scispace - formally typeset
Search or ask a question

Showing papers by "American University in Cairo published in 2005"


Journal ArticleDOI
TL;DR: In this paper, the fine weld nugget grain structure of friction stir welds (FSW) undergoes abnormal grain growth (AGG) in the post-weld solution heat-treated condition.
Abstract: Recent investigations showed that the fine weld nugget grain structure of friction stir welds (FSW) undergoes abnormal grain growth (AGG) in the post-weld solution heat-treated condition. This significantly deteriorates the strength of FSW of high-strength heat-treatable Al-alloys. In the current research, various welds of AA2095 sheets were prepared by manipulating the FSW parameters, and subsequently heat-treated to investigate the influence of the process parameters (feed rate and tool rotation speed) on the extent of AGG. Characterization of the microstructure and tensile properties revealed that the tool rotational speed and the feed rate appreciably affect the extent of AGG. The higher the rotation speed the lower the AGG at low-to-intermediate feed rates.

163 citations


Proceedings ArticleDOI
05 Jun 2005
TL;DR: In this paper, the modeling and a novel design of MEMS TEG especially conceived for human body applications are described, based on the basis of a thermal model of the device, which includes the human body as one of its important elements.
Abstract: Miniaturized and cost-effective thermoelectric generators (TEG) scavenging energy from environment could potentially provide power autonomy to consumer electronic products operating at low power. For example, TEG mounted in a wristwatch have been used to generate electricity from human heat. The key point of IMEC's research in this field is the realization of a body area network, consisting of a set of wireless sensors/actuators, able to provide health, sports, comfort, and safety monitoring functions to the user. The development of miniature energy scavengers built on MEMS technology is a primary goal of the ongoing research, as this will make the network truly power autonomous. In this paper, the modeling and a novel design of MEMS TEG especially conceived for human body applications are described. The design is built on the basis of a thermal model of the device, which includes the human body as one of its important elements. For this purpose, the research on human body thermal features is performed. The TEG prototype made with commercial thermopiles is tested with power conditioning electronics and a wireless module mounted on a watchstrap.

145 citations


Journal ArticleDOI
TL;DR: The results indicated that while stigma does exist in Egypt, the form that it takes must be understood with reference to Egyptian notions of selfhood that locate behavioral disturbances in the intersubjective rather than intrapsychic realm.

123 citations


Journal ArticleDOI
01 Jan 2005
TL;DR: In this paper, the structure and stabilization mechanism of turbulent lifted non-premixed hydrocarbon flames have been investigated using combined laser imaging techniques, including Rayleigh scattering, laser induced predissociation fluorescence of OH, LIF of PAH, and planar imaging velocimetry.
Abstract: The structure and stabilization mechanism of turbulent lifted non-premixed hydrocarbon flames have been investigated using combined laser imaging techniques. The techniques include Rayleigh scattering, laser induced predissociation fluorescence of OH, LIF of PAH, LIF of CH 2 O, and planar imaging velocimetry. The geometrical structure of multi-reaction zones and flow field at the stabilization region have been simultaneously measured in 16 hydrocarbon flames. The data reveal the existence of triple flame structure at the stabilization region of turbulent lifted flames. Increasing the jet velocity leads to an increase of the lift-off height and to a broadening of the lift-off region. Further analysis of the stabilization criterion at the lift-off height based on the premixed nature of triple-flame propagation and flow field data has been presented and discussed.

93 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a method to solve the problem of the problem: "no abstracts" and "no abstraction". But no abstracts. No abstracts were used.
Abstract: No Abstract

83 citations


Journal ArticleDOI
TL;DR: This work uses Influenza as a model system for studying the cross-species transfer and evolution of the SARS coronavirus and its links with the international trade in small carnivores.
Abstract: 1. Introduction 2. Environmental and social influences on emerging infectious diseases: past, present, and future 3. Evolutionary genetics and the emergence of SARS coronavirus 4. Influenza as a model system for studying the cross-species transfer and evolution of the SARS coronavirus 5. Management and prevention of SARS in China 6. Confronting SARS: A view from Hong Kong 7. The aetiology of SARS: Koch's postulates fulfilled 8. Laboratory Diagnosis of SARS 9. Animal origins of SARS coronavirus: possible links with the international trade in small carnivores 10. Epidemiology, transmission dynamics and control of SARS: the 2002-2003 epidemic 11. Dynamics of modern epidemics 12. The international response to the outbreak of SARS, 2003 13. The experience of the 2003 SARS outbreak as a traumatic stress among frontline healthcare workers in Toronto: lessons learned 14. Informed consent and public health 15. What have we learnt from SARS? References Index

82 citations


Journal ArticleDOI
TL;DR: Investigation of the extent of contamination of some of the most used paper denominations of the Egyptian currency found that over 65% of these bills had a bacterial count above 5.0 cm2.
Abstract: The objective of this study was to investigate the extent of contamination of some of the most used paper denominations of the Egyptian currency (25 PT). Sixty-nine bills in circulation were collec...

62 citations


Journal ArticleDOI
TL;DR: Recombinant erythropoietin (EPO) and human growth hormone (hGH) are currently being abused but are fortunately detectable either directly by employing isoelectric focusing and immunoassays or indirectly by assessing changes in selected hematopoietic parameters.

60 citations


Journal ArticleDOI
TL;DR: This research aims at finding a hyper solution to that two-dimensional problem by allowing both Autonomic Computing and Web Services paradigms to lend each other their distinct features.
Abstract: Autonomic Computing was introduced to reduce the complexity of managing computing systems; however, the heterogeneous nature existing in most computing systems introduces some difficulty to achieve this target Moreover, the notion of service as a computing component that seamlessly collaborates with other services in a loosely-coupled manner to perform complicated tasks was introduced by Service-Oriented Architecture (SOA); and then, fertilized by Web Services that added open standards to different roles and operations involved in a community of services; however, in order to gain the expected benefits of Web Services, the latter should be able to survive in normal and abnormal conditions Our research aims at finding a hyper solution to that two-dimensional problem by allowing both Autonomic Computing and Web Services paradigms to lend each other their distinct features First, Web Services lend Autonomic Computing the concept of platform-independency; second, Autonomic Computing lends Web Services the attributes providing self-management The focus of this paper will be on how the self-healing autonomic attribute can be implemented and applied using Web Services

57 citations


Journal ArticleDOI
TL;DR: The chance-constrained approach and the α -cut are used to transform the stochastic fuzzy problem to its deterministic-crisp equivalent, according to each of the four dominance indices.

56 citations


Proceedings ArticleDOI
27 Dec 2005
TL;DR: Fuzzy PSO as discussed by the authors is a generalization of standard PSO in which charisma is defined to be a fuzzy variable, and more than one particle in each neighborhood can have a nonzero degree of charisma, and consequently is allowed to influence others to a degree that depends on its charisma.
Abstract: In standard particle swarm optimization (PSO), the best particle in each neighborhood exerts its influence over other particles in the neighborhood. In this paper, we propose fuzzy PSO, a generalization which differs from standard PSO in the following respect: charisma is defined to be a fuzzy variable, and more than one particle in each neighborhood can have a non-zero degree of charisma, and, consequently, is allowed to influence others to a degree that depends on its charisma. We evaluate our model on the weighted maximum satisfiability (maxsat) problem, comparing performance to standard PSO and to Walk-Sat.

Journal ArticleDOI
TL;DR: In this paper, the authors extend command-shaping theory to nonlinear systems, specifically systems with Coulomb friction, and apply it to a PD-controlled mass to ground a solder cell machine.
Abstract: Fast and accurate point-to-point motion is a common operation for industrial machines, but vibration will frequently corrupt such motion. This paper develops commands that can move machines without vibration, even in the presence of Coulomb friction. Previous studies have shown that input shaping can be used on linear systems to produce point-to-point motion with no residual vibration. This paper extends command-shaping theory to nonlinear systems, specifically systems with Coulomb friction. This idea is applied to a PD-controlled mass with Coulomb friction to ground. The theoretical developments are experimentally verified on a solder cell machine. The results show that the new commands allow the proportional gain to be increased, resulting in reduced rise time, settling time, and steady-state error.

Journal ArticleDOI
TL;DR: In this article, the authors found indirect evidence concerning the existence of a tradition of Ḣajjāj diagrams, which helps to reveal the influence of al- Ḥajjajjáj, even though the transmission of his translation has become contaminated with other Arabic traditions.

Proceedings ArticleDOI
02 May 2005
TL;DR: In this paper, an algorithm for the detection of non-metallic anti-personnel (AP) land mines by using ground penetrating radar (GPR) is described, which combines wavelet packet analysis and higher-order-statistics (HOS).
Abstract: An algorithm is described for the detection of non-metallic anti-personnel (AP) land mines by using ground penetrating radar (GPR). The algorithm combines two powerful tools: the wavelet packet analysis and higher-order-statistics (HOS). The use of both techniques makes detection of shallowly anti-personnel land mines objects possible which obscured by the return from air-soil interface. The experimental data sources include 1GHz pulse GPR data, and 1GHz to 4GHz stepped-frequency GPR data, from laboratory measurements.

Journal ArticleDOI
TL;DR: In this paper, a general method for solving the inverse reliability problem with multiple design variables and constraints that is specially suitable for practitioner engineers is introduced. But this method is not suitable for bridge crane design.

Proceedings ArticleDOI
03 Jan 2005
TL;DR: The research aims at proving that with autonomic Web services, computing systems will be able to manage themselves as well as their relationships with each other.
Abstract: Summary form only given. The complexity of computing systems keeps growing even beyond human capabilities to handle management tasks for achieving the best benefits from such systems. Autonomic computing was introduced with the promise of self-management, where computing systems would be able to manage their behaviors. The concept of Web services emerged for the intension of enabling heterogeneous computing systems to seamlessly and dynamically interact with each other to empower intra-enterprise collaboration. This research is concerned with the issue of designing autonomic computing systems so that computing systems can evolve towards self-management paradigm. For this purpose, and by conducting the research, the relationship between the goals of autonomic computing and the promises of Web service has become enough persuasive to blend the two technologies in a composite one, which is autonomic Web services. In autonomic Web services, each entity is a Web service that is behaving autonomically. The research aims at proving that with autonomic Web services, computing systems will be able to manage themselves as well as their relationships with each other. To achieve this objective, the research proposes a system that implements the concept of autonomic Web services; a proof-of-concept prototype of this system is currently under development and testing.

Proceedings ArticleDOI
10 Oct 2005
TL;DR: The security attacks that the ARAN protocol defends against are detailed, how an authenticated selfish node can disturb the network by dropping packets or by not cooperating in the routing functionality is criticized and a reputation-based scheme called reputed-ARAN is proposed to detect and defend against selfish nodes.
Abstract: In this paper, we analyze the Authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. Here, we criticize how an authenticated selfish node can disturb the network by dropping packets or by not cooperating in the routing functionality and propose a reputation-based scheme called Reputed-ARAN to detect and defend against selfish nodes.

Proceedings ArticleDOI
19 Sep 2005
TL;DR: The proposed model is an enhancement of machine modeled in form of networked control systems (NCS) based on the presence of a supervisor controller on top of separate controller nodes based on a pyramid control hierarchy.
Abstract: In this paper, a pyramid control hierarchy is proposed. It is based on the presence of a supervisor controller on top of separate controller nodes. A simulation study is conducted to test the functionality of the system. The proposed model is an enhancement of machine modeled in form of networked control systems (NCS). Two models are tested: one supervisor/two sub-controllers, one supervisor/three sub-controllers. All possible combinations of supervisor-controller intercommunication are tested. Also, all supervisor/controller inter-changeability possibilities are taken into consideration. Results are illustrated and discussed. Recommendations are drawn out. All machine models of this study are built using switched gigabit Ethernet in star topology

Proceedings ArticleDOI
R. Bebawy1, H. Sabry1, S. El-Kassas1, Y. Hanna1, Y. Youssef1 
11 Jul 2005
TL;DR: Nedgty secures Web services by applying business specific rules in a centralized manner and has the ability to secure Web services against denial of service, buffer overflow, and XML denial of Service attacks; as well as having an authorization mechanism.
Abstract: This paper describes the research conducted to develop Nedgty, the open source Web services firewall. Nedgty secures Web services by applying business specific rules in a centralized manner. It has the ability to secure Web services against denial of service, buffer overflow, and XML denial of service attacks; as well as having an authorization mechanism.

Journal ArticleDOI
TL;DR: In this article, the group theoretic method is applied for solving problem of the flow of an elastico-viscous liquid past an infinite flat plate in the presence of a magnetic field normal to the plate.

Proceedings ArticleDOI
28 Jun 2005
TL;DR: A simulation study is made to test the fault tolerant ability of networked machines by reallocating loads in case of controller failure and the increase in machine speed for higher production, is considered.
Abstract: In this paper, a simulation study is made to test the fault tolerant ability of networked machines. This ability is introduced by reallocating loads in case of controller failure. Also, the increase in machine speed for higher production, is considered. The maximum speed of operation of individual machines and fault tolerant production-lines, is studied. All machine networks of this study are built on-top-of switched Gigabit Ethernet in star topology.

Journal ArticleDOI
TL;DR: In this article, the authors traced the development of broadcast media technologies in Egypt, arguing that Egypt has historically made use of its position as a leader of media content in the Arab world to enhance development and culture as well as to advance the government's political agenda.
Abstract: Like many other countries in the Arab world, Egypt is trying to harness the internet as a powerful new medium to bridge the digital divide. This article starts by tracing the development of broadcast media technologies in Egypt, arguing that Egypt has historically made use of its position as a leader of media content in the Arab world to enhance development and culture as well as to advance the government’s political agenda. The article pays special attention to the development of the internet in Egypt, examining such issues as online connectivity, content and its Arabization. It argues that as a major provider of media content in the Arab world, and particularly with a new technocrat government, Egypt has the potential to lead the way towards greater democratization of communication and strengthening of civil society in the region.

Journal ArticleDOI
TL;DR: This finding represents the first detection of POTV in the northeastern United States where it infects a diverse array of mosquito species and was not detected in mosquitoes sampled during 1998, 1999, 2002, and 2004.
Abstract: Potosi virus (POTV) (Bunyaviridae: Orthobunyavirus) was Þrst isolated from Aedes albopictus (Skuse) collected in Potosi, MO, in 1989, and subsequent isolations were reported from Illinois, Michigan, Ohio, and the Carolinas. To determine whether the distribution of this virus extends into the northeastern United States, we analyzed arboviruses acquired from mosquitoes collected in Connecticut from 1998 to 2004. In 2001, a bunyavirus was isolated from Aedes vexans (Meigen) that was different from other arboviruses known to occur in Connecticut by cross-neutralization and reverse transcription-polymerase chain reaction (RT-PCR) assays. Nucleotide and encoded amino acid sequences of a portion of the G2 envelope gene were 99 and 100% similar to POTV, respectively, yet distinct from indigenous strains of Jamestown Canyon (JCV), Cache Valley (CVV), and Trivittatus virus (TVTV). Viral isolates obtained from the statewide surveillance program were retested by RT-PCR coupled with restriction enzyme analysis to distinguish POTV from other bunyaviruses. POTV isolates, previously typed by neutralization, were correctly identiÞed by RT-PCR; however, many isolates classiÞed as JCV or CVV by enzyme-linked immunosorbent assay proved to be POTV by molecular assays. In total, 92 strains of POTV were isolated from 12 mosquito species in 2000, 2001, and 2003, whereas POTV was not detected in mosquitoes sampled during 1998, 1999, 2002, and 2004. Viral isolation rates were highest for Anopheles punctipennis (Say) (3.2Ð11.3 infection rate per 1,000 mosquitoes), whereas the greatest number of isolates came from Ochlerotatus trivittatus (Coquillett) (8 Ð16 isolates). This Þnding represents the Þrst detection of POTV in the northeastern United States where it infects a diverse array of mosquito species.

Journal ArticleDOI
TL;DR: In this paper, the authors present two techniques for improving the performance of HORN applied to cost-based abduction, which is an AI formalism in which evidence to be explained is treated as a goal to be proven, proofs have costs based on how much needs to be assumed to complete the proof, and the set of assumptions needed to finish the least cost proof are taken as the best explanation for the given evidence.

Book ChapterDOI
01 Jan 2005
TL;DR: In this article, the authors proposed a micro-approach to assess the e-readiness of small and medium enterprises in the textile industry in Egypt, focusing on assessing firms' level of connectivity, awareness and usage of ICTs and identifying barriers to ereadiness.
Abstract: This chapter adopts a micro approach towards assessing the e-readiness of small and medium enterprises in the textile industry in Egypt. The analysis focuses on evaluating firms’ level of connectivity, awareness and usage of ICTs and identifies barriers to ereadiness. The chapter adds to the literature on e-readiness assessment, which is mostly macro in nature. The micro approach focuses on ICT awareness and usage patterns, and has the advantage of capturing variations at the firm level. Based on connectivity alone, neither small nor medium firms under study were found close to being e-ready. However, extending e-readiness to include the use and awareness of ICTs, one may conclude that e-readiness is in general directly proportional to size. Medium-sized firms, therefore, are potentially e-ready. The chapter argues that raising SME ereadiness would require heavy investment in human capital and raising awareness in addition to upgrading levels and types of connectivity. IDEA GROUP PUBLISHING 701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.idea-group.com ITB11189 This chapter appears in the book, Electronic Business in Developing Countries: Opportunities and Challenges edited by Sherif Kamel. © 2005, Idea Group Inc. Venturing the Unexplored: E-Readiness Assessment 247 Copyright © 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited. Introduction A number of studies have been conducted toward assessing countries’ e-readiness — namely, their preparedness for the digital world. Assessments were based on combinations of indicators such as e-connectivity, human capital, business climate, leadership and others. Quantitative and qualitative indices were devised and used to evaluate and rank countries on the e-readiness scale. While providing insight into the overall e-readiness of countries on the macro level, few studies have attempted to evaluate e-readiness from a micro perspective, i.e., studies conducted at the sectoral or firm level. In particular, a small number of studies have undertaken an assessment of the adoption of information and communication technologies (ICTs) in small and medium enterprises (SMEs) in the United States, Australia, and in some European, Asian and African countries. However, none was done for any of the countries in the Middle East and North Africa region. This paper takes on this endeavor. It is the first attempt to adopt a micro approach to assess e-readiness of SMEs in an Arab country. The objective of the research is to assess the e-readiness of SMEs in the textile, specifically garment, industry in Egypt, and in particular, evaluate their preparedness for electronic commerce. The research is exploratory in nature, and represents a first step towards more extensive research to assess the preparedness of different sectors in Egypt for embracing and internalizing ICTs. The paper is divided into four sections. Following the introduction, the second section is a brief review of the literature and methodologies used for e-readiness assessments, highlighting Egypt’s macro e-readiness score and ranking as presented in these studies. The section also includes a brief coverage of micro studies assessing ICT adoption and use in SMEs. The third part includes the micro study, starting by a brief description of the textile sector and the firms selected, to be followed by results of the field research and an assessment of the firms’ e-readiness. The fourth section presents conclusions and recommendations. Background: E-Readiness – From Macro to Micro Analysis The literature on macro e-readiness assessment has taken two approaches. The first group of studies undertakes a quantitative assessment, whereby countries are assigned numerical scores depending on how well they have performed on specific components of the e-readiness measure. A weighted average is calculated based on the relative importance accorded to these components. This approach has been adopted by, among others, the Economist Intelligence Unit (EIU) in devising the EIU E-Readiness Indices (Economist Intelligence Unit, 2001, 2002, 2003 & 2004), the Center for International Development at Harvard measuring the Network Readiness Index (Center for International Development, 2001-2 & 2002-3), the International Data Corporation in calculating the Information Society Index (International Data Corporation and World Times, 2000, 17 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the

Proceedings ArticleDOI
12 Sep 2005
TL;DR: This work presents a methodology for optimizing the training process to get better translation quality using the well known GIZA ++ SMT toolkit based on adjusting the parameters of GizA ++ that affect the generation of the translation model.
Abstract: Statistical machine translation (SMT) involves many tasks including modeling, training, decoding, and evaluation. In this work, we present a methodology for optimizing the training process to get better translation quality using the well known GIZA ++ SMT toolkit. The methodology is based on adjusting the parameters of GIZA ++ that affect the generation of the translation model. When applying the methodology, an average improvement of 7% has been achieved in the translation quality.

Journal ArticleDOI
TL;DR: In this article, the fracture toughness of the recently produced gas pipes material PE100 is investigated and compared to the commonly used material PE80 to determine their relative advantages, including the effect of the specimen thickness and specimen configuration.
Abstract: The mechanical behavior of the recently produced gas pipes material PE100 is investigated and compared to the commonly used material PE80 to determine their relative advantages. The two materials show plastic behavior at room temperature. The fracture toughness of the two materials is experimentally determined using the two common elastic plastic fracture mechanics methods: the American Society for Testing and Materials (ASTM) multiple specimen test method for determining the J-R curve of the materials, and the crack opening displacement method. The investigation of the fracture behavior of the two materials includes the effect of the specimen thickness as well as specimen configuration. The experimental tests were carried on the compact tension specimens and the single edge notch bending (SENB) specimens. At -70°C, the materials show elastic behavior, the ASTM test method for determining fracture toughness is applied to SENB specimens to determine K 1C of both materials. PE80 shows greater resistance to fracture than PE100.

Proceedings ArticleDOI
01 Jan 2005
TL;DR: This paper investigates the effect of failures on the productivity of fault-tolerant networked control systems under varying loads by developing and using improved Markov models.
Abstract: This paper investigates the effect of failures on the productivity of fault-tolerant networked control systems under varying loads Higher speeds of operation are sometimes used to increase production and compensate for down time due to component failures Improved Markov models are developed and used to calculate system probabilities When these probabilities are combined with the maximum speed of operation in each system state, the average speed of operation is obtained If machines cannot be run at maximum speed all the time, the Markov models are used again to find the best speed mix that would yield maximum output capacity

Journal ArticleDOI
TL;DR: Data from an independent assessment demonstrate the impact of training in the use of clinical practice guidelines on the quality of clinical examinations of 579 children presenting with diarrhoea or ARI in Egypt.
Abstract: Egypt began training of physicians in case management of diarrhoea and acute respiratory infection (ARI) in the 1980s and 1990s respectively. Data from an independent assessment demonstrate the impact of training in the use of clinical practice guidelines on the quality of clinical examinations of 579 children presenting with diarrhoea or ARI. These examinations were conducted by 115 government physicians in 80 government health facilities and in two Egyptian governorates. The quality of care, although better than that in the past, remains poor, and training had little effect. Poor examinations were related to misclassification and inappropriate treatment of serious illnesses. Such errors have potentially serious consequences. Egypt is now implementing the Integrated Management of Childhood Illness strategy. This effort should be independently assessed to measure the improvement in the quality of care provided by government health facilities in Egypt.

Journal ArticleDOI
TL;DR: The characteristic function method has been employed to determine and investigate certain classes of solution of first-order nonlinear hydrodynamical equations of a perfect fluid with respect to different Coriolis parameters as mentioned in this paper.