-n... more All-electric buildings are playing an important role in the electrification plan towards energy-neutral smart cities. Batteries are key components in all-electric buildings that can help the demand-side energy management as a flexibility asset and improve the building survivability in the case of power outages as an active survivability asset. This paper introduces a novel methodology and indexes for determining cost-effective battery sizes. It also explores the possible trade-off between energy flexibility and the survivability of all-electric buildings. The introduced methodology uses IDA-ICE 4.8 as a building performance simulation tool and MATLAB® 2017 as a post-processing calculation tool for quantifying building energy flexibility and survivability indexes. The proposed methodology is applied to a case study of a Norwegian single-family house, where 10 competitive designs, 16 uncertainty scenarios, and 3 dynamic pricing tariffs suggested by the Norwegian regulators are investi...
Security must be addressed in the phase of planning and designing of egovernment system. Manageme... more Security must be addressed in the phase of planning and designing of egovernment system. Management process is needed to assess security control, where management allows departments and agencies to maintain and measure the extent of data security depending on the mechanism of revealing the security weak points .Revealing the weak points is done by using a series of standards built on the application of machine learning methods specifically Using the Neural Networks Model, and intelligent data analysis. All these techniques are useful in monitoring and measuring the extent of the secured data and the provided services. The applied results on the data site of ”Cairo cleanliness and beautification authority for cleaning” in Egypt showed that measurement qualifications were adequate, proper ,preaching, and can be generalized. The proposed approach of monitoring is very comprehensive where it limits the risk of information security that affect organizations’ risk management decisions.
Authentication as a security key issue is required for securing the inter-vehicle communication. ... more Authentication as a security key issue is required for securing the inter-vehicle communication. Mostly, authentication schemes that depend on the network infrastructure Road Side Unit (RSU) had been proven to have low computation and communication overhead. RSUs may become unavailable due to congestion or failure conditions. Replicating authentication service offered by RSUs to trusted vehicles in their ranges may present novel alternative to support the availability of such services. A complement to our previous replication protocol Central Push-based Replication Protocol (CPRP) is presented in this work. Two new replica allocation techniques are proposed to spawn new replicas in order to improve the authentication service availability that are offered from RSUs. The optimality (Correctness) of these techniques has been evaluated with different ratios of RSU failures in different realistic scenarios. The results showed that both techniques improve CPRP in increasing the authentica...
One of the biggest problems in applying machine learning (ML) in the energy and buildings field i... more One of the biggest problems in applying machine learning (ML) in the energy and buildings field is the lack of experience of ML users in implementing each ML algorithm in real-life applications the right way, because each algorithm has prerequisites to be used and specific problems or applications to be implemented. Hence, this paper introduces a generic pipeline to the ML users in the specified field to guide them to select the best-fitting algorithm based on their particular applications and to help them to implement the selected algorithm correctly to achieve the best performance. The introduced pipeline is built on (1) reviewing the most popular trails to put ML pipelines for the energy and building, with a declaration for each trial drawbacks to avoid it in the proposed pipeline; (2) reviewing the most popular ML algorithms in the energy and buildings field and linking them with possible applications in the energy and buildings field in one layout; (3) a full description of the...
A MATLAB program was developed to estimate the hydrodynamic forces due to wave and current on an ... more A MATLAB program was developed to estimate the hydrodynamic forces due to wave and current on an un-trenched submarine cable of diameter 9 in resting at the bottom of a 14-m depth sea, utilizing the Fourier decomposition method. The aim of this part of the research is to provide an accurate estimation of the hydrodynamic forces acting on the cable and to present a comparison between the Morison force model and Fourier decomposition force model. In addition, investigating the methods of fixation for submarine pipes and cables as the commonly used methods is of high cost for both manufacturing and installation and maintenance processes has many drawbacks. This research is concerned with the ability of the cable to be stable on the seabed using its own weight and, if required, estimating extra chain weight to be added helping stabilize the cable on the seabed. A validation of the developed program with UWAHYDRO program developed in the Western Australia University is introduced in this...
Mantle melts provide a window on processes related to global plate tectonics. The composition of ... more Mantle melts provide a window on processes related to global plate tectonics. The composition of chromian spinel (Cr-spinel) from mafic-ultramafic rocks has been widely used for tracing the geotectonic environments, the degree of mantle melting and the rate of mid-ocean ridge spreading. The assumption is that Cr-spinel’s core composition (Cr# = Cr/(Cr + Al)) is homogenous, insensitive to post-formation modification and therefore a robust petrogenetic indicator. However, we demonstrate that the composition of Cr-spinel can be modified by fluid/melt-rock interactions in both sub-arc and sub-mid oceanic mantle. Metasomatism can produce Al-Cr heterogeneity in Cr-spinel that lowers the Cr/Al ratio, and therefore modifies the Cr#, making Cr# ineffective as a geotectonic and mantle melting indicator. Our analysis also demonstrates that Cr-spinel is a potential sink for fluid-mobile elements, especially in subduction zone environments. The heterogeneity of Cr# in Cr-spinel can, therefore, b...
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Optimal ventilation strategies are fundamental to achieve net/nearly-zero energy buildings. In th... more Optimal ventilation strategies are fundamental to achieve net/nearly-zero energy buildings. In this study, three hybrid ventilation control strategies are proposed to minimize the cooling need in an open-plan office building, located in the center of Glasgow (Scotland). The performance of the three proposals is assessed by IDA ICE (a whole building performance simulation tool) and compared to a traditional fully mechanical ventilation system. The performance comparison includes different criteria, i.e., indoor temperature and predicted percentage of dissatisfied (PPD) for assessing the indoor comfort, and CO 2 level for assessing the indoor air quality (IAQ). The results show that the three proposed hybrid ventilation strategies are able to minimize the cooling need to zero. They can also imply a drastic reduction of AHU heating power, compared with a mechanical ventilation system without heat recovery (or with low efficiency heat recovery). In addition, they significantly save the fan energy. The only drawback of the proposed strategies is that they might increase space heating demand. For instance, the first and second strategies save about 75 and 50% of AHU (air handling unit) fan energy; however, the space heating increases by about 4.2 and 2.2 kWh/m 2 a, respectively. The third strategy features as the best proposal because it saves around 68% of fan energy with less increase (1.3 kWh/m 2 a) in heating demand. Moreover, it ensures higher thermal comfort and IAQ levels compared to the first and second proposals.
Green façades or vertical greenery systems (VGSs) are continuously gaining attention among urbani... more Green façades or vertical greenery systems (VGSs) are continuously gaining attention among urbanists for improving the living comfort and energy efficiency in urban areas. However, modelling and simulating the thermal response of VGSs remains a research topic. This paper introduces a novel inverse modeling approach for modeling the thermal response of VGSs on building envelopes. The modelling approach considers the VGSs as a homogeneous layer with apparent thermo-physical properties. The approach optimizes the apparent thermo-physical properties by calibrating the inverse model using data generated by a detailed thermal response model of VGS or experimental data. It is shown that the predicted temperature of VGS deviates by less than ± 1.3 °C, while the heat flux on the inner side of the building envelope deviates by less than ± 0.3 W/m² compared to the measured values.
This paper proposes an adaptive fuzzy logic control scheme for a class of strict-feedback nonline... more This paper proposes an adaptive fuzzy logic control scheme for a class of strict-feedback nonlinear systems with unknown backlash-like hysteresis. The proposed controller exploits the properties of the newly developed L 1 adaptive control in conjunction with the approximation capability of fuzzy systems. The developed controller is fast, the adaptation can be as fast as the CPU permits, and robust by virtue of the L 1 adaptive control structure and the direct estimation of the system nonlinear functions via fuzzy logic systems. As a result, the proposed L 1 adaptive fuzzy controller has a simpler form and requires fewer adaptation parameters. The inverted pendulum and Duffing forced oscillation systems are used in simulation studies to verify the effectiveness of the proposed L 1 adaptive fuzzy control scheme.
A validated and highly selective high-performance thin-layer chromatography (HPTLC) method was de... more A validated and highly selective high-performance thin-layer chromatography (HPTLC) method was developed for the determination of ketorolac tromethamine (KTC) with phenylephrine hydrochloride (PHE) (Mixture 1) and with febuxostat (FBX) (Mixture 2) in bulk drug and in combined dosage forms. The proposed method was based on HPTLC separation of the drugs followed by densitometric measurements of their spots at 273 and 320 nm for Mixtures 1 and 2, respectively. The separation was carried out on Merck HPTLC aluminum sheets of silica gel 60 F254 using chloroform-methanol-ammonia (7:3:0.1, v/v) and (7.5:2.5:0.1, v/v) as mobile phase for KTC/PHE and KTC/FBX mixtures, respectively. Linear regression lines were obtained over the concentration ranges 0.20-0.60 and 0.60-1.95 µg band(-1) for KTC and PHE (Mixture 1), respectively, and 0.10-1.00 and 0.25-2.50 µg band(-1) for KTC and FBX (Mixture 2), respectively, with correlation coefficients higher than 0.999. The method was successfully applied ...
7th International Conference on Mobile Data Management (MDM'06), 2006
In this paper, we argue why service-orientation is the appropriate computing paradigm to use in m... more In this paper, we argue why service-orientation is the appropriate computing paradigm to use in mobile and wireless environments. We explain how the limitations of mobile devices can be overcome by functionality sharing via service-orientation. We identify some key areas that need to be addressed in order for this vision to become a reality. We survey existing approaches in these areas and discuss what is still missing.
DOI to the publisher's website. • The final author version and the galley proof are versions of t... more DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the "Taverne" license above, please follow below link for the End User Agreement:
Advances in Information Security, Privacy, and Ethics, 2015
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime ... more Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection. Market: This premier publication is essential for all academic and research library reference collections. It is a crucial tool for academicians, researchers, and practitioners. Ideal for classroom use.
Uploads
Papers by Mohamed Hamdy