- Home
- Conference Proceedings
- Qatar Foundation Annual Research Conference Proceedings
- Conference Proceeding
Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1
- Conference date: 18-19 Nov 2014
- Location: Qatar National Convention Center (QNCC), Doha, Qatar
- Volume number: 2014
- Published: 18 November 2014
301 - 320 of 480 results
-
-
Heme Oxygenase Isoform 1 Regresses Cardiomyocyte Hypertrophy Through Regressing Sodium Proton Exchanger Isoform 1 Activity
Authors: Ahmed Sobh, Nabeel Abdulrahman, Soumaya Bouchoucha and Fatima MraicheBackground: Pathological cardiac hypertrophy is a worldwide problem and an independent risk factor that predisposes the heart to failure. Enhanced activity or expression of the sodium proton exchanger isoform 1 (NHE1) has been implicated in conditions of cardiac hypertrophy. Induction of cGMP has previously been demonstrated to reduce NHE1 activity and expression, which could be through the expression of heme oxygenase isoform 1 (HO-1), a stress-induced enzyme that shows cardioprotective properties. In our study, we aimed to investigate the role of inducing HO-1 in a cardiac hypertrophy model that expresses active NHE1 to determine whether HO-1 could protect against NHE1 induced cardiomyocyte hypertrophy. Methods: H9c2 cardiomyocytes were infected with the active form of the NHE1 adenovirus in the presence and absence of protoporphyrin (CoPP). Which was used to induce HO-1. Protein and mRNA expression of HO-1 were invested in H9c2 cardiomyocytes in the presence and absence of the expression of the active form of the NHE1 adenovirus. The effects of HO-1 induction on NHE1 protein expression and cardiomyocyte hypertrophic markers were measured respectively by western blotting and analyzing the cell surface area of H9c2. Results: Our results showed a significant decrease in HO-1 mRNA expression in cardiomyocytes expressing active NHE1 (74.84 ± 9.19 % vs. 100 % normal NHE1 expression, p<0.05). However, we did not see any changes in NHE1 protein expression following HO-1 induction. A trend towards decrease in cardiomyocyte hypertrophy was observed in H9c2 cardiomyoblasts infected with the active form of NHE1 following stimulation with HO-1 (NHE1, 154.93 ± 14.87 % vs. NHE1 + CoPP, 109 ± 16.44 %). Conclusion: In our model, HO-1 maybe a useful means to reduce NHE1 induced cardiomyocyte hypertrophy, although the mechanism by which it does that requires further investigation.
-
-
-
Qatar´s Youth Is Putting On Weight: The Increase In Obesity Between 2003 And 2009
The profound economic growth in the Arabian Gulf states over the past few decades has had a great impact on the lifestyle of the Qatari population. There has been a rapid appearance of fast food restaurants and other hallmarks of western society. These influences have been accompanied by a higher energy intake and decreased levels of physical activity. The potential impact on the younger population is particularly alarming. Throughout the recent past, the prevalence of type 2 diabetes (T2DM) among children and adolescents has increased significantly due to the high prevalence of obesity. Obese children can have a higher risk of premature mortality due to consequent cardiometabolic morbidity. According to WHO, obesity-induced medical conditions have now led to excess mortality surpassing that associated with tobacco. However, data on the body weight status of Qatari children are lacking for the past ten years. This study estimates the magnitude of the increase in BMI among Qatari adolescents (aged 12-18 years), by comparing our data (obtained during 2009) with published results from 2003 [Bener et al, JHPN 2005;23(3):250-8]. The present data originate from a pilot study on lung function conducted in Qatar in 2009. The subjects were chosen by random sampling of Qatari students attending government schools (grade 7-12). For our study, only students aged 12-18 years are included, resulting in a total number of 705 participants (400 girls and 305 boys). Although a large variety of data was collected, our study focused only on height, weight and BMI. The results reveal a substantial increase in BMI during this 7 year period for both Qatari boys and girls. For boys aged 12 years, mean BMI increased by 2 Kg m-2 which became a 5 Kg m-2 increase at the age of 17 years, and possibly as much as 8 Kg m-2 by 18 years. By contrast, the increase in mean BMI for girls remained more or less constant between the age of 12 years and 17 years, fluctuating between 2 Kg m-2 and 4 Kg m-2, before reaching almost 7 Kg m-2 at the age of 18 years. Using International Obesity Task Force (IOTF) criteria, the overall prevalence of Qatari children who were overweight or obese was 26.5% (boys) and 23.1% (girls) in 2003 [Bener, Food Nutr Bull 2006;27(1):39-45], and 47.2% (boys) and 40.8% (girls) in 2009. For boys, this represents a 21% increase, with a corresponding increase of 18% for girls. These results show that during this 7-year period, the prevalence of overweight and obesity among both boys and girls has increased by more than 75%. Based on these figures, the prevalence of childhood obesity is alarmingly high and points to an acute need for intervention, and a need for local research into the most appropriate and effective actions. In addition, there is also a need to systematically collect regular and ongoing observational data regarding body weight status of adolescent Qataris in order to continue to monitor this situation.
-
-
-
Effect Of Diabetes On Gastric Stem Cell Lineage In Rat Models
Authors: Ali Abdullah Al Jabri and Sheriff KaramIn 2013, it was estimated that over 382 million people throughout the world suffered from diabetes. Despite the numerous treatment approaches to manage this condition, diabetic patients continue to suffer from various symptoms and complications. These include, but are not limited to, retinopathy, nephropathy, peripheral and autonomic neuropathy, gastrointestinal, genitourinary, cardiovascular, and cerebral symptoms. In this study, we attempt to investigate the variations in the gastric stem cell lineage in order to further understand the gastrointestinal symptoms experienced by diabetic patients and reveal possible treatment promises. Using rats as an animal model, we divide them into different age groups of 3, 6, 9, and 12 months. For each age group, there were twelve animals, six of which were kept as control. The other six were injected with Streptozotocin to destroy the Beta cells of the Islet of Langerhans in the pancreas. The diabetic rats' plasma glucose was closely monitored; those that naturally recovered from diabetes were researched separately. Antibodies against KI-67 and Oct3/4 are used to examine cellular proliferation, Ghrelin for cells secreting this hormone, H,K-ATPase for parietal cells, UEA and GSII lectins for the surface and neck mucus cells respectively. For more quantitative results, qRT-PCR using primers specific for genes of gastric stem cell differentiation pathways was used. Statistical calculations including One-tailed T-test were used to determine whether the changes between the control and diabetic groups were significant. Results suggest an increase in the proliferation activity of stem cells number of some cells like surface mucus cells, and a decrease in the number of ghrelin secreting cells. Future tests to be used in order to support these results include antibodies against gastrin, CCK, and LGR5.
-
-
-
Electronic Library Institute-seerq (elisq)
An electronic library is a computer-managed set of collections with services tailored for its user communities. The project team—a collaboration of four universities (Qatar University - QU, Virginia Tech, Pennsylvania State University, Texas A & M University), the Qatar National Library - QNL, and consultants—focused on the two project aims for Qatar: building community and building infrastructure (i.e., collections and information services). Thus we fit with Qatar's Thematic Pillar of Research on Computing and Information Technology, and overlap with a number of Research Grand Challenges (e.g., Cyber-security; Managing the Transition to a Diversified, Knowledge-based Society, and Culture, Arts, Heritage, Media and Language within the Arabic Context). With regard to our aim of building an electronic library community in Qatar, we have: 1. Participated in the Special Library Association Gulf Chapter, hosted in Qatar, to create awareness about electronic libraries; 2. Launched a consulting center at QU Library—with more than 30 new reference works, online educational resources, and specialized databases—and are sharing knowledge with librarians and information professionals to support those interested in collections and services; 3. Established a collaboration with Gulf Studies at QU, so we can identify and host content on this topic, and assist QU researchers and students; and 4. Collected citation-based and non-citation-based metrics (altmetrics), for Qatar and 35 nations that are competing with Qatar's annual scholarly production. We published a new approach for comparing the metrics and evaluating country-level scholarly impact. 5. Studied the evolving scholarly activities and needs of researchers in Qatar, and compared them with our findings from USA, informing ELISQ about requirements and solutions appropriate for international electronic libraries. With regard to our aim of building electronic library infrastructure in Qatar, we have built collections and provided related services: 1. Penn State's SeerSuite software is running at QU, allowing users to search the metadata and full-text of collections of PDF files from scholarly articles, e.g., QScience papers. SeerSuite gathers scholarly documents and automatically extracts metadata (authors, venues etc.) from crawled WWW content, allowing QNL and other libraries to harvest that metadata using OAI-PMH.. SeerSuite is being improved for searching on the content of the figures and tables in scholarly documents. 2. An historical collection of old Arabic documents has been assembled, indexed, and made accessible as well as data/text mined. 3. Using our QU server running Heritrix, gathered our first Arabic collection (8GB from 2,200 PDF files), from Qatari newspapers (Al-Rayah, Al-Watan, Qatar News Agency, Al-Arab, and Al-Sharq). This news collection was indexed with Apache Solr and is available for searching. Building upon the IPTC system we created a categorization system (taxonomy) for news stories, and then applied it through machine learning to train classifiers to aid browsing. 4. Both QNL and QU are building Web archives of portions of the WWW in Qatar, adapting Heritrix and the Wayback Machine, thus preserving history, culture, and Arabic content (including news, sports, government information, and university webpages) for future use and scholarly study.
-
-
-
Openadn: Middleware Architecture For Cloud Based Services
Authors: Mohammed Samaka, Deval Bhamare, Aiman Erbad, Subharthi Paul and Raj JainAny global enterprise, such as, Qatar National Bank, with branches in many countries is an example of an Application Service Provider (ASP) that uses multiple cloud data centers to serve their customers. Depending upon the time of the day, the number of users at different location changes and the ASPs need to rescale their operation at each data center to meet the demand at that location. ASPs are facing a great challenge to leverage the benefits provided by such multi-cloud distributed environments without service-centric Internet service Provider (ISP) infrastructure. In addition, each ASP's requirements are different and since these ASPs are large customers of ISPs, they want the network traffic handling to be tailored to their requirements. While the ASP wants to control the forwarding of its traffic on the ISP's network; the ISP does not want to relinquish control of its resources to the ASPs. In this work we present an innovative architecture, which facilitates ASPs to automate the deployment and operation of their applications over multiple clouds. We have developed Middleware Architecture for Cloud based applications using Software Defined Networking (SDN) concepts. Especially we discuss how the implementation of interface between ASP and ISP control planes as well as implementation of generic packet header abstraction is achieved. Using our system, ASPs may specify the policies in the control plane and the control plane is responsible for enforcing these policies in the data plane. In OpenADN architecture, each application consists of multiple workflows, which are dynamically created and the required virtual servers and middleboxes are automatically created at the appropriate clouds. OpenADN allows both new applications that are designed specifically for it as well as legacy applications. It implements "Proxy-Switch Port" (pPort) to provide an interface between OpenADN-aware and OpenADN-unaware services. Depending on the available resources in the host, the controller launches a pPort with a pre-configured number of workflows that it can support. The pPort automatically starts a proxy server. The proxy service acts as the interface between OpenADN-aware services and OpenADN-unaware applications. We support both packet level middleboxes (such as intrusion detection systems) and message level middleboxes (such as firewalls). A cross-layer design is proposed in the current architecture that allows application-layer flow of information to be placed in the form of labels at layer 3.5 (packet level) and at layer 4.5 (message level). Layer 3.5 is called as "Application Label Switching" (APLS) layer. APLS is used by the path policy (routing/switching) component while layer 4.5 information is used to initiate and terminate application sessions. In addition to traditional applications, OpenADN can also be used for other multi-cloud applications such as Internet of Things, Virtual Worlds, Online Games, and Smart Wide Area Network services.
-
-
-
Load Follows Generation: The New Paradigm For Future Power System Control In Presence Of High Penetration Of Variable Renewable Resources
More LessIn the 130 years since the invention of the legacy electric power system concept, electrical generation has been adjusted to match electrical consumption (i.e., the "load") as it varies throughout the time of day and seasons. This "generation follows load" paradigm is a major roadblock to the large-scale incorporation of renewable energy into the national power grid since energy sources such as wind and solar provide inconsistent, variable power that cannot easily be controlled to follow consumption. As a result, today's centrally planned and controlled power system design is no longer adequate. This paper is to introduce a new control approach to enable a "load follows generation" paradigm where a flexible engineered system with distributed control at the users' sites will revolutionize the power industry. Customers will be able to generate power on-site, purchase power from a variety of sources (including each other), sell power back to the grid, select the level of the supply reliability they wish to purchase, and choose how to manage their electricity use. The resulting solution will make the electricity grid significantly more efficient and robust by facilitating extensive use of renewable energy sources and reducing end-use losses in the system. With renewable energy sources widely distributed (e.g., roof-top solar panels and wind farms), the proposed approach will allow exchange of power among utilities, market service providers, consumers, and aggregators (services representing many loads), and also allow power exchange within a customer site. By incorporating this flexibility into their operations, utilities will be able to adjust the overall load they must serve to match available power. This "load follows generation" approach is essential to allow unhindered inclusion of low-emission renewables in the electricity grid. At the same time it makes consumers active agents in the energy exchange. Earlier research addressed discrete aspects of the scientific challenges, but the new approach called Flexible Load Energy eXchange (FLEX) will provide the system-level, holistic approach to achieve its vision. The overarching goal is to develop the science, technology, and control system design required to enable energy exchange between the customer and other parties in the electricity energy exchange ecosystem to unlock the huge potential of renewable generation. A central impediment is the stochastic variability of renewable energy sources such as wind and solar, prompting some to question if dependence on renewable sources will ever be viable. Even when wind (which tends to produce at night) and solar (produced during the day) are combined, severe variations in generation require huge adjustments (termed "ramping" within the industry), and spinning (on-line) reserves using conventional generation. This paper explores the missing critical component of smart grid development: smart and flexible loads. In addition, power interruptions, which are often caused by generation/load imbalances or faults on end-user radial connections, will be greatly reduced in a FLEX-enabled power grid by on-site or alternate customer generation. FLEX will also enable customer participation to create new market arrangements, such as wholesale and retail options, and incentives to increase energy efficiency not previously available.
-
-
-
Plate: Problem-based Learning Authoring And Transformation Environment
Authors: Mohammed Samaka, Yongwu Miao, John Imagliazzo, Disi Wang, Ziad Ali, Khulood Aldus and Mohamed AllyThe project entitled Problem-based Learning Authoring and Transformation Environment (PLATE) is housed at Qatar University. It is under the auspices of the Qatar National Priority Research Program (NPRP). The PLATE project seeks to improve student learning using innovative approaches to problem-based learning (PBL) in a cost-effective, flexible, interoperable, and reusable manner. Traditional subject-based learning that focuses on passively learning facts and reciting them out of context is no longer sufficient to prepare potential engineers and all students to be effective. Within the last two decades, the problem based learning approach to education has started to make inroads into engineering and science education. This PBL educational approach comprises an authentic, ill-structured problem with multiple possible routes to multiple possible solutions. A systematical approach to support online PBL is the use of a pedagogy-generic e-learning platform such as IMS Learning Design (IMS-LD 2003), which is an e-learning technical standard useful to script a wide range of pedagogical strategies as formal models. It seeks to research and develop a process modeling approach together with software tools to support the development and delivery of face-to-face, online, and hybrid PBL courses or lessons in a cost-effective, flexible, interoperable, and reusable manner. The research team seeks to prove that the PLATE authoring system optimizes learning and that the PLATE system improves learning in PBL activities. For this poster presentation, the research team will demonstrate the progress it has made within the second year of research. This includes the development of a PBL scripting language to represent a wide range of PBL models, the creation of transformation functions to map PBL models represented in the PBL scripting language into the executable models represented in IMS-LD, and the architecture of the PLATE authoring tool. In addition, the project team designed the run-time environment and developed an initial version of a run-time engine and a run-time user agent. A teacher can instantiate a PBL script and execute a script instance as a course. The user can manipulate the diagram-based script instance in the user agent and the engine will response to the users' actions. Because of this, the system supports the user in executing a course module according to the definition of the PBL script. The research team plans to illustrate that the research and development of a PBL scripting language and the associated authoring and execution environment can provide a significant thrust toward further research of PBL by using meta-analysis, designing effective PBL models, and extending or improving a PBL scripting language. The PLATE project can enable PBL practitioners to develop, understand, customize, and reuse PBL models at a high level by relieving the burdens of handling complex details to implement a PBL course. The research team believes that the project will stimulate the application and use of PBL in curricula with online learning practice by incorporating PBL support into popularly used e-learning platforms and by providing a repository of PBL models and courses.
-
-
-
World Cybersecurity Indicator Using Computational Intelligence
Authors: Ahmad Al Shami and Simeon ColemanThe aim of this research is to investigate the utilisation of Computational Intelligence (CI) methods for constructing a World Cybersecurity Indicator (WCI) to enable consistent and transparent assessments of the cybersecu- rity capabilities of nation's through the utilisation of Synthetic Composite Indicators (SCI's) concept for ranking their readiness and progress. SCI are assessment tools usually constructed to evaluate and contrast entities perfor- mance by aggregating intangible measures in many areas such as technology and innovation. SCI key value is inhibited in its capacity to aggregate com- plex and multi-dimensional variables into a single meaningful value. As a result, SCIs have been considered as one of the most important tools for macro-level and strategic decision making. Considering the shortcomings of the existing SCI, this study is proposing a CI approach to develop a new WCI. The suggested approach utilizes Fuzzy Proximity Knowledge Mining technique to build the qualitative taxonomy initially, and Fuzzy c-mean is employed to form a macro level cybersecurity indicator. To illustrate the method of construction a fully worked application is pre- sented. The application employs real variables of possible threats to the In- formation and Communication Technology (ICT). The weighting and aggre- gation results obtained were compared against classical approaches namely Principal Component Analysis, Factor Analysis and the Geometric Mean to weight and aggregate SCI's. The proposed model has the capability of weighting and aggregating major cybersecurity indicators into a single value that ranks nations even with limited data points. The validity and robustness of the WCI is evaluated using Monte Carlo simulation. In order to show the value added by the new cybersecurity index, the WCI is applied to the Middle East and North Africa (MENA) region as a special case study and then generalised. In total seventy-three countries were included, that are representative of developed, developing and under- developed nations. The nal and overall ranking results obtained, suggest novel and unbiased way compared to traditional or statistical methods when building, the WCI.
-
-
-
Residential Load Management System For Future Smart Energy Environment
Authors: Shady Samir Khalil and Haitham Abu-rubElectricity consumption has increased substantially over the last decade. According to the Gulf Research Center (2013), residential sector represents the largest portion (about 50%) of electricity consumption in the GCC region, due to substantial growth of electrical residential appliances. Therefore, we present a novel online smart residential load management system that is used to monitor and control power consumption of the loads for minimizing energy consumption, balancing electric power supply, reducing peak demand, and minimizing energy bill while considering residential customer preferences and comfort level. The presented online algorithm manages power consumption by assigning the residential load according to utilities power supply events. The input data to the management algorithm is set based on the categorized loads according to: importance (vital, essential, and non-essential electrical loads), electrical power consumption, electricity bill limitation, utilities power limitation, and load priority. The data are processed and fed to the presented algorithm, which accurately manages the power of Dwelling Loads using external controlled disconnectors. The proposed online algorithm yields to improve the overall grid efficiency and reliability, especially during the demand response periods. Simulation results demonstrate the validity of the proposed algorithm.
-
-
-
Using Social Computing For Knowledge Translation: Exploiting Social Network And Semantic Content Analyses To Facilitate Online Knowledge Translation Within An Online Social Community Of Medical Practitioners
Authors: Samuel Stewart and Syed Sibte Raza AbidiSocial computing has led to new approaches for Knowledge Translation (KT) by overcoming the temporal and geographical barriers experienced in face-to-face KT settings. Social computing based discussion forums allow the formulation of communities of practice whereby a group of professionals disseminate their knowledge and experiences through online discussions on specialized topics. In order to successfully build an online community of practice, it is important to improve the connectivity between like-minded community members and between like-topic discussions. In this paper we present a Medical Online Discussion Analysis and Linkages (MODAL) method to identify affinities between members of an online social community by applying: (a) social network analysis to understand their social communication patterns during KT; and (b) semantic content analysis to establish affinities between different discussions and professionals based on their communicated content. Our approach is to establish linkages between users and discussions at the semantic and contextual levels—i.e. we do not just link discussions that share exact medical terms, rather we link practitioners and discussions that share semantically and contextually similar medical terms, thus accounting for vocabulary variations, concept hierarchies and specialized clinical scenarios. MODAL incorporates two novel semantic similarity methods to analyze online discussions using: (i) the Generalized Vector Space Model (GVSM) that leverages semantic and contextual similarity to find similarities between discussion threads and between practitioners; and (ii) an extension of the Balanced Genealogy Model (BGM) so that we are able to address non-leaf mappings, issues of homonymity noted in medical terminologies, and further contextualization of the similarity measures using information content measures. We have implemented a similarity metric that captures the concept of "interest" between users or threads, i.e., a numeric measure of how interested user A is in user B, or how much of the information contained in thread A is related to thread B. MODAL measures the "interest" one professional has in another professional within the online community, and then uses this metric to identify those professionals that are sought by other professionals for expert advice—the content experts. Furthermore, by incorporating the interest measures with SNA, MODAL is able to identify the content experts within the community, and analyze the content of their conversations to determine their areas of expertise. Given the short and unstructured nature of online communications, we use the MeSH medical lexicons and the medical text analysis tools, i.e. Metamap, to map the unstructured narrative of online discussions to formal medical keywords based on the MeSH lexicon. MODAL is tested on two online professional communities of healthcare practitioners: (a) Pediatric Pain Mailing List is a community of 460 clinicians from around the world--over a four year period 2505 messages were shared on 783 different discussion threads; (b) SURGINET is a community of 865 clinicians from around the world that use the forum to discuss general surgical issues-it contains over 17000 messages on 2111 threads by 231 users. MODAL is able to identify content experts and link like-minded practitioners based on the content of their conversations rather than on direct ties between them.
-
-
-
Innovative Data Collection And Dissemination In V2x Networks
Authors: Wassim Drira and Fethi FilaliThe emergence of V2X (Vehicle-to-Vehicle and Vehicle-to-Infrastructure) networks lends a significant support for the Intelligent Transportation Systems to improve many applications for different purposes such as safety, traffic efficiency and added-value services. Typically, such environment is distinguished by its mobility and topology dynamics over space and time. Moreover, these applications need to collect and disseminate data reactively or proactively from vehicles or the traffic control center (TMC) to run efficiently. Thus, in this abstract paper, we will provide an extended framework to collect and disseminate data in V2X networks based on the new emerging network NDN (Named Data Networking) which treats content as a primitive - decoupling location from identity, security and access, and retrieving content by name. The communication paradigm in this network is based on the pattern of Request/Response where request messages are Interest packets and responses are Data packets. In order to provide an efficient reactive data collection mechanism, we propose an NDN Query mechanism (NDN-Q to allow any node to submit a query in the network to collect data which is built on the fly. Then, NDN-Q uses a reduce mechanism to aggregate data hop by hop towards the Query Source. Thus, in NDN-Q, the data collection is performed in two steps. The first one is the query dissemination towards data sources while the second one concerns data sources's response collection and aggregation. Then, we extended NDN with a Publish/Subscribe (Pub/Sub) capability in order to provide an efficient data collection and dissemination mechanism in V2X networks. Therefore, a node, a vehicle or the TMC, can subscribe to a content topic through a rendezvous node to receive zero or many messages as and when they are published without re-expressing its interest. Thus, many nodes may subscribe to the same topic which will allow the use of the NDN capabilities in terms of multicast to reduce the communication load in the network. The framework has been designed to meet the V2X communication requirements in terms of mobility and dynamics. Then, it has been implemented based on the NS-3 module ndnSim. Moreover, SUMO has been used to generate the vehicle mobility scenario. The evaluation argues that this extension reduces the number of packets disseminated to subscribers and efficiently handles the mobility of vehicles. Moreover, the data collection fulfills the delay requirement of traffic safety applications. The evaluation of NDN-Q argues that it reduces the number of packets collected from data sources, efficiently handles the mobility of vehicles, and deliver query results in a reasonable time, i.e. 280ms when a reduce process is performed in intermediate nodes or less than 50ms without any reduce process. In this abstract paper, we presented an innovative data collection and dissemination framework in V2X networks based on NDN. The framework gives a fully distributed query mechanism that does not require knowledge of the network organization and vehicles, and a Pub/Sub mechanism that takes into consideration V2X network characteristics and needs in terms of mobility, periodic disconnectivity, publish versioning and tagging with location, etc.
-
-
-
Maximum Power Transfer Of Pv-fed Inverter-based Distributed Generation With Improved Voltage Regulation Using Flywheel Energy Storage Systems
Authors: Hisham El Deeb, Ahmed Massoud, Ahmed Abbas, Shehab Ahmed, Ayman Abdel-khalik and Mohamed DaoudOne of the main issues accompanied with the high penetration of PV distributed generation (DG) systems in low voltage (LV) networks is the overvoltage challenge. The amount of injected power to the grid is directly related to the voltage at the point of common coupling (PCC), which necessitates limiting the amount of injected power to the grid to conservative values compared to the available capacity from the PV panels particularly at light loading. In order to mitigate the tradeoff between injecting the maximum amount of electrical power and voltage rise phenomena, many control schemes were suggested in order to optimize the operation of PV DG energy sources as well as maintaining safe voltage levels. Unlike these conventional methods, this paper proposes a combined PV inverter-based distributed generation and flywheel energy storage system to ensure improved voltage regulation as well as making use of the maximum available power from the PV source at any instant, decoupling its relation with the terminal voltage. The concluded assumptions were simulated through Matlab/Simulink and verified experimentally.
-
-
-
Enhancing Rpl Resilience Against Packet Dropping Insider Attacks
Authors: Karel Heurtefeux, Ochirkhand Erdene-ochir, Nasreen Mohsin and Hamid MenouarTo gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability. In this work, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. Random behavior and data replication have been introduced to RPL to enhance its resilience against such insider attacks. The classical RPL and its resilient variants have been analyzed through simulations. Resilient techniques introduced to RPL have enhanced significantly the resilience against attacks providing route diversification to exploit the redundant topology created by wireless communications. In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.
-
-
-
Transformation Of Online Social Networks And Communication Tools: A Technological Point Of View
More LessOnline social networks and online real time communication tools gained large popularity in the last years. In the Arab spring they emerged as one of the main tools to exchange ideas and to organize activities. Many users were unaware that their communication and their interaction patterns are traced. After the Arab spring and after the information demystified by Edward Snowden, users are becoming security aware and look for alternative technologies to communicate securely. Our contribution in this presentation is twofold, first we present the current technological developments in computer science and networking technologies that envision to provide tools to the users, so that their communication is secured and impossible to track. Based on peer-to-peer-technologies, known from file-sharing applications, several solutions for secure, reliable and untraceable communication already exist. In addition, opportunistic and delay-tolerant networks, provide asynchronous "online" communication which do not even use the Internet infrastructure, thus making it even harder to identify and to trace. As a second contribution, we present a technological framework based on peer-to-peer networking, which allows to build platforms for online social network. In depth, we show how this framework is capable to provide common functionality of online social networks, but at the same time is privacy-aware and impossible to trace or to shut of. The framework uses fully decentralized data storage and sophisticated cryptography for the user management, secure communication and access control to the data of the users. The quality of the presented framework, in terms of performance and communication costs, has been evaluated in simulations with up to 10,000 network nodes as well as in test with up to 30 participants. Our findings are, that up to now the usability, economical pressure and the security of (centralized) communication tools were incompatible. This observation changes with decentralized solutions which do not come with economic pressure. Both secure and usable solutions are about to emerge, fully distributed and secure, which will be impossible to shut down or to trace. For the future it will be interesting, whether the presented decentralized technology will be ignored or whether it will disrupt the economics and the market of social networks, like it was the case with Napster and the music industry, a case in which decentralized peer-to-peer networking unfolded it potential.
-
-
-
Data Science at QCRI
Authors: Divy Agrawal, Laure Berti, Hossam Hammady, Prasenjit Mitra, Mourad Ouzzani, Paolo Papotti, Jorge Quiane Ruiz, Nan Tang, Yin Ye, Si Yin and Mohamed Zaki"The Data Analytics group at QCRI has embarked on an ambitious endeavor to become a premiere world-class research group in Data Science by tackling diverse research topics related to information extraction, data quality, data profiling, data integration, and data mining. We will present our ongoing projects to overcome different challenges encountered in Big Data Curation, Big Data Fusion, and Big Data Analytics. (1) Big Data Curation: Due to complex processing and transformation layers, data errors proliferate rapidly and sometimes in an uncontrolled manner, thus compromising the value of information and impacting data analysis and decision making. While data quality problems can have crippling effects and no end-to-end off-the-shelf solutions to (semi-)automate error detection and correction existed, we built a commodity platform, NADEEF that can be easily customized and deployed to solve application-specific data quality problems. This project implements techniques that exploit several facets of data curation including: * assisting users in the semi-automatic discovery of data quality rules; * involving users (and crowds) in the cleaning process with simple and effective questions; * and unifying logic-based methods, such as declarative data quality rules, together with quantitative statistical cleaning methods. Moreover, implementation of error detection and cleaning algorithms has been revisited to work on top of distributed processing platforms such as Hadoop and Spark. (2) Big Data Fusion: When data is combined from multiple sources, it is difficult to assure its veracity and it is common to find inconsistencies. We have developed tools and systems that tackle this problem from two perspectives: (a) In order to find the true value for two or more conflicting ones, we automatically compute the reliability (accuracy) of the sources and dependencies among them, such as who is copying from whom. Such information allows much higher precision than simple majority voting and ultimately leads to values that are closer to the truth. (b) Given an observed problem over the integrated view of the data, we compute explanations for it over the sources. For example, given erroneous values in the integrated data, we can explain which source is making mistakes. (3) Big Data Analytics: Data analysis tasks typically employ complex algorithmic computations that are hard/tedious to express in current data processing platforms. To cope with this problem, we are developing Rheem, a data processing framework that provides an abstraction on top of current data processing platforms. This abstraction allows users to focus only on the logics of their applications and developers to provide ad-hoc implementations (optimizations) over existing data processing platforms. We have already created two different applications using Rheem, namely data repair and data mining. Both have shown benefits in terms of expressivity of the Rheem abstraction as well as in terms of query performance through ad-hoc optimizations. Additionally, we have developed a set of scalable data profiling techniques to understand relevant properties of big datasets in order to be able to improve data quality and query performance."
-
-
-
Up & Away: A Visually-controlled Easy-to-deploy Uav Cyber Physical Testbed
Authors: Ahmed Saeed, Azin Neishaboori, Khaled Harras and Amr MohamedCyber-Physical Systems (CPS) rely on advancements in fields such as robotics, mobile computing, sensor networks, controls, and communications, to advance complex real-world applications including aerospace, transportation, factory automation, and intelligent systems. The multidisciplinary nature of effective CPS research, diverts specialized researchers' efforts towards building expensive and complex testbeds for realistic experimentation, thus, delaying or taking the focus away from the core potential contributions to be made. We present Up and Away (UnA), a cheap and generic testbed composed of multiple autonomously controlled Unmanned Ariel Vehicle (UAV) quadcopters. Our choice of using UAVs is due to the their deployment flexibility and maneuverability enabling a wide range of CPS research evaluations in areas such as 3D localization, camera sensor networks, target surveillance, and traffic monitoring. Furthermore, we provide a vision-based localization solution that uses color tags to identify different objects in varying light intensity environments and use that system to control the UAVs within a specific area of interest. However, UnA's architecture is modular so that the localization system can be replaced by any other system (e.g. GPS) as deployment conditions change. UnA enables interaction with real world objects, treating them as CPS input, and uses the UAVs to carry out CPS specific tasks while providing sensory information from the UAV's array of sensors as output. We also provide an API that allows the integration of simulation code that will obtain input from the physical world (e.g. targets to track) then provide control parameters (i.e. number of quadcopters and destinations coordinates) to the UAVs. The UnA architecture is depicted in Figure 1a. To demonstrate the promise of UnA, we use it to evaluate another research contribution we make in the area of smart surveillance, particularly that of target coverage using mobile cameras. Optimal camera placement to maximize coverage has been shown to be NP-complete for both area and target coverage. Motivated by the need for practical computationally efficient algorithms to autonomously control mobile visual sensors, we propose efficient near-optimal algorithms for finding the minimum number of cameras to cover a high ratio of targets. First, we develop a basic method, called cover-set coverage to find the location/direction of a single camera for a group of targets. This method is based on finding candidate points for each possible camera direction and spanning the direction space via discretizing camera pans. We then propose two algorithms, (1) Smart Start K-Camera Clustering (SSKCAM) and (2) Fuzzy Coverage (FC), which divide targets into multiple clusters and then use the cover-set coverage method to find the camera location/direction for each cluster. Overall, we were able to integrate the implementation of these algorithms with the UnA testbed to witness real-time assessment of our algorithms as shown in Figure 1b.
-
-
-
قياس فاعلية بناء وتطوير برنامج محوسب لإدارة وتحليل الاستشهادات المرجعية العربية
Authors: Saleh Alzeheimi and Akram Zekiإن من المؤشرات العلمية التي خرجت بها بعض الدراسات حول أسباب ضعف الانتاج الفكري العربي وضعف المحتوى الرقمي في قواعد البيانات العالمية هو غياب البرامج المحوسبة التي تعنى بتحليل المراجع والاستشهادات المرجعية (العربية) الورادة في هذا الانتاج، وانعدام البرامج الآلية التي تقدم مؤشرات احصائية (ببليومترية) تبرز التوجه البحثي العربي، وتعين صناع القرار في المؤسسات البحثية والأكاديمية والباحثين أيضا في توجيه مسار البحث العلمي العربي ومعرفة نقاط القوة والضعف في التخصصات العربية المبحوث فيها، وعرض الخريطة القياسية للعلوم العربية Systematic Map وتفرعاتها. وفي المقابل توجد أدوات متقدمة وبرامج عالمية تقدم حلولاً لتحليل النتاج الفكري الأجنبي (المنشور باللغة الانجليزية) مثل Scopus وJournal Citation Report (JCR) إلا أن هذه البرامج لا تدعم النتاج الفكري المنشور باللغة العربية، كما أنها غير مجانية، ولا تتيح الاستخدام الحر والمفتوح للمؤسسات والأفراد. لذا تهدف الدراسة إلى قياس فاعلية بناء وتطوير برنامج محوسب لإدارة وتحليل الدراسات الببليومترية والاستشهادات المرجعية العربية. وستعمد الدراسة إلى طريقتين لتحقيق أهداف الدراسة وهما: - بناء برنامج محوسب (مفتوح المصدر) باستخدام لغةPHP وMYSQL من أجل اتاحة الفرصة للمطورين للتطوير المستمر واتاحته مجانا للمتخصصين في مجال الدراسات الببليومترية وبهذا يكون أول برنامج عربي مفتوح المصدر في مجال التحليل الآلي للدراسات الببليومترية. - تجربة البرنامج على دوريات عربية محكمة وقياس فاعلية التقارير والاحصائيات الببليومترية ومدى تطابقها مع القوانيين الببليومترية مثل قانون لوتكان وقانون برادفورد، ومدى استيفاء البرنامج للخصائص والمؤشرات التي تقدمها البرامج العالمية الداعمة للانتاج الفكري الأجنبي مثل Scopus و Google Scholar و Science Direct. وعليه فإن الدراسة ستعتمد على المنهج البنائي والتجريبي لقياس فاعلية برنامج محوسب مفتوح المصدر في مجال الدراسات الببليومترية العربية Arabic Citation Engine وسيتم تقييم البرنامج من خلال ادخال بيانات عينة من المقالات العربية المنشورة في الدروريات التي تصدرها الجامعة الاسلامية العالمية بماليزيا MUII وفحص التقارير والمؤشرات العلمية التي يستخرجها البرنامج ومدى دقة المعطيات بناء على القوانيين الببليومترية.
-
-
-
Energy Storage As An Enabling Technology For The Smart Grid
Authors: Omar Ellabban and Haitham Abu-rubIn today's world, the need for more energy seems to be ever increasing. The high cost and limited sources of fossil fuels, in addition to the need to reduce greenhouse gasses, have made renewable energy sources (RES) attractive in today's world economy. However, the fluctuating and intermittent nature of these RES causes variations of power flow that can significantly affect the stability and operation of the electrical grid. In addition, the power output of these RES is not as easy to adjust to changing demand cycles as the output from the traditional power sources. To overcome these problems, energy from these RES must be stored when excess is produced and then released, when production levels are less than the required demand. Therefore, in order for RES to become completely reliable as primary sources of energy, energy storage systems (ESS) is a crucial factor. The impact of the ESS in future grid is receiving more attention than ever from system designers, grid operations and regulators. Energy storage technologies have the potential to support our energy system's evolution, they can be used for multiple applications, such as: energy management, backup power, load leveling, frequency regulation, voltage support, and grid stabilization. In this work, an overview of the current and future energy storage technologies used for electric power applications is carried out. Furthermore, an assessment of the dynamic performance of energy storage technologies for the stabilization and control of the power flow of emerging smart grid will be presented. The EES can enhance the operation security and ensure the continuity of energy supply in future smart grids.
-
-
-
A Novel Solution For Addressing Network Firewall Issues In Remote Laboratory Development
Authors: Ning Wang, Xuemin Chen, Michael Ho, Hamid Parsaei and Gangbing SongThe increased use of remote laboratories for online education has made network security issues ever more critical. To defend against numerous new types of potential attacks, the complexity of network firewalls has been significantly increased. Consequently, the network firewall will inevitably limit the real time remote experimental data transmission. To solve the issue of traversing network firewalls, we designed and implemented a novel real-time experimental data transmission solution which includes two parts, real-time experiment control data transmission and real-time experiment video streaming transmission, for remote laboratory development. To implement real-time experiment control data transmission, a new web server software architecture was designed and developed to allow the traversing of network firewalls. With this new software architecture, the public network port 80 can be shared between Node.js, which is a stable server-side software engine to support real-time communication web applications, and the Apache web server software system. With this new approach, the Apache web server application still listens to the public network port 80, but any client requests for the Node.js web server application through the port will be forwarded to a special network port which Node.js web server application is listening to. Accordingly, a new solution in which both Apache and Node.js web server applications work together via HTTP proxy developed by the Node-HTTP-Proxy software package is implemented on the server-side. With this new real time experiment control and data transmission solution, the end user can control remote experiments and view experimental data on the web browser without firewall issues and without the need of third party plug-ins. It also provides a new approach for the remote experiment control and real time data transmission based on pure HTTP protocol. To implement real-time experiment video transmission part, we developed a complete novel solution via HTTP Live Streaming (HLS) protocol and FFMPEG that is a powerful cross-platform command line video trans-code/encoding software package on the server side. In this paper, a novel, real-time video streaming transmission approach based on HLS for the remote laboratory development is presented. With this new solution, the terminal users can view the real-time experiment live video streaming on any portable device without any firewall issues or the need for a third party plug-in. We have successfully implemented this novel real-time experiment data transmission solution in the remote SVP experiment and remote SMA experiment development. End users can now conduct the SVP and SMA remote experiment and view the experiment data and video in real time through web browsers anywhere that has internet connection without any third party plug-in. Consequently, this novel real-time experiment data transmission solution gives the unified framework significant improvements.
-
-
-
Power System Stabilizer Design Based On Honey-bee Mating Optimization Algorithm
Authors: Abolfazl Halvaei Niasar, Dariush Zamani and Hassan MoghbeliPower system stability is one of the main factors in performance of electrical system. A control system must retain frequency and voltage size under any distortion such as sudden increase in load, to leave a generator from circuit or cut off a transmission line in a constant level. In this paper, Honey-Bee Mating Optimization (HBMO) algorithm has been used to design power system stabilizer. It is based on the mating between queen and bees. Meta-heuristics honey-bee mating optimization algorithm is considered to be as intelligent algorithm. Simulation results show that HBMO algorithm is simple to solve optimization issues. It works based on the changes in the system to adapt with reality and increase flexible parameters in comparison with other methods. Furthermore, considering performance level, it has suitable standard deviation and convergence of approximation.
-