Abu Dhabi, United Arab Emirates
Abu Dhabi, United Arab Emirates

Al-Hosn University is an educational institution founded in 2005 and located in Abu Dhabi, the capital city of the United Arab Emirates. It is a segregated institution in which the male students have one villa building to themselves and the females a villa building to themselves. These villa buildings are residential villas that have had the interiors cleared out to accommodate classrooms. Wikipedia.


Time filter

Source Type

Mourlas C.,National Technical University of Athens | Papadrakakis M.,National Technical University of Athens | Markou G.,ALHOSN University
Engineering Structures | Year: 2017

During the last decades, many researchers have proposed a number of constitutive models for simulating the behavior of reinforced concrete structures under cyclic loading. The finite element analysis, has been used in the past, to produce solutions for specific structural members that undergo different loading conditions. The purpose of this paper is to propose a computationally efficient finite element based numerical method in order to simulate accurately and efficiently the mechanical behavior of a wide range of reinforced concrete structural members under cyclic loading. The proposed method is based on the experimental results and the concrete modeling of Kotsovos and Pavlovic (1995) as modified by Markou and Papadrakakis (2013). A new algorithmic formulation that describes the development of microcracking, macrocracking and the brittle behavior of the concrete under cyclic behavior, is presented. The concrete domain is simulated by 8- and 20-noded hexahedral elements, which treat cracking with the smeared crack approach. Steel reinforcement is modeled with truss and beam elements which are considered embedded inside the hexahedral concrete mesh. The numerical accuracy of the proposed method is demonstrated by comparing the numerically force-deflection curves with the corresponding experimental results found in the literature. © 2017 Elsevier Ltd


Loucif S.,ALHOSN University
Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013 | Year: 2013

Torus is gaining a great interest in on-chip networks, and to further reduce torus diameter, hierarchical-torusnetworks have been proposed, where a cluster of IPs are connected by a single router. This paper investigates the performance merits of clustering in the torus, and compares the performance of the hierarchical-torus to that of the torus. Our simulation results show that, although hierarchical-torushas lower network diameter than the tours, the latter provides better latency performance. Hierarchical-torus suffers from the high load of traffic distributed on fewer channels, compared to the torus, resulting in high message blocking delays. Hierarchical-torus manages to outperform the torusonly under local traffic distribution or when the fraction of hot-spot traffic is very large. Also, our results show hierarchical-torus greatly improves its performance in terms of message latency under deterministic routing with a small number of virtual channels, a performance which is almost similar to that obtained when messages are adaptive routed. © 2013 IEEE.


Loucif S.,ALHOSN University
Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015 | Year: 2015

This paper investigates the effects of concentration on the performance of k-ary n-cubes. Simulation results indicate that only large ratios of packet length-to-average hop-count are in favor of concentrated mesh and torus. The Cmesh takes full advantage of its high channel bandwidth to outperform Ctorus. Moreover, non-local traffic suffers more from performance bottleneck than local traffic at routers. Providing dedicated input ports, one for each IP, at routers, reduces the average packet latency compared to a configuration with a single input port shared by all IP cores of the cluster. © 2015 IEEE.


Markou G.,ALHOSN University
International Journal of Computational Methods | Year: 2015

In this paper, a numerical investigation on the limits of an automatic procedure for the generation of embedded steel reinforcement inside hexahedral finite elements (FEs) is presented. In 3D detailed reinforced concrete simulations, mapping the reinforcement grid inside the concrete hexahedral FEs is performed using the end-point coordinates of the rebar reinforcement macro-elements. This procedure is computationally demanding while in cases of large-scale models, the required computational time for the reinforcement mesh generation is excessive. This research work scopes to study and present the limitations of the embedded mesh generation method that was proposed by Markou and Papadrakakis, through the use of a 64-bit operating system. The embedded mesh generation method is integrated with a filtering algorithm in order to allocate and discard relatively short embedded rebar elements that result from the arbitrary positioning of the embedded rebar macro-elements and the nonprismatic geometry of the hexahedral mesh. The computational robustness and efficiency of the integrated embedded mesh generation method are demonstrated through the analysis of three numerical models. The first two numerical models are a full-scale 2-story and a 7-story RC structures while the third model deals with a full-scale RC bridge with a trapezoidal section and a total span of 100 m. Through the third numerical implementation, the computational capacity of the integrated embedded rebar mesh generation method is investigated. © 2015 World Scientific Publishing Company.


Zineddine M.,ALHOSN University
2016 International Conference on Information Technology for Organizations Development, IT4OD 2016 | Year: 2016

Information Communication Technology (ICT) has been providing critical support for developed economies. It supports civil infrastructure, public safety, and national security. Industrial Control Systems (ICS) are pivotal for industries that require complex systems, rigorous monitoring and controlling. The combination of ICSs and the Internet connectivity has added tremendous business and technological value to the use and management of complex systems. However, ICSs have become vulnerable to cyber-attacks, and important targets for cyberwar. This study presents findings from a survey of 31 industrial personnel. Our results reveal that securing ICSs is problematic. The availability and reliability of industrial systems has been a priority of industrial personnel, while their security is a top priority of IT personnel, therefore an ICS security dilemma. This conflict has been hindering the security process of ICSs. To mitigate this issue, companies involved in the design and manufacturing of these systems have to integrate security mechanisms from the design phases by embedding security routines that are required to be followed for the proper functioning of ICSs. © 2016 IEEE.


Loucif S.,ALHOSN University
Proceedings - International Conference on Advanced Information Networking and Applications, AINA | Year: 2015

Mesh and torus are the most popular topologies suggested to implement Network-on-Chip (NoC). Concentration has been suggested to reduce networks complexity in terms of routers and wiring requirements. Several studies have examined the performance of concentrated mesh. This paper expands on these studies to re-evaluate the benefits of concentration in mesh and torus. Three alternative router configurations are proposed to investigate bottleneck performance due to concentration. Simulation results indicate that, under uniform traffic distribution, only large ratios of packet length-to-average hop count is in favor of concentrated mesh and torus. The Cmesh profits from its high channel bandwidth to offer better performance than Ctorus. The latter is unable to overcome the high packet serialization overhead even when using separate input ports at routers, one for each IP core, to reduce packet contention. Furthermore, non-local traffic at routers suffers more from contention than local traffic. Providing dedicated input ports, one for each IP core, at routers, reduces the average packet latency by 80% compared to a configuration with a single input port shared by all IP cores of the cluster, while only 20% improvement is achieved by adding a separate input port to service local traffic. However, when high traffic load is sent locally to the IP cores belonging to the same cluster as the source, a router configuration with multiple channels servicing local traffic greatly reduces the overall packet latency. © 2015 IEEE.


Occupant movement in evacuation models has been simulated and predicted based on a number of variables, including crowd density. This study investigates the relationship between crowd density and occupant crawling movement, as a physical response to environmental conditions in fire. It is an attempt to generate the fundamental speed-density relationship that has been developed for walking movement. This is conducted by examining the impact of population size and exit access width on crowd walking and crawling speeds on a flat surface. The findings of the study suggest that exit access width has a significant impact, whereas occupant configuration (population size) plays less of a factor. The results further demonstrate that there is a significant difference in the crawling speed given the exit access width available, due to the secondary effect of crowd density. The relationship between crowd crawling speed and density is best represented by a quadratic regression model. The study concludes with the need to continuously develop new predictive movement methods, or enhance existing ones in order to cope with the level of detail required to ensure occupant safety and model complexity. © 2011 Elsevier Ltd.


Information and Communication Technology (ICT) security issues have been a major concern for decades. Today's ICT infrastructure faces sophisticated attacks using combinations of multiple vulnerabilities to penetrate networks with devastating impact. With the recent rise of cloud computing as a new utility computing paradigm, organizations have been considering it as a viable option to outsource major IT services in order to cut costs. Some organizations have opted for a private or hybrid cloud to take advantage of the emerging technologies and services. However, ICT security issues have to be appropriately mitigated. This research proposes a cloud security framework and an approach for vulnerabilities coverage and cost optimization using Cuckoo search algorithm with Lévy flights as random walks. The objective is to mitigate an identified set of vulnerabilities using a selected set of techniques when minimizing cost and maximizing coverage. The results show that Cloud Computing providers and organizations implementing cloud technology within their premises can effectively balance IT security coverage and cost using the proposed approach. © 2014 Elsevier Ltd. All rights reserved.


Said-Houari B.,King Abdullah University of Science and Technology | Soufyane A.,ALHOSN University
IMA Journal of Mathematical Control and Information | Year: 2012

Our interest in this paper is to analyse the asymptotic behaviour of a Timoshenko beam system together with two boundary controls, with delay terms in the first and second equation. Assuming the weights of the delay are small enough, we show that the system is well-posed using the semigroup theory. Furthermore, we introduce a Lyapunov functional that gives the exponential decay of the total energy. © 2012 The author.


Awad M.I.,ALHOSN University | Kovach J.V.,University of Houston
Quality and Reliability Engineering International | Year: 2011

Robust design is an efficient method for product and process improvement which combines experimentation with optimization to create a system that is less sensitive to uncontrollable variation. In this article, a simple and integrated modeling methodology for robust design is proposed. This methodology achieves the robustness objective function and input variables constraints simultaneously. The objective function is written in terms of the multivariate process capability vector (MCpm) of several competing features of the system under study. The proposed methodology is applicable to general functions of the system performance with random variables. The effectiveness of the methodology is verified using two real-world examples which are compared with those of other robust design methods. © 2010 John Wiley & Sons, Ltd.

Loading ALHOSN University collaborators
Loading ALHOSN University collaborators