In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for the observed data.
Carbon dioxide geo-sequestration (CGS) into sediments in the form of (gas) hydrates is one proposed method for reducing anthropogenic carbon dioxide emissions to the atmosphere and, thus reducing global warming and climate change. However, there is a serious lack of understanding of how such CO2 hydrate forms and exists in sediments. We thus imaged CO2 hydrate distribution in sandstone, and investigated the hydrate morphology and cluster characteristics via x-ray micro-computed tomography in 3D in-situ. A substantial amount of gas hydrate (∼17% saturation) was observed, and the stochastically distributed hydrate clusters followed power-law relations with respect to their size distributions and surface area-volume relationships. The layer-
... Show MoreThe new of compounds synthesized by sequence reactions starting from a reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride to produce the compounds [I]a,b, then the compounds[I]a,b reacted with sodium azide to yield compounds[II]a,b that reacted 1,3-dipolarcycloaddition reaction with acrylic acid to give compounds [III]a,b these compounds reacted with methanol led to ester compounds[IV]a,b then reacted with hydrazine to give acid hydrazide [V]a,b . Finally compounds [V]a,b reacted with aromatic aldehydes to product shiff bases derivatives. The compounds characterized by mp. , IR, 1HNMR in addition to mass spectroscopy for some of them the liquid crystals properties were studied by using polarized optical microsco
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show More