1,182 research outputs found

    Voronoi Diagram Applications Towards New Sustainable Architectural Language

    Get PDF
    This paper is concerned with the study of how to generate irregular geometric shapes that simulate their counterparts in nature, based on mathematical rules, specifically through Voronoi diagram, which already has been used in a group of contemporary buildings and urban design projects. The paper deals with this diagram through a theoretical study that explains the characteristics and applications of this diagram, with a review of examples of engineering formations that exist in nature and to which the applications of the Voronoi diagram apply. The paper aims to how to achieve a balance between form and function through this diagram, by studying and analyzing a group of contemporary buildings whose design was based on this diagram, whether in shaping the facades, forms and the structural systems

    Voronoi Diagram Applications Towards New Sustainable Architectural Language

    Get PDF
    This paper is concerned with the study of how to generate irregular geometric shapes that simulate their counterparts in nature, based on mathematical rules, specifically through Voronoi diagram, which already has been used in a group of contemporary buildings and urban design projects. The paper deals with this diagram through a theoretical study that explains the characteristics and applications of this diagram, with a review of examples of engineering formations that exist in nature and to which the applications of the Voronoi diagram apply. The paper aims to how to achieve a balance between form and function through this diagram, by studying and analyzing a group of contemporary buildings whose design was based on this diagram, whether in shaping the facades, forms and the structural systems

    Transparency in Architecture and its Mutual Effects between Built and Natural Environment

    Get PDF
    This paper is concerned with studying the concept of transparency in architecture, which is not only limited to the physical aspect related to the penetration of natural light through transparent surfaces into the building, but is linked to the psychological and spiritual aspects of the building\u27s occupants through the virtual removal of barriers between them and the natural environment.by studying a variety of iconic buildings which Representing a group of different architectural schools till reaching the contemporary architecture, the paper deals with how the concept of transparency has been developed in conjunction with the development of the construction industry over the ages, so that transparency has become an essential part of the architectural design philosophy

    Transparency in Architecture and its Mutual Effects between Built and Natural Environment

    Get PDF
    This paper is concerned with studying the concept of transparency in architecture, which is not only limited to the physical aspect related to the penetration of natural light through transparent surfaces into the building, but is linked to the psychological and spiritual aspects of the building\u27s occupants through the virtual removal of barriers between them and the natural environment.by studying a variety of iconic buildings which Representing a group of different architectural schools till reaching the contemporary architecture, the paper deals with how the concept of transparency has been developed in conjunction with the development of the construction industry over the ages, so that transparency has become an essential part of the architectural design philosophy

    Investigating crime patterns in Egypt using crowdsourced data between 2011-2013

    Get PDF
    Dissertation submitted in partial fulfilment of the requirements for the degree of Master of Science in Geospatial TechnologiesCrime is a social phenomenon that negatively impinges upon the society on various levels. Such phenomena are ought to be measured and analyzed to achieve control over its presence and consequences. One of the ways for measurement and analysis involves the use of crime maps as vital tools for visualising crime related data. Getting access to crime data is undoubtedly a challenged endeavour faced by hurdles of data collection, storage and making it available for public access. In addition, coming up with useful relationships for extracting information and patterns for crime data analysis is a significant challenge as well. This research investigates the link between the spatial and temporal variables in crime related data collected from crowdsourcing. The research will capitalize on crime data gathered throughout the operation of an online project called Zabatak founded by the author since January 2011 in Egypt. The dataset consists of more than 2000 crime incidents from various geographical areas across Egypt. The research considers an exploratory analysis in trying to interpret crime patterns and trends. The results of this study have identified various interesting trends and patterns in the dataset. One of the major findings of this research points out a strong relationship between the spatial and temporal variables in Car-Theft incidents. In addition, It was possible in the study to relate crime types to the type of the geographical area. The research considers Spatio-Temporal analysis using Inhomogeneous Spatio-Temporal K-function and pair-correlation functions which have identified a Spatio-Temporal cluster and interaction in crime data which can open new ways for crime maps data analysis

    Bilateral investment treaties treatment of international capital movement: time for reform?

    Get PDF
    PhDWhile the freedom to move capital is necessary for foreign investors, the power of the state to regulate capital transfers is necessary to prevent volatile capital from causing financial crises as well as to mitigate such crises when they occur. Thus, in regulating international capital movement, a balance should be made between the right to transfer funds and the state’s right to protect the stability of its economy. It is in relation to achieving this balance that this thesis argues that bilateral investment treaties’ (BITs) regulation of capital transfers is deficient, both substantively and procedurally. On substance, this thesis identifies three substantive defects that affect obligations under BITs: absoluteness, immediacy, and breadth. First, many BITs adopt an absolute approach in liberalizing capital that does not permit any restrictions or exceptions, nor does it distinguish between different kinds of capital, or between the right to import capital and the right to repatriate capital. Second, the obligation to permit transfers is immediate and does not allow for a gradual liberalization of capital. Third, many BITs’ terms and obligations are broad and therefore vague, such as the broad definition of investment, or the obligation to grant fair and equitable treatment, which is also broad and interpreted in a manner that restricts the regulatory powers of the host state. Such results could have been partly mitigated if there were a dispute settlement mechanism with the power to create precedent and with it a clearer and more coherent body of rules. But BITs’ investor-state arbitration is also deficient since it consists of ad hoc tribunals, which are not bound by precedent; and their decisions are not generally subject to substantive review. This leads to an inconsistent and incoherent body of law that protects neither the state’s regulatory powers nor the legitimate expectation of investor

    Estimation of testosterone in and isolation of progesterone from human urine

    Get PDF
    A method for the estimation of urinary testosterone is described. This depends on acid hydrolysis, a modified form of the Girard separation and chromatography on an alumina column and on paper. The final method of detection is by gas -liquid chromatography.The reliability critlria of the method have been investigated. The recovery of added testosterone was approximately 80%. The method is reasonably precise, the coefficients of variation being 6.4% and 8.0% for male and female urine respectively. The chromatographic, chemical and physical behaviour of the compound estimated in the final fraction is similar to that of authentic testosterone. Accordingly, the method which is also practicable, appears to be specific.When testosterone assays were performed in normal men and in normally menstruating women, considerable variations were found from one subject to another. However, levels in males were consistently higher than those in females, there being no overlap between the two groups.Serial assays of urinary testosterone in normal male subjects showed the presence of peaks of excretion at fairly regular intervals. In two cases studied sekual intercourse had no effect on the occurrence of such peaks but caused an overall rise in testosterone output.Testosterone excretion values in normal young men aged from 16 to 20 were generally higher than those of the elder group of subjects aged from 21 to 63 years.Serial assays of urinary testosterone in normally menstruating women have shown an elevation of levels during the luteal phase probably associated with the presence of a functioning corpus luteum. A second rise was also noted at the time of ovulation, and a slight increase was observed during the follicular phase in two of the cycles studied.The assay method for urinary testosterone is now being applied to conditions such as acne vulgaris, sex chromosome abnormalities, athersclerosis in males and hirsutism in females.Progesterone has been isolated from the urine of a woman in late pregnancy. A modification of the Girard reaction was used by which it was :possible to separate the 'conjugated ketone' fraction both from non-ketonic fraction and from the bulk of the saturated ketones. The final separation was made using gas-liquid chromatography with a stream splitter.Work is proceeding on the use of the modified Girard separation technique to estimate plasma steroids with a Δ-3-ketone structure. By this method the majority of the biologically active neutral steroid can be estimated simultaneously in one sample

    Does Number of Ports Affect Outcomes in Patients Undergoing Laparoscopic Pyloromyotomy? Retrospective Chart-Review Study

    Get PDF
    Background. Although open Ramstedt's pyloromyotomy is the gold standard for the surgical management of infantile hypertrophic pyloric stenosis, laparoscopic pyloromyotomy has been found highly successful. Various factors, however, can affect the outcomes of surgical interventions in these patients. We observed a relationship between the number of ports used and outcome in patients undergoing laparoscopic pyloromyotomies. Methods. We retrospectively assessed the medical records of selected group of patients who underwent laparoscopic pyloromyotomy in our institution. Factors analyzed included operation time, length of hospital stay, postoperative complications, and time to postoperative full feeding. Results. We observed failure of myotomy in both two patients who underwent laparoscopic pyloromyotomy using only two working ports compared to successful myotomies in the remaining patients. Conclusion. Laparoscopy provides good results in terms of intraoperative exposure and cosmesis. However, standardized surgical technique with two working ports is advisable, and this can trigger further research to be ascertained

    Reduction of secondary lobes in joint angle and delay estimation in angle of arrival localization to detect MAC address spoofing in wireless networks

    Get PDF
    in this paper, we solve the problem of  secondary lobes that are due to noise that comes from constructive and destructive multipath interference that are resulted in received signal strength (RSS) variation over time. This is to develop a very efficient localization algorithm that uses a unique fingerprint angle of arrivals (AOAs), in a specified range, with associated time delays (TDs), in the surrounded sparsity design promoting multipath parameter (i.e:RSS). We solve this problem to detect physical identity spoofing of nodes in radio wireless networks, and localize adversaries and jammers of wireless networks. All radio waves are vulnerable to many types of attacks due to the ability to capture them and sniff or eavesdropping on them in the open space. Physical identity spoofing is used to launch many types of attacks against wireless networks like Denial of Service (DOS), Man-In-The-Middle and Session Hijacking and eavesdropping. Eavesdropping is a human-based social engineering attack. Active adversaries are able to jam and eavesdrop simultaneously, while passive adversaries can only eavesdrop on passed signals. In TCP/IP protocol for example, Media Access Card (MAC) Address is transferred in 802.11 frames. Detection process was carried out by analyzing electromagnetic radio waves that are used to transfer data, in the form of radio wave signals that are formed by the modulation process which mixes the electromagnetic wave, with another one of different frequency or amplitude to produce the signal with a specified pattern of frequency and amplitude. We depended on the angle of arrival of vectors and time delay across scattered areas in the surrounded space to solve the problem of co-location in detection and localization of jammers. We used Maximum Likelihood (ML) angle of arrival determination because ML approaches, known to their higher accuracy and enhanced resolution capabilities. And we assessed their computational complexity that was considered as the major drawback for designers to their implementation in practice.   Our solution was tested on a jammer that changed the signal strength of received signal at the receiver at an angle of arrival 30 degree. And we used scatterers density to determine the angle of arrival of the sender. The simulation has observed that the power of the received signal has changed from the range of angles 20 to 40 degrees. We used scatterers because they describe the density of the signal power, and also enhance the signal to noise ratio, that resulted from the multipath fading of the signal strength. And also overcoming the problem of secondary lobes that are due to signal propagation, while determining the angle of arrival of a signal sender. So, we developed a new passive technique to detect MAC address spoofing based on angle of arrival localization. And assessed the computation complexity of the localization technique through depending on a range angle to estimate the angle of arrival of the adversary within it. And we reduced number of secondary lobes, and their peaks, in the importance function, while determining the angle of arrival, and so increasing the accuracy of angle of arrival measurement. We compared our work to other techniques and find that our technique is better than these techniques
    • 

    corecore