98
Guidelines for Authors This periodical is a publication of the Academic Publishing and Translation Directorate of Qassim University. Its purpose is to provide an opportunity for scholars to publish their original research. Manuscripts will be published in on of the following platforms: i) Article: It should be original and has a significant contribution to the field in which the research was conducted. ii) Review Article: A critical synthesis of the current literature in a particular field, or a synthesis of the literature in a particular field during an explicit period of time. iii) Brief Article (Technical Notes): A short article (note) having the same characteristics as an article. iv) Innovation and Invention Reports v) Forum: Letters to the Editor, comments and responses, preliminary results or findings, and miscellany. vi) Book Reviews The Editorial Board will consider manuscripts in the following fields: Electrical Engineering Civil Engineering Mechanical Engineering Chemical Engineering Computer Engineering Mining and Petroleum Engineering Computer Science Information Technology Information Systems Basic Engineering and Computer Sciences A manuscript should be submitted in English, and, if accepted for publication, it should not be published elsewhere without the written permission of the Editor-in-Chief. General Instructions 1. Submission of manuscripts for publication: Papers must be presented in final page format (not more than 20 pages, A4 size), along with a compact disk (CD) containing the contribution executed on a PC using MS Word or any updated version of it. Manuscripts should be typed using Times New Roman, 12 points font, and one and half space. Pages are to be numbered consecutively and are to include all illustrative material, such as tables and figures, in their appropriate places in the text. If the author does not follow these guidelines, the paper is likely to be rejected or delayed. 2. Abstracts: Manuscripts for articles, review articles, and brief articles require both Arabic and English abstracts, using not more than 200 words.. 3. Keywords: Each article must have keywords before both abstracts (English and Arabic) and they should not exceed 10 words. 4. Tables and other illustrations: Tables, figures, charts, graphs and plates should be planned to fit the Journal’s page size (A4 incl. running heads). Line drawings are to be presented on high quality tracing paper using black India ink. Copies are not permitted for use as originals. Line quality is required to be uniform, distinct, and in proportion to the illustration. Photographs may be submitted on glossy print paper, in either black and white, or color, or made by using Adobe Photoshop. Tables and other illustrative material must include headings or titles, and captions for figures. 5. Abbreviations: The names of periodicals should be abbreviated in accordance with The World List of Scientific Periodicals. e.g., et al., J. of Food Sci. For weights and measurements, and where appropriate, abbreviations rather than words are to be used, e.g., cm, mm, m, km, cc, ml, g, kg, min, %, etc., Fig. Latin abbreviations such as: op. cit., loc. cit., ibid., are to be in italic (if they are used). 6.References: References are mentioned numerically [between brackets] in the text and a list of references are provided at the end of the manuscript as follows: a- Journals: [number] followed by the last name of the author (authors), First name or abbreviation, ”paper title” , journal title , volume and issue numbers, (the year of publications between parentheses) , and page numbers. Example: Sawyer, D. A. “Pounding of Rainwater on Flexible Roof Systems,” Proceedings ASCE, Journal of the Structural Division , Vol. 93, No. 1, (1967), pp.127-147. b- Books: Book references must include author, book title , the publisher’s location, and publisher, and the year of publication. Example: Feld, J., and Carper, K., Construction failure , 2 nd Ed., New York, Wiley, 1997. 7. Content Note or Footnote: A content note or footnote is a note from the author to the reader providing clarifying information. A content note is indicated in the text by using a half-space superscript number (e.g. … books 3 are …). Content notes are to be sequentially numbered throughout the text. A reference may be cited in a content note by the use of the standard (Author, Date) style in the same way they are used in the text. Content notes are to be presented below a solid half-line separating them from the text of the page in which the footnote is mentioned (in single column). Use the same half-space superscript number assigned in the content note(s) in the text to precede the content note itself. 8. Proofs: No changes, additions or deletions will be allowed in the pageproof stage. 9. Opinions: Manuscripts submitted to the Journal for publication contain the author’s conclusions and opinions and, if published, do not constitute a conclusion or opinion of the Editorial Board. 10. Offprints: Two copies of the journal and twenty reprints of the accepted papers will be sent to the authors. 11. Correspondence: All correspondence may be addressed to: E-mail: [email protected] 12. Frequency: …Two issues per year……. Subscription and Exchange: E-mail: [email protected]

Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Guidelines for Authors This periodical is a publication of the Academic Publishing and Translation Directorate of Qassim University. Its purpose is to provide an opportunity for scholars to publish their original research.

Manuscripts will be published in on of the following platforms: i) Article: It should be original and has a significant contribution to the field in which the research was conducted. ii) Review Article: A critical synthesis of the current literature in a particular field, or a synthesis of the literature in a particular

field during an explicit period of time. iii) Brief Article (Technical Notes): A short article (note) having the same characteristics as an article. iv) Innovation and Invention Reports v) Forum: Letters to the Editor, comments and responses, preliminary results or findings, and miscellany. vi) Book Reviews The Editorial Board will consider manuscripts in the following fields:

• Electrical Engineering • Civil Engineering • Mechanical Engineering • Chemical Engineering • Computer Engineering

• Mining and Petroleum Engineering • Computer Science • Information Technology • Information Systems • Basic Engineering and Computer Sciences

A manuscript should be submitted in English, and, if accepted for publication, it should not be published elsewhere without the written permission of the Editor-in-Chief.

General Instructions

1. Submission of manuscripts for publication: Papers must be presented in final page format (not more than 20 pages, A4 size), along with a compact disk (CD) containing the contribution executed on a PC using MS Word or any updated version of it. Manuscripts should be typed using Times New Roman, 12 points font, and one and half space. Pages are to be numbered consecutively and are to include all illustrative material, such as tables and figures, in their appropriate places in the text. If the author does not follow these guidelines, the paper is likely to be rejected or delayed. 2. Abstracts: Manuscripts for articles, review articles, and brief articles require both Arabic and English abstracts, using not more than 200 words.. 3. Keywords: Each article must have keywords before both abstracts (English and Arabic) and they should not exceed 10 words. 4. Tables and other illustrations: Tables, figures, charts, graphs and plates should be planned to fit the Journal’s page size (A4 incl. running heads). Line drawings are to be presented on high quality tracing paper using black India ink. Copies are not permitted for use as originals. Line quality is required to be uniform, distinct, and in proportion to the illustration. Photographs may be submitted on glossy print paper, in either black and white, or color, or made by using Adobe Photoshop. Tables and other illustrative material must include headings or titles, and captions for figures.

5. Abbreviations: The names of periodicals should be abbreviated in accordance with The World List of Scientific Periodicals. e.g., et al., J. of Food Sci. For weights and measurements, and where appropriate, abbreviations rather than words are to be used, e.g., cm, mm, m, km, cc, ml, g, kg, min, %, etc., Fig. Latin abbreviations such as: op. cit., loc. cit., ibid., are to be in italic (if they are used). 6.References: References are mentioned numerically [between brackets] in the text and a list of references are provided at the end of the manuscript as follows: a- Journals: [number] followed by the last name of the author (authors), First name or abbreviation, ”paper title” , journal title , volume and issue numbers, (the year of publications between parentheses) , and page numbers. Example: Sawyer, D. A. “Pounding of Rainwater on Flexible Roof Systems,” Proceedings ASCE, Journal of the Structural Division, Vol. 93, No. 1, (1967), pp.127-147. b- Books: Book references must include author, book title, the publisher’s location, and publisher, and the year of publication. Example: Feld, J., and Carper, K., Construction failure, 2nd Ed., New York, Wiley, 1997. 7. Content Note or Footnote: A content note or footnote is a note from the author to the reader providing clarifying information. A content note is indicated in the text by using a half-space superscript number (e.g. … books3 are …). Content notes are to be sequentially numbered throughout the text. A reference may be cited in a content note by the use of the standard (Author, Date) style in the same way they are used in the text. Content notes are to be presented below a solid half-line separating them from the text of the page in which the footnote is mentioned (in single column). Use the same half-space superscript number assigned in the content note(s) in the text to precede the content note itself. 8. Proofs: No changes, additions or deletions will be allowed in the pageproof stage. 9. Opinions: Manuscripts submitted to the Journal for publication contain the author’s conclusions and opinions and, if published, do not constitute a conclusion or opinion of the Editorial Board. 10. Offprints: Two copies of the journal and twenty reprints of the accepted papers will be sent to the authors. 11. Correspondence: All correspondence may be addressed to:

E-mail: [email protected] 12. Frequency: …Two issues per year…….

Subscription and Exchange: E-mail: [email protected]

Page 2: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

In The Name of ALLAH,

Most Gracious, Most Merciful

Page 3: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1

(January 2008/Muharram 1429H.)

II

Page 4: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences

Qassim University, Vol. 9, No. 1, PP 1-83 for English (January 2016/Rabi I 1437H.)

Qassim University Scientific Publications

(Refereed Journal)

Volume (9) – NO.(1)

Journal of

Engineering and Computer Sciences

January 2016 – Rabi I 1437H

Scientific Publications & Translation

Page 5: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1

(January 2008/Muharram 1429H.)

IV

Deposit: 1429/2023

EDITORIAL BOARD Prof. Mohamed A Abdel-halim (Editor in-Chief)

Prof. Mohammed Abdel-aziz Irfan

Prof. Salem Dhaou Nasri

Dr. Ahmad Ali Al-Hajji

Dr. Ashraf Saied Abdelkhalek Nasr

Dr. Sherif M. ElKholy (Editorial Secretary)

Advisory Committee: Civil Engineering: Prof. Mahmoud Abu-Zeid, Egyptian Ex-Minister of Water Resources and Irrigation, President of the World Water Council, Professor of Water Resources, National Water Research Center, Egypt. Prof. Essam Sharaf, Professor of Transportation Engineering, Faculty of Engineering, Cairo University.

Prof. Abdullah Al-Mhaidib, Vice President for Research and higher studies, Professor of Geotechnical Engineering, College of Engineering, King Saud University, KSA.

Prof. Keven Lansey, Professor of Hydrology and Water Resources, College of Engineering, University of Arizona, Tucson, Arizona, USA.

Prof. Fathallah Elnahaas, Professor of Geotechnical/ Structure Engineering, Faculty of Engineering, Ein Shams University, Egypt. Prof. Faisal Fouad Wafa, Professor of Civil Engineering, Editor in-chief, Journal of Engineering Sciences, King Abdul-Aziz University, KSA Prof. Tarek AlMusalam, Professor of Structural Engineering, College of Engineering, King Saud University, KSA.

Electrical Engineering : Prof. Farouk Ismael, President of Al-ahram Canadian University, Chairman of the Egyptian Parliament Committee for Education and Scientific Research, Professor of Electrical Machines, Faculty of Engineering Cairo University, Egypt. Prof. Houssain Anees, Professor of High Voltage, Faculty of Engineering, Cairo University.

Prof. Metwally El-sharkawy, Professor of Electrical Power Systems, Faculty of Engineering, Ein Shams University, Egypt.

Prof. Mohamed A. Badr, Dean of Engineering College, Future University, Professor of Electrical Machines, Faculty of Engineering, Ein Shams University, Egypt.

Prof. Ali Rushdi, Professor of Electrical and Computer Engineering, College of Engineering, King Abdul-Aziz University, KSA. Prof. Abdul-rahman Alarainy, Professor of High Voltage, College of Engineering, King Saud University, KSA. Prof. Sami Tabane, Professor of Communications, National School of Communications, Tunisia.

Mechanical Engineering: Prof. Mohammed Alghatam, President of Bahrain Center for Research and Studies . Prof. Adel Khalil, Vice Dean, Professor of Mechanical Power, Faculty of Engineering, Cairo University, Egypt. Prof. Said Migahid, Professor of Production Engineering, Faculty of Engineering, Cairo University, Egypt.

Prof. Abdul-malek Aljinaidi, Professor of Mechanical Engineering, Dean of Research and Consultation Institute, King Abdul-Aziz University, KSA

Computers and Information: Prof. Ahmad Sharf-Eldin, Professor of Information Systems, College of Computers and Information Systems, Helwan University, Egypt.

Prof. Abdallah Shoshan, Professor of Computer Engineering,, College of Computer, Qassim University, Advisor for Saudi Minister of Higher Education, KSA . Prof. Maamar Bettayeb, Professor of Computer Engineering, AlSharkah University, UAE. Prof. Farouk Kamoun, Professor of Networking Engineering, Tunis University, Tunisia.

Qassim University, College of Engineering, P.O. Box: 6677 Buraidah 51431

[email protected]

Page 6: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences

Qassim University, Vol. 9, No. 1, PP 1-83 for English (January 2016/Rabi I 1437H.)

Contents Page

Effect of Silica Fume and Granulated Blast Furnace Slag on the Durability of

Partially-Damaged Concrete

Walid A. Al-Kutti and Nabil M. Al-Akhras .................................................... 1

Theoretical Determination of The Effective Parameters Into the Carbon Nanotube

Networks Behaviour

A. Nasr .............................................................................................................. 19

Medical Image Security Using a Novel Steganography Technique

Mohamed Tahar Ben Othman ....................................................................... 39

Pedagogical Derivation of All Irredundant Dependency Sets for Relational

Databases

Ali Muhammad Ali Rushdi and Omar Mohammed Ba-Rukab .................. 59

V

Page 7: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1

(January 2008/Muharram 1429H.)

VI

Page 8: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences

Qassim University, Vol. 9, No. 1, pp. 1-18 (January 2016/Rabi' I 1437H)

1

Effect of Silica Fume and Granulated Blast Furnace Slag on the Durability

of Partially-Damaged Concrete

Walid A. Al-Kutti1 and Nabil M. Al-Akhras2

1Department of Construction Engineering, College of Engineering, University of Dammam, Kingdom of

Saudi Arabia

(P.O. Box 1982 - Dammam 31441, Kingdom of Saudi Arabia)

[email protected]

(Received, 13/05/2015 Accepted 27/11/2015)

ABSTRACT. This study investigates the effect of silica fume (SF) and ground granulated blast furnace

slag (GGBFS) on the durability properties of concrete subjected to compressive damage. Portland cement was replaced by 10% SF and 60% of GGBFS as a replacement of Portland cement. Thirty-six concrete

cylinders (100 x 200 mm) were subjected to three compressive preloading levels (50%, 75%, and 90% of

the ultimate strength capacity). After 28 days of curing, the concrete specimens were experimentally tested for electrical resistivity, rapid chloride penetration (RCPT) and the chloride migration. The

experimental results showed that the SF increases the compressive strength of concrete by 50% of control

concrete. Besides, the GGBFS improves the durability of concrete with the highest electrical resistivity about 4 and 1.85 times the OPC and SF concrete results, respectively. The chloride permeability in

GGBFS was found to be about 78% and 65% less than OPC and SF concrete, respectively. The chloride

migration coefficient increases in the control samples subjected to 90% compressive damage. However, the replacement of Portland cement with SF and GGBFS improved the concrete durability when

subjected to compressive damage up to 90% of the compressive strength.

Keywords: Electrical Resistivity, Durability; Concrete; Chloride Diffusion; Compressive stress.

Page 9: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 2

1. Introduction

The Arabian Gulf region has an aggressive environmental condition where the

fluctuation of temperature per day is about 20o C and reaching about 45

oC. The salty

environmental condition is enhancing the transport of chlorides and hence extends

the deterioration of reinforced concrete structures due to the corrosion of the

reinforcement steel. Several experimental studies were conducted in the last three

decades to investigate the effect of concrete mix ingredients on the durability of

reinforced concrete and several recommendations were suggested to improve the

quality of concrete. These efforts were reflected as guidelines and specifications

which assure a production of quality concrete. The quality of aggregate in this

region is marginal limestone aggregate and has high water absorption up to 2.6%

which affect the mechanical and durability properties of concrete as reported by

Al-Amoudi et al. [1] and Shamsad et al. [2].

To improve the durability properties of concrete, mineral admixtures such as

silica fume (SF) and Ground Granulated Blast Furnace Slag (GGBFS) were

recommended in such aggressive salt environment to increase the maintenance-free

service life of concrete structure and to achieve sustainability in concrete industry .

Several researchers studied the effect of mineral admixtures on the mechanical and

the durability properties of concrete. In the following sections literature review on

the effect of SF and GGBFS on the properties of concrete will be presented.

1.1 Effect of SF and GGBFS on Compressive Strength of Concrete

Ground Granulated Blast Furnace Slag (GGBFS) is one of wildly used

mineral admixtures which is a waste product of steel industry. GGBFS contains up

to 35% of SiO2 and about 40% of CaO with a marginal higher fineness index

compared to Portland cement. Although, several experimental investigations were

conducted on the mechanical and the durability properties of the replacement of

Portland cement using deferent levels of GGBFS, the results showed different

conclusions on the performance of GGBFS in the development of compressive

strength after 28 days of curing when compared to ordinary Portland concrete OPC.

How-Ji et al. [4] conducted comparative experimental study between OPC and

GGBFS concrete; they reported that the strength development in GGBFS is at low

rate at early age up to 28 days of curing when compared to OPC. Same conclusions

were reported by (Qingtao et al. [5], Bilim et al. [6], Otieno et al. [7] and Min-Hong

Zhang et al. [8]). However, others such as Luc and Frederic [9] reported that the

replacement of Portland cement with 35% of GGBFS increases the 28 days

compressive strength about 9% more than the OPC concrete. This could be

explained due to low pozzolanic reactivity and the fineness index.

In recent study, Teng et al. [10] conducted experimental investigation on the

durability and mechanical properties of ultra-fine ground granulated blast-furnace

slag UFGGBFS – with fineness index approximately twice of that of GGBFS- and

Page 10: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Effect of Silica Fume and Granulated Blast Furnace Slag … 3

reported that the addition of UFGGBS to concrete tends to increase the early

compressive strength up to 23% after 3 days of curing compared to normal concrete.

The replacement of Portland cement with 5-10% of silica fume significantly

increases the early compressive strength of concrete as reported by (Erhan et al. [11],

Rafat [12] and Bhanjaa and Sengupta [13] ) in which silica fume has more than 50 times

fineness index and has a an active pozzolanic activity and cement hydration rate

compared to Portland cement.

1.2 Effect of SF and GGBFS on Durability Properties of Concrete

Several experimental research was conducted to evaluate the performance of

SF and GGBFS on the durability of concrete. How-Ji et al. [4] conducted

comparative experimental study between OPC and GGBFS concrete; they reported

that a significant reduction in the total porosity was reported for GGBFS concrete

compared to OPC which leads to a denser microstructure and improvement in the

transport properties in GGBFS concrete. Dellinghausen et al. [14] investigated the

influence of content of Ground Granulated Blast Furnace Slag and curing time on

shrinkage and durability of concrete. Three levels of water to binder ration w/b

(0.30, 0.42 and 0.55) and three levels of GGBFS (0%, 50% and 70%) were used in

the study. The study reported that the 70% partial replacement of GGBFS reduced

the total shrinkage and the chloride penetration by 35% and 47% after 7 days curing,

respectively.

Obada et al. [15] investigated the contribution of GGBFS and SF on

corrosion resistance in concrete. 500 x 500 mm reinforced concrete slabs with

several levels of replacement of Portland cement with GGBFS was ponded with

3% NaCl for two years. Obada et al. [15] reported that the additional of GGBFS

increased the concrete resistance to corrosion. The corrosion current rate was found

to be 0.1 μA/cm2 in OPC concrete after 2 years compared to 0.04 and 0.032 μA/cm

2

in SF and GGBFS concrete, respectively.

In recent review, Yong Zhang and Mingzhong Zhang [16] reported that the SF

reacts with calcium hydroxide and improves the pore distribution of the interfacial

transition zone. Sobhani and Najimi [17] investigated the correlation between the

corrosion rate and the compressive strength, rapid chloride permeability test RCPT and

water permeability of concrete containing silica fume and reported that the additional of

silica fume improves the transport properties of concrete. Xianming et al. [18] studied

the effect of silica fume and blast furnace slag on the porosity and the chloride binding

capacity of the concrete, they reported that the replacement of Portland cement by 50%

of GGBFS increases the chloride binding capacity while the addition of 10% SF reduced

it. Same results reported by Luo et al. [19].

Although the laboratory experimental studies proved the superiority of the

replacement of Portland cement by SF or GGBFS on the durability properties of

concrete, there is a need to evaluate the performance of such mineral admixtures on

Page 11: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 4

concrete subjected to actual loads which represents the actual state of concrete

structures. In recent study, Rahman et al. [20] conducted an investigation on the

chloride migration in normal concrete subjected to different levels of compressive

damage. The chloride diffusion coefficients were determined according to chloride

migration test (NT-Build 492) [23]. From this study it was noted that the chloride

diffusion in concrete samples was significantly increased with the increase of

compressive induced damage up to 75% of the compressive strength of concrete.

This paper aims to investigate the effect of Silica Fume (SF) and Ground

Granulated Blast Furnace Slag (GGBFS) on the durability properties of concrete

subjected to four levels of compressive loads. Concrete cylinders with SF and GGBFS

were subjected to different compressive preloading levels and different durability tests

including Electrical Resistivity according to AASHTO TP 95-11 [21], Rapid Chloride

Permeability Test (RCPT) according to ASTM C 1202 [22] and the Chloride

Migration Test (NT-Build 492) [23] were conducted. The durability of partially

damage SF and GGBFS concrete was evaluated.

2. Experimental Program

2.1 Concrete Mix Design

Three concrete mixes were casted and used in this study. Ordinary Portland cement

(OPC), 10% Silica Fume concrete (SF) and 60% Ground Granulated Blast furnace

Slag concrete (GGBFS). Type I cement and a fixed water to cement ratio of 0.4

were used in the mix design. Sixty percent of coarse aggregate to total aggregate

was used in the mix design using Riyadh Road type coarse aggregate. Table 1 shows

the details of the mix design and Table 2 shows the physical properties and the

chemical analysis of the Type I cement, SF and GGBFS.

Table (1). Concrete mixes ingredients

Concret

e Type

Cement +

Mineral

Admixture

Content

(kg/m3)

w/c Superplasticizer

(kg/m3)

Aggregate

(kg/m3)

Tests

(After 28 days of

Curing)

OPC 370

0.40

4.7

( DARACEM

255)

1865

1-Compressive Strength

2-Chloride Permeability

3-Chloride Migration

4- Electrical Resistivity

SF (333 + 37)

10% SF

GGBFS

(148+222)

60%

GGBFS

Page 12: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Effect of Silica Fume and Granulated Blast Furnace Slag … 5

Table (2). Physical properties and chemical analysis of materials

Components OPC SF GGBFS

Chemical Analysis

SiO2 % 20.78 94.6 32.35

Al2O3 % 5.28 0.28 13.5

Fe2O3 % 3.27 0.36 0.50

CaO % 64.1 0.45 42.99

MgO % 1.86 0.30 5.08

SO3 % 2.58 0.05 0.04

Physical Properties

Specific gravity 3.1 2.22 2.91

Fineness (m2/kg) 337 19200 419

Moisture % 0.1 0.17 0.13

2.2 Specimens Preparation

To evaluate the effect of applied compressive loads on the durability

properties of the SF and GGBFS concrete, thirty six concrete cylinders (100 x 200

mm) were used in this study for the three types of concrete mixes (OPC, SF and

GGBFS) and three levels of preloading damage (50%, 75% and 90%). After 28 days

of curing, the concrete cylinders where subjected to three levels of damage: 50%,

75% and 90% of compressive strength. Figure 1 shows the concrete cylinders in the

curing tanks. The control and the damaged samples were subjected to three

durability tests as discussed in the following section.

2.3 Experimental tests

To achieve the objectives of the study, different tests were conducted after 28

days of curing as follows:-

Compressive strength

To create compressive damage, the concrete cylinders were preloaded in

three levels of (50%, 75% and 90%) of ultimate compressive strength according to

ASTM C39 after 28 days curing period.

Page 13: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 6

Fig. (1). Concrete samples in the curing tanks

Electrical resistivity

The electrical resistivity (in kΩ.cm) was measured as shown in Figure 2. The

control and damaged concrete cylinders were tested according to AASHTO TP 95-

11.Table 3 was used to correlate the electrical resistivity and the chloride

permeability according to AASHTO TP 95-11.

Fig. (2). Electrical resistivity test.

Page 14: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Effect of Silica Fume and Granulated Blast Furnace Slag … 7

Table (3). Correlation between electrical resistivity and chloride permeability

Chloride Permeability Resistivity Test kΩ.cm

High > 12

Moderate 12 – 21

Low 21 – 37

Very low 37 – 254

Negligible < 254

Rapid Chloride Penetration Test

The rapid chloride permeability test was conducted according to ASTM

C1202. In this test, a disk of 50 mm thick and 100 mm diameter was used to

evaluate the durability of concrete by measuring the charge passed after 6 hours

according to ASTM C 1202. The test cell contains reservoir of 3% NaCl called

upstream cathode and 0.3% NaOH called downstream anode and 60 V electrical

voltage was applied to accelerate the movement of chloride ions from the upstream

cathode to the downstream anode. Figure 3 shows the RCPT cells. Thereafter, the

durability of concrete was evaluated using Table 4 in which a correlation between

the charge passed after 6 hours in Coulombs and the chloride ion permeability was

used as index of the durability of concrete.

Table (4). Chloride ion permeability based on charge passed

Charge in Coulombs Chloride Ion Permeability

>4000 High

4000 – 2000 Moderate

2000 – 1000 Low

1000 – 100 Very Low

<100 Negligible

Page 15: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 8

Fig. (3). Rapid chloride permeability test cells

Chloride Migration Coefficient

The chloride migration coefficient of concrete was determined according to

NT-BUILD 492 [23]. The test cell contains two containers filled with 10% NaC1

and the 0.3 M NaOH and a 50 mm concrete disk was placed between them. The cell

was supplied by power depends on the initial readings of the current as per described

in NT-VUILD 492 for 24 h. Thereafter, the disk spill using compression and silver

nitrate solution AgNO3 sprayed on the samples and the chloride penetration depth is

measured. Figure 4 shows the concrete disks after the spraying the AgNO3 solution.

The non-steady-state migration coefficient Dnssm (10-12

m2/s) was then calculated

based on the following equation and according to NT-BUILD 492 [23]:

Where, U is applied voltage in Volt; T temperature in the NaOH solution

container in Co; L is the thickness of the specimen, (50mm); xd: the penetration

depths in mm and t is the test duration in hour.

Page 16: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Effect of Silica Fume and Granulated Blast Furnace Slag … 9

Fig.(4). Concrete samples treated with silver nitrate

3. Results and Discussions

3.1 Compressive Strength of Concrete

Figure 5 shows the effect of SF and GGBFS on the compressive strength of

concrete. The figure shows that the compressive strength of SF is 43 MPa while it is

30 and 26 MPa for OPC and GGBFS, respectively. This indicates that the addition

of SF increased the compressive strength of concrete compared to OPC, while the

inclusion of GGBFS decreased the compressive strength due to its low rate of

pozzolanic reactivity and lower cement hydration rate compared to SF concrete.

Fig. (5). Compressive strength for OPC, SF, and GGBFS concrete

Page 17: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 10

3.2 Electrical Resistivity of Concrete

Figure 6 presents the effect of SF and GGBFS on the electrical resistivity of

concrete. The electrical resistivity of GGBFS was 42.3 kΩ.cm, while it was 18.2 and

9.9 kΩ.cm for SF and OPC respectively. From Table 3 and Figure 6, the OPC

concrete was classified with high chloride permeability state while the SF concrete

found to be moderate permeability state and the best performance was found for the

GGBFS concrete where it has very low chloride permeability due to reduction in the

pore connectivity as reported by Hooton [27].

3.3 Rapid Chloride Permeability of Concrete

Figure 7 shows the influence of SF and GGBFS on chloride penetration of

concrete. The charge passed in the OPC was 4639 coulomb, while it was 2936 and

1037 coulomb for SF and GGBFS concretes, respectively. The correlation between

the charge passed and the chloride permeability was classified for the three types of

Fig. (6). Electrical resistivity for OPC, SF and GGBFS concrete

Fig. (7). Rapid chloride permeability of OPC, SF and GGBFS concrete

Page 18: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Effect of Silica Fume and Granulated Blast Furnace Slag … 11

concrete as shown in Table 4. The OPC concrete was classified as high

chloride permeability compared to moderate permeability for SF concrete and low

chloride permeability for GGBFS concrete. The GGBFS and SF improved the micro

structure of concrete and enhance the pored distribution in concrete and decreased

the porosity as reported by Turkmen [24].

3.4 Chloride Migration Coefficient of Concrete

Figure 8 shows the effect SF and GGBFS on the chloride migration

coefficient of concrete. The migration coefficient of OPC was 17.20x10-12

m2/s,

while it was 12.2 and 6.2x10-12

m2/s for SF and GGBFS concrete. This indicates that

the Dnssm for OPC is about 3 times that of GGBFS concrete, and about 1.5 times that

of SF concrete. This indicates the advantages of using GGBFS and SF as

replacement of Portland cement to enhance the durability properties of concrete.

While the superior performance of SF could be explained by its reaction with

Ca(OH)2 that form secondary silicate hydrates production which improves the micro

structure of the concrete and reduces the pore structure as its fineness index more

than 60 times of the OPC, the GGBFS effect was in raising the chloride binding

capacity as results of its large amount of Al2O3 content (Obada et al. [15] and

Ytterdal [25]).

Fig. (8). Chloride migration coefficient in OPC, SF, and GGBFS concrete

3.5 Compressive Damage Level

Figure 9 presents the effect of compressive damage level on the rapid

chloride permeability of concrete. For OPC concrete, up to 50% compressive

damage level there was no change in the chloride permeability, while the charge

Page 19: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 12

passed increased from 4500 Coulombs for control mix to 5330 and 5660 Coulombs

for OPC concrete subjected to 75% and 90% compressive damage which is about

1.25 times the undamaged specimens. This indicates a significant effect of

compressive damage on the chloride permeability for OPC concrete subjected to

compressive load higher than 75% of its ultimate strength. Besides, the additions of

SF and GGBFS in concrete reduced the effect of compressive damage by enhancing

the chloride permeability in concrete as shown in Fig. 9.

Fig. (9). Effect of compressive damage on RCPT of concrete

Figure 10 shows the influence of compressive damage level on the chloride

migration coefficient of concrete (Dnssm). It can be observed that for OPC, the

chloride migration coefficient increased from 17.2 x 10-12

m2/s for undamaged

concrete up to 20.7 x 10-12

m2/s and 24.2 x 10

-12 m

2/s for 75% and 90% damaged

concrete, respectively. This indicates a significant increase (of 40%) in the chloride

migration in the 90% damaged OPC concrete compared to undamaged concrete.

Besides, the SF concrete improved the resistance of migration of chloride in

concrete subjected to compressive induced damage up to 90% damaged concrete.

The replacement of Portland cement with GGBFS improved significantly the

durability of concrete as shown in Fig. 10 and similar conclusion was reported by

Gjørv [26]. Although, the compressive-induced damage up to 90% of the

compressive strength increased the chloride migration coefficient up to 2 times of

the undamaged concrete, The Dnssm in 90% damaged GGBFS concrete was less than

the undamaged OPC concrete.

0

1000

2000

3000

4000

5000

6000

7000

0% 50% 75% 90%

Ch

arg

e P

assed

(C

ou

lom

b)

Applied Compressive Damage Level as Percentage of Concrete

Strngth, fc

OPC SF GGBFS

Page 20: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Effect of Silica Fume and Granulated Blast Furnace Slag … 13

Fig. (10). Effect of compressive damage on chloride migration coefficient

4. Conclusions

The durability of OPC, SF and GGBFS concrete was evaluated using three different

concrete durability tests. The following conclusions could be mentioned:

1. The SF increases the compressive strength of concrete by about 50% of

OPC concrete after 28 days of curing.

2. The GGBFS concrete has the highest electrical resistivity with about

43 (KΩ.cm) compared to 18.2 KΩ.cm and 9.8 KΩ.cm for SF and OPC concrete

which indicates that high, moderate and very low chloride penetration for OPC, SF

and GGBFS concrete respectively.

3. The GGBFS concrete has the lowest rapid chloride penetration with about

1037 columns compared with 2936 and 4639 for SF and OPC concrete indicated

high, moderate and low chloride penetration for OPC, SF and GGBFS concrete.

4. The chloride migration coefficient in undamaged samples was found to be

17.2x10-12

m2/s for OPC concrete compared with 12.2x10

-12 m

2/s and 6.2x10

-12 m

2/s

for SF and GGBFS concrete. This indicates that the replacement of Silica Fume and

the GGBFS as a percentage of Portland cement leads to decrease in the chloride

migration coefficient in SF and GGBFS concrete by 75% and 33 %, respectively.

5. A significant increase in the chloride migration coefficient was found in

OPC samples subjected to compressive damage up to 90% of its compressive

strength. However, the replacement of Portland cement with SF and GGBFS leads to

improvement of the concrete durability even when subjected to compressive damage

up to 90% of its compressive strength. Therefore, it is recommended to use GGBFS

in concrete structures subjected aggressive environmental conditions such as the

Arabian Gulf region.

Page 21: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 14

5. Acknowledgement

The authors acknowledge the support received from the Deanship of Scientific

Research at University of Dammam under the research project No. 2013211.

6. References

[1] Al-Amoudi, O.S.B., Al-Kutti W A., Ahmad S., and Maslehuddin M.,

“Correlation between Strength and Certain Durability Indices of Plain and

Blended Cement Concretes", Cement and Concrete Composites, Vol. (31),

No. 9, (2009), pp. 672-676.

[2] Shamsad, Ahmad, Al-Kutti, W.A., Al-Amoudi, O.S.B., and Maslehuddin, M.,

“Compliance Criteria for Quality Concrete,” Construction and Building

Materials, Vol. (22), No. 6, (2008), pp. 1029-1039.

[3] Dinakar, P., Reddy, M.K., and Sharma, M.,” Behaviour of Self-Compacting

Concrete using Portland Pozzolana Cement with Different Levels of Fly Ash”,

Materials and Design, Vol. (46), (2013), pp. 609-616.

[4] How-Ji C., Shao-Siang H., Chao-Wei T., Malek M. A., and Lee-Woen E., " Effect

of Curing Environments on Strength, Porosity and Chloride Ingress Resistance

of Blast Furnace Slag Cement Concretes: A Construction Site Study",

Construction and Building Materials, Vol. (35), (2012), pp. 1063–1070.

[5] Qingtao L. , Zhuguo L., and Guanglin Y., "Effects of Elevated Temperatures on

Properties of Concrete Containing Ground Granulated Blast Furnace Slag as

Cementitious Material", Construction and Building Materials, Vol. (35), (2012),

pp. 687-692.

[6] Bilim C, Atis C., Tanyildizi H., and Karahan O., ''Predicting The Compressive

Strength of Ground Granulated Blast Furnace Slag Concrete using Artificial

Neural Network", Advanced Engineering Software, Vol. (40), (2009),

pp. 334–340.

[7] Otieno M., Hans B., and Mark A., “Effect of Chemical Composition of Slag on

Chloride Penetration Resistance of Concrete”, Cement and Concrete

Composites, Vol. (46), (2014), pp. 56-64.

[8] Min-Hong Z., Jahidul I., and Sulapha P. , “ Use Of Nano-Silica to Increase Early

Strength and Reduce Setting Time of Concretes with High Volumes of Slag”,

Cement and Concrete Composites, Vol. (34), (2012), pp. 650-662.

[9] Luc C. and Frédéric M.,” Limestone Fillers Cement Based Composites: Effects of

Blast Furnace Slags on Fresh and Hardened Properties”, Construction and

Building Materials, Vol. (51), (2014), pp. 439-445.

[10] Teng S., Lim T. Y., and Divsholi B.S.,” Durability and Mechanical Properties

of High Strength Concrete Incorporating Ultra-Fine Ground Granulated

Page 22: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Effect of Silica Fume and Granulated Blast Furnace Slag … 15

Blast-Furnace Slag”, Construction and Building Materials, Vol. (40), (2013),

pp. 875-881.

[11] Erhan G., Mehmet G., Seda K., and Kasım M.," Strength, Permeability and

Shrinkage Cracking of Silica Fume and Metakaolin Concretes", Construction

and Building Materials, Vol. (34), (2012), pp. 120–130.

[12] Bhanjaa S. and Sengupta B.," Influence of Silica Fume on The Tensile Strength

of Concrete", Cement and Concrete Research, Vol. (35), (2005), pp. 743 – 747.

[13] Rafat S.," Utilization of Silica Fume in Concrete: Review of Hardened

Properties", Resources, Conservation and Recycling, Vol. (55), (2011),

pp. 923–932.

[14] Dellinghausen, L.M., Gastaldini, A.L.G., Vanzin, F.J., and Veiga, K.K.” Total

Shrinkage, Oxygen Permeability, and Chloride Ion Penetration in Concrete

Made with White Portland Cement and Blast-Furnace Slag”, Construction

and Building Materials, Vol. (37), (2012), pp. 652-659.

[15] Obada K., Khan M.S.H., and Sharuddin Ahmed, ”The Role of Hydrotalcite in

Chloride Binding and Corrosion Protection in Concrete with Ground

Granulated Blast Furnace Slag” Cement and Concrete Composites, Vol. (34),

(2012), pp.936-945.

[16] Yong Z. and Mingzhong Z.,” Transport Properties in Unsaturated Cement-

Based Materials – A Review”, Construction and Building Materials,

Vol. (72), (2014), pp. 367-379.

[17] Sobhani J., and Najimi M., "Electrochemical Impedance Behavior and

Transport Properties of Silica Fume Contained Concrete", Construction and

Building Materials, Vol. (47), (2013), pp. 910–918.

[18] Xianming S., Zhengxian Y., Yajun L., and Doug C., "Strength and Corrosion

Properties of Portland Cement Mortar and Concrete with Mineral

Admixtures", Construction and Building Materials, Vol. (25), (2011),

pp. 3245–3256.

[19] Luo R, Cai Y., Wang C., and Huang X.," Study of Chloride Binding and

Diffusion in GGBS Concrete", Cement Concrete Resources, Vol. (33), No. 1,

(2003), pp. 1–7.

[20] Rahman M. K., Al-Kutti W. A., Shazali M. A., and Baluch M. H., “Simulation

of Chloride Migration in Damaged Self Compacting Concrete”, ASCE

Materials Journal, Vol. (24), No. 7, (2012), pp.658-667.

[21] AASHTO TP 95-11, Standard Method of Test for Surface Resistivity

Indication of Concrete's Ability to Resist Chloride Ion Penetration.

[22] ASTM C 1202, Standard Test Method for Electrical Indication of Concrete's

Ability to Resist Chloride Ion Penetration.

Page 23: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 16

[23] NT-Build 492, Chloride Migration Coefficient from Non-Steady-State

Migration Experiments.

[24] Turkmen I., "Influence of Different Curing Conditions on the Physical and

Mechanical Properties of Concretes with Admixtures of Silica Fume and

Blast Furnace Slag", Materials Letters, Vol. (57), (2003), pp. 4560 – 4569.

[25] Ytterdal, S., “The Effect of Fly Ash and GGBFS as Cement Replacement on

Chloride Binding and Ingress in Mortar Samples”, M.S thesis, Norwegian

University of Science and Technology, Faculty of Engineering Science and

Technology, (2014).

[26] Gjørv O. E., “Blast Furnace Slag for Durable Concrete Infrastructure in

Marine Environments”, Durability Aspects of Fly Ash and Slag in Concrete,

Workshop Proceeding Nordic, (2012), pp.67-82.

[27] Hooton R. D. ,” Thirty Five Years of Experience with Slag Cement Concrete

in Canada”, Durability Aspects of Fly Ash and Slag in Concrete, Workshop

Proceeding Nordic, (2012), pp.179-190.

Page 24: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Effect of Silica Fume and Granulated Blast Furnace Slag … 17

اخلرسانة قوة حتملأتثري رماد السيليكا وخبث أفران تصنيع احلديد على اجلزئياملعرضة للتلف

2نبيل األخرس و 1ىقطوليد ال

1 السعوديةقسم اهلندسة األساسية، كلية اهلندسة، جامعة الدمام، اململكة العربية 1

[email protected] قسم اهلندسة املدنية، كلية اهلندسة، جامعة األردن للعلوم والتكنولوجيا، اململكة األردنية اهلامشية2

( 27/11/2015قبل للنشر ، 13/05/2015)قدم للنشر

اىل اخلرسانة العادية واملعرضة ملستوايت خمتلفة هذا البحث يتناول أتثري خبث احلديد و رماد السيليكا ملخص البحث.% و 10من الضرر الناتج عن اجهادات الضغط. مت اضافة رماد السيليكا وخبث احلديد اىل اخلرسانة العادية ب )

عينة اسطوانة خرسانية لثالثة مستوايت 36 كنسب احالل عن األمسنت البورتالندي العادي . مت تعريض % (60%( من مقاومتها للضغط . مت اختبار نفاذية الكلوريدات لعينات اخلرسانة املتضررة والغري 90و %، %75، 50 (

واختبار قياس NT Build 492 متضررة وذلك ابستخدام اختبارات قياس نفاذية الكلوريدات وفقا للمواصفات القياسيةيزيد مقاومة اخلرسانة اضافة رماد السيليكا ملية انمن املعاجلة . أظهرت النتائج املع 28بعد املقاومة الكهرابئية وذلك

% عن العينات القياسية . ابإلضافة لذلك ، فقد اظهرت النتائج املعملية ابلرغم من أن اضافة خبث 50للضغط بنسبة احلديد يقلل من مقاومة اخلرسانة للضغط لكنه يزيد مقاومتها الكهرابئية مبقدار اربع مرات عن اخلرسانة العادية ومبقدار

% 78اد السيليكا. كما ان نفاذية الكلوريدات أظهرت نقصان يف خرسانة خبث احلديد بنسبة الضعف عن خرسانة رم% 90% عنها يف اخلرسانة العادية وخرسانة رماد السيليكا .كان أتثري الضرر الناتج عن الضغط بنسبة حتميل 65و

ايدة يف نفاذية الكلوريدات وذلك يف واضحا يف عينات اخلرسانة العادية، بينما مل يظهر للضرر الناتج عن الضغط أي ز العينات احملتوية على االضافات املعدنية.

Page 25: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Walid A. Al-Kutti and Nabil M. Al-Akhras 18

Page 26: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences

Qassim University, Vol. 9, No. 1, pp. 19-38 (January 2016/Rabi' I 1437H)

19

Theoretical Determination of the Effective Parameters Into the Carbon

Nanotube networks behaviour

A. Nasr1, 2

1Radiation engineering dept., NCRRT, Atomic Energy Authority, Egypt

2College of computer, Qassim University, P.O.B. 6688, Buryadah 51453, KSA

[email protected]

(Received 10/5/2015, accepted 29/11/2015)

Abstract. As a result of the high improvement rate of carbon nanotubes (CNTs) fabrication process and

its tremendous important applications in various fields, the manuscript is devoted to the study of CNTs

effective parameters for the case of nano-dimensional networks. It is also called Carbon nanotube networks (CANETs). Parameters such as density, allowable adjacent distance, phase angles and radius of

CNTs are determined. Isotropy performance as a function of these CNTs parameters is discussed. This

allows us to determine the suitable phase angles and adjacent distance between each one CNT and other in the case of random distribution. Also, the relation between the FET conductance and mobility between

the transmitter and receiver destination as a function of different CNTs parameters are theoretically

studied. From the results obtained, one can recognize that the CNTs properties play an important role for determining the CANETs behaviour. One of the effective CNTs parameters is the longitudinal length,

LCNT as it is commonly used in various CANETs figure of merit factors. According to the calculated

values of CNTs length and radius, the allowable adjacent distance that achieves high FET conductance is between 3-15nm. The phase angle between CNTs is essential for achieving the intersections, nanonodes,

in the path between the destination terminals. As a consequence of random distribution of CNTs in a

specified area, the wide range of phase angles is studied from 1.5° to 75° with two degree increments in each step. The important fact that is concluded from the results is that the ability to apply phase angle

modulation in the CANETs and its advantages to secure the data until it reaches to the terminal in shortest

data path distance. Moreover, the obtained FET mobility values (50- 150 cm2/Vs) under considered

conditions give the facility to fabricate the CNTs in nanodimensional practical phase processes.

Keywords: carbon nanotube, networks, isotropy, phase encoding, mobility, CANET, FET conductance.

Page 27: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 20

1. Introduction

Engineering characteristics of graphene carbon nanotube (CNT) encourage the

researchers to exploit them in various applications. This is due to the ability of CNT

to gather the functions of more electronic devices at the same time. It can be adapted

to work as four essential components in nanonetwork circuitry, i.e., modulator,

demodulator, tuner, and antenna as shown in modern experimental and theoretical

treatments [1- 8]. Logic applications such as inverter, NOR, and NAND gates can be

obtained by utilizing CNTs network transistors [9-12]. Optical networks on-chip

will have a good contribution for global interconnections accomplished with multi-

core processors as considered in [13].

Also, the CNT has special optical proprieties that can be utilized for

obtaining high performance nanoscale commutation networks. Moreover, CNTs’

small sizes allow them for new applications such as nano-integrated tiny devices to

go through a cell and operate in the blood stream without stirring the cell’s defensive

response. The CNTs open the way for solving the problems of emerging

applications related to human body, such as early diseases diagnosis, drug delivery

and directing and tracking of nanocapsules [14 -16]. The carbon nanotubes networks

(CANETs) witness these multiple functions. The CNTs distributions denote the

facility to carry the high data rate from one nanonode to other. Since the dimensions

of CNT is 10-9

times lower than the traditional electrical networks, bandwidth will

be increased inversely by the same factor, in THz range. The suggested CANET can

be utilized in manufacturing devices in areas such as medicine, chemistry and

physics, military, single-electron memories, and on-chip connection networks

[17-20]. The power supply of these on- chip integrated devices nanonetworks can be

saved by utilizing modified CNTs network as electrode in Li-ion batteries [21-24].

Any CANET can be specified according to the nature of the internal

distribution of CNTs. The CNTs have the first priority for nanonetwork operation in

various fields, because they enjoy unique mechanical, electric, and electromagnetic

characteristics [25]. The main CNTs mechanical characteristics include a sharp

resonance peak, high tensile strength, and elastic modules [26]. While the CNTs

main electrical and electromagnetic characteristic is the high conductance, a high

current density arises from its semiconducting and metallic properties.

Consequently, the CNTs can be utilized as a gate between the source and drain in

Field Effect Transistor (FET). The determination of short path in CANET essentially

depends on the FET conductance value and mobility, which will be covered in more

details in the following sections. Now the attention will be directed to how the CNTs

can be constructed to establish nanonetwork. In this investigation, the CNTs are

distributed randomly in the CANET. Their distribution, the phase angle, and the

total numbers are studied to clarify and select appropriate values for these nanoscale

networks. In recent research works and technologies, the CNTs networks are utilized

as a semiconductor material to establish a single FET transistor [27].

Page 28: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 21

The physical characteristics of each CNT will affect the network

performance. The path of data, from the two destinations, depends essentially on the

density, intersections, phase angle, radius and lengths of CNTs.

The main feature of the CANET is how the data transfer is controlled from

any nanonode to another one. From previous studies [28-30], the CNT properties

play an important role for this transferring process. For example, the radius, length,

and phase angle between different CNTs in a specified area will affect and control

the way of data path. Especially, the value of phase angle and amount of deviations

can be enrolled (exploited) to code and control the data flaw across the CANET. The

length and radius of each individual CNTs has noticeable impact on phase angle and

deviation. Because intersections between CNTs, which function of the considered

two factors, will be established and then more nanonodes are assigned, it is evident

to consider the figure of merits that are used to measure the probability of

transferring the data via the nanonetwork. In this paper, other factors will be utilized

such as isotropy, and FET conductance and mobility to determine the effective

parameters in the CANET performance. Isotropy measures the directionality of

CANET as a function of CNTs properties as described later. It is also more useful to

depict and allocate the allowable phase angle to transfer the data via the

nanonetwork. FET conductance between the source and drain is an important factor

for any CANET, since it specifies the behavior according to the CNTs parameters.

In other words, the data path length between the source and drain will affect the

conductance value. So, when the CNT density increases, more vertices and edges

will be established. And hence more intersections can occur if the allowed degrees

of angles between them can be achieved. The allowed degrees of angles mean that

each CNT angle in relation to other CNTs permits more intersections across the

CNT length. In this study, more attention is given to cover most of angle degrees

values with small predictable angles deviations.

Mobility is used to evaluate the momentum scattering rate and it is an essential

part to investigate the scattering process in any system. Therefore, more descriptions are

devoted to study the CANET charge carriers mobility in relation with CNTs parameters.

In this treatment, it plays an important role for the determination of FET channel

transconductance and deduced current. Then, the high-frequency behavior of the FET

can be finally calculated by the mobility value [31 -32].

We now clarify how the CANETs work to transfer, control and secure the

data between different users. The main point here is that CNTs carry out many

functions at the same time. The random distributions of CNTs determine the

network protocol between the two terminal destinations. The data routes will be

different as it across different nanonodesand also it will be carried into different

CNTs, which are represented as a channel of data. Also the phase angle and angle

deviation will change depending on the data route length and nature of CNTs

distribution. In our opinion, this wide variety of phase angle will contribute to the

data encoding and will achieve the security while decreasing the interference along

the data path. Another factor can also be involved in determining the CANET

Page 29: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 22

protocol is the conductance values between the terminals. This can be represented as

the FET conductance and mobility between source and drain. Of course, more FETs

will be represented if more nanonodes are incorporated for covering wide nano area.

As a result of CNTs random distribution in a specified area, the intersection process

and short path length between the terminals can be achieved.

In the following section, the mathematical model description and derivation of

CANET are presented. Section (3) states the numerical results and discussions of the

effective parameters into CANETs behaviour. The last section reports the important facts

and consequences about the obtained results. Also, it assigns numerical values for the

effective parameters into the proposed CANETs model representation.

2. Mathematical Model Description of CANET

In the beginning of this section, it is important to discuss the CANET distribution

and how the data path can be varied according to internal properties of CNTs. The

CNTs have a reduced size, in the scale of nanometers that contributes to more wide-

range of bandwidth (in range of THz). As a result, the network capacity and then

data rate will be increased (in range of 1014

b/s). Previously, some properties are

distinguished for CNTs [28]. Here, more detailed discussions will be devoted to

determine the effective parameters of CNTs that have a noticeable effect on the

CANET performance. The essential part for the communication media is the CNTs

network itself. The links of this network are the individual CNTs.

CNTs distributions determine the overall CANET distribution such as routes,

coding method, nanonodes numbers, source drain conductance, and mobility. Of

course, CNTs parameters such as length, diameter, and resistivity will determine the

allowable angle and angle deviation between one CNT and others, intersections,

vertices and edges. In this model, the CNTs are randomly distributed. In our

opinion, this assumption is close to small nanosacle size practical implementation

[32]. Also, the CNTs random distributions open the way to study the major

probabilities of expected data routes between the source and drain. Accordingly, the

angle increment and deviation between one CNT and others play an important role

for encoding the data. Also, the angle value determines the required CNTs adopted

parameters to achieve high conductance and accomplished mobility. In this

proposed model, the numbers, lengths and radiuses of CNTs, in a specified constant

area, are investigated.

Other two factors that have important contributions in CANET distribution

are the adjacent distance and expected distance deviation between the CNTs in the x

and y directions, v and Δv respectively. Alignment of CNTs in this nanoscale is still

very hard process, due to the difficulty to reduce the cost and to obtain the

separation of impurities in metallic naotube [12]. So, the model studies various

values of these two factors against conductance and mobility reliability.

Page 30: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 23

Let us now discus how the data path can be varied according to CNTs

properties. In fact, the shortest distance between the transmitter and receiver

depends on CNTs random distribution. In other words, if the numbers of CNTs are

adequate to compose multi intersections, the more nanonode will be found to

exchange the data between the destinations. Hence the data path will be passed

through the route which will have a minimum resistance (high conductance). Of

course, the same data can go through different routes but the high SNR and desired

encoding data, according to the required phase angle, will be picked in the

destination terminal [1].

These phase angles are constructed due to the random distribution of CNTs

into the CANET. An indication of the internal CANET distribution layout is

considered in Fig. 1. To investigate the effect of phase angle of each CNT relative to

other CNTs, the overall directionality of all CNTs will be determined. So, the

quantity that is used to specify or measure the global directionality of all CNTs is

the isotropy.

To describe of isotropic and anisotropic properties, the orientation distribution

function is usually used; see for example [33].

Fig. (1). Schematic diagram of the Carbon Nanotubes Network (CANET) with its random pass

lengths, angles and density of distribution.

The anisotropy of electromagnetic response of CNT-based polymer

composite in terahertz range is studied experimentally and theoretically in details in

[34]. There, the dispersion and alignment of multiwall CNTs (MWCNTs) in

polystyrene matrix were achieved by the forge rolling method.

Terminals in the carbon nanotube networks

Nanodes internal connections via the information passes

Page 31: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 24

The simple form of isotropy is considered in [12]. For convenience in the

proposed CANET model, the isotropy can be denoted by the following expression [28]:

𝐼(𝜃, 𝑛) = 𝑑𝑡𝑛 𝑤𝐶𝑁𝑇𝐿𝑖 ∑cos (𝜃𝑘+∆𝜃)

sin(𝜃𝑘+∆𝜃)

𝑛𝑘=1 (1)

Here, 𝑑𝑡 is the density of nanotube, n is the number of carbon nanotube in

specified area, wCNT and Li are the width and length of nanotube respectively, and

𝜃𝑘and ∆𝜃 are phase angle and angle deviations respectively. In this treatment,

various phase angles with small increment step and most probabilities of angle

deviations are covered. Adoption of two latter parameters, 𝜃𝑘 and ∆𝜃, is essential to

determine the adequate CNTs arrangements as considered before. Consequently, the

conductance and mobility will be determined, as depicted in the results and

discussion section. One can notice from equation (1) that parameters of the CNTs

control the obtained value of isotropy. Also, the effect of various CNTs parameters

such as lengths, radius, and densities into isotropy are studied.

It is important to determine the suitable path that the data will travel between

the transmitter and receiver destinations. This path is dependent mainly on the

CANET properties and distribution. Normally, the route that has small distance and

resistance will be the most suitable candidate for the data signal transmission. The

connection procedure of the nanonetwork between the two destinations can be

measured by the FET conductance. It depends on the CANET specifications and can

be given by:

𝐺𝑆𝐷 = 𝜌𝐶𝑁

𝐴∑ ∑ 𝑃𝑖𝑗 |𝑣𝑖 − 𝑣𝑗| + (

𝐿𝑖

2cos(𝜃𝑖 + ∆𝜃) +

𝐿𝑗

2cos (𝜃𝑗 + ∆𝜃))𝑛

𝑗=1,𝑗≠𝑖𝑛𝑖=1

−1 (2)

𝐺𝑆𝐷 = 𝜌𝐶𝑁

𝐴[((𝑃12|𝑣1 − 𝑣2| + (

𝐿1

2cos(𝜃1 + ∆𝜃) +

𝐿2

2cos (𝜃2 + ∆𝜃)))

+ (𝑃13|𝑣1 − 𝑣3| + (𝐿1

2cos(𝜃1 + ∆𝜃) +

𝐿3

2cos (𝜃3 + ∆𝜃))) + ⋯

+ (𝑃𝑛(𝑛−1)|𝑣𝑛 − 𝑣𝑛−1|

+ (𝐿𝑛

2cos(𝜃𝑛 + ∆𝜃) +

𝐿𝑛−1

2cos (𝜃𝑛−1 + ∆𝜃))) +. . )]

−1

𝑃𝑖𝑗 = 𝑓(𝑥, 𝑦, 𝐿𝑖 , 𝐿𝑗 , 𝜃𝑗 + ∆𝜃) (3)

Here 𝜌𝐶𝑁 is the CNT resistivity,𝑃𝑖𝑗 is probability of the carbon nanotube (i) to

intersect, connect, with another one (j) , |𝑣𝑖 − 𝑣𝑗| is the difference in distance between

vertices in x or y direction, 𝐿𝑖 and 𝐿𝑗 is the CNT length for the CNT number i and j

respectively into the specified area, A. One can notice that the FET conductance is

mainly a function of CNTs properties and distributions. Also, the 𝑃𝑖𝑗 internally is a

Page 32: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 25

function of CNTs properties. Various values of CNTs lengths, radiuses and phase

angles are discussed to obtain a high conductance. From the considered equation, there

are two parameters that influence the conductance value directly. The phase angles and

angle deviations (𝜃𝑘 and ∆𝜃), and the distance difference, |𝑣𝑖 − 𝑣𝑗|, between CNTs

and each other are functions of the random distribution, properties and numbers of

CNTs in a specified area respectively. Consequently, the CNTs intersections and

nanonodes will be constructed in the data path. The data can be transferred via

different paths and nanonodes between the two destinations. In each path, different

FET gates conductance will be included. This means that different induced current will

flow for carrying or transmitting the data in each path between the destination

terminals. The effective one is the path which has a high FET gates conductance to

carry the data between the source and drain [35- 37].

Determinations of charge-carrier mobility in semiconducting carbon

nanotubes are essential part for CANETs behavior. Charge density, impurities, and

scattering mechanisms can be assigned when studying the effects of the applied

voltage, temperature and other physical quantities on the mobility [31, 38]. Mobility

can be determined by different methods depending on the device type. i.e., the

Drude model of the mobility can be applied in the case of carbon nanotube FET

rather than Hall mobility method [32, 38]. In the intrinsic mobility model of

a nanotube, many assumptions are considered when discussing the FET mobility.

For example, there is no injection for non-equilibrium carriers from source and

drain, quantum capacitance and thermally activated carriers may be neglected.

However, the following approach allows us to probe different aspects of the CNTs

device behavior. The formula that measures the FET mobility, µ can be denoted by:

𝜇 =𝑡𝐶𝑁𝑇

20𝜖𝑤(

𝐼𝑜𝑛 − 𝐼𝑜𝑓𝑓

𝑉𝑆𝐷

) ∑ ∑ 𝐿𝑠𝑑 (𝑖, 𝑗)

𝑛

𝑗=1,𝑗≠𝑖

𝑛

𝑖=1

=𝑡𝐶𝑁𝑇

20𝜖𝑤(𝐺𝑆𝐷−𝑜𝑛 − 𝐺𝑆𝐷−𝑜𝑓𝑓) ∑ ∑ 𝐿𝑠𝑑 (𝑖, 𝑗)𝑛

𝑗=1,𝑗≠𝑖𝑛𝑖=1 (4)

where, 𝐿𝑠𝑑(𝑖, 𝑗) is the different longitudinal length paths between the FET source

and drain, gate length, 𝑡𝐶𝑁𝑇 is the CNT center location, 𝜖 is the carbon nanotube

dielectric constant, w is the FET gate width, (𝐼𝑜𝑛 − 𝐼𝑜𝑓𝑓) the gate current on-off at a

specific source drain voltage, Vsd. The last term can be represented by the difference

between the gate conductance value in “on” state and “off” state,

(𝐺𝑆𝐷−𝑜𝑛 − 𝐺𝑆𝐷−𝑜𝑓𝑓). By substituting the values of different 𝐿𝑠𝑑(𝑖, 𝑗) from equation

(2) into equation (4), the induced FET mobility values can be determined.

The main goal in the derivations of the previous mathematical model is to

distinguish the main CNTs parameters that enhance CANETs behaviour. This will

be presented in details when obtained results are described and discussed in the

following section.

Page 33: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 26

3. Results and Discussions

In the consequence of the previous mathematical model derivations, the results will

be processed. The CANETs isotropy measures the directionality of the nanonetwork.

Fig. (2). The CANET isotropy vs CNTs lengths

at different CNT radius. For CNT

numbers; N=100, initial angle; θ=

(40°), Δθ=2-200°.

Fig. (3) The CANET isotropy vs CNTs lengths at

different CNT radius. For CNT

numbers; N=100, initial angle; θ= (π/4°),

Δθ=2-200°.

Equation 1 determines the different CNTs parameters that have effects on the

isotropy behavior. Figs (2 and 3) depict the isotropy as a function of different

lengths and at various CNTs radius value

The number of CNTs and phase angle deviation between them in these two

Figs are kept constant, N=100, Δθ=2-200° respectively. Meanwhile, the initial phase

angle value between CNTs is changed from θ= 40° to π/4 (45°) respectively. From

these Figs, one can notice that the trend of isotropy is changed inversely at different

value of initial phase

angle. In Fig. 2, isotropy reached higher values at longer values of CNTs. The

higher obtained isotropy value is for wider CNTs radius, 1.5nm, and vice versa for

Fig. 3. But higher positive values of isotropy are recognized in Fig. 2 in comparison

with Fig. 3. The origin of principal difference between dependencies in Figs 2-3 is

referred to the change of the initial phase angle values from 40° to π/4. This will occur

periodically depending on the cyclic values of phase angle. From nanonetwork point

of view, it is normal to obtain various isotropy value and direction because the

intersections are distributed randomly. This distribution is dependent on each CNT

length, radius and phase angle with other CNTs. To clarify more the effect of CNTs

parameters on the isotropy behavior, Figs (4, 5 and 6) show the relation between the

isotropy and each of initial phase angle and length of CNTs. The order of various

CNTs radius is the same as in Figs (2, and 3). The difference between these three Figs

Fig. (3) The CANET isotropy vs CNTs lengths at different CNT

radius. For CNT numbers; N=100, initial angle; θ=

(π/4°), Δθ=2-200°.

Iso

tro

py

(A

)

CNTs lengths (µm)

RCNT=1.1 (r), 1.3 (b), 1.5 nm

Fig. (2). The CANET isotropy vs CNTs lengths at different

CNT radius. For CNT numbers; N=100, initial angle;

θ= (40°), Δθ=2-200°.

Iso

tro

py

(A

)

CNTs lengths (µm)

RCNT=1.1 (r), 1.3 (b), 1.5 nm

Page 34: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 27

is that the number of CNTs are varied as 10, 50, 100 CNTs respectively. In each Fig.,

the isotropy trend, as mentioned in the previous Figs (2, 3), appears periodically

according to the initial value of phase angle, θ. It is clear that at small length of CNTs,

the isotropy variations are not recognized as at higher values of CNTs length, from 4

to 18µm in Figs (4, 5) and from 13-19µm in Fig. 6.

Fig. (4). The CANET isotropy vs CNTs lengths;

LCNT, and Initial angle values; Θ, at

different CNT radius. For CNT

numbers; N=10, Δθ=2-200°.

Fig. (5). The CANET isotropy vs CNTs lengths;

LCNT, and Initial angle values; Θ, at

different CNT radius. For CNT

numbers; N=50, Δθ=2-200°.

The reason to change the CNTs length range, LCNT, in Fig. 6 to determine the

allowable range which can give a similar behavior of the isotropy in short and long

nanotube length. From the obtained results in Figs (2-6), one can notice that when

the CNTs radius increases the absolute values of isotropy also increase. The high

isotropy values are mainly function of the proper value of CNT radius at

simultaneous phase angle values between CNTs for the same CNTs length for an

assigned nanonetwork area. The high isotropy peaks values will contribute more into

the data exchange between transmitter and receiver. Also from these Figs, in

addition to the effects of previous parameters, (initial phase angle, CNTs radius), the

number of CNTs has a recognizable effect in isotropy value, as in Fig. 6. It is

predictable that when the number of CNTs is increased, the intersections and

corresponding nanonodes will be realized. Hence, the isotropy, directionality will be

high in positive and negative values. From the obtained results, the CNTs initial

phase angle and numbers play an important role for selecting the required CANETs

isotropy range. For certain CNTs number, the phase peaks can be utilized to

exchange the data between various nanonodes. Also, different peaks value can be

utilized as a nano-communication technique for encoding the transferred data

between the source and drain. In another word, the phase angle value that has a peak

can be assigned. Hence it can be used to transfer data between different nanonodes

till the data reaches the destination terminal point.

Page 35: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 28

Fig. (6). The CANET isotropy vs CNTs

lengths; LCNT, and Initial angle

values; Θ, at different CNT radius.

For CNT numbers; N=100, Δθ=2-

200°.

Fig. (7). The CANET conductance vs CNTs

adjacent distance deviation; Δv, and

CNTs angle deviation; ΔΘ, for CNTs

numbers; N=50, resistivity=0.13

mΩcm, adjacent distance, v=1-12 nm,

Angle step 2°.

Now we describe more on how the initial phase angle and angle deviation

can be utilized for encoding data. The proposed model covers almost expected

values of phase angle range. Moreover, the allowable phase angle range

𝜃𝑗 ± ∆𝜃 = (0,9,18,27, … .𝜋

2) ± ∆𝜃 is manipulated, as additionally considered

in [28]. The ±∆𝜃 predicted tolerance values, phase angle deviation, open the way to

more accurate determination of the total effective phase angles. From the obtained

results till now, the phase angle and CNTs density are effective parameters for the

CANETs model representation.

To investigate the influence of other parameters such as the adjacent distance

between the CNTs, and the allowable gate widths into the CANETs performance,

the FET gate conductance and mobility are theoretically determined as considered in

Equations (3 and 4). The FET conductance is a very important parameter and its

dependency on the CNTs parameters such as length, radius, and adjacent distance is

practically studied in [39- 42]. Therefore, the dependence of conductance in each of

the angle and adjacent distance deviations is illustrated in Fig. 7. Highest peak is

achieved at the minimum value of connection probability, 0.2. To find the main

cause for getting the highest FET conductance values at lowest connection

probability, 𝑃𝑖𝑗 , refer to equations (2 and 3). The higher values of 𝑃𝑖𝑗 occurred when

the longer nanotube length and adjacent distance between them are utilized. This

means that less intersection and nanonodes will occur in the way of the data path

between two user terminals. In turn, the corresponding conductance value will

decrease. For attaining higher values of conductance, more intersections and small

adjacent distance between CNTs should be achieved. From Fig. 7, one can notice

that multi-separated FET conductance peaks occur for different connection

Page 36: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 29

probabilities and also can repeat periodically for other angle phase period. It

indicates the importance of the determination of phase angle as many peaks appear

along the phase angle deviation range. This means many encoded data can be

transferred via nanonodes from the transmitter to the receiver terminal. This ensures

the ability to exploit the phase angle values to make a phase modulation for

transferring data between the user terminals. Moreover, the conductance semi

Gaussian distribution is notified along the adjacent distance deviation, Δv. One can

notice that as the adjacent distance deviations increase, conductance values decrease

as discussed in [43]. The highest peaks of conductance are achieved at Δv range

from +2nm to +5nm for adjacent distance, v, from 1-12 nm. So, the maximum peaks

of conductance occur at total adjacent distance (v±Δv) in the range from 3- 15nm.

These adjacent distance assigned values will be declared more when the mobility is

studied as shown in Figs (8, 9).

The minimum values of FET mobility, µ, are achieved at the same adjacent

distance deviation considered before, Δv from +2nm to +5nm. It is noticed also from

Figs (8, 9), at the same CANETs conditions and for 𝑃𝑖𝑗= 0.8 and Δv=3nm, when the

gate width, w, is expanded from 5µm to 10µm, the mobility value will decrease from

150cm2/Vs to 50cm

2/Vs. These predictable obtained values of FET mobility

demonstrate the ability to precisely assemble the CANETs by utilizing available

manufactural process [44]. The various angle ranges from 1.5°-75° with step

increment 2° are utilized. This implies and confirms the scanning smoothly of all

possible phase angle values in the range. The mobility behavior takes a semi-parabolic

shape, reciprocal of FET conductance behavior, and has higher values for specified

higher connection probabilities. The obtained results give appropriate behavior when

compared with the discussion considered in the experimental results in [44].

Fig. (8). The CANET mobility vs CNTs adjacent

distance deviation, Δv (nm) at different

CNT radius. For CNT numbers; N=50,

angle range (1.5°-75° with step

increment=2°, v=1-12nm, w=5µm.

Fig. (9). The CANET mobility vs CNTs adjacent

distance deviation, Δv (nm) at different

CNT radius. For CNT numbers; N=50,

angle range (1.5°-75° with step

increment=2°, v=1-12nm, w=10µm.

Page 37: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 30

To explain the effect of adjacent distance and phase deviations (Δv, ∆𝜃) into

the mobility, analogous to the FET conductance, Figs (10, 11) are depicted for the

same condition considered in previous two Figs (8, 9). One can notice that there are

multiple peaks of the FET mobility along the variation axis of the phase deviation,

∆𝜃. It ensures the fact that the phase angles can be utilized for encoding the data into

the carbon nanotube network. Also, it is more obvious in the last two Figs (12, 13).

Many multi periodical peaks can be recognized when exploring the change of the

mobility with phase angle deviations. Also it is clear that the peaks can be utilized

for interchanging the data between the nanonodes. One can notice that, from the

mobility behavior as a function of gate conductance deviations, ΔG, the mobility has

a semi stable behavior in comparison with its augmented vales at low and high

connection probabilities respectively. But in all cases of the connection probabilities,

there is an increment of FET mobility with the increase in the ΔG value that agrees

with the obtained results considered in [31]. When comparison is held between Figs

(12, 13), the multi-peaks of the mobility is more sharp in the case of small adjacent

distance deviation than in high adjacent distance deviation, Δv =5, and 10nm

respectively. Determining suitable connection probabilities and then stable mobility

behavior depends essentially on the specified CNTs parameters.

Fig. (10). The CANET mobility vs CNTs

adjacent distance deviation; Δv,

and CNTs angle deviation; ΔΘ, for

CNTs numbers; N=50,

resistivity=0.13 mΩcm, angle range

(1.5°-75° with step increment=2°,

v=1-12nm, w=5µm.

Fig. (11). The CANET mobility vs CNTs

adjacent distance deviation; Δv,

and CNTs angle deviation; ΔΘ, for

CNTs numbers; N=50,

resistivity=0.13 mΩcm, angle range

(1.5°-75° with step increment=2°,

v=1-12nm, w=10µm.

Page 38: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 31

Fig. (12). The CANET mobility vs CNTs gate

conductance deviation; ΔG, and

CNTs angle deviation; ΔΘ, for CNTs

numbers; N=50, resistivity=0.13

mΩcm, angle range (1.5°-75° with

step increment=2°, v=1-12nm,

w=5µm, Δv=10nm.

Fig. (13). The CANET mobility vs CNTs gate

conductance deviation; ΔG, and

CNTs angle deviation; ΔΘ, for CNTs

numbers; N=50, resistivity=0.13

mΩcm, angle range (1.5°-75° with

step increment=2°, v=1-12nm,

w=5µm, Δv=5nm.

As seen from the previous results, when connection probabilities values are

low, high conductance and low mobility values can be achieved. The low FET

mobility values mean that it matches with the practical rules for fabrication of the

nano-dimensional devices like CNTs [44].

4. Conclusion

As a result of increasing demand of nanodevices that can be fabricated into the same

nano-integrated chip, the development of new nanonetworks techniques to transfer,

encode, store, and read data have become more interesting for any nanofabrication

designer. Among these techniques, the carbon nanotube networks (CANETs) can be

exploited for versatile applications. The main focus of this paper is to determine the

main effective CNTs parameters that influence the behavior of CANETs. From the

obtained results, the phase angle and angle deviation between various random CNTs

play an important role in determining the CANETs properties such as isotropy, FET

conductance and mobility. Other important factors include the adjacent distance and

deviation values that are common sensitive parameters for improving the CANETs

behviour. These two essential factors depend mainly on the CNTs density, radius,

and length. Certain values of these parameters are assigned into the obtained

CANETs behviour. For example, the appropriate values of numbers, radius, and

length range of the CNTs that denote high isotropy are 100, 1.5nm, and 13-19µm

respectively. As a result, the allowable adjacent distance between different random

CNTs ranges from 3 to 15nm. The other effective parameter that can enhance

CANETs performance is the gate width. When the gate width, w, is expanded from

5µm to 10µm, the FET conductance will increase, while the mobility value will

decrease from 150cm2/Vs to 50cm

2/Vs.

Page 39: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 32

Accordingly, any increment into the FET conductance difference, ΔG, will

affect positively on FET mobility. Finally, as the adjacent distance deviation

decreases, the multi peaks of the FET conductance and mobility will be become

sharper. These peaks can represent the data transfer, encoding, reading and storage

between nanonodes and also between the nano-transmitter and nano-receiver.

5. References

[1] Chen, P. Ch. Ch., “High-performance carbon nanotube network transistors for

logic applications”, Applied Physics Letters, Vol. 92, (2008), 063511.

[2] Timmermans, M. Y., Estrada, D., Nasibulin, A. G., Wood, J. D., Behnam, A.,

Sun, D., Ohno Y., Lyding J. W. , Hassanien A., Pop E., and Kauppinen E.

I.,“Effect of Carbon Nanotube Network Morphology on Thin Film Transistor

Performance”, Nano Research, Vol.5, issue 5, (2012), pp. 307–319.

[3] Gulbahar, B., and Akan, O. B., “A Communication Theoretical Modeling of

Single-Walled Carbon Nanotube Optical Nanoreceivers and Broadcast

Power Allocation”, IEEE Transactions on Nanotechnology, Vol. 11, No. 2,

(2012), pp. 395-405.

[4] Nasr, A., Aboshosha A., Al-Adl, S. M., “Dark current characteristics of

quantum wire infrared photodetectors”, IET Proc. Optoelectronic, Vol. 1,

Issue 3, (2007), pp. 140-1145.

[5] Nasr, A., “Performance of quantum wire infrared photodetectors under

illumination conditions”, J. Optics & Laser Technology, Elsevier, Vol. 41,

(2007), pp. 871–876.

[6] Nasr, A., “Spectral responsivity of the quantum wire infrared photodetectors”

J. Optics & Laser Technology, Elsevier, Vol. 41, (2009), pp. 345–350.

[7] Nasr, A., “Theoretical model for observation of the conversion efficiency into

quantum dot solar cells”, J. energy engineering, ASCE, (2015), 04015002.

[8] Nasr, A., "Infrared radiation photodetectors", Chapter 5: in the book "Infrared

Radiation", ISBN: 979-953-307-349-0, (2012), pp. 95-126.

[9] Weldon, J., Jensen, K., and Zettl, A., “Nanomechanical radio transmitter”,

physica status solidi (b), Vol. 245, No. 10, (2008), pp. 2323-2325.

[10] Paolis, R. D., Pacchini S., Coccetti F., Monti G., Tarricone L., Tentzeris M.

M., and Plana R.,“Circuit model of carbon-nanotube inks for

microelectronic and microwave tunable devices”, IEEE International

Microwave Symposium Digest (MTT), (2011), pp. 1-4.

Page 40: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 33

[11] Nasr, A., Aly, A., “The Effect of multi-intermediate bands on the behavior of

InAs1-xNx/ GaAs1-ySby quantum dot solar cell”, J. of Semicond., Vol. 36,

No. 4, (2015), pp 1-6.

[12] Bush, S. F., Goel S.,“Graph Spectra of Carbon Nanotube Networks”,

1st international conference on nano-Networks and Workshops, Lausanne,

(2006), pp. 1-10.

[13] Pereira, L. F.C., Ferreira, M.S., “Electronic transport on carbon nanotube

networks: A multiscale computational approach”, J. Nano Communication

Networks, Vol. 2, Issue 1, (2011), pp. 25-38.

[14] Dressier, F. and Kargl, F., “Security in Nano Communication: Challenges and

Open Research Issues”, Optics and Photonics Journal, Vol.2, No.2, (2013),

pp. 113-118.

[15] Pereira L. F.C., Ferreira, M.S.,“Electronic transport on carbon nanotube

networks: A multiscale computational approach”, J. Nano Communication

Networks, Vol. 2, Issue 1, (2011), pp. 25-38

[16] Wojtek Tutak, “Single Walled Carbon Nanotube Networks as Substrates for

Bone Cells”, Materials Science and Engineering Dept., The State

University of New Jersey, (2010), PhD thesis.

[17] Heller, I., Janssens A. M., Ma1nnik J., . Minot E. D., . Lemay, S. G., and

Dekker, C., “Identifying the Mechanism of Biosensing with Carbon

Nanotube Transistors”, Nano Letter Vol. 8, No.2, (2008), pp 591–595.

[18] Sangwan, V. K., Ballarotto, V. W., . Fuhrer, M. S., and Williams, E. D.,

“Facile fabrication of suspended as-grown carbon nanotube devices”, Appl.

Phys. Lett., Vol. 93, (2008,), 113112 .

[19] Choi W. B,, Chae S., Bae E., Lee, J., Cheong, B., Kim, J., Kim, J., “Carbon-

nanotube-based nonvolatile memory with oxide–nitride–oxide film and

nanoscale channel”, Appl. Phys. Lett., Vol. 82, No. 2, (2003), pp. 275-277.

[20] Heck, M. J. R., Bowers , J. E., “Energy Efficient and Energy Proportional

Optical Interconnects for Multi-Core Processors: Driving the Need for On-

Chip Sources”, IEEE J. of Selected Topics in Quantum Electronics, Vol.

20, No. 4, (2014), 8201012.

[21] Wang, J. Ch., J. Zh., Minett, A. I., Liu, Y., Lynam, C., Liu, H., and Gordon,

G. W., “Carbon nanotube network modified carbon fiber paper for Li-ion

batteries”, Energy Environ. Sci., Vol. 4, No. 2, (2009), pp. 393–396.

[22] Nasr, A., Aly, A., “Theoretical investigation of some parameters into the behavior

of quantum dot solar cells”, J. of Semicond., Vol. 12, (2014), 124001.

Page 41: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 34

[23] Nasr, A., “Theoretical study of the photocurrent performance into quantum dot

solar cells”, J. Optics & Laser Technology, Elsevier, Vol. 48, (2013),

pp. 135-140

[24] Aly, A. and Nasr, A., “Theoretical Performance of Solar Cell based on

Minibands Quantum Dots”, J. Appl. Phys., Vol. 115, (2014), 114311.

[25] Atakan, B. and Akan, O. B.,“Carbon Nanotube-based Nanoscale Ad Hoc

networks”, IEEE communications magazine, (2010), pp. 129-135.

[26] Coull, V. S., Coleman, R. J.N., Byrne, L., Scott, G., “Carbon Nanotube

network based sensors”, 12th IEEE Conference on Nanotechnology

(IEEE-NANO), (2012), pp. 1-3.

[27] Lin, Y., Appenzeller J., Chen, Zh., Chen Zh., Cheng, H., and Avouris, Ph., “High-

Performance Dual-Gate Carbon Nanotube FETs with 40-nm Gate Length”,

IEEE Electron device letters, Vol. 26, No. 11,( 2005), pp. 823- 825.

[28] Nasr, A., “Theoretical study for improving the performance of carbon

nanotubes networks”, J. of engineering & computer sciences; QUJECS,

Vol. 8, No.2, (2015), pp.

[29] Gupta, P. and Kumar, P.R., “The Capacity of Wireless Networks”, IEEE

Transactions on Information Theory, Vol. 46 , Issue: 2, (2000), pp. 388 – 404.

[30] Chae, S. H., and Lee, Y. H., “Carbon nanotubes and graphene towards soft

electronics”, Chae and Lee Nano Convergence, Vol. 1, (2014), pp. 1-25,

http://www.nanoconvergencejournal.com/content/1/1/15

[31] D urkop, T., Kim, B. M., and Fuhrer, M. S, “Properties and applications of

high-mobility semiconducting nanotubes”, J. Phys: Condens. Matter,

Vol. 16,(2004), R553–R580.

[32] Bychanok, D. S., Kanygin, M. A., Okotrub, A. V., Shuba, M. V., Paddubskaya,

A. G., Pliushch, A. O., Kuzhir, P. P., and Maksimenko, S. A.,“Anisotropy

of the Electromagnetic Properties of Polymer Composites Based on

Multiwall Carbon Nanotubes in the Gigahertz Frequency Range”, JETP

Letters, Vol. 93, No. 10, (2011), pp. 607–611.

[33] Bychanok, D. S., Shuba, M. V., Kuzhir, P. P., Maksimenko, S. A., Kubarev, V.

V., Kanygin, M. A., Sedelnikova, O. V., Bulusheva, L. G., and Okotrub,

A. V., “Anisotropic electromagnetic properties of polymer composites

containing oriented multiwall carbon nanotubes in respect to terahertz

polarizer applications”, J. Appl. Phys.,Vol.114, (2013),114304.

[34] Yoon, J., Lee, D., Kim, Ch., Lee, J., Choi, B., Kim, D. M., Kim, D. H., Lee,

M., Choi, Y., and Choi, S., “Accurate extraction of mobility in carbon

Page 42: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 35

nanotube network transistors using C-V and I-V measurements”, Applied

Physics Letters, Vol. 105, (2014), 212103.

[35] Colasanti, S., Bhatt, V. D. and Lugli, P., “3D Modeling of CNT Networks for

Sensing Applications”, IEEE 10th Conference on Ph.D. Research

in Microelectronics and Electronics (PRIME), (2014), pp. 1-4.

[36] Akyildiz, I. F., Jornet, J. M., “Electromagnetic wireless nanosensor networks”,

J. Nano Communication Networks, Vol. 1,( 2010), pp.3-19.

[37] Koksal, C. E., and Ekici, E., “Applications and Performance of a Nanoreceiver

with a Carbon Nanotube Antenna Forest”, IEEE Wireless Communications,

Vol. 19, Issue 5, (2012),PP. 52-57.

[38] Schroder, D. K., “Semiconductor Material and Device Characterization”, (New

York: Wiley), (1998).

[39] Pereira, L. F. C., Ferreira, M. S., “Electronic transport on carbon nanotube

networks: a multiscale computational approach”, J. Nano Communication

Networks, Vol. 2, Issue 1, (2011), pp.25-38.

[40] Fischer, J. E., Dai, H., Thess, A., Lee, R., Hanjani, N. M., Dehaas, D. L., and

Smalley, R. E., “Metallic resistivity in crystalline ropes of single-wall

carbon nanotubes”, Phys. Rev. B, Vol. 55, No. 8, (199), pp. R4921-R4924.

[41] Harris, P. J. F.,“Carbon nanotube composites”, International Materials

Reviews, Vol. 49, No. 1, (2004), pp. 31-41.

[42] Dai, H.; “Carbon Nanotubes: Synthesis, Integration, and Properties”, Accounts

of Chemical Research, Vol. 35, No. 12, (2002), pp. 1035-1044.

[43] Stadermann, M., Papadakis, S. J., Falvo, M. R., Novak, J., Snow, E., Fu, Q.,

Liu, J., Fridman, Y., Boland, J. J., Superfine, R., and Washburn, S.,

“Nanoscale study of conduction through carbon nanotube networks”,

Physical Review B69, (2004), 201402 (R).

[44] Snow, E. S., Campbell, P. M., Ancona, M. G., and Novak, J. P., “High-

mobility carbon-nanotube thin-film transistors on a polymeric substrate”,

Applied Physics Letters, Vol. 86, (2005), 033105.

Page 43: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 36

حتديـــد نظــري للمعامالت املؤثـرة يف سلوك شبكات األانبيب النانوية الكربونية 1,2 اشرف نصر مدينة نصر، -( 29ص. ب. ) -، املركز القومي لبحوث وتكنولوجيا اإلشعاع، هيئة الطاقة الذرية اهلندسة اإلشعاعيةقسم 1

القاهرة، مجهورية مصر العربية. اململكة العربية السعودية،51452-القصيم–( 6688ص.ب. ) -جامعة القصيم –ة احلاسب كلي -قسم هندسة احلاسب2

(29/11/2015، قبل للنشر 10/5/2015)قدم للنشر

نتيجة معدل التطور العايل يف عملية تصنيع االانبيب النانوية الكربونية )سنتس( وتطبيقاهتا مـــلخــص البحـــث:

تختلةة، إن البح قد كـر لدراسة املعامتات املهمة لسنتس ولل يف الشبكات املهمة اهلائلة يف اجملاالت امللات االبعاد النانوية. وهذه الشبكات تسمى شبكات االانبيب النانوية الكربونية )كانيتس(. هذه املعامتات

حساهبا. أداء االيزتروىبمثل كثاإة، املساإة املتجاورة املسموحة، طور الزاوية ونصف قطر السنتس وقد مت املثمرةكدالة يف معامتات السنتس السابقة قد نوقشت. وهذا بدوره يسمح حبسابة طور الزاوية املناسب واملساإة

املتجاورة لكل سنتس موزع عشوائي واآلخرين.معامتات خمتلةة يفايضا العتاقة بني توصيلية ال )إت( والتحركية بني حمطيت املرسل واملستقبل كدالة

نتس قد درست نظراي.للسمن النتائج احملصول عليها، ميكن متاحظة ا خواص السنتس تلعب دور مهم حلساب سلوك الكانيتس.

عناصر رقم اجلدارة للكانيتس. وطبقا عامل مشرتك يستتخدم يف خمتلف ألنهالطويل لهو الطو من املعامتات املؤثرة القيم املسموح هبا للمساإات املتجاورة واليت حتقق اعلى توصيلية للةت للقيم احملسوبة لطول السنتس ونصف قطره،

( اننومرت.15-3تكو ما بني )ولل يف الطريق مابني حمطيت طور الزاوية بني السنتس يعترب اساسي لتحقيق التقاطع والعقد النانوية اىل °1.5ور الزوااي قد در منالوصول. ونتيجة التوزيع العشوائي للسنتس يف مساحة حمددة، نطاق عريض من ط

Page 44: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Theoretical Determination of the Effective Parameters into the … 37

إ احلقيقة املهمة واليت ميكن ا تستنج من هذه النتائج انه امكانية تطبيق زايدة يف كل خطوة. درجتنيمع 75°عتاوة تعديل طور الزاوية يف الكانتس وميزهتا يف امن املعلومات حىت تصل اىل االطراف وسلوك أقصر طريق بينهم.

سم/إولت اثنية( حتت الظروف 150اىل 50تحركية للةت احملصول عليا تكو ما بني )على لل ، إن قيمة ال املذكورة واليت تعطي امكانية تصنيع السنتس يف االبعاد النانوية عمليا.

Page 45: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

A. Nasr 38

Page 46: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences

Qassim University, Vol. 9, No. 1, pp. 39-58 (January 2016/Rabi' I 1437H)

39

Medical Image Security Using a Novel Steganography Technique

Mohamed Tahar Ben Othman

Computer Science Department, College of Computer, Qassim University

Kingdom of Saudi Arabia

Emails: [email protected]; [email protected]

(Received 9/3/2016, accepted 4/5/2016)

ABSTRACT. The exchange of the medical patient’s information through the Internet, known as

Telemedicine, has become imperative. Indeed, for practical purposes, patient files have to be shared to several medical locations (with different specializations, for example) and insurance companies. On the

other hand, the privacy and security of a patient’s health information has to be safeguarded. Through the

Internet, the patient’s health information can be disclosed or tampered, either accidentally or maliciously. To address this issue, intensive research has been conducted in the last decade to ensure the secure and

safe transmission of such information through medical image steganography. This issue is of supreme

importance when conducting remote surgeries, also known as Tele-surgery, wherein a doctor is performing surgery on a patient who does not physically share the same location. In this case, real-time

security is absolutely needed. As this domain still requires much research, we propose a new

steganography technique based on image clustering of the Region of Non-Interest (RONI) of the image. This new technique demonstrates that while the Region of Interest (ROI) in medical image is not used in

this process, the robustness against some attacks, such as rotation and cropping, is still highly effective.

Results show that this robustness is related to the size of duplication of the embedded stego-information and the dispersal rate of this duplication.

Keywords: Medical image steganography, Telemedicine, ROI, RONI, Dispersal rate

Page 47: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 40

1. Introduction

In the last decade, several types of research were conducted to ensure medical

information confidentiality and authentication while transmitting patient files using

an open access network. On the other hand, separating the Electronic Patient Record

(EPR) and the images may lead to the detachment of EPR from the cover holding it,

which can lead to faulty and dangerous medical decisions. To avoid this detachment,

different techniques of steganography/watermarking were proposed to embed the

needed data into the image. The integrity of the medical data must be protected, as

high risks of inappropriate use of medical information can be the result of data

tampering. Several techniques were used to overcome the increasing difficulties of

maintaining the security of patient information. Medical images are generally

embedded by medical information. Data hiding techniques are used for concealing

patient information with medical images [1]. As this information is sensitive and the

medical image has zero tolerance for noise, neither the information nor the image

should be destroyed by either watermarking data or tampering. These techniques

present a wide number of security aspects, such as data privacy, image integrity,

authenticity, detection of tampered elements and image correction, confidentiality,

and authentication. Although the Digital Imaging and Communications in

Medicine (DICOM) is used to store, transmit and print medical image information,

security means are still necessary [2]. Steganography is the process of hiding

information in a carrier, such as a text, a voice medium, an image, or a video. The

frequency of digital images on the Internet and their impressive ability in hiding data

without quality degradation make them the most used carrier as steganography

covers [3]. Although steganography is a high-security technique for data

transmission, its robustness depends on the level of resistance against attacks.

A good image steganography technique aims at three aspects [3]: 1) the

capacity, the maximum data that can be stored in a cover image; 2) the

imperceptibility, the visual quality of a stego-image after data hiding; and 3)

the robustness against attacks.

The rest of this paper is presented as follows: the general structure of the

steganography scheme is given in Section 2. Section 3 provides an introduction on

the medical image’s sensitivity. Section 4 presents the related works mainly

focusing on methods based on the Least Significant Bit (LSB). The proposed

solution is explained in Section 5. Section 6 reveals the experimental results, and

lastly, the conclusion is detailed in Section 7.

2. Image steganography

Image steganography is a technique of hiding a message in a cover image, in such a

way that its presence cannot be discerned. Image steganography can be done in

spatial [4, 5, 6, 7, 8] or transformational [9, 10, 11, 12] domains. The spatial domain

is simpler and faster in execution, but vulnerable to compression and geometric

Page 48: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 41

distortions, such as rotation, scaling and cropping, for instance. The transformational

domain, while robust against many geometric distortions and filtering, requires a

higher computational time and complexity [13]. Figure 1 presents the general

steganography schema.

Fig. (1). General Steganography schema

3. Medical Image’s Sensitivity

The images distributed in an easily accessible open network are susceptible to

accidental or intentional attacks, leading to the introduction of artifacts,

consequently causing the loss of the patient’s identity. Although there are risks of

inappropriate use of medical information, given the ease with which digital data can

be manipulated, the exchange of the medical history of the patient among medical

experts, which includes clinical images, prescriptions, initial diagnosis, is a

necessity. On the other hand, health policies have stipulated stringent rules regarding

the disclosure of patients’ information, which are classified as highly sensitive data.

Medical images have zero tolerance for noise, a particularity that contrasts that of

most images, pushing researchers to improve the security of these types of digital

images. The main security characteristics of medical information are:

confidentiality, reliability, and availability [13]:

1. Confidentiality: ensures that only the entitled users have access to the

information.

2. Reliability has two sides: a) integrity — the information has not been

modified by non-authorized people; and b) authenticity — a proof that the

information belongs to the correct patient and issued from the right source.

3. Availability: warrants an information system to be used in the normal

scheduled conditions of access.

Embedding Process Extraction Process

Key K

Extraction

Function

Ext(S, K)

Extracted

Data, D

Stego, S

Key K

Embedding

Function

Emb(C, D, K)

Cover, C

Data, D

Stego, S

Page 49: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 42

Medical image steganography techniques may be classified into three

categories: a) authentication schemes, which include tamper detection and recovery;

b) data-hiding schemes to hide Electronic Patient Records; and c) schemes that

combine authentication and data hiding [5].

4. Related Work

Medical images are extremely sensitive as they contain patient information, which

requires uncompromising security during both storage and transmission. Several

steganography LSB based techniques have been proposed. A study of the recent

works was conducted with most concluding that the advantages of steganography

based on LSB are that it is easy to implement, it has a high embedding capacity

when using more than one bit per pixel, all while assuring that the difference

between the resulting stego-image and the original image cannot be visually

identified. Also, the different researches agree on the fact that the main shortcoming

of this technique is that it is not resistant to attacks like JPEG compression and LSB

attacks. Moreover, in case the LSB based technique has high imperceptibility,

several research proposals limit attention to only one bit per pixel for data hiding,

which results in low capacity.

Akhtar N. et al. [3] proposed an improvement to the plain LSB based image

steganography. They used the bit inversion technique to improve the stego-image

quality. They implemented two schemes of the bit inversion techniques. One

technique assumes that the cover image is already transferred to its destination

contrarily to the other technique. In both techniques, LSBs of some pixels of the

cover image are inverted if they map a pattern of some bits of the pixels. Using this

technique they reduce the number of modified bits, which improves the quality of

the stego image.

Mei-Ching Chen et al. proposed in [14] an LSB steganography method based

on Huffman Encoding. Their algorithm has three main parts for the embedding

process, starting with the Huffman encoded bit stream of the secret image, followed

by the size of the encoded bit stream and ending with the Huffman table

corresponding to the secret image. The main objective is to better secure the

embedded data without compromising the quality of the stego-image.

Weiqi L. et al. proposed in [15] an edge adaptive scheme, which selects the

embedding regions according to the size of the secret message and the difference

between two consecutive pixels in the cover image, by considering the difference

between the pixel and its neighbors. For lower embedding rates, only sharper edge

regions are used, while keeping the other smoother regions as they are. They

experimented with seven different steganalysis algorithms — the results of hiding

data in 6000 natural images. They found that their proposed scheme could enhance

the security significantly compared to the typical LSB-based approaches.

Page 50: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 43

Malay Kumar K. et al. proposed in [16] a fragile, blind, high payload capacity, medical image watermarking (type of steganography) technique that preserves the Region Of Interest (ROI). The watermark is embedded in the spatial domain. Through experiments, they found that their scheme can maintain Electronic Patient Report (EPR)/DICOM data privacy and medical image integrity. This effectiveness is proven through various image quality measures, such as PSNR, MSE, and MSSIM.

Dharwadkar N.V. et al. present in [17] a reversible, fragile, spatial domain watermarking scheme for medical images. They store the key (fingerprint) in unaltered components of the medical image. The key is used to recover the extracted watermark. The extracted watermark is used for copyright justifications.

N. Kumar et al. proposed in [18] a new steganography method in spatial domain, which embeds patient information in the cover medical image using a dynamically generated key. The main aim of the proposed method is to generate a key for steganography techniques to maintain the reversibility of the original cover image. Putting aside their analysis of the Peak Signal to Noise Ratio (PSNR) and the Mean Square Error (MSE) that give an idea about the stego-image’s quality, the authors did not take into account any type of attacks that may impact their proposed method.

All these techniques focus on the quality of the stego-image and disregard the process’s robustness against attacks. Our proposed solution to secure data hiding, to assure the good quality of the stego-image, all while presenting a robust steganography technique.

5. Proposed Technique

5.1 Image clustering with content addressable method

In [19, 20] we proposed a new clustering technique called Content Addressable Method (CAM) that consists of choosing a configurable number of bits for each pixel of the cover image. These bits are used as an address regrouping all entries sharing the same feature. Unlike geometric clustering, in our proposed clustering technique, the pixels that belong to the same cluster may be distinct from each other in geometric points of view, which helps in reducing the effect of attacks. On the other hand, clustering is regrouping the pixels with the same predefined features, used to store a portion of the EPR data, which helps retrieval and adds robustness to the hiding process. The more the distribution of pixels over clusters is uniform, the more the watermark is robust against attacks.

5.2 Cluster dispersal rate

As condense area is liable to attacks, we defined in [19] the dispersal rate (DR)

of a set of pixels in the image as the closest area containing these pixels over the total

area. We believe that if the cluster dispersal rate is high, the stego-image will be more

robust against attacks. For sake of simplicity, we considered only the smallest

rectangle holding the set of pixels. We defined two levels of the dispersal rate:

Page 51: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 44

1- The Cluster Dispersal Rate (CDR): This defines the area on the image

occupied by a cluster. This normally depends on the image itself and the clustering

function. Our proposal in medical images is to consider pushing to a higher CDR by

cluster implant. Cluster Dispersal Rate is calculated according to the Equation 1.

CDR𝑐 =(𝑥𝑚𝑎𝑥𝑐

− 𝑥𝑚𝑖𝑛𝑐) ∗ (𝑦𝑚𝑎𝑥 𝑐

− 𝑦𝑚𝑖𝑛𝑐) ∗ 100

MxN, (1)

where, M and N represent the images′sizes and 𝑥𝑚𝑎𝑥 , 𝑥𝑚𝑖𝑛 , 𝑦𝑚𝑎𝑥 , and 𝑦𝑚𝑖𝑛

are the coordinates of the smallest rectangle containing the cluster 𝑐

2- The In-cluster Dispersal Rate (ICDR): It was called in [19] Sub-cluster

Dispersal Rate (SDR). The ICDR defines the sub-cluster pixels dispersal within the

cluster, which depends on the cluster construction. As we introduce a new technique

to implant the cluster, this rate is taken into consideration while implanting.

Equation 2 presents the average ICDR of sub-clusters in a given cluster.

avg(ICDR𝑐) =∑ (𝑥𝑚𝑎𝑥 𝑠𝑐

− 𝑥𝑚𝑖𝑛𝑠𝑐) ∗ (𝑦𝑚𝑎𝑥𝑠𝑐

− 𝑦𝑚𝑖𝑛𝑠𝑐) ∗ 100𝑠𝑐

𝑛𝑠𝑐𝑐 ∗ (𝑥𝑚𝑎𝑥 𝑐− 𝑥𝑚𝑖𝑛𝑐

) ∗ (𝑦𝑚𝑎𝑥𝑐− 𝑦𝑚𝑖𝑛𝑐

), (4)

Where nscc is the number of subclusters in cluster c

5.3 Cluster implant

The crown implant is the base that holds the artificial teeth while hiding its

artificial character. In the same way, the cluster implant is the way to insert clusters

in the RONI so it can handle the embedding data without visually damaging the

image. Table 2 presents two different clustering algorithms. The first algorithm has

four steps, starting from step 1 which represents the Content base Addressing

Method and, depending on the level of uniformity, the algorithm goes through the

remaining steps. As soon as a certain level of uniform distribution is attained the

algorithm stops to keep the PSNR acceptable (PSNR is considered not acceptable

when it drops below 30 DB and ensures good quality when it is over 35 DB [6]).

The second algorithm implants the clusters, taking into account, firstly, the dispersal

rate and the distribution uniformity.

Page 52: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 45

Table (1). Clustering algorithm

Algorithm 1 Algorithm 2

Step

1

For each pixel (i, j) of the RONI

c 5 LSBs of R (in RGB) // c: cluster

sc 5 LSBs of G (in RGB) // sc: sub-

cluster

add the pixel (i j) to the sub-cluster(c, sc)

c=1

sc=1

For each pixel (i, j) of the RONI

RONI(i,j,1) c

RONI(i.j,2) sc

c = (c+1) mod maxClusters

subClusters(c)= (subClusters(c)+1) mod

maxSubCluster;

sc=subClusters(c);

Step

2

For each cluster

if subcluster_size > maxduplication

Add pixels to a subcluster

(subcluster_size < minduplication) within

the same cluster by changing only 1 bit of the current subcluster ID.

maxduplication is a parameter that gives the maximum stego-information

duplication, any sub-cluster with a size

greater than this parameter may be used to implant some sub-clusters, with a size less

than minduplication, in its neighborhood.

Step

3

For each cluster

if subcluster_size > maxduplication

Add pixels to a subcluster

(subcluster_size < minduplication) in a

different cluster by changing only 1 bit of the current cluster ID.

Step 4

For each cluster

if subcluster_size > maxduplication

Add pixels to a subcluster

(subcluster_size < minduplication) in the

same or a different cluster by gradually changing the number of bits of the current

subcluster ID or cluster ID.

The Cluster Dispersal Rate (CDR) is calculated for each cluster. Figure 2

presents the CDR plot for each image. As it can be seen from Figure 2, in Brain 1,

using Algorithm 1, clusters occupy between 53% and 60% of the area of the image,

whereas, in the remaining images, clusters are dispersed on more than 90% of the area.

Figure 3 presents the Average In-Cluster Dispersal Rate of sub-clusters using

Algorithm 1. It averaged more than 55% of all sub-clusters in Imaging_Xray image

and is low in all other images that may not resist to cropping attacks.

Page 53: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 46

Brain 1 Brain 2

Imaging Xray Pic. content Xray

Fig. (2). Algorithm 1 - Clusters Dispersal Rate

Brain 1 Brain 2

Imaging Xray Pic. content Xray

Fig. (3). Algorithm 1 - In-Cluster Average Dispersal Rate

Page 54: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 47

Brain 1 Brain 2

Imaging Xray Pic_ content_Xray

Fig. (4). Algorithm 2 - In-Cluster Average Dispersal Rate

Although algorithm 2 produces a completely uniform distribution, and Figure

4 shows that the ICDR is considerably improved using Algorithm 2, the PSNR

(Equation 3) presented in Table 2 severely dropped. For this reason, in the

remainder of the paper, we consider the first algorithm.

PSNR = 10 log (max(i2(x,y))

1

MxN∑ ∑ (i(x,y)−w(x,y))

2Nx=1

My=1

) (3)

Where; i(x,y) and w(x,y) is the value of the pixel (x,y), respectively, in the

original and stego-image.

Table (2). PSNR Algorithm 1 vs. Algorithm 2

PSNR Algorithm 1 PSNR Algorithm 2

Brain1 37.45 26.56

Brain2 36.88 27.22

Imaging Xray 41.68 28.33

Pic. content_xray 36.77 27.97

Page 55: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 48

The embedded data is formed by two parts: the Electronic Patient Record and

the ROI signature. Figure 5 demonstrates a proposed format of the Electronic Patient

Record (EPR). The EPR is the information of the patient that may contain the

patient’s ID (PID) and the description of the status given by the specialist to which

the ROI coordinates, the Upper-Left-pixel-Coordinates (ULPC) and the Lower-

Right-Pixel-Coordinates (LRPC) and the Scale of the ROI signature are added, as

shown in Figure 1.

PID ULPC LRPC Scale Description

4 bytes 18 bits 18 bits 12 bits 60 bytes

Fig. (5). Electronic Patient Record (EPR)

5.4 Information embedding:

Figure 9 summarizes the embedding process. To secure the ROI part, a ROI

signature is formed and inserted with the EPR in the RONI. The ROI signature is a

resized binary image of the ROI. The Scale field in the EPR record is providing the

size to which the ROI is resized to. The signature can be compared after extraction

only visually as to give an idea of whether the ROI has been tampered. Figure 6

shows the original used images where the ROI is indicated. ROI is generally

delimited by the specialists.

Fig. (6). Original images with delimited ROI

Figure 7 shows the extracted ROI. The binary and resized binary (signature)

of each ROI are given in Figure 8.

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Page 56: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 49

Fig. (7). ROI

Fig. (8). ROI (and resized) signature

The flowchart of the embedding process is given in Figure 9.

Figure (9). Embedding process

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Original Image

RONI ROI

Cluster Implant

Steganography ROI

signature

Stego-image

EPR

Flat combined

representation

Page 57: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 50

5.5 Information Extraction:

Figure 10 shows the extraction process. The first step of the extraction process is to

go through the extraction of the clusters. Each cluster contains sub-clusters that

contain the same hidden information. To reduce the tamper effect on the Content

Address and the embedded information we use the Decision Building Table we

defined in [20]. The sub-cluster value indexes the row of the table, and the value of

the embedded information indexes the column. We believe that, if the dispersal rate

is high, the probability of changing the same information to the same value is low.

In conclusion, the higher counter indicates the appropriate information.

Fig. (10). Extraction process

6. Experimental Results

Figures 11, 12, and 13 show the original images, the images after clusters implant,

and the stego-images.

Fig. (11). Original images

Stego Image

Clusters Extraction

Decision Building

Table

ROI signature EPR

For each cluster: The different extracted data in a

sub_Cluster is put in a row. The

data that has higher occurrences is

considered as the good data.

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Page 58: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 51

Fig. (12). After clusters implant

Fig. (13). Stego images

Table (3). PSNR after clustering and after embedding

PSNR after clustering

implant PSNR after Embedding

Brain1 37.45 35.91

Brain2 36.88 32.84

Imaging_Xray 41.68 35.07

Pic_content_xray 36.77 32.33

As it can be seen in Table 3, the PSNR is considerably high (greater than 30)

in all images after both clusters implant and stego-embedding.

Figure 14 presents the different exerted attacks: rotation 5o, rotation 15

o,

rotation 125o and cropping.

An example of the extracted signature for each image is shown in Figure 15.

The bit error rate (Equation 4) and Normalized Cross Correlation (Equation 5) are

used to measure the quality of the extracted EPR and ROI signature:

𝐵𝐸𝑅 =𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑒𝑟𝑟𝑜𝑟 𝑏𝑖𝑡𝑠∗100

𝑡𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑏𝑖𝑡𝑠 (4)

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Page 59: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 52

𝑁𝐶𝐶 =∑ ∑ 𝑖(𝑥,𝑦)𝑤(𝑥,𝑦)𝑦𝑥

∑ ∑ 𝑖2(𝑥,𝑦)𝑦𝑥 (5)

Where; i(x,y) and w(x,y) is the value of the pixel (x,y), respectively, in the

original and stego-image.

Fig. (14). Attacked stego images

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Rotation 5o

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Rotation 15o

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Rotation 125o

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Cropping

Page 60: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 53

Fig. (15). Extracted signatures

Table (4). Brain 1 results

attack

EPR Bit

Error

Rate

ROI

Sig.

Bit Error

Rate

EPR Cross

correl

ation

ROI

Sig.

Cross correl

ation

None 2.13 0.07 0.96 0.79

Rotatio

n 5o 2.13 0.07 0.96 0.79

Rotatio

n 15o 2.13 0.07 0.96 0.79

Rotation 125o

2.13 0.07 0.96 0.79

Croppi

ng 1 2.13 0.07 0.96 0.79

Croppi

ng 2 2.74 0.08 0.95 0.79

Table (5). Brain 2 results

attack

EPR Bit

Error

Rate

ROI

Sig.

Bit Error

Rate

EPR Cross

correl

ation

ROI

Sig.

Cross correl

ation

None 0 0 1 1

Rotatio

n 5o 0 0 1 1

Rotatio

n 15o 0 0 1 1

Rotation 125o

0 0 1 1

Croppi

ng 1 0.61 0.08 0.99 0.94

Croppi

ng 2 1.82 0.17 0.97 0.93

Table (6). Imaging_Xray results

attack

EPR

Bit Error

Rate

ROI Sig.

Bit

Error Rate

EPR

Cross correl

ation

ROI Sig.

Cross

correlation

None 1.22 0.02 0.99 0.98

Rotatio

n 5o 1.22 0.02 0.99 0.98

Rotatio

n 15o 1.22 0.02 0.99 0.98

Rotatio

n 125o 1.22 0.02 0.99 0.98

Croppi

ng 1 1.22 0.02 0.99 0.98

Croppi

ng 2 1.22 0.02 0.99 0.98

Table (7). Pic_content_xray results

attack

EPR

Bit Error

Rate

ROI Sig.

Bit

Error Rate

EPR

Cross correl

ation

ROI Sig.

Cross

correlation

None 0 0 1 1

Rotatio

n 5o 0 0 1 1

Rotatio

n 15o 0 0 1 1

Rotatio

n 125o 0 0 1 1

Croppi

ng 1 1.21 1.50 0.91 0.89

Croppi

ng 2 1.97 1.73 0.92 0.87

Tables 4-7 separately provide the quality of the extracted EPR and

signature, after a variety of attacks. We can see that most of the results are

promising. The signature NCC is low in Table 4 for all attacks because of the low

CDR for the brain 1 image. Also, the NCC is decreasing in the cropping in Table 7,

as a result of the low ICDR of the image Pic. content. xray.

Brain 1 Brain 2 Imaging_Xray Pic_content_xray

Page 61: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 54

7. Conclusions

Using the Internet to transfer medical images has become inevitable, despite the fact

that patients’ health information can be disclosed or tampered with, either

accidentally or intentionally. The aim of this paper is to provide a way to help secure

the image’s quality and the information it contains. We chose to focus on two types

of attacks, namely rotation and cropping. The steganography is made on RONI part

of the image, where the Electronic Patient Record and a ROI signature is embedded.

The embedding is made on the spatial domain due to its simplicity and capacity.

RONI part is divided into clusters. Each cluster is divided into sub-clusters and each

sub-cluster holds the same information. Medical and normal images differ in the

sense that the ROI part is not used and may not be recognized in the destination,

which may impact the extraction. Results show that our technique is robust against

rotation attacks. Also, the cropping attacks’ effects depend on the CDR and ICDR.

Other ways to implant clusters will be looked upon in the future, with a more

meaningful way to calculate the dispersal. A study of the combination of the

Algorithm 1 and Algorithm 2 of clustering will be a priority.

8. Acknowledgment

The Author gratefully acknowledges financial support for the present work (project

ID 2701) from the Deanship of Scientific Research at Qassim University.

9. References

[1] Al-Qershi O. M., Khoo B. E., “ROI–based Tamper Detection and Recovery for

Medical Images Using Reversible Watermarking Technique”, IEEE

International Conference on Information Theory and Information Security

(ICITIS), (2010), Beijing, pp. 151 – 155.

[2] Rafael A. S., Marcel P. J., "Assessment of Steganographic Methods in Medical

Imaging", XXVI Conference on Graphics, Patterns and Images, SIBGRAPI

(2013), Arequipa-Peru.

[3] Akhtar N., Khan S., Johri P., "An Improved Inverted LSB Image

Steganography", International Conference on Issues and Challenges in

Intelligent Computing Techniques (ICICT), (2014), pp. 749 - 755.

[4] Akhtar N., Johri P., Khan S., “Enhancing the Security and Quality of LSB Based

Image Steganography”, 5th

International Conference on Computational

Intelligence and Communication Networks (CICN), (2013), pp. 385 – 390.

[5] Yung-Yi L., Ran-Zan W., “Improved Invertible Secret Image Sharing with

Steganography”, Seventh International Conference on Intelligent

Information Hiding and Multimedia Signal Processing (IIH-MSP), (2011),

pp. 93 – 96.

Page 62: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 55

[6] Anbarasi L.J., Kannan S., “Secured secret color image sharing with

steganography”, International Conference on Recent Trends in Information

Technology (ICRTIT), (2012), pp. 44 – 48.

[7] Das R., Tuithung T., “A novel steganography method for image based on

Huffman Encoding”, 3rd

National Conference on Emerging Trends and

Applications in Computer Science (NCETACS), (2012), pp. 14 – 18.

[8] Sarreshtedari S., and Akhaee M.A., “One-third probability embedding: a new ±1

histogram compensating image least significant bit steganography scheme”,

Image Processing, IET, Vol. (8), No. 2, (2014), pp. 78 – 89.

[9] Prabakaran, G., Bhavani, R., and Rajeswari, P.S., “Multi secure and robustness

for medical image based steganography scheme”, International Conference

on Circuits, Power and Computing Technologies (ICCPCT), (2013), pp.

1188 – 1193.

[10] Keshari S. and Modani S.G., “Weighted fractional Fourier Transform

based image Steganography”, International Conference on Recent Trends

in Information Systems (ReTIS), (2011), pp. 214 – 217.

[11] Zhiyuan Z., Ce Z., and Yao Z., “Two-Description Image Coding

With Steganography”, IEEE Signal Processing Letters, Vol. (15), (2008),

pp. 887 – 890.

[12] Thanikaiselvan V. and Arulmozhivarman P., “High Security Image

Steganography Using IWT and Graph Theory”, IEEE International

Conference on Signal and Image Processing Applications (ICSIPA),

(2013), pp. 337-342.

[13] Nyeem H., Boles W., and Boyd C., “A review of medical image watermarking

requirements for tele-radiology”, Journal of Digital Imaging, Vol. (26), No.

2, pp. 326-343.

[14] Chen, Mei-Ching, Agaian S.S., and Chen C.L.P., “Generalized

collage steganography on images”, IEEE International Conference

on Systems, Man and Cybernetics, (2008), pp. 1043 – 1047.

[15] Weiqi L., Fangjun H., and Jiwu H., “Edge

Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE

Transactions on Information Forensics and Security, Vol.(5), No. 2,

(2010), pp. 201 – 214.

[16] Kundu M.K. and Das S., “Lossless ROI Medical Image Watermarking

Technique with Enhanced Security and High Payload Embedding”,

International Conference on Pattern Recognition, (2010), pp. 1457 – 1460.

[17] Dharwadkar N.V., Amberker B. B., and Supriya & Prateeksha B. P. ,

“Reversible Fragile Medical Image Watermarking with Zero Distortion”,

Page 63: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 56

International Conference on Computer and Communication Technology

(ICCCT), (2010), pp. 248 – 254.

[18] Kumar N. and Kalpana V., “A Novel Reversible Steganography Method using

Dynamic Key Generation for Medical Images”, Indian Journal of Science

and Technology, Vol. (8), No. 16, (2015).

[19] Mohamed T.B.O, "Novel image clustering based on image features for robust

reversible data hiding", International Journal of Fuzzy Systems and

Advanced Applications, (2015), pp. 1-8.

[20] Mohamed T.B.O, "New Image Watermarking Scheme based on Image Content

Addressing Method", The 13th

WSEAS International Conference on

Applied Computer and Applied Computational Science, (2014).

Page 64: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Medical Image Security Using a Novel Steganography Technique 57

لإلخفاءأمن الصور الطبية ابستخدام تقنيات جديدة

عثمانحممد طاهر بن 51452القصيم –( 6688ص.ب. ) –جامعة القصيم –كلية احلاسب –قسم علوم الكمبيوتر

اململكة العربية السعودية

(4/5/2016، قبل للنشر 9/3/2016)قدم للنشر

للمريض من خالل شبكة اإلنرتنت، واملعروفة ابسم التطبيب عن ةأصبح تبادل املعلومات الطبيملخص البحث.بعد، حتمي. يف الواقع، ألغراض عملية، ملفات املرضى جيب أن تكون مشرتكة لعدة مواقع طبية )مع التخصصات املختلفة، على سبيل املثال(، وشركات التأمني. من انحية أخرى، فإن خصوصية وأمن املعلومات

أن تصان. ولكن من خالل شبكة اإلنرتنت، املعلومات الصحية للمريض ميكن الكشف الصحية للمريض جيبعنها أو العبث هباإما عن قصد أو غري قصد. وملعاجلة هذه املسألة، أجريت حبوث مكثفة يف العقد املاضي لضمان

عند إجراء العمليات انتقال آمن هلذه املعلومات من خالل إخفاءها داخل الصورالطبية. تزيد أمهية هذه املسألةاجلراحية عن بعد، حيث أن الطبيب املنفذ للعملية اجلراحية واملريض ال يتشاركان فعليا نفس املكان. يف هذه

ألن هذا جمال ال يزال يتطلب و (. Real Timeاحلالة، هناك حاجة ماسة ألمن املعلومات يف الوقت احلقيقي )املنطقة غري ذات قسيم املعلومات جديدة على أساس ت الكثري من البحث، فإننا نقرتح تقنية إخفاء

( بتقنية جديدة. توضح هذه التقنية اجلديدة أنه يف حني مل Clusters(من الصورة إىل تكتالت )RONIاالهتمام)( من الصورة الطبية، فإن املعلومات املخفية تصمد ضد بعض ROIيتم استخدام املنطقة ذات االهتمام )

رتبط حبجم تكرار املعلومة ومعدل درجة الصمود مان واالقتصاص. وتشري النتائج إىل أن اهلجمات، مثل الدور انتشارها دخل الصورة.

Page 65: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Mohamed Tahar Ben Othman 58

Page 66: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Journal of Engineering and Computer Sciences

Qassim University, Vol. 9, No. 1, pp. 59-83 (January 2016/Rabi' I 1437H)

59

Pedagogical Derivation of All Irredundant Dependency Sets for

Relational Databases

Ali Muhammad Ali Rushdi1 and Omar Mohammed Ba-Rukab2

1Department of Electrical and Computer Engineering, Faculty of Engineering,

King AbdulazizUniversity, P. O. Box 80204, Jeddah, 21589, Saudi Arabia

[email protected]

2Department of Information Technology, Faculty of Computing and Information Technology-Rabigh,

King Abdulaziz University, P.O.Box 344, Rabigh, 21911, Saudi Arabia

[email protected]

(Received 9/3/2016, accepted 10/8/2016)

Abstract. This paper introduces a pedagogical method for the derivation of all irredundant dependency sets (IDSs) (and a minimal cover (MC) of the dependency set for relational databases. The paper utilizes

an established equivalence between relational database functional dependencies (FDs) and a fragment of

switching algebra that is typically built of Horn clauses. Therefore, the paper proposes the employment of various tools of switching theory in the domain of relational databases. In particular, the paper obtains

the IDSs and MC of a database dependency set by employing a Variable-Entered Cover Table (VECT) to

construct a presence or Petrick Function (PF). The proposed procedure is presented in detail and demonstrated via two illustrative examples. The traditional database approach, adopted by almost all

textbooks on relational databases and based on the heuristic application of inference axioms, does not

decide whether there is a unique IDS or multiple ones, and does not produce multiple IDSs when these exist. The present procedure, however, produces all (or, at least, as many as required) IDSs, and decides

which among them are minimal covers. The present procedure is validated via Karnaugh maps and

directed graphs. The paper demonstrates that the current covering problem is of exponential complexity and hence intractable. However, this complexity issue is not of much concern for the current pedagogical

application to relational databases.

Keywords. Switching Algebra, Relational Databases, Irredundant Dependency Set, Irredundant

Disjunctive Form, Variable-Entered Cover Table, Functional Dependency, Minimal Cover.

Page 67: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 60

1. Introduction

Modern textbooks on Relational Databases (see, e.g., [1-8]) use their own jargon,

definitions, mathematics and algorithms for handling functional dependencies. They

ignore a striking similarity (equivalence or isomorphism) with a fragment of

propositional logic, typically built of Horn clauses [9-18].The concept of a closure

for a Database Functional Dependency (FD) set corresponds to that of a complete

sum (CS) or Blake Canonical Form (BCF) CS(g) of a switching function g.

Irredundant Dependency Sets (IDSs) in Relational Databases are exactly identified

as the parallel of the Irredundant Disjunctive Forms (IDFs) of a switching function.

In particular, a minimal cover for a dependency set is expressed by the minimal sum

of the corresponding switching function.

Students and engineers who are familiar with logic can save a lot of effort if the

concepts of relational databases are translated to the more familiar language of logic.

Moreover, they can utilize the more powerful algorithms and tools of switching

algebra. These tools include purely-algebraic techniques [19-21], purely-visual

techniques employing the Karnaugh map [19-22], and intermediary, hybrid, or mixed

techniques employing the Variable-Entered Karnaugh Map (VEKM) [19-40]. There

are already many pedagogical switching-algebraic analyses of certain problems of

relational databases including these of deriving the closure of a set of functional

dependencies, constructing the closure for a set of attributes and finding all candidate

keys [36]. These problems require the algorithmic derivation of the complete sum

(Blake canonical form) [19, 20, 30, 36, 37] of certain switching functions obtained via

an appropriate transformation of the relational functional dependencies.

A prominent additional problem is the problem of deriving irredundant

dependency sets equivalent to a set of functional dependencies and determining the

minimal cover of such a set. This problem is typically referred to as the covering

problem and will be solved herein algorithmically under the assumption that the

closure of the given set of functional dependencies is already available. The solution

employs a Variable-Entered Cover Table (VECT) to construct a presence or Petrick

Function (PF). Two examples are used to apply a switching-algebraic approach to

the covering problem and to demonstrate its pedagogical and computational merits

over the traditional approach that relies on repeated application of rules of inference.

The organization of the remainder of this paper is as follows. Section 2

reviews the covering problem in a relational-database context, while section 3

outlines the method of the Variable-Entered Covered Matrix for a completely-

specified switching function that represents the set of functional dependencies of a

relational database. Section 4 illustrates the method via two examples. The first

example is a simple 6-varialbe that yields a unique IDS, while the second example

(albeit of fewer variables) leads to more involved computations and yields several

IDSs. Section 5 adds some discussion, while Section 6 concludes the paper.

Page 68: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

61

2. On the (Set) Covering Problem

Covering problems (or set covering problems) have a prolific literature [32, 41-67]. They have many applications such as: designing of switching circuits, data retrieving, assembly line balancing, airline staff scheduling, locating defense networks, distributing products, warehouse locating, and location emergency service facility [56]. The covering problem is one of well-known problems of binary programming [69] and typically it involves deriving all Irredundant Disjunctive forms (IDFs) of a switching (Boolean) function. Recent investigations reveal the intractability of the covering problem [56]. In fact, the covering problem is an NP-hard problem [68]. In the worst case, the time complexity of the best algorithm for the covering problem is exponential because the problem is combinatorial. However, the problem can be simplified by not insisting on obtaining all IDFs. This is achieved by pruning unnecessary search paths that do not yield minima IDF. This point will be clarified by our forthcoming Example 2, which clearly indicates how effective such a pruning can be.

The set covering problem can be defined as follows. Let X and Y be two sets, R be a relation defined on X × Y, and Cost a cost function that applies on subsets of Y. The set covering problem (X, Y, R) consists of finding a minimal co-subset S of Y such that for any x of X, there exists an element y of S with x R y. In the context of set covering, we say that y covers x when x R y. It is convenient to illustrate a set covering problem using a matrix, called its covering matrix. The matrix associated with the set covering problem (X, Y, R) has rows labeled with elements of X and columns labeled with elements of Y, such that the element [x, y] of the matrix is equal to 1 if and only if x R y.The set covering problem (X, Y, R) consists in finding a minimal cost subset of columns that coverall the rows. The set covering problem is to find a subset of columns that cover all the rows and that is minimal with respect to Cost.This task is known to be NP-hard. The covering matrix can be reduced to its cyclic core by removing rows and columns using the concepts of essentiality, minterm dominance, and prime dominance [48].

The selection of prime implicants is performed on the basis of the reduced covering matrix. This stage in the general case is exponential. This means that the exact solution may not be found at the given time (or even may not be found at all). Therefore, approximate methods are used (e.g. greedy or genetic algorithms, as well as others which solve the coverage problem heuristically). This approach provides finding of the result in polynomial time, but does not guarantee an optimal solution (e.g. it may turn out that the number of prime implicants is excessive).

A number of methods of improving the process of selection of prime implicants are described in the literature. For example, the concept proposed in Coudert and Sasao [51] is an abstract evolution of exact cover algorithm Cyclic Core, which uses so-called transposition functions. The problem is reduced to cover of set <X, Y>, where both X and Y are a subset of the partially ordered set (Z,⊑), whereas y is a cover of x if and only if x ⊑ y. Thus, the selection may be performed with the use of the Cyclic Core algorithm and with the use of graphs Binary Decision Diagram (BDD).

Page 69: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 62

In addition to the transposition function, attention should be drawn to the

Gimpel reduction [50], which also is an extended version of de facto Cyclic Core

method. It does enable the reduction of columns, but in the worst case it introduces

additional rows, which involves the creation of new dominant rows and columns. In

practice, the Gimpel reduction only makes sense if it guarantees obtaining smaller

covering matrix.

Petrick method is another selection technique of prime implicants [19, 32, 41,

42, 51, 57]. An algorithm based on it is known as ‘branch-and-bound’ method and is

a modification of a classical Quine-McCluskey method. Petrick method removes the

resulting redundancy of the covering matrix (by finding essential prime implicants)

and applies Boolean algebra to obtain the final result. Arslan and Sertbas, [51]

declare that the main weakness of the algorithm is exponential computational

complexity, but such a complexity is an inherent characteristic of the pertinent

problem, in the sense that the best algorithm for solving this problem is of

exponential complexity.

Wiśniewski, et al. [64] proposed an innovative approach to the proper

selection of prime implicants. The resulting covering matrix is imaged with the use

of the selection hypergraph. Then, the class of the selection hypergraph is verified. If

it belongs to a class of xt-hypergraphs. This means that the selection process can be

performed in polynomial time. In this case, the problem comes down to finding a

cover of the first exact transversal and involves a polynomial computational

complexity [64].

Yaping, et al. [58] built an integer programming model for the minimum

covering problem and proposed a simplification method of logic functions in which

its minimum cover is obtained by solving an integer program.

The minimum covering problem was also approximately solved via several

meta heuristics including Ant Colony Optimization (ACO) [53], Firefly Algorithm

[61], Binary TLBO [62], Shuffled Frog Leaping [63], Intelligent Water Drops

(IWD) [66], Beam-Search Approach [67], and Cat Swarm Optimization [65].

Despite the diversity of classical and state-of-the-art methods for handling the

coverage problem, we will present herein just one method characterized by its

pedagogical simplicity and its suitability for application to relational databases.

3. The Covering Problem for Relational databases

The covering problem, when specialized to switching theory, involves the selection

of some prime implicants irredundantly to cover a completely specified switching

function or the asserted part of an incompletely specified switching function [19,

32]. This problem will be discussed herein exclusively for the purpose of using the

closure of a set of functional dependencies of a relational database to produce the

entire irredundant dependency sets equivalent to the original set of functional

dependencies and to determine a minimal cover of such a set.

Page 70: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

63

An irredundant disjunctive form (IDF) of a completely specified switching

function g is a minimal sub-formula of the complete sum )(gCS that covers g . In

other words, a sum-of –products (s-o-p) formula h is an IDF for g if and only if [19]:

1. h is a sub-formula of )(gCS , i.e., each and every term of h is a term

of )(gCS and hence a prime implicant of g.

2. g h , i.e., the formula h covers the function g.

3. No proper sub-formula of h has the property (2), i.e., if one or more

terms of the formula h is removed from it, it ceases to cover the function g .

Among the IDFs of g , any formula with the minimum number of terms as a

primary criterion, and with the minimum number of literals as a secondary criterion

is called a minimal sum for g . While g has a unique complete sum it may have

more than one minimal sum.

There are many algebraic, tabular or mapping methods for obtaining all the

IDFs of a switching function [19]. Most of these methods use the complete sum as a

starting point, or more generally act in a 2-step fashion by finding the complete sum

first before proceeding to derive the IDFs. Once the set of all IDFs is obtained, the

minimal sum is trivially deduced. The method employed herein is that of the

Variable-Entered Cover Matrix (VECM). The theoretical foundation of this method

was established by Reusch [46]. Later, Rushdi and Al-Yahya [32] provided a

practical working knowledge of the method through a lucid clear interpretation of it

that relies heavily on VEKM-related terms. The description given by Reusch [46]

and expounded by Rushdi and Al-Yahya [32] is for incompletely-specified

switching functions. Below, we give a simplified version of this description that fits

the present need for a completely-specified switching function.

Despite the alarming information about the intractability of the covering

problem, we note that the complexity issue is not of much concern, here, since we

deal with a pedagogical approach for the specific problem of relational database.

We want simply to supplement existing textbooks with an insightful algorithmic

treatment that might enhance or even replace the current ad hoc heuristics used by

these texts. We will avoid the complexity issue either by avoiding large problems or

by not insisting to obtain all IDFs.

4. Method of the Varialbe-Entered Cover Matrix

Let the function g under consideration be given by the sum-of-products (s-o-p) formula

𝑔 = ⋁ 𝑔𝑗𝑗𝑚𝑎𝑥𝑗 , (1)

Page 71: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 64

where the term 𝑔𝑗 is not restricted in any fashion whatsoever, other than

being an implicant of g . In particular, 𝑔𝑗is not required (though it can be) a

minterm or a prime implicant. The complete sum for g is given as

CS(𝑔) = ⋁ 𝑃𝑖𝑖𝑚𝑎𝑥𝑖 , (2)

where the union/disjunction/ORing operator in (2) runs over all the

prime implicants 𝑃𝑖 of 𝑔.Now, construct a table or matrix of size maxmax ji

such that 𝑃𝑖 is the coordinate or key of the horizontal row i of the table, while 𝑔𝑗

is the coordinate of its vertical column j. The entry 𝑇𝑖𝑗 of the table at row i

and column j is given by the Boolean quotient (residue, restriction or ratio)

𝑇𝑖𝑗 = 𝑃𝑖

𝑔𝑗⁄ = (𝑃𝑖)𝑔𝑗=1. (3)

Note that 𝑇𝑖𝑗 represents the part of 𝑔𝑗 that is covered by 𝑃𝑖 , and

hence 𝑇𝑖𝑗 = 1 means that 𝑃𝑖 covers 𝑔𝑗 completely because 𝑔𝑗 subsumes 𝑃𝑖 , while

𝑇𝑖𝑗 = 0 means that 𝑃𝑖 does not cover any part of 𝑔𝑗 because 𝑃𝑖 and 𝑔𝑗 are

disjoint. For this last case, Reusch uses a hyphen (ـ) instead of a 0, which does not

conform to our present interpretation.

With the matrix [T] properly constructed, we are sure that every column j will

have the value 1 in at least one of its elements, which is another way of saying that

an implicant 𝑔𝑗 of g must be totally covered by at least one of the prime

implicants𝑃𝑖 of 𝑔. If such a way of covering is the sole way for 𝑔𝑗 to be covered,

then the corresponding 𝑃𝑖 is an essential prime implicant. However, it might so

happen that 𝑔𝑗 is covered by some alternative means if several prime implicants 𝑃𝑖 ′𝑠

cooperate to cover a single 𝑔𝑗, such that:

1. not a single one of them is capable of covering 𝑔𝑗alone, and

2. if one of them is removed, then the remaining ones will not suffice to

cover 𝑔𝑗.

For such a set of prime implicants both of the following two equivalent

conditions are true:

1. the generalized consensus[19, 29] of these prime implicants is subsumed

by 𝑔𝑗.

2. the union of table entries in column j at the rows i corresponding to

these𝑃𝑖 ′𝑠 is equal to 1 irredundantly (The problem of finding minimal sets of terms

that sum to one irredundantly is known as the Tautology or the Sum-to-One Problem

[20, 33]).

The next step in the VECM method is to write a Petrick or presence function

PF expressing all the IDFs of f. This function is written as a product-of-sums

(p-o-s) formula:

Page 72: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

65

𝑃𝐹 = ⋀𝑗=1𝑗𝑚𝑎𝑥𝐴𝑗 (4)

where 𝐴𝑗 is an expression of the possible ways of selecting prime

implicants to cover the asserted implicant 𝑔𝑗, viz.,

𝐴𝑗 = ⋁ ⋀𝑖∈𝐼𝑃𝑖𝐼 (5)

with the union operator in (5) taken over all sets I that satisfy the 2 properties

𝐼 ∈ 𝐼𝑇 = 1, 2, 3, … , 𝑖𝑚𝑎𝑥 (6)

⋁ 𝑇𝑖𝑗𝑖∈𝐼 = 1 (irr) (7)

where the abbreviation (irr.) stands for " irredundantly".

To find all IDFs of f, the Petrick function PF must be converted into a sum-

of-products form by multiplying its alterms out and invoking well-known

simplification rules [19]. Rushdi and Al-Yahya [30], and Rushdi et al. [70-72]

outline a convenient method for performing multiplication via two-dimensional

tables, where each of the table entries obtained is retained unless it subsumes

another entry in the same row or in the same column. This method is now illustrated

by two examples.

5. Illustrative Examples

Example 1 Consider the relational variable (relvar) 𝑅 with attributes 𝐴, 𝐵, 𝐶, 𝐷, 𝐸

and 𝐹, with the following dependency set, taken from Dates [2].

𝑆 = 𝐴 → 𝐵𝐶, 𝐸 → 𝐶𝐹, 𝐵 → 𝐸, 𝐶𝐷 → 𝐸𝐹. (8)

The set S of FD's in (8) is expressed in equational form as:

𝑔 = 𝐴( ∨ 𝐶) ∨ 𝐸(𝐶 ∨ ) ∨ 𝐵 ∨ 𝐶𝐷( ∨ )

= 𝐴 ∨ 𝐴𝐶 ∨ 𝐸𝐶 ∨ 𝐸 ∨ 𝐵 ∨ 𝐶𝐷 ∨ 𝐶𝐷= 0. (9)

The complete sum of 𝑔 can be obtained via the VEKM-folding algorithm [30, 37] or

the improved Blake-Tison algorithm [30, 71, 72] as:

𝐶𝑆(𝑔) = 𝑃1 ∨ 𝑃2 ∨ 𝑃3 ∨ 𝑃4 ∨ 𝑃5 ∨ 𝑃6 ∨ 𝑃7 ∨ 𝑃8 ∨ 𝑃9 ∨ 𝑃10 ∨ 𝑃11 = 0, (10)

where

𝑃1 = 𝐴𝐵, 𝑃2 = 𝐴𝐶,

𝑃3 = 𝐸𝐶, 𝑃4 = 𝐸𝐹, 𝑃5 = 𝐵𝐸,

𝑃6 = 𝐶𝐷𝐸𝑃7 = 𝐶𝐷𝐹, 𝑃8 = 𝐴𝐸,

𝑃9 = 𝐵𝐶, 𝑃10 = 𝐴𝐹, 𝑃11 = 𝐵𝐹 (11)

Page 73: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 66

Table 1 shows the variable-Entered Cover Matrix (VECM) for this example.

In the first column, the only elements that add to 1 irredundantly is 𝑇11= 1, and

hence 𝑃1 is an essential prime implicant, and should appear as a factor of the Petrick

function. Similarly, 𝑃3, 𝑃4, 𝑃5, 𝑃6 are essential prime implicants since each of the m

solely covers one implicant (In fact, they cover 𝐸𝐶, 𝐸𝐹, 𝐵𝐸, and 𝐶𝐷𝐸, respectively.

For the second column, there are several possibilities for elements adding to 1

irredundantly, namely,

𝑇22 = 1, (12a)

𝑇12⋁𝑇92 = 𝐵⋁𝐵, (12b)

𝑇12⋁𝑇32⋁𝑇52 = 𝐵⋁𝐸⋁𝐵𝐸, (12c)

𝑇32⋁𝑇82 = 𝐸⋁𝐸, (12d)

This means that implicant 𝐴𝐶 at the heading of the second column can be

covered either by 𝑃2 alone, by 𝑃1 and 𝑃9 together, by 𝑃1, 𝑃3 and 𝑃5 together, or by

𝑃3 and 𝑃8 together. This is summarized by the following factor for the Petrick

function:

(𝑃2 ∨ 𝑃1𝑃9 ∨ 𝑃1𝑃3𝑃5 ∨ 𝑃3𝑃8) (13)

Finally the seventh column headed by 𝐶𝐷𝐹 demands a coverage by 𝑃7 alone

or by 𝑃4 and 𝑃6 together (corresponding to 𝐸 ∨ 𝐸 = 1). Therefore the final Petrick

function is

𝑃𝐹 = 𝑃1 (𝑃2 ∨ 𝑃1𝑃9 ∨ 𝑃1𝑃3𝑃5 ∨ 𝑃3𝑃8)𝑃3𝑃4𝑃5𝑃6(P7 ∨ P4P6) (14a)

= 𝑃1𝑃3𝑃4𝑃5𝑃6(𝑃2 ∨ 𝑃9 ∨ 1 ∨ 𝑃8)(𝑃7 ∨ 1) (14b)

= 𝑃1𝑃3𝑃4𝑃5𝑃6 (14c)

Here, the two parentheses in (14a) are replaced by their quotients by the

essential factor (𝑃1𝑃3𝑃4𝑃5𝑃6) in (14b) [20]. There is a single IDS and hence a single

minimal cover for this example, namely

𝑔𝑚𝑖𝑛𝑖𝑚𝑎𝑙 = 𝐴𝐵 ∨ 𝐸𝐶 ∨ 𝐸𝐹 ∨ 𝐵𝐸 ∨ 𝐶𝐷𝐸, (15a)

𝑆𝑚𝑖𝑛𝑖𝑚𝑎𝑙 = 𝐴 → 𝐵, 𝐸 → 𝐶, 𝐸 → 𝐹, 𝐵 → 𝐸, 𝐶𝐷 → 𝐸 (15b)

Example 2

This example seems innocently simple, but it will turn out to be far more

complicated than the earlier example. Here, there are four variables, A, B, C, and D

related by a cyclic dependency set:

Page 74: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

67

𝑆=𝐴 → 𝐵, 𝐵 → 𝐶, 𝐶 → 𝐷, 𝐷 → 𝐴, (16)

which corresponds to the equational form,

𝑔 = 𝐴𝐵 ∨ 𝐵𝐶 ∨ 𝐶𝐷 ∨ 𝐷𝐴 = 0. (17)

The complete sum for g consists of 12 prime implicants (Rushdi and Al-

Yahya, 2001a), namely:

𝐶𝑆(𝑔) = 𝐴𝐵 ∨ 𝐴𝐶 ∨ 𝐴𝐷 ∨ 𝐵𝐴 ∨ 𝐵𝐶 ∨ 𝐵𝐷 ∨ 𝐶𝐴 ∨ 𝐶𝐵 ∨ 𝐶𝐷 ∨ 𝐷𝐴 ∨ 𝐷𝐵 ∨ 𝐷𝐶. (18)

Table 2 shows the Variable-Entered Cover Matrix for this example. In the first

column, there are several possibilities of elements adding to 1 irredundantly, namely

𝑇11 = 1 (19a)

𝑇21 ∨ 𝑇81 = 𝐶 ∨ 𝐶 (19b)

𝑇31 ∨ 𝑇(11)1 = 𝐷 ∨ 𝐷 (19c)

𝑇21 ∨ 𝑇91 ∨ 𝑇(11)1 = 𝐶 ∨ 𝐶𝐷 ∨ 𝐷 (19d)

𝑇31 ∨ 𝑇81 ∨ 𝑇(12)1 = 𝐷 ∨ 𝐶 ∨ 𝐷𝐶 , (19e)

which means a contribution to the Petrick function of the form:

(𝑃1 ∨ 𝑃2𝑃8 ∨ 𝑃3𝑃11 ∨ 𝑃2𝑃9𝑃11 ∨ 𝑃3𝑃8𝑃12), (20)

and hence the final Petrick function of this example is

𝑃𝐹 = (𝑃1 ∨ 𝑃2𝑃8 ∨ 𝑃3𝑃11 ∨ 𝑃2𝑃9𝑃11 ∨ 𝑃3𝑃8𝑃12)(𝑃5 ∨ 𝑃2𝑃4 ∨ 𝑃6𝑃12 ∨ 𝑃3𝑃4𝑃12 ∨ 𝑃2𝑃6𝑃10)(𝑃9 ∨ 𝑃3𝑃7 ∨

𝑃6𝑃8 ∨ 𝑃1𝑃6𝑃7 ∨ 𝑃3𝑃4𝑃8)(𝑃10 ∨ 𝑃4𝑃11 ∨ 𝑃7𝑃12 ∨ 𝑃5𝑃7𝑃11 ∨ 𝑃4𝑃8𝑃12). (21)

Table 3 illustrates the multiplication of the first and third factors on (21)

while Table 4 depicts the multiplication of the second and fourth factors in (21). In

each table, 7 subsuming terms are circled out and deleted, so that the outcome in

each table reduces from 25 terms to 18 terms. The Petrick function can be obtained

by multiplying the 18 outcomes of Table 3 with the 18 outcomes of Table 4, and

then deleting any subsuming terms among the resulting 324 terms. However, we

note that there is a common outcome in Tables 3 and 4, namely 𝑃3𝑃4𝑃8𝑃12 , which

will force its way to appear as a term in the final Petrick function (PF).Now, we

need to multiply the remaining 17 outcomes of table 3 by the remaining 17

outcomes of Table 4. Since the required multiplication cannot fit legibly in one

page, we present it in four tables (Table 5 – Table 8). In each of these tables,

subsuming outcomes are circled and deleted. Five minimal 4-literal outcomes are

highlighted. In Table 5, namely 𝑃1𝑃5𝑃9𝑃10, 𝑃2𝑃4𝑃9𝑃11, 𝑃3𝑃5𝑃7𝑃11 , 𝑃2𝑃6𝑃8𝑃10 and

𝑃1𝑃6𝑃7𝑃12. In addition to the earlierly separated 4-literal outcome 𝑃3𝑃4𝑃8𝑃12, they

constitute six minimal covers for this problem. These minimal covers are displayed

in six four-variable maps in Fig. 1.

Page 75: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 68

Figures 2 and 3 give graph interpretations of the results in this example. Figure 2 is a complete bidirectional implication graph representation of CS(g) in (18), while Fig. 3 offers graphs of samples of the 4-literal, 5-literal, and 6-literal IDFs obtained. Each of the three graphs in Fig. 3 is an IDF for the cyclic function g in (17) indeed since it is a cyclic graph and ceases to be so if one of its branches is omitted. The implication graphs in Figs. 2 and 3 as well as the Karnaugh maps in Fig. 1 can be viewed as validation techniques for the covering algorithm of this paper.

Work on this example is very tedious and cumbersome. One can relax the present covering problem from one of obtaining all IDFs to one obtaining all minimal covers. However, though the latter problem is certainly simpler than the former one, it is still intractable (as we will shortly see).

From a practical point of view, one needs just a single minimal sum. For this example, one can stop after constructing Tables 3 and 4 and declare that the common entry (shown shaded in them) which is 𝑃3𝑃4𝑃8𝑃12 is one minimal sum. With this, one can avoid the constructions of Tables 5-8.

6. Discussion

The covering problem herein is intractable. This means that its complexity increases exponentially as a function of the number of variables involved. Let us consider a generalization of Example 2 with an n-variable cyclic dependency set

Sn = X1 → X2, X2 → X3 , X3 → X4 , … , Xn−1 → Xn, Xn → X1 , (22)

The dependency set S in (16) can be identified as S4 in (22). The set Sn corresponds to the equational form

gn= (⋁ Xi

ni=1 )⋀(⋁ Xj

nj=1 ) = ⋁ 𝑋𝑖

𝑛𝑖=1 ⋁ (𝑋𝑖𝑋𝑗)𝑛

𝑗=1𝑗#𝑖

. (23)

Formula (23) is an absorptive formula (one in which no term can absorb

another) [20]. Certain pairs of terms 𝑋𝑖𝑋𝑗 and 𝑋𝑗𝑋𝑘 have a consensus 𝑋𝑖𝑋𝑘, but that

consensus is already there in the formula 𝑔𝑛. Therefore, the formula is its own complete sum CS(𝑔𝑛). This means that the number of prime implicants of 𝑔𝑛 is (n

2-2). Since the implication graph for 𝑔𝑛 is a complete digraph (see Fig 2),

a minimal coverage of 𝑔𝑛 is a simple loop in such a graph (see Fig. 3(a)). Hence, a minimal coverage of 𝑔𝑛 consists of n prime implicants, which corresponds to n edges that constitute a simple loop in the n-node digraph. Now, the number of minimal sums is the same as the number of permutations among (n-1) nodes to construct a loop that starts and ends at an arbitrarily selected node, which is (n-1)!. Now according to the well-known Sterling formula [73-76]:

Page 76: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

69

lim𝑛→∞ 𝑛! =𝑛𝑛

𝑒𝑛 √2𝜋𝑛. (24)

Hence the number of minimal sums as 𝑛 → ∞ is

(n − 1

e)

n−1

√2𝜋(𝑛 − 1),

which is exponential in n. The above discussion asserts that the problem of

finding all minimal sums is of exponential complexity [77, 78]. Since the number of

all IDFs is no less than that of all minimal sums, then the problem of finding all

IDFs is also of exponential complexity. Table 9 summarizes the results in this

discussion, and gives the reader a glimpse of the "curse of dimensionality" of the

present case. The huge numbers that appear in Table 9 should not be thought of as a

"defeat of purpose" for this paper. The paper is intended as a treatment of a certain

application of the covering problem, namely that of the functional dependencies of a

database. This is a case where the complexity issue is not of much concern, since

only small or medium sized problems are encountered. Most of the practical

examples cited by popular texts on Relational [1-8] sound as simple as Example 1

and not as hard as Example 2.

7. Conclusions

This paper is in a sense a continuoation of earlier serious attempt to transform

relational database concepts to the switching-algebraic domain and hence to utilize

switching-algebraic procedures and concepts in relational databases [14-18, 36, 37].

We stress the pedagogical advantages gained when one departs from the traditional

database approach and utilizes tools of switching theory and digital design. The

traditional database approach, adopted by almost all textbooks on database design is

based on the heuristic application of axioms and lemmas for the manipulation of

functional dependencies. This study replaces the traditional heuristics in the relational

domain by more powerful and insightful algorithms in the switching domain.

An interesting topic for further research stems from the fact that the function dealt with

in deriving the closure for dependency sets is a disjunction of terms derived from

particular Horn clauses. Each of these terms is a product (ANDing) of a single

complemented literal with some other un-complemented literals. This feature should

be studied with the hope of simplifying the current VECM algorithm.

Acknowledgments

The authors are indebted to two anonymous reviewers whose challenging suggestions

forced a sbustantial rewriting of this manuscript and hopefully a significant

improvement in it readability.

Page 77: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 70

Table (1). The Variable-Entered Cover Matrix (VECM) for the function in Example 1.

𝑪𝑫𝑭 𝐂𝐃𝐄 𝐁𝐄 𝐄𝐅 𝐄𝐂 𝐀𝐂

𝐀𝐁

𝐴𝐵 𝐴𝐵 0 𝐴𝐵 𝐴𝐵 𝐵 1 𝐏𝟏 = 𝐀𝐁

0 0 𝐴𝐶 𝐴𝐶 𝐴 1 𝐶 𝐏𝟐 = 𝐀𝐂

0 0 0 𝐶 1 𝐸 𝐸𝐶 𝐏𝟑 = 𝐄𝐂

𝐸 0 0 1 𝐹 𝐸𝐹 𝐸𝐹 𝐏𝟒 = 𝐄𝐅

BE B 1 0 0 BE 0 𝐏𝟓 = 𝐁𝐄

E 1 CD 0 0 0 CDE 𝐏𝟔 = 𝐂𝐃𝐄

1 F CDF CD 0 0 CDF 𝐏𝟕 = 𝐂𝐃𝐅

AE A A 0 0 E E 𝐏𝟖 = 𝐀𝐄

0 0 C BC B B 0 𝐏𝟗 = 𝐁𝐂

A AF AF A AF F F 𝐏𝟏𝟎 = 𝐀𝐅

0 BF F 0 BF BF 0 𝐏𝟏𝟏 = 𝐁𝐅

Table (2). The Variable-Entered Cover Matrix (VECM) for the function in Example 2.

𝐷𝐴 𝐶𝐷 𝐵𝐶 𝐴𝐵

0 AB 0 1 𝑃1 = 𝐴𝐵

0 0 A C 𝑃2 = 𝐴𝐶

0 A AD D 𝑃3 = AD

B BA A 0 𝑃4 = 𝐵𝐴

BC 0 1 0 𝑃5 = 𝐵𝐶

Page 78: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

71

𝐷𝐴 𝐶𝐷 𝐵𝐶 𝐴𝐵

0 B D 0 𝑃6 = 𝐵𝐷

C A 0 0 𝑃7 = 𝐶𝐴

CB 𝐵 0 C 𝑃8 = 𝐶𝐵

0 1 0 CD 𝑃9 = CD

1 0 DA 0 𝑃10 = 𝐷𝐴

B 0 0 D 𝑃11 = DB

C 0 D DC 𝑃12 = 𝐷𝐶

Table (3). Multiplication of the first and third parentheses in Equation (21). The outcome

𝑷𝟑𝑷𝟒𝑷𝟖𝑷𝟏𝟐 common with Table 4 is distinguished. The 2-literal and 3-literal outcomes

are highlighted.

1P 32

PP113

PP1192

PPP1283

PPP

9P

73PP

86PP

761PPP

843PPP

91PP

731PPP

861PPP

761PPP

8431PPPP

982PPP

8732PPPP

862PPP

8432PPPP

1193PPP

1173PPP

11863PPPP

11843PPPP

1192PPP

11983PPPP

12873PPPP

12863PPPP

119732PPPPP

119862PPPPP

1197621PPPPPP

1198432PPPPPP

1287631PPPPPP

87631PPPPP

87621PPPPP

12843PPPP

Page 79: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 72

Table (4). Multiplication of the second and fourth parentheses in Equation (21). The outcome

𝐏𝟑𝐏𝟒𝐏𝟖𝐏𝟏𝟐 common with Table 3 is distinguished. The 2-literal and 3-literal outcomes

are highlighted.

5P 42

PP126

PP1243

PPP1062

PPP

10P

114PP

127PP

1175PPP

1284PPP

105PP

1154PPP

1275PPP

1175PPP

12854PPPP

1142PPP

1142PPP

12742PPPP

12842PPPP

12106PPP

121164PPPP

1276PPP

12864PPPP

121043PPPP

1062PPP

121143PPPP

12743PPPP

1211765PPPPP

117542PPPPP

12117543PPPPPP

1110642PPPPP

1210762PPPPP

11107652PPPPPP

12108642PPPPPP

12843PPPP

Table (5). Multiplication of the 2-literal and 3-literal outcomes of Tables 3 and 4 Five 4-literal

outcomes are highlighted

Page 80: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

73

Table (6). Multiplication of the 4 literal outcomes of Table 3 by the 2 literal and 3 literal outcomes

of Table 4

Table (7). Multiplication of the 2-literal and 3-literal outcomes of Table 3 by the 4-literal outcomes

of Table 4.

Table (8). Multiplication of the 4-literal outcomes of Table 3 by the 4-literal outcomes of Table 4

Page 81: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 74

Table (9). Certain parameters for the n-varialbe cyclic dependency set.

No. of variables No. of prime

implicants

No. of prime implicants in a

minimal sum No. of minimal sums

n n2-n n (n-1)!

2 2 2 1

3 6 3 2

4 12 4 6

5 20 5 24

10 90 10 362880

100 9900 100 9.3326*10155

1000 999000 1000 4.0239*102564

10000 ~108 10000 2.8463*1035655

Page 82: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

75

Fig. (1). Six four-variable Karnaugh maps representing the six minimal covers for Example 2.

𝑃1𝑃6𝑃7𝑃12: 𝑃1𝑃5𝑃9𝑃10:

𝑃2𝑃4𝑃9𝑃11:

𝑃2𝑃6𝑃8𝑃10: 𝑃3𝑃4𝑃8𝑃12:

𝑃3𝑃5𝑃7𝑃11:

Page 83: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 76

BAP1

ABP4

BCP8CBP

5

CDP12

DCP9

DAP3

ADP10

BDP11

D

B

P 6

AC

P7

CA

P2

Fig. (2). A complete bidirectional graph depicting CS(g) in (18).

3P

4P

8P

12P

12843(a) PPPP 1110952

(b) PPPPP

10P

11P

5P

2P

9P

1187652(c) PPPPPP

11P

5P

2P

7P

8P

6P

Fig. (3). Sample graphs depicting sample 4-element, 5-element, and 6-element graphs.

8. References

[1 ] Maier, D., 1983.The Theory of Relational Databases, Computer Science Press,

Rockville, MD, USA.

[2 ] Dates, C.J., 2004. An Introduction to Database Systems. 8th Edn, Pearson

Education/Addison-Wesley,Boston,pp:1005.

[3 ] Dates, C. J., 2005. Database in Depth: Relational Theory for Practitioners,

Sebastopol, CA, USA.

[4 ] Dates, C. J., 2012. Database Design and Relational Theory: Normal Forms

and All That Jazz, O'Reilly Media, Sebastopol, CA, USA.

Page 84: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

77

[5 ] Coronel, C. , S. Morris, and P. Rob, 2009. Database Systems: Design,

Implementation and Management, 9th Edition, Cengage Learning, Boston,

MA, USA.

[6 ] Elmasri, R., and S. Navathe, 2010. Fundamentals of Database Systems, 6th

Edition, Addison Wesley, Boston, MA, USA.

[7 ] Tamer Özsu, M. , and P. Valduriez, 2011. Principles of Distributed Database

Systems, 3rd

Edition, Springer, New York, NY, USA.

[8 ] Hernandez, M. J., 2013. Database Design for Mere Mortals: A Hands-On

Guide to Relational Database Design, 3rd

Edition, Addison Wesley,

Boston, MA, USA.

[9 ] Delobel, C. and R.G. Casey, 1973. Decomposition of a data base and the

theory of Boolean switching functions. IBM Journal of Research and

Development, 17: 374-386.

[10 ] Delobel, C., R. G. Casey, and P. A. Bernstein, 1977. Comment on

'Decomposition of a data base and the theory of Boolean switching

functions,' IBM Journal of Research and Development, 21(5) : 484-485.

[11 ] Fagin, R., 1977. Functional dependencies in a relational database and

propositional logic. IBM J. Res. Dev., 21: 534-544.

[12 ] Fagin, R., 1982. Horn clauses and database dependencies. J. Assoc. Comput.

Machinery, 29: 952-985.

[13 ] Sagiv, Y., C. Delobel, D.S. Parker and R. Fagin, 1981. An equivalence

between relational database dependencies and a fragment of propositional

logic. J. Assoc. Comput. Machinery, 28: 435-453.

[14 ] Russomano, D.J. and R.D. Bonnell, 1999. A pedagogical approach to database

design via Karnaugh maps. IEEE Transaction on Education, 42: 261-270.

[15 ] Zhang, Y.S., 2009a. Determining all candidate keys based on Karnaugh map.

Proceedings of the International Conference on Information Management,

Innovation Management and Industrial Engineering, Dec. 26-27, IEEE

Xplore Press, Xi'an, pp: 226-229.

[16 ] Zhang, Y.S., 2009b. Determining closure of sets of attributes based on

Karnaugh map. Proceedings of the 2nd International Symposium on

Knowledge Acquisition and Modeling, Nov. 30-Dec. 1, IEEE Xplore

Press,Wuhan, pp: 190-193.

[17 ] Zhang, Y.S., 2010. A visual explanation for computing minimal cover.

Proceedings of theInternational Conference on Information Management,

Innovation Management and Industrial Engineering,Nov. 26-28, IEEE

Xplore Press,Kunming, pp: 125-128.

Page 85: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 78

[18 ] YiShun, Z. and J. ChunHua, 2011. Logic Algebra Method for Solving

Theoretic Problems of Relational Database. In: Computer, Informatics,

Cybernetics and Applications, He, X., E. Hua, X. Liu and Y. Lin (Eds.).,

Springer, Dordrecht,pp:1706-1706.

[19 ] Muroga, S., 1979. Logic Design and Switching Theory. 1st Edn., Wiley, New

York, pp:617.

[20 ] Brown, F. M., 1990. Boolean Reasoning: The Logic of Boolean Equations. 1st

Edn., Springer, Boston, pp: 273.

[21 ] Gregg, J.R., 1998. Ones and Zeroes: Digital Circuits and the Logic of Sets. 1st

Edn., Wiley, New York, NY, USA.

[22 ] Rushdi, A. M., 1997. Karnaugh map, Encyclopedia of Mathematics,

Supplement Volume I, M. Hazewinkel (editor), Boston, Kluwer Academic

Publishers, pp. 327-328. Available at

http://www.encyclopediaofmath.org/index.php/Karnaugh_map.

[23 ] Rushdi, A. M., 1983. Symbolic reliability analysis with the aid of variable-

entered Karnaugh maps, IEEE Transactions on Reliability, R-32(2): 134-

139.

[24 ] Rushdi, A.M., 1985. Map derivation of the minimal sum of a switching

function from that of its complement. Microelectronics and Reliability,

25: 1055- 1065.

[25 ] Rushdi, A.M., 1987. Improved variable-entered Karnaugh map procedures.

Computers and Electrical Engineering, 13: 41-52.

[26 ] Rushdi, A.M., 2001. Prime-implicant extraction with the aid of the variable-

entered Karnaugh map. Umm Al-Qura University Journal: Science,

Medicine and Engineering, 13: 53-74.

[27 ] Rushdi, A.M., 2001. Using variable-entered Karnaugh maps to solve Boolean

equations. International Journal of Computer Mathematics, 78: 23-38.

[28 ] Rushdi, A. M., and Al-Khateeb, D. L.,1983. A review of methods for system

reliability analysis: A Karnaugh-map perspective, Proceedings of the First

Saudi Engineering Conference, Jeddah, Saudi Arabia, vol. 1, pp. 57-95.

[29 ] Rushdi, A. M. and H. A. Al-Yahya, 2000. A Boolean minimization procedure

using the variable-entered Karnaugh map and the generalized consensus

concept. International Journal of Electronics, 87: 769-794.

[30 ] Rushdi, A. M. and H. A. Al-Yahya, 2001. Derivation of the complete sum of a

switching function with the aid of the variable entered karnaugh map. King

Saud University: J. Eng. Sci., 13: 239-269.

[31 ] Rushdi, A. M. and H. A. Al-Yahya, 2001. Further improved variable-entered

Karnaugh map procedures for obtaining the irredundant forms of an

Page 86: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

79

incompletely-specified switching function. J. King Abdulaziz Univ. Eng.

Sci., 13: 111-152.

[32 ] Rushdi, A.M. and H. M. Al-Yahya, 2002. Variable-entered Karnaugh map

procedures for obtaining the irredundant disjunctive forms of a switching

function from its complete sum. J. King Saud Univ. Eng. Sci., 14: 13-27.

[33 ] Rushdi, A. M. A., and Albarakati, H. M., 2012.Using variable-entered

Karnaugh maps in determining dependent and independent sets of Boolean

functions, Journal of King Abdulaziz University: Computers and

Information Technology, 1(2): 45-67.

[34 ] Rushdi, A. M. A., and Albarakati, H. M., 2014. Prominent classes of the most

general subsumptive solutions of Boolean equations, Information

Sciences,281: 53-65.

[35 ] Rushdi, A. M. and M. H. Amashah, 2011. Using variable-entered Karnaugh

maps to produce compact parametric solutions of Boolean equations.

International Journal of Computer Mathematics, 88: 3136-3149.

[36 ] Rushdi, A.M.A. and O.M. Ba-Rukab, 2014. Switching algebraic analysis of

relational databases. J. Mathem. Stat., 10: 231-243.

[37 ] Rushdi, A.M.A. and O.M. Ba-Rukab, 2014. Map derivation of the closures for

dependency and attribute sets and all candidate keys for a relational

database, Journal of King Abdulaziz University: Engineering Sciences,

25(2): 3-34.

[38 ] Rushdi, A. M. A., and Ghaleb, F. A. M., 2014. The Walsh spectrum and the

real transform of a switching function: A review with a Karnaugh-map

perspective, Journal of Qassim University: Engineering and Computer

Sciences, 7 (2): 73-112.

[39 ] Rushdi, A. M. A., Hassan, A. K., 2015. Reliability of migration between

habitat patches with heterogeneous ecological corridors, Ecological

Modelling, 304, 1-10.

[40 ] Rushdi, A. M. A., and Hassan, A. K., 2016. An exposition of system reliability

analysis with an ecological perspective, Ecological Indicators, 63, 282-295.

[41 ] Petrick, S. R., 1956. A direct determination of the irredundant forms of

a Boolean function from the set of prime implicants. Technical Report

AFCRC-TR-56-110, Air Force Cambridge Research Center, Cambridge,

MA, USA.

[42 ] Petrick, S. R., 1960. On the minimization of Boolean functions. Proceedings of

the International Conference on Information Processing, Paris, p. 195.

Published by Oldenbourg, Germany, 1960, pp. 422-423.

Page 87: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 80

[43 ] Gimpel, J. F., 1965. A method of producing a Boolean function having an

arbitrarily prescribed prime implicant table. IEEE Transactions on

Electronic Computers, 3: 485-488.

[44 ] Mayoh, B. H, 1968. On finding optimal covers. International Journal of

Computer Mathematics, 2: 57-73.

[45 ] Breuer, M. A., 1970. Simplification of the covering problem with application

to Boolean expressions. Journal of the ACM (JACM), 17: 166-181.

[46 ] Reusch, B., 1975. Generation of prime implicants from subfunctions and a

unifying approach to the covering problem, IEEE Transactions on

Computers, C-24 (9): 924-930.

[47 ] Jeong, S.-W., and F. Somenzi, 1992. A new algorithm for the binate covering

problem and its application to the minimization of Boolean relations.

Digest of Technical Papers., IEEE/ACM International IEEE Conference on

Computer-Aided Design, ICCAD-92.

[48 ] Coudert, O., 1994. Two-level logic minimization: An overview. Integration,

the VLSI journal, vol. 17, no. 2, pp. 97–140.

[49 ] Palopoli, L., F. Pirri, and C. Pizzuti, 1999. Algorithms for selective

enumeration of prime implicants. Artificial Intelligence, 111(1): 41-72.

[50 ] Coudert, O., and Sasao, T., 2001. Two-Level Logic Minimization, Logic

Synthesis and Verification. S. Hassoun & T. Sasao (ed.), Kluwer Academic

Publishers, chapter 1, pp. 167–196.

[51 ] Arslan, N., Sertbas, A., 2002. An educational computer tool for Simplification

of Boolean function’s via Petrick’s Method. Journal of Electrical &

Electronics, vol. 2, no. 2, pp. 555–561.

[52 ] Fallah, H., Sadigh, A. N., & Aslanzadeh, M., 2009. Covering problem. In

Facility Location (pp. 145-176). Physica-Verlag HD.

[53 ] Ren, Z., Feng, Z., Ke, L., Zhang, Z., 2010. New ideas for applying ant colony

optimization to the set covering problem. Comput. Ind. Eng., pp. 774–784.

[54 ] Steinbach, B. and C. Posthoff, 2012. Improvements of the construction of exact

minimal covers of Boolean functions. Computer Aided Systems Theory–

EUROCAST 2011. Springer, Berlin-Heidelberg, pp. 272-279.

[55 ] Shieh, B. S., 2013. Solution to the covering problem. Information Sciences,

222, 626-633.

[56 ] Lucas, A., 2013. Ising formulations of many NP problems. arXiv preprint

arXiv:1302.5843.

[57 ] Roth, Ch., and Kinney, L., 2013. Fundamentals of Logic Design. Cengage

Learning.

Page 88: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

81

[58 ] Yaping, X., Hongwei, L., &Yijun, L., 2013, August. The optimization method of

simplifying logic function. In Signal Processing, Communication and

Computing (ICSPCC), 2013 IEEE International Conference on (pp. 1-4). IEEE.

[59 ] Crawford, B., Soto, R., Monfroy, E., 2013. Cultural algorithms for the set

covering problem. In:Tan, Y., Shi, Y., Mo, H. (eds.) Advances in Swarm

Intelligence, 4th International Conference.Lecture Notes in Computer

Science, vol. 7929, pp. 27–34. Springer, Harbin, China.

[60 ] Crawford, B., Soto, R., Cuesta, R., Paredes, F., 2014. Application of the

artificial bee colony algorithmfor solving the set covering problem. Sci.

World J., Article ID 189164, 1–8.

[61 ] Crawford, B., Soto, R., Olivares-Suárez, M., Paredes, F., 2014. A binary firefly

algorithm for the setcovering problem. In: 3rd Computer Science On-line

Conference 2014, Modern Trends andTechniques in Computer Science,

vol. 285, pp. 65–73. Springer.

[62 ] Crawford, B., Soto, R., Aballay, F., Misra, S., Johnson, F., Paredes, F., 2015.

Computational Scienceand Its Applications—ICCSA 2015: 15th

International Conference, Banff, AB, Canada, June 22–25, 2015,

Proceedings, Part IV, chapter A Teaching-Learning-Based

OptimizationAlgorithm for Solving Set Covering Problems, pp. 421–430.

Springer International Publishing, Cham.

[63 ] Crawford, B., Soto, R., Peña, C., Palma, W., Johnson, F., Paredes, F., 2015.

Solving the set coveringproblem with a shuffled frog leaping algorithm. In:

Nguyen, N.T., Trawinski, B., Kosala, R).eds.) Intelligent Information and

Database Systems—7th Asian Conference. LNCS, vol. 9012, pp. 41–50.

Springer, Bali, Indonesia.

[64 ] Wiśniewski, R., Bazydło, G., &Węgrzyn, M., 2015. Application of

Hypergraphs in the Prime Implicants Selection Process. IFAC-

PapersOnLine, 48(4), 302-305.

[65 ] Crawford, B., Soto, R., Berrios, N., &Olguín, E., 2016. Cat Swarm

Optimization with Different Binarization Methods for Solving Set Covering

Problems. In Artificial Intelligence Perspectives in Intelligent Systems (pp.

511-524). Springer International Publishing.

[66 ] Crawford, B., Soto, R., Córdova, J., &Olguín, E., 2016. A Nature Inspired

Intelligent Water Drop Algorithm and Its Application for Solving The Set

Covering Problem. In Artificial Intelligence Perspectives in Intelligent

Systems (pp. 437-447). Springer International Publishing.

[67 ] Reyes, V., Araya, I., Crawford, B., Soto, R., &Olguín, E., 2016. A Beam-Search

Approach to the Set Covering Problem. In Artificial Intelligence Perspectives

in Intelligent Systems (pp. 395-402). Springer International Publishing.

Page 89: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 82

[68 ] Cormen, C. Leiserson, R. Rivest, 1990. Introduction to Algorithms, MIT

Press, Cambridge.

[69 ] Wolsey, L. A., &Nemhauser, G. L., 2014. Integer and Combinatorial

Optimization. John Wiley & Sons.

[70 ] Rushdi, A.M., T. M. Alshehri, M. Zarouan, and M. A. Rushdi, 2014. Utilization of

the modern syllogistic method in the exploration of hidden aspects in

engineering ethical dilemmas, Journal of King Abdulaziz University:

Computers and Information Technology, Vol. 3, No. 1, pp. 73-127.

[71 ] Rushdi, A.M., M. Zarouan, T. M. Alshehri, and M. A. Rushdi, 2015. A modern

syllogistic method in intuitionistic fuzzy logic with realistic tautology, The

Scientific World Journal, Vol. 2015, Article ID 327390, 12 pages.

[72 ] Rushdi, A. M., M. Zarouan, T. M. Alshehri, and M. A. Rushdi, 2015.

Incremental version of the modern syllogistic method, Journal of King

Abdulaziz University: Engineering Sciences, Vol. 26, No. 1, pp. 25-51.

[73 ] Milton Abramowitz and Irene A. Stegun, eds., 1964. Handbook of

MathematicalFunctions With Formulas, Graphs, and MathematicalTables,

NBS Applied Mathematics Series 55, National Bureau ofStandards,

Washington, DC.

[74 ] Dan Romik, 2000. Stirling’s Approximation for n!: The Ultimate Short

Proof?, The American Mathematical Monthly, Vol. 107, No. 6, 556–557.

[75 ] Li, Y. C. 2006. A note on an identity of the gamma function and Stirling’s

formula. Real Analysis Exchange, 32(1), 267-272.

[76 ] Zwillinger, D. (Ed.). 2014. Table of integrals, series, and products

(The eighth edition of the classic Gradshteyn and Ryzhik). Elsevier.

[77 ] Johnson, C. M. and Reiter, E. E. 2012. Limits of Computation: An Introduction

to the Undecidable and the Intractable, Chapman and Hall/CRC.

[78 ] Reus, B. 2016. Limits of Computation: From a Programming Perspective.

Springer International Publishing.

Page 90: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Pedagogical Derivation of All Irredundant Dependency …

83

اشتقاق مجيع جمموعات االعتماد غري الوافرة لقاعدة بياانت عالقية 2عمر حممد ابركابو 1علي حممد علي رشدي

جامعة امللك عبد العزيز -كلية اهلندسة -الكهرابئية واحلاسب ةاهلندسقسم [email protected]

مللك عبد العزيزجامعة ا -رابغ -كلية احلاسب وتقنية املعلومات -قسم تقنية املعلومات [email protected]

(10/8/2016قبل للنشر ، 9/3/2016)قدم للنشر

تقدم ورقة البحث هذه طريقة تعليمية الشتقاق مجيع جمموعات االعتماد غري الوافرة )ج ع و( ملخص البحث.

تمادات الدالية )ع د( يف )وتغطية أصغرية )غ ص(( لقاعدة بياانت عالقية. تستغل الورقة التكافؤ املثبت بني االعقواعد البياانت العالقية وجزء من جرب التبديل مبين منطيا مما يعرف بعبارات هورن. ولذلك تقرتح الورقة توظيف األدوات املختلفة جلري التبديل يف ميدان قواعد البياانت، وبصفة خاصة تولد الورقة جمموعات االعتماد غري الوافرة

جدول تغطية متغري احملتوايت )ج غ غ ح( إلنشاء مايعرف ابسم دالة برتيك. يتم شرح وتغطية أصغرية بتوظيفرتح ابلتفصيل وعرضه من خالل مثالني توضيحيني. إن األسلوب التقليدي املتبع من قبل جل مراجع اإلجراء املق

قواعد البياانت العالقية ، والذي يعتمد على تطبيق إجراءات تنقيبية تستخدم مسلمات االستدالل ال يستطيع أن عات عديدة من هذا النوع، كما أنه ال حيصل حيدد ما إذا كان مثة جمموعة اعتماد غري وافرة وحيدة، أو أنه توجد جممو

على هذه اجملموعات العديدة إن وجدت. إن اإلجراء املتبع هنا ينتج مجيع هذه اجملموعات، أو قد يكتفي بعدد مطلوب منها، وحيدد أيها حيقق التغطية األصغرية. يتم التأكد من صحة هذا اإلجراء بواسطة خرائط كارنوه والرسوم

بني هذه الورقة أن مسألة التغطية حمل الدراسة هاهنا ذات تعقيد أسي، ومن مث فإهنا غري قابلة للتتبع. غري املوجهة. ت أن قضية التعقيد ليست بذات أمهية يف التطبيق العملي احلايل لقواعد البياانت العالقية.

Page 91: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

Ali Rushdi and Omar Ba-Rukab 84

Page 92: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

אوאد

אא

א ومא،وאאא7א465345جא01/.(-دא)+א*( و)'&%$#"!!א مאW א א א

مא א אא א א

א א א

אمא א) א' &%وא$#ول

אW 1AK+אא1@?<=א>;:9

EאאאدאW

١ JE@1אWFG+HI+9א Q%Rل"!IEN9OوאF.KGLو&FFعאRKE ٢ J &LאALאWV:3Lא%(אن( .وא+א 4X1 ]وא3@1@?وא3ZوYאA Kو3ولא ضא

٣ JV^!AאALאF_AX WEAA1`[aV^!bA)K

٤ J3:Vو<אeאא)dאعא<Z3'אא LאK

٥ JgאLאW/hiאdbوאI[I'وIVZRض Kو3ول

٦ J3ZدאאA34א

EوطאW

١ JklאVא=و&د@Hوmnא)gوoא Lوא'Z3>وאHl>3)E@1نאZ9نIK ٢ JbوIm4X1bE@1نאZ9نIp(I*مK

٣ JqZ@3 r(א%)ALא1@?א#$K

W"! אEج

sطאd9E@1אq9AW ١ Jgאu/h،وuRvr9א אنאdZو4>1wE01مאA9نIK

٢ J>5p(I1`)[I%א?hI4Vد Kذنz'-)>3אy9@3ز5

٣ J'~Lو4אdZאنא%VARאLאg،و~(O<=3.א <9+אu/hE01<=א;:9-X9wא9אdZو4א -u9:Eh9:;<٢٠٠وאK

٤ J3אم<4(>E@13אZ9(Microsoft word)مfont 12و39 T imes New RomanوR)#)،L3<א%`lא.>F!4K

٥ J-دKH@אg)E@1א(وא*אول9:9Iy٢٠qo0@KHA4K

٦ JאنאE@1وאqאE01و3Z9نIA3)6وlא@K!א>+ 9 Kאu4وu1Aא وא*א

٧ JKI@KH+)א#rK

٨ JE@1א(>X@9سR%1/م0+ذوb'l>Lא&#دא)+אL'65א9K

IE9'وuدא)+b.(< .9KI'5%אb'>Lمدא)+bIאس(< (p3א`Wאb'~>#&LאI1R#&אLאb%)E@1אنא Rوא)3!'אI6وlאelאqFGLאqRFO! )g.>E9'وאqRF(u3aEאRدqbRא،qbRא

F.b.>E@K!مאb'IqK

]،5<אWq(/ل1אא?Knوאo09א <א دZLא)%א١،عL١٦ د،م،&( אQאsدאKk?אVoאFم٢٠٠٤E،١٥١- ١٠١K

kE3ZאWلذ/)،@K!ذא#). >).b+(دאL%א'59z١٦،ص٨Kx&Lאqb'3ZR#&אLאb%)I+(دא#k3Zאنא Rوא)3!'אI6وlאelאqFGLאq>13). >).bF(u3aEאRZنאqאRK

نW(/لH،FאK^3אnALאWA1`א9ضد'א94و،W،Rوlא#>`Lم١٩٨٨אK ٩ J$XR+A3)F)%E@1>A 3Lא!'وאمא#K

١٠ Jول-qbאE@1و9 نא*gA3)b)אولوאאنaאqb qא* >qولوאאنRقא* >K

١١ J 9K دאu10H65E@1א4eIو9

١٢ J3)-9'9 `א34E01.(-אوLאu/h-)K

١٣ Jل 9)+ #)،.Z9א'A%!صLאg9 9K:مא5E01&אeא3

١٤ JARKG)'V%א-'אeو34LאدאLא K

&و%$אא#E-mail: [email protected]

Page 93: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram
Page 94: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

ب‌

Page 95: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

ج‌

(1)العدد – (9)المجلد

م2016 يناير –هـ 1437 ربيع األول

النشر العلمي والرتمجة

Page 96: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

د‌

1429/ 2023رقم اإليداع :

هيئة التحرير (رئيس التحرير) أ.د./ حممد عبد السميع عبد احلليم .1 أ.د/ حممد عبد العزيز عرفان .2 أ.د/ سامل ضو نصري .3 د/ أمحد علي احلجي .4 عبداخلالق نصراشرف سعيد د./ .5 (سكرتري التحرير) د./ شريف حممد عبد الفتاح اخلويل .6

ةللمجل ةاالستشاري ةأعضاء اهليئ

اهلندسة املدنية مصر. –لبحوث املياه يللمياه وأستاذ املوارد املائية ابملركز القوم يورئيس اجمللس العلمسابقا ياملصر يوزير املوارد املائية والر – أ.د./ حممود أبو زيد .1 مصر. –جامعة القاهرة –أستاذ هندسة النقل بكلية اهلندسة – أ.د./ عصام شرف .2

اململكةة –جامعةة امللةك سةعود –وأستاذ اهلندسة اجليوتكنيكية بكلية اهلندسة يوكيل جامعة امللك سعود لشئون البحث العلم – أ.د./ عبد هللا املهيدب .3 العربية السعودية.

. ةالوالايت املتحد –جامعة أريزوان –كلية اهلندسة – ةقسم اهلندسة املدني – ةأستاذ اهليدروليكا واملوارد املائي – ./ كيفن النذىأ.د .4 مصر. –جامعة عني مشس –واإلنشائية بكلية اهلندسة ةأستاذ اهلندسة اجليوتكنيكي – أ.د./ فتح هللا النحاس .5

.ةالسعودي ةالعربي ةاململك –العزيز جبامعة امللك عبد ةورئيس حترير جملة العلوم اهلندسي ةندسة املدنيأستاذ اهل – أ.د./ فيصل فؤاد وفا .6

. ةالسعودي ةالعربي ةاململك –جبامعة امللك سعود ةنشائيأستاذ اهلندسة اإل – أ.د./ طارق املسلم .7

اهلندسة الكهرابئيةة بكليةة يةئالت الكهرابوأسةتاذ هندسةة اآ يمبجلةس الشةورا املصةر ية ورئةيس جلنةة التعلةيم والبحةث العلمةرئةيس جامعةة ارهةرام الكندية – أ.د./ فاروق إمساعيلل .8

مصر. –جامعة القاهرة –اهلندسة

مصر. –جامعة القاهرة –بكلية اهلندسة أستاذ هندسة اجلهد العايل – أ.د./حسني إبراهيم أنيس .9

مصر. –جامعة عني مشس –ئية بكلية اهلندسة الت الكهرابجامعة املستقبل وأستاذ هندسة اآ –عميد كلية اهلندسة – أ.د./ حممد عبد الرحيم بدر .10

.مصر –جامعة عني مشس –أستاذ القوا الكهرابئية بكلية اهلندسة – يالشرقاو أ.د./ متويل .11

اململكة العربية السعودية. –جامعة امللك عبد العزيز –دسة واحلاسب بكلية اهلن ئيةأستاذ اهلندسة الكهراب – يأ.د./ على حممد رشد .12

اململكة العربية السعودية. –جامعة امللك سعود –بكلية اهلندسة أستاذ هندسة اجلهد العايل – أ.د./ عبد الرمحن العريين .13

تونس. –أستاذ االتصاالت ابملدرسة الوطنية لالتصاالت –أ.د./ سامي اتابن .14

امليكانيكيةاهلندسة

رئيس مركز البحرين للدراسات والبحوث. – أ.د./ حممد الغتم .15

مصر. –جامعة القاهرة –وأستاذ القوا امليكانيكية وكيل كلية اهلندسة – أ.د./ عادل خليل .16

مصر. –جامعة القاهرة –بكلية اهلندسة –نتاج أستاذ هندسة وميكانيكا اإل –أ.د./ سعيد جماهد .17

ةالعربيةة ةاململكةة –جامعةةة امللةةك عبةةد العزيةةز –وعميةةد معهةةد البحةةوث واالستشةةارات بكليةةة اهلندسةةة ةأسةةتاذ اهلندسةةة امليكانيكيةة – يديللجلنأ.د./ عبللد املللل ا .18 .ةالسعودي

احلاسبات واملعلومات

مصر. –جامعة حلوان –أستاذ نظم املعلومات بكلية احلاسبات واملعلومات – أ.د./ أمحد شرف الدين .19

جامعةةة القصةةيم ومستشةةار وزيةةر التعلةةيم العةةا والبحةةث العلمةة ابململكةة –أسةةتاذ هندسةةة احلاسةةب بكليةةة احلاسةةب اآ – الشوشللانأ.د./ عبللدهللا .20 العربي السعودي .

ارمارات العربي املتحده. –جبامعة الشارق ارهلي –أستاذ هندسة احلاسب – أ.د./ معمر بطيب .21

تونس. –جامعة تونس –كلية علوم احلاسب –أستاذ الشبكات – أ.د./ فاروق كمون .22

Page 97: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

ه‌

توياتمحلا صفحة

وخبث أفران تصنيع احلديد عل قوة حتمل اخلرسانة املعرضة للتلف أتثري رماد السيليكا )امللخص العريب( اجلزئي

18 ......................................................... وليد القطى و نبيل األخرس

حتديةةةد نظةةري للمعامالت املؤثةرة يف سلوك شبكات ارانبيب النانوية الكربونية )امللخص العريب( 37 ....................................................................... اشرف نصر

)امللخص العريب( جديدة لإلخفاءأمن الصور الطبية ابستخدام تقنيات 58 ............................................................... حممد طاهر بن عثمان

)امللخص العريب( اشتقاق مجيع جمموعات االعتماد غري الوافرة لقاعدة بياانت عالقية 83 ........................................... علي حممد علي رشدي وعمر حممد ابركاب

هـ

جملة علوم اهلندسة واحلاسب، (هـ‌‌1437ربيع‌األول/‌‌م‌2016ينايرباإلجنليزية‌)‌83-1(،‌ص‌ص‌1(،‌العدد‌)9اجمللد‌)‌القصيمجامعة

Page 98: Guidelines for Authors…جلة الهندسة/مجلة الهندسة... · Journal of Engineering and Computer Sciences, Qassim University, PP 1-70, Vol. 1, No. 1 (January 2008/Muharram

و‌