Search results for: Maha Salah Abdullah Ismail
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1128

Search results for: Maha Salah Abdullah Ismail

948 Comparative Study of Universities’ Web Structure Mining

Authors: Z. Abdullah, A. R. Hamdan

Abstract:

This paper is meant to analyze the ranking of University of Malaysia Terengganu, UMT’s website in the World Wide Web. There are only few researches have been done on comparing the ranking of universities’ websites so this research will be able to determine whether the existing UMT’s website is serving its purpose which is to introduce UMT to the world. The ranking is based on hub and authority values which are accordance to the structure of the website. These values are computed using two web-searching algorithms, HITS and SALSA. Three other universities’ websites are used as the benchmarks which are UM, Harvard and Stanford. The result is clearly showing that more work has to be done on the existing UMT’s website where important pages according to the benchmarks, do not exist in UMT’s pages. The ranking of UMT’s website will act as a guideline for the web-developer to develop a more efficient website.

Keywords: algorithm, ranking, website, web structure mining

Procedia PDF Downloads 486
947 Infection of Phlebotomus Sergenti with Leishmania Tropica in a Classical Focus of Leishmania Major in Tunisia

Authors: Kaouther Jaouadi, Jihene Bettaieb, Amira Bennour, Ghassen Kharroubi, Sadok Salem, Afif Ben Salah

Abstract:

In Tunisia, chronic cutaneous leishmaniasis due to Leishmania (L) tropica is an important health problem. Its spreading has not been fully elucidated. Information on sandfly vectors, as well as their associated Leishmania species, is of paramount importance since vector dispersion is one of the major factors responsible for pathogen dissemination. In total, 650 sandflies were captured between June and August 2015 using sticky paper traps in the governorate of Sidi Bouzid, a classical focus of L. major in the Central-West of Tunisia. Polymerase chain reaction-restriction fragment length polymorphism analysis of the internal transcribed spacer 1 and sequencing were used for Leishmania detection and identification. Ninety-seven unfed females were tested for the presence of Leishmania parasite DNA. Six Phlebotomus sergenti were found positive for L. tropica. This finding enhances the understanding of the cycle extension of L. tropica outside its original focus of Tataouine in the South-East of the country.

Keywords: cutaneous leishmaniasis, Leishmania tropica, sandflies, Tunisia

Procedia PDF Downloads 129
946 Technology Assessment: Exploring Possibilities to Encounter Problems Faced by Intellectual Property through Blockchain

Authors: M. Ismail, E. Grifell-Tatjé, A. Paz

Abstract:

A significant discussion on the topic of blockchain as a solution to the issues of intellectual property highlights the relevance that this topic holds. Some experts label this technology as destructive since it holds immense potential to change course of traditional practices. The extent and areas to which this technology can be of use are still being researched. This paper provides an in-depth review on the intellectual property and blockchain technology. Further it explores what makes blockchain suitable for intellectual property, the practical solutions available and the support different governments are offering. This paper further studies the framework of universities in context of its outputs and how can they be streamlined using blockchain technology. The paper concludes by discussing some limitations and future research question.

Keywords: blockchain, decentralization, open innovation, intellectual property, patents, university-industry relationship

Procedia PDF Downloads 157
945 Secure Image Encryption via Enhanced Fractional Order Chaotic Map

Authors: Ismail Haddad, Djamel Herbadji, Aissa Belmeguenai, Selma Boumerdassi

Abstract:

in this paper, we provide a novel approach for image encryption that employs the Fibonacci matrix and an enhanced fractional order chaotic map. The enhanced map overcomes the drawbacks of the classical map, especially the limited chaotic range and non-uniform distribution of chaotic sequences, resulting in a larger encryption key space. As a result, this strategy improves the encryption system's security. Our experimental results demonstrate that our proposed algorithm effectively encrypts grayscale images with exceptional efficiency. Furthermore, our technique is resistant to a wide range of potential attacks, including statistical and entropy attacks.

Keywords: image encryption, logistic map, fibonacci matrix, grayscale images

Procedia PDF Downloads 281
944 Short Text Classification for Saudi Tweets

Authors: Asma A. Alsufyani, Maram A. Alharthi, Maha J. Althobaiti, Manal S. Alharthi, Huda Rizq

Abstract:

Twitter is one of the most popular microblogging sites that allows users to publish short text messages called 'tweets'. Increasing the number of accounts to follow (followings) increases the number of tweets that will be displayed from different topics in an unclassified manner in the timeline of the user. Therefore, it can be a vital solution for many Twitter users to have their tweets in a timeline classified into general categories to save the user’s time and to provide easy and quick access to tweets based on topics. In this paper, we developed a classifier for timeline tweets trained on a dataset consisting of 3600 tweets in total, which were collected from Saudi Twitter and annotated manually. We experimented with the well-known Bag-of-Words approach to text classification, and we used support vector machines (SVM) in the training process. The trained classifier performed well on a test dataset, with an average F1-measure equal to 92.3%. The classifier has been integrated into an application, which practically proved the classifier’s ability to classify timeline tweets of the user.

Keywords: corpus creation, feature extraction, machine learning, short text classification, social media, support vector machine, Twitter

Procedia PDF Downloads 130
943 Investigation of Damage in Glass Subjected to Static Indentation Using Continuum Damage Mechanics

Authors: J. Ismail, F. Zaïri, M. Naït-Abdelaziz, Z. Azari

Abstract:

In this work, a combined approach of continuum damage mechanics (CDM) and fracture mechanics is applied to model a glass plate behavior under static indentation. A spherical indenter is used and a CDM based constitutive model with an anisotropic damage tensor was selected and implemented into a finite element code to study the damage of glass. Various regions with critical damage values were predicted in good agreement with the experimental observations in the literature. In these regions, the directions of crack propagation, including both cracks initiating on the surface as well as in the bulk, were predicted using the strain energy density factor.

Keywords: finite element modeling, continuum damage mechanics, indentation, cracks

Procedia PDF Downloads 394
942 Comparative Study of Estimators of Population Means in Two Phase Sampling in the Presence of Non-Response

Authors: Syed Ali Taqi, Muhammad Ismail

Abstract:

A comparative study of estimators of population means in two phase sampling in the presence of non-response when Unknown population means of the auxiliary variable(s) and incomplete information of study variable y as well as of auxiliary variable(s) is made. Three real data sets of University students, hospital and unemployment are used for comparison of all the available techniques in two phase sampling in the presence of non-response with the newly generalized ratio estimators.

Keywords: two-phase sampling, ratio estimator, product estimator, generalized estimators

Procedia PDF Downloads 207
941 Quantitative Structure-Activity Relationship Modeling of Detoxication Properties of Some 1,2-Dithiole-3-Thione Derivatives

Authors: Nadjib Melkemi, Salah Belaidi

Abstract:

Quantitative Structure-Activity Relationship (QSAR) studies have been performed on nineteen molecules of 1,2-dithiole-3-thione analogues. The compounds used are the potent inducers of enzymes involved in the maintenance of reduced glutathione pools as well as phase-2 enzymes important to electrophile detoxication. A multiple linear regression (MLR) procedure was used to design the relationships between molecular descriptor and detoxication properties of the 1,2-dithiole-3-thione derivatives. The predictivity of the model was estimated by cross-validation with the leave-one-out method. Our results suggest a QSAR model based of the following descriptors: qS2, qC3, qC5, qS6, DM, Pol, log P, MV, SAG, HE and EHOMO for the specific activity of quinone reductase; qS1, qS2, qC3, qC4, qC5, qS6, DM, Pol, logP, MV, SAG, HE and EHOMO for the production of growth hormone. To confirm the predictive power of the models, an external set of molecules was used. High correlation between experimental and predicted activity values was observed, indicating the validation and the good quality of the derived QSAR models.

Keywords: QSAR, quinone reductase activity, production of growth hormone, MLR

Procedia PDF Downloads 322
940 Transparency Phenomenon in Kuew Teow

Authors: Muhammad Heikal Ismail, Law Chung Lim, Hii Ching Lik

Abstract:

In maintaining food quality and shelf life, drying is employed in food industry as the most reliable perseverance technique. In this way, heat pump drying and hot air drying of fresh rice noodles was deduced to freeze drying in achieving quality attributes of oil content Scanning Electron Microscope (SEM) images, texture, and colour. Soxthlet analysis shows freeze dried noodles contain more than 10 times oil content, distinct pores of SEM images, higher hardness by more than three times, and wider colour changes by average more than two times to both methods to explain the less transparency physical outlook of freeze dried samples.

Keywords: freeze drying, heat pump drying, noodles, Soxthlet

Procedia PDF Downloads 461
939 Perceptions of Corporate Governance and Business Ethics Practices in Kuwaiti Islamic and Conventional Banks

Authors: Khaled Alotaibi, Salah Alhamadi, Ibraheem Almubarak

Abstract:

The study attempts to explore both corporate governance (GC) and business ethics (BE) practices in Kuwaiti banks and the relationship between CG and BE, using an accountability framework. By examining the perceptions of key stakeholder groups, this study investigates the practices of BE and CG in Islamic banks (IBs) compared to conventional banks (CBs). We contribute to the scarce studies concerned with relations between CG and BE. We have employed a questionnaire survey method for a random sample of crucial relevant stakeholder groups. The empirical analysis of the participants’ perceptions highlights the importance of applying CG regulations and BE for Kuwaiti banks and the clear link between the two concepts. We find that the main concern is not the absence of CG and BE codes, but the lack of consistent enforcement of the regulations. Such a system needs to be strictly and effectively implemented in Kuwaiti banks to protect all stakeholders’ wealth, not only that of stockholders. There are significant patterns in the CG and BE expectations among different stakeholder groups. Most interestingly, banks’ client groups illustrate high expectations concerning CG and BE practices.

Keywords: corporate governance, GC, business ethics, BE, Islamic banks, IBs, conventional banks, CBs, accountability

Procedia PDF Downloads 129
938 Rejuvenate: Face and Body Retouching Using Image Inpainting

Authors: Hossam Abdelrahman, Sama Rostom, Reem Yassein, Yara Mohamed, Salma Salah, Nour Awny

Abstract:

In today’s environment, people are becoming increasingly interested in their appearance. However, they are afraid of their unknown appearance after a plastic surgery or treatment. Accidents, burns and genetic problems such as bowing of body parts of people have a negative impact on their mental health with their appearance and this makes them feel uncomfortable and underestimated. The approach presents a revolutionary deep learning-based image inpainting method that analyses the various picture structures and corrects damaged images. In this study, A model is proposed based on the in-painting of medical images with Stable Diffusion Inpainting method. Reconstructing missing and damaged sections of an image is known as image inpainting is a key progress facilitated by deep neural networks. The system uses the input of the user of an image to indicate a problem, the system will then modify the image and output the fixed image, facilitating for the patient to see the final result.

Keywords: generative adversarial network, large mask inpainting, stable diffusion inpainting, plastic surgery

Procedia PDF Downloads 49
937 Mobile Cloud Computing: How to Improve

Authors: Abdullah Aljumah, Tariq Ahamad

Abstract:

The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.

Keywords: Cloud Computing, MCC, SAAS, computer interaction

Procedia PDF Downloads 348
936 The Reliability of Management Earnings Forecasts in IPO Prospectuses: A Study of Managers’ Forecasting Preferences

Authors: Maha Hammami, Olfa Benouda Sioud

Abstract:

This study investigates the reliability of management earnings forecasts with reference to these two ingredients: verifiability and neutrality. Specifically, we examine the biasedness (or accuracy) of management earnings forecasts and company specific characteristics that can be associated with accuracy. Based on sample of 102 IPO prospectuses published for admission on NYSE Euronext Paris from 2002 to 2010, we found that these forecasts are on average optimistic and two of the five test variables, earnings variability and financial leverage are significant in explaining ex post bias. Acknowledging the possibility that the bias is the result of the managers’ forecasting behavior, we then examine whether managers decide to under-predict, over-predict or forecast accurately for self-serving purposes. Explicitly, we examine the role of financial distress, operating performance, ownership by insiders and the economy state in influencing managers’ forecasting preferences. We find that managers of distressed firms seem to over-predict future earnings. We also find that when managers are given more stock options, they tend to under-predict future earnings. Finally, we conclude that the management earnings forecasts are affected by an intentional bias due to managers’ forecasting preferences.

Keywords: intentional bias, management earnings forecasts, neutrality, verifiability

Procedia PDF Downloads 206
935 Channel Length Modulation Effect on Monolayer Graphene Nanoribbon Field Effect Transistor

Authors: Mehdi Saeidmanesh, Razali Ismail

Abstract:

Recently, Graphene Nanoribbon Field Effect Transistors (GNR FETs) attract a great deal of attention due to their better performance in comparison with conventional devices. In this paper, channel length Modulation (CLM) effect on the electrical characteristics of GNR FETs is analytically studied and modeled. To this end, the special distribution of the electric potential along the channel and current-voltage characteristic of the device is modeled. The obtained results of analytical model are compared to the experimental data of published works. As a result, it is observable that considering the effect of CLM, the current-voltage response of GNR FET is more realistic.

Keywords: graphene nanoribbon, field effect transistors, short channel effects, channel length modulation

Procedia PDF Downloads 381
934 The Influence of the Form of Grain on the Mechanical Behaviour of Sand

Authors: Mohamed Boualem Salah

Abstract:

The size and shape of soil particles reflect the formation history of the grains. In turn, the macro scale behavior of the soil mass results from particle level interactions which are affected by particle shape. Sphericity, roundness and smoothness characterize different scales associated to particle shape. New experimental data and data from previously published studies are gathered into two databases to explore the effects of particle shape on packing as well as small and large-strain properties of sandy soils. Data analysis shows that increased particle irregularity (angularity and/or eccentricity) leads to: an increase in emax and emin, a decrease in stiffness yet with increased sensitivity to the state of stress, an increase in compressibility under zero-lateral strain loading, and an increase in critical state friction angle φcs and intercept Γ with a weak effect on slope λ. Therefore, particle shape emerges as a significant soil index property that needs to be properly characterized and documented, particularly in clean sands and gravels. The systematic assessment of particle shape will lead to a better understanding of sand behavior.

Keywords: angularity, eccentricity, shape particle, behavior of soil

Procedia PDF Downloads 389
933 An Eigen-Approach for Estimating the Direction-of Arrival of Unknown Number of Signals

Authors: Dia I. Abu-Al-Nadi, M. J. Mismar, T. H. Ismail

Abstract:

A technique for estimating the direction-of-arrival (DOA) of unknown number of source signals is presented using the eigen-approach. The eigenvector corresponding to the minimum eigenvalue of the autocorrelation matrix yields the minimum output power of the array. Also, the array polynomial with this eigenvector possesses roots on the unit circle. Therefore, the pseudo-spectrum is found by perturbing the phases of the roots one by one and calculating the corresponding array output power. The results indicate that the DOAs and the number of source signals are estimated accurately in the presence of a wide range of input noise levels.

Keywords: array signal processing, direction-of-arrival, antenna arrays, Eigenvalues, Eigenvectors, Lagrange multiplier

Procedia PDF Downloads 310
932 Equivalent Circuit Modelling of Active Reflectarray Antenna

Authors: M. Y. Ismail, M. Inam

Abstract:

This paper presents equivalent circuit modeling of active planar reflectors which can be used for the detailed analysis and characterization of reflector performance in terms of lumped components. Equivalent circuit representation has been proposed for PIN diodes and liquid crystal based active planar reflectors designed within X-band frequency range. A very close agreement has been demonstrated between equivalent circuit results, 3D EM simulated results as well as measured scattering parameter results. In the case of measured results, a maximum discrepancy of 1.05dB was observed in the reflection loss performance, which can be attributed to the losses occurred during measurement process.

Keywords: Equivalent circuit modelling, planar reflectors, reflectarray antenna, PIN diode, liquid crystal

Procedia PDF Downloads 259
931 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography

Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway

Abstract:

This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.

Keywords: steganography, stego, LSB, crop

Procedia PDF Downloads 244
930 The Contribution of Vygotsky's Social and Cultural Theory to the Understanding of Cognitive Development

Authors: Salah Eddine Ben Fadhel

Abstract:

Lev Vygotsky (1896–1934) was one of the most significant psychologists of the twentieth century despite his short life. His cultural-historical theory is still inspiring many researchers today. At the same time, we observe in many studies a lack of understanding of his thoughts. Vygotsky poses in this theory the contribution of society to individual development and learning. Thus, it suggests that human learning is largely a social and cultural process, further mentioning the influence of interactions between people and the culture in which they live. In this presentation, we highlight, on the one hand, the strong points of the theory by highlighting the major questions it raises and its contribution to developmental psychology in general. On the other hand, we will demonstrate what Vygotsky's theory brings today to the understanding of the cognitive development of children and adolescents. The major objective is to better understand the cognitive mechanisms involved in the learning process in children and adolescents and, therefore, demonstrate the complex nature of psychological development. The main contribution is to provide conceptual insight, which allows us to better understand the importance of the theory and its major pedagogical implications.

Keywords: vygotsky, society, culture, history

Procedia PDF Downloads 33
929 Using Convergent and Divergent Thinking in Creative Problem Solving in Mathematics

Authors: Keng Keh Lim, Zaleha Ismail, Yudariah Mohammad Yusof

Abstract:

This paper aims to find out how students using convergent and divergent thinking in creative problem solving to solve mathematical problems creatively. Eight engineering undergraduates in a local university took part in this study. They were divided into two groups. They solved the mathematical problems with the use of creative problem solving skills. Their solutions were collected and analyzed to reveal all the processes of problem solving, namely: problem definition, ideas generation, ideas evaluation, ideas judgment, and solution implementation. The result showed that the students were able to solve the mathematical problem with the use of creative problem solving skills.

Keywords: convergent thinking, divergent thinking, creative problem solving, creativity

Procedia PDF Downloads 324
928 The Effect of Mobile Technology Use in Education: A Meta-Analysis Study

Authors: Şirin Küçük, Ayşe Kök, İsmail Şahin

Abstract:

Mobile devices are very popular and useful tools for assisting people in daily life. With the advancement of mobile technologies, the issue of mobile learning has been widely investigated in education. Many researches consider that it is important to integrate pedagogical and technical strengths of mobile technology into learning environments. For this reason, the purpose of this research is to examine the effect of mobile technology use in education with meta-analysis method. Meta-analysis is a statistical technique which combines the findings of independent studies in a specific subject. In this respect, the articles will be examined by searching the databases for researches which are conducted between 2005 and 2014. It is expected that the results of this research will contribute to future research related to mobile technology use in education.

Keywords: mobile learning, meta-analysis, mobile technology, education

Procedia PDF Downloads 697
927 Impact of Tourists on HIV (Human Immunodeficiency Virus) Incidence

Authors: Ofosuhene O. Apenteng, Noor Azina Ismail

Abstract:

Recently tourism is a major foreign exchange earner in the World. In this paper, we propose the mathematical model to study the impact of tourists on the spread of HIV incidences using compartmental differential equation models. Simulation studies of reproduction number are used to demonstrate new insights on the spread of HIV disease. The periodogram analysis of a time series was used to determine the speed at which the disease is spread. The results indicate that with the persistent flow of tourism into a country, the disease status has increased the epidemic rate. The result suggests that the government must put more control on illegal prostitution, unprotected sexual activity as well as to emphasis on prevention policies that include the safe sexual activity through the campaign by the tourism board.

Keywords: HIV/AIDS, mathematical transmission modeling, tourists, stability, simulation

Procedia PDF Downloads 366
926 Investigate the Effects of Anionic Surfactant on THF Hydrate

Authors: Salah A. Al-Garyani, Yousef Swesi

Abstract:

Gas hydrates can be hazardous to upstream operations. On the other hand, the high gas storage capacity of hydrate may be utilized for natural gas storage and transport. Research on the promotion of hydrate formation, as related to natural gas storage and transport, has received relatively little attention. The primary objective of this study is to gain a better understanding of the effects of ionic surfactants, particularly their molecular structures and concentration, on the formation of tetrahydrofuran (THF) hydrate, which is often used as a model hydrate former for screening hydrate promoters or inhibitors. The surfactants studied were sodium n-dodecyl sulfate (SDS), sodium n-hexadecyl sulfate (SHS). Our results show that, at concentrations below the solubility limit, the induction time decreases with increasing surfactant concentration. At concentrations near or above the solubility, however, the surfactant concentration no longer has any effect on the induction time. These observations suggest that the effect of surfactant on THF hydrate formation is associated with surfactant monomers, not the formation of micelle as previously reported. The lowest induction time (141.25 ± 21 s, n = 4) was observed in a solution containing 7.5 mM SDS. The induction time decreases by a factor of three at concentrations near or above the solubility, compared to that without surfactant.

Keywords: tetrahydrofuran, hydrate, surfactant, induction time, monomers, micelle

Procedia PDF Downloads 388
925 Species Diversity of Some Remarkable New Records of Lichens from Chwarta District, Kurdistan Region of Iraq

Authors: Salah Abdulla Salih, Muhamad Sohrabi

Abstract:

This paper aims to study the species, morphology, habitats and geographical distribution of new records of lichens from the Chwarta districts Kurdistan Region of Iraq from September 2022 to June 2023. As a result of the survey in the different locations belonging to the district, found that there are eleven species of lichens are reported from Iraq for the first time. Of these, the taxa of Lecanora thallophila H. Magn is the first species of parasitic lichen reported from Iraq, including the newly recorded genus of lichen Acarospora A.Massal. The lichenized fungi are Acarospora bullata Anzi., Acarospora laqueata Stizenb., Acarospora umbilicata Bagl., Acrocordia gemmata (Ach.) A. Massal., Squamulea subsoluta (Nyl.) Arup, Søchting & Frödén., Coppinsiella ulcerosa (Coppins & P.James) S.Y.Kondr. & L.Lőkös., Myriolecis flowersiana (H. Magn.) Śliwa, Zhao Xin & Lumbsch., Megaspora rimisorediata Valadbeigi & A. Nordin sp. nov., Physcia subtilis Degel., Polycauliona polycarpa (Hoffm.) Frödén, Arup, & Søchting.

Keywords: apothecia, lichen species, new records, Kurdistan region

Procedia PDF Downloads 45
924 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 349
923 Consumers Rights during COVID-19 Pandemic Time: Evidence from Libya

Authors: Sabri Gabran Mohammed Elkrghli, Salah A. Mohamed Abdulgader

Abstract:

Given the emergence and the spreading of the Covid-19 pandemic that swept the globe, it was necessary to address the issue of consumer rights in such unprecedented circumstances. Libyan consumers have been targeted in this study with the aim to measure their attitudes towards the extent to which their rights, as consumers of foodstuff, have been secured during the Covid-19 pandemic. The recommended sample size was randomly selected (384) local participants. Out of this number, only a validated number of (267) responses were deemed valid for the analysis phase. The instrument of this research was developed based on the extant published literature on consumer rights. The study concluded with a set of key results; the most important result is that consumer rights of foodstuffs were below the satisfactory level. Theoretical and practical implications have emerged from the study. The most important implication is that customers of foodstuffs need more protection in Libya. This issue should be given greater importance, especially in the light of contemporary environmental challenges such as the outbreak of Covid-19. Designing and conducting global and local awareness campaigns is another significant advice suggested by this study. Finally, the research concluded with limitations and put forward some future avenues.

Keywords: consumers rights, foodstuffs, COVID-19, Libya

Procedia PDF Downloads 128
922 Agent/Group/Role Organizational Model to Simulate an Industrial Control System

Authors: Noureddine Seddari, Mohamed Belaoued, Salah Bougueroua

Abstract:

The modeling of complex systems is generally based on the decomposition of their components into sub-systems easier to handle. This division has to be made in a methodical way. In this paper, we introduce an industrial control system modeling and simulation based on the Multi-Agent System (MAS) methodology AALAADIN and more particularly the underlying conceptual model Agent/Group/Role (AGR). Indeed, in this division using AGR model, the overall system is decomposed into sub-systems in order to improve the understanding of regulation and control systems, and to simplify the implementation of the obtained agents and their groups, which are implemented using the Multi-Agents Development KIT (MAD-KIT) platform. This approach appears to us to be the most appropriate for modeling of this type of systems because, due to the use of MAS, it is possible to model real systems in which very complex behaviors emerge from relatively simple and local interactions between many different individuals, therefore a MAS is well adapted to describe a system from the standpoint of the activity of its components, that is to say when the behavior of the individuals is complex (difficult to describe with equations). The main aim of this approach is the take advantage of the performance, the scalability and the robustness that are intuitively provided by MAS.

Keywords: complex systems, modeling and simulation, industrial control system, MAS, AALAADIN, AGR, MAD-KIT

Procedia PDF Downloads 209
921 Expression of uPA, tPA, and PAI-1 in Calcified Aortic Valves

Authors: Abdullah M. Alzahrani

Abstract:

Our physiopathological assumption is that u-PA, t-PA, and PAI-1 are released by calcified aortic valves and play a role in the calcification of these valves. Sixty-five calcified aortic valves were collected from patients suffering from aortic stenosis. Each valve was incubated for 24 hours in culture medium. The supernatants were used to measure u-PA, t-PA, and PAI-1 concentrations; the valve calcification was evaluated using biphotonic absorptiometry. Aortic stenosis valves expressed normal plasminogen activators concentrations and overexpressed PAI-1 (u-PA, t-PA, and PAI-1 mean concentrations were, resp., 1.69 ng/mL ± 0.80, 2.76 ng/mL ± 1.33, and 53.27 ng/mL ± 36.39). There was no correlation between u-PA and PAI-1 (r = 0.3) but t-PA and PAI-1 were strongly correlated with each other (r = 0.6). Over expression of PAI-1 was proportional to the calcium content of theAS valves. Our results demonstrate a consistent increase of PAI-1 proportional to the calcification. The over expression of PAI-1 may be useful as a predictive indicator in patients with aortic stenosis.

Keywords: aortic valve, PAI-1, tPA gene, uPA gene

Procedia PDF Downloads 451
920 Robust Numerical Scheme for Pricing American Options under Jump Diffusion Models

Authors: Salah Alrabeei, Mohammad Yousuf

Abstract:

The goal of option pricing theory is to help the investors to manage their money, enhance returns and control their financial future by theoretically valuing their options. However, most of the option pricing models have no analytical solution. Furthermore, not all the numerical methods are efficient to solve these models because they have nonsmoothing payoffs or discontinuous derivatives at the exercise price. In this paper, we solve the American option under jump diffusion models by using efficient time-dependent numerical methods. several techniques are integrated to reduced the overcome the computational complexity. Fast Fourier Transform (FFT) algorithm is used as a matrix-vector multiplication solver, which reduces the complexity from O(M2) into O(M logM). Partial fraction decomposition technique is applied to rational approximation schemes to overcome the complexity of inverting polynomial of matrices. The proposed method is easy to implement on serial or parallel versions. Numerical results are presented to prove the accuracy and efficiency of the proposed method.

Keywords: integral differential equations, jump–diffusion model, American options, rational approximation

Procedia PDF Downloads 92
919 Fear and Anxiety among School Age Children Undergoing Dental Treatment in an Oral Health Unit

Authors: Maha Ibrahim Mohamed Khalifa

Abstract:

Background: Dental fear and anxiety lead to avoidance of dental treatment and deterioration of oral health. Aim of the study: To assess the levels of fear and anxiety among school-age children undergoing dental treatment. Setting: The study was conducted in Outpatient Dental Clinics at Benha Teaching Hospital. Research design: A descriptive research design was utilized to conduct the study. Sample: A purposive sample of 60 school-age children and their mothers attending at the previously mentioned setting was included. Tools: Three tools were used: Tool one: A structured interviewing questionnaire for Personal characteristics of children and their mothers. Tool two: Dental Subscale of Children's Fear Survey Schedule (CFSS-DS). Tool three: Modified Dental Anxiety Scale (MDAS). Results: It was illustrated that more than two-fifths (43.3%) of children had maximum fear and more than half of children (53.3%) had maximal anxiety. Conclusion: Many school-age children undergoing dental treatment suffer from high levels of fear and anxiety. Recommendations: The study recommended further research should be conducted to assess levels of fear and anxiety among children undergoing dental treatments and preferable nursing interventions for reducing their fears and anxieties.

Keywords: fear, anxiety, children, dental treatment

Procedia PDF Downloads 62