Search results for: Amani S. Alqahtani
74 Screening for Internet Addiction among Medical Students in a Saudi Community
Authors: Nawaf A. Alqahtani, Ali M. Alqahtani, Khalid A. Alqahtani, Huda S. Abdullfattah, Ebtehal A. Alessa, Khalid S. Al Gelban, Ossama A. Mostafa
Abstract:
Background: The internet is an exciting medium that is becoming an essential part of everyday life. Although the internet is fully observed in Saudi Arabia, young people may be vulnerable to problematic internet use, possibly leading to addiction. Aim of study: To explore the magnitude of internet addiction (IA) among medical students associated risk factors and its impact on students' academic achievement. Subjects and Methods: A cross sectional study was conducted in 2014 on 571 medical students (293 males and 278 females) at the College of Medicine, King Khalid University, Abha, Saudi Arabia. Data Collection was done through using the Arabic version of the Compulsive Internet Use Scale and a checklist of demographic characteristics. Results: Age of participants ranged from 19 to 26 years (Mean+SD: 21.9+1.5 years). Internet access was available to 97.4% of students at home and to 80.2% of students at their mobile phones. The most frequently accessed websites by medical students were the social media (90.7%), scientific website (50.4%) and the news websites (31.3%). IA was mild in 47.8% of medical students while 5.8% had moderate IA. None of the students had severe IA. Prevalence of IA was significantly higher among female medical students (p=0.002), availability of internet at home (p=0.022), and availability of internet at the students' mobile phone (p=0.041). The mean General Point Average (GPA) was highest among students with mild IA (4.0+0.6), compared with 3.6+0.6 among those with moderate addiction, and 3.9+0.6 among those who did not show IA. Differences in mean GPA according to grade of IA were statistically significant ((P=0.001). Conclusions: Prevalence of IA is high among medical students in Saudi Arabia. Risk factors for IA include female gender, availability of internet at home or at the mobile phone. IA has a significant impact on students' GPA. Periodic screening of medical students for IA and raising their awareness toward the possible risk of IA are recommended.Keywords: internet addiction, medical students, risk factors, Saudi Arabia
Procedia PDF Downloads 52973 Nutrient Content and Labelling Status of Pre-Packaged Beverages in Saudi Arabia
Authors: Ruyuf Y. Alnafisah, Nouf S. Alammari, Amani S. Alqahtani
Abstract:
Background: Beverage choice can have implications for the risk of non-communicable diseases. However, there is a lack of knowledge in assessing the nutritional content of these beverages. This study aims to describe the nutrient content of pre-packaged beverages available in the Saudi market. Design: Data were collected from the Saudi Branded Food Data-base (SBFD). Nutrient content was standardized in terms of units and reference volumes to ensure consistency in analysis. Results: A total of 1490 beverages were analyzed. The highest median levels of the majority of nutrients were found among dairy products; energy (68.4(43-188]kcal/100 ml in a milkshake); protein (8.2(0.5-8.2]g/100 ml in yogurt drinks); total fat (2.1(1.3-3.5]g/100 ml in milk); saturated fat (1.4(0-1.4]g/100 ml in yogurt drinks); cholesterol (30(0-30]mg/100 ml in yogurt drinks); sodium (65(65-65].4mg/100 ml in yogurt drinks); and total sugars (12.9(7.5-27]g/100 ml in milkshake). Carbohydrate level was the highest in nectar (13(11.8-14.2] g/100ml]; fruits drinks (12.9(11.9-13.9] g/100ml), and sparkling juices (12.9(8.8-14] g/100ml). The highest added sugar level was observed among regular soft drinks (12(10.8-14] g/100ml). The average rate of nutrient declaration was 60.95%. Carbo-hydrate had the highest declaration rate among nutrients (99.1%), and yogurt drinks had the highest declaration rate among beverage categories (92.7%). The median content of vitamins A and D in dairy products met the mandatory addition levels. Conclusion: This study provides valuable insights into the nutrient content of pre-packaged beverages in the Saudi market. It serves as a foundation for future research and monitoring. The findings of the study support the idea of taxing sugary beverages and raise concerns about the health effects of high sugar in fruit juices. Despite the inclusion of vitamins D and A in dairy products, the study highlights the need for alternative strategies to address these deficiencies.Keywords: pre-packaged beverages, nutrients content, nutrients declaration, daily percentage value, mandatory addition of vitamins
Procedia PDF Downloads 5872 Stakeholders Perspectives on the Social Determinants of Health and Quality of Life in Aseer Healthy Cities
Authors: Metrek Almetrek, Naser Alqahtani, Eisa Ghazwani, Mona Asiri, Mohammed Alqahtani, Magboolah Balobaid
Abstract:
Background: Advocacy of potential for community coalitions to positively address social determinants of health and quality of life, little is known about the views of stakeholders involved in such efforts. This study sought to assess the provinces leaders’ perspectives about social determinants related to the Health Neighborhood Initiative (HNI), a new county effort to support community coalitions. Method and Subjects: We used a descriptive, qualitative study using personal interviews in 2022. We conducted it in the community coalition's “main cities committees” set across service planning areas that serve vulnerable groups located in the seven registered healthy cities to WHO (Abha, Tareeb, Muhayel, Balqarn, Alharajah, Alamwah, and Bisha). We conducted key informant interviews with 76 governmental, profit, non-profit, and community leaders to understand their perspectives about the HNI. As part of a larger project, this study focused on leaders’ views about social determinants of health related to the HNI. All interviews were audio-recorded and transcribed. An inductive approach to coding was used, with text segments grouped by social determinant categories. Results: Provinces leaders described multiple social determinants of health and quality of life that were relevant to the HNI community coalitions: housing and safety, community violence, economic stability, city services coordination and employment and education. Leaders discussed how social determinants were interconnected with each other and the need for efforts to address multiple social determinants simultaneously to effectively improve health and quality of life. Conclusions: Community coalitions have an opportunity to address multiple social determinants of health and quality of life to meet the social needs of vulnerable groups. Future research should examine how community coalitions, like those in the HNI, can actively engage with community members to identify needs and then deliver evidence-based care.Keywords: social determinants, health and quality of life, vulnerable groups, qualitative research
Procedia PDF Downloads 8471 Arabic Quran Search Tool Based on Ontology
Authors: Mohammad Alqahtani, Eric Atwell
Abstract:
This paper reviews and classifies most of the important types of search techniques that have been applied on the holy Quran. Then, it addresses the limitations in these techniques. Additionally, this paper surveys most existing Quranic ontologies and what are their deficiencies. Finally, it explains a new search tool called: A semantic search tool for Al Quran based on Qur’anic ontologies. This tool will overcome all limitations in the existing Quranic search applications.Keywords: holy Quran, natural language processing (NLP), semantic search, information retrieval (IR), ontology
Procedia PDF Downloads 57270 The Job of Rhetoric in Public Relations Practice
Authors: Talal Alqahtani
Abstract:
For all institutions, either public or private, communication is important now more than ever. This is because the importance of communication has grown over the years, and it has the ability to either break or make an organization. With globalization, the changing technology, and other emergent issues that affect organizations, the communication given out has had to be better, sharper, and both proactive and reactive. This is the reason why the importance of public relations has been on the increase. Institutions realize the importance of having a good image and having public relations experts who can effectively manage communication in an institution easily in times of crisis. Public relations itself is not, however, effective, and this has led to the adoption of rhetoric in communication. Rhetoric use has had a long transformation because, in the past, it was only used in politics. Rhetoric in communication has come to be appreciated and adopted by many diverse fields and sectors. This study looks at the job of rhetoric in public relations practice and how it can identify with the administration of an institution's notoriety.Keywords: communication, notoriety, rhetoric, public relation
Procedia PDF Downloads 23469 Using of Bimolecular Fluorescence Complementation (BiFC) Assays to Study Homo and/ or Heterodimerization of Laminin Receptor 37 LRP/ 67 LR with Galectin-3
Authors: Fulwah Alqahtani, Jafar Mahdavi, Lee Weldon, Nick Holliday, Dlawer Ala'Aldeen
Abstract:
There are two isoforms of laminin receptor; monomeric 37 kDa laminin receptor precursor (37 LRP) and mature 67 kDa laminin receptor (67 LR). The relationship between the 67 LR and its precursor 37 LRP is not completely understood, but previous observations have suggested that 37 LRP can undergo homo- and/or hetero- dimerization with Galectin-3 (Gal-3) to form mature 67 LR. Gal-3 is the only member of the chimera-type group of galectins, and has one C-terminal carbohydrate recognition domain (CRD) that is responsible for binding the ß-galactoside moieties of mono- or oligosaccharides on several host and microbial molecules. The aim of this work was to investigate homo- and hetero-dimerization among the 37 LRP and Gal-3 to form mature 67 LR in mammalian cells using bimolecular fluorescence complementation (BiFC).Keywords: 37 LRP, 67 LR, Gal-3, BiFC
Procedia PDF Downloads 50468 Prevalence of Chronic Diseases and Predictors of Mortality in Home Health Care Service: Data From Saudi Arabia
Authors: Walid A. Alkeridy, Arwa Aljasser, Khalid Mohammed Alayed, Saad Alsaad, Amani S. Alqahtani, Claire Ann Lim, Sultan H. Alamri, Doaa Zainhom Mekkawy, Mohammed Al-Sofiani
Abstract:
Introduction: The history of publicly funded Home Health Care (HHC) service in Saudi Arabia dates back to 1991. The first HC program was launched to provide palliative home care services for patients with terminal cancer. Thereafter, more programs launched across Saudi Arabia most remarkably was launching the national program for HHC by the Ministry Of Health (MOH) in 2008. The national HHC MOH program is mainly providing long-term care home care services for over 40,000 Saudi citizens. The scope of the HHC service program provided by the Saudi MOH is quite diverse, ranging from basic nursing care to specialized care programs, e.g., home peritoneal dialysis, home ventilation, home infusion therapy, etc. Objectives: The primary aim of our study is to report the prevalence of chronic conditions among Saudi people receiving long-term HHC services. Secondary aims include identifying the predictors of mortality among individuals receiving long-term HHC services and studying the association between frailty and poor health outcomes among HHC users. Methods: We conducted a retrospective and cross-sectional data collection from participants receiving HHC services at King Saud University Medical City, Riyadh, Saudi Arabia. Data were collected from electronic health records (EHR), patient charts, and interviewing caregivers from the year 2019 to 2022. We assessed functional performance by Katz's activity of daily living and the Bristol Activity of Daily Living Scale (BADLS). A trained health care provider assessed frailty using the Clinical Frailty Scale (CFS). Mortality was assessed by reviewing the death certificates if patients were hospitalized through discharge status ascertainment from EHR. Results: The mean age for deceased individuals in HHC was 78.3 years. Over twenty percent of individuals receiving HHC services were readmitted to the hospital. The following variables were statistically significant between deceased and alive individuals receiving HHC services; clinical frailty scale, the total number of comorbid conditions, and functional performance based on the KATZ activity of daily living scale and the BADLS. We found that the strongest predictors for mortality were pressure ulcers which had an odds ratio of 3.75 and p-value of < 0.0001, and the clinical frailty scale, which had an odds ratio of 1.69 and p-value of 0.002, using multivariate regression analysis. In conclusion, our study found that pressure ulcers and frailty are the strongest predictors of mortality for individuals receiving home health care services. Moreover, we found a high rate of annual readmission for individuals enrolled in HHC, which requires further analysis to understand the possible contributing factors for the increased rate of hospital readmission and develop strategies to address them. Future studies should focus on designing quality improvement projects aimed at improving the quality of life for individuals receiving HHC services, especially those who have pressure ulcers at the end of life.Keywords: homecare, Saudi, prevalence, chronic
Procedia PDF Downloads 11867 Construction of Green Aggregates from Waste Processing
Authors: Fahad K. Alqahtani
Abstract:
Nowadays construction industry is developing means to incorporate waste products in concrete to ensure sustainability. To meet the need of construction industry, a synthetic aggregate was developed using optimized technique called compression moulding press technique. The manufactured aggregate comprises mixture of plastic, waste which acts as binder, together with by-product waste which acts as fillers. The physical properties and microstructures of the inert materials and the manufactured aggregate were examined and compared with the conventional available aggregates. The outcomes suggest that the developed aggregate has potential to be used as substitution of conventional aggregate due to its less weight and water absorption. The microstructure analysis confirmed the efficiency of the manufacturing process where the final product has the same mixture of binder and filler.Keywords: fly ash, plastic waste, quarry fine, red sand, synthetic aggregate
Procedia PDF Downloads 23066 The Effectiveness of Goldstein's Social Skillstreaming Model on Social Skills of Special Education Pre-Service Teachers
Authors: Ragea Alqahtani
Abstract:
The purpose of the study was to measure the effectiveness of the Goldstein’s social skill streaming model based on the special and general pre-service teachers’ knowledge about controlling their emotions in conflict situations. A review of previous pieces of literature guided the design and measurement of the effectiveness of the approach to the control of emotions. The teachers were assessed using the coping strategy, adult anger, and Goldstein’s skill streaming inventories. Lastly, the paper provides various recommendations on the sensitization of the Goldstein’s Social Skill streaming model to both the special and pre-service teachers to promote their knowledge about controlling emotions in conflicts.Keywords: emotional control, Goldstein social skill streaming model, modeling technique, self- as-a-model, self-efficacy, self-regulation
Procedia PDF Downloads 2065 Change Point Analysis in Average Ozone Layer Temperature Using Exponential Lomax Distribution
Authors: Amjad Abdullah, Amjad Yahya, Bushra Aljohani, Amani Alghamdi
Abstract:
Change point detection is an important part of data analysis. The presence of a change point refers to a significant change in the behavior of a time series. In this article, we examine the detection of multiple change points of parameters of the exponential Lomax distribution, which is broad and flexible compared with other distributions while fitting data. We used the Schwarz information criterion and binary segmentation to detect multiple change points in publicly available data on the average temperature in the ozone layer. The change points were successfully located.Keywords: binary segmentation, change point, exponentialLomax distribution, information criterion
Procedia PDF Downloads 17564 WormHex: Evidence Retrieval Tool of Social Media from Volatile Memory
Authors: Norah Almubairik, Wadha Almattar, Amani Alqarni
Abstract:
Social media applications are increasingly being used in our everyday communications. These applications utilise end-to-end encryption mechanisms, which make them suitable tools for criminals to exchange messages. These messages are preserved in the volatile memory until the device is restarted. Therefore, volatile forensics has become an important branch of digital forensics. In this study, the WormHex tool was developed to inspect the memory dump files of Windows and Mac-based workstations. The tool supports digital investigators to extract valuable data written in Arabic and English through web-based WhatsApp and Twitter applications. The results verify that social media applications write their data into the memory regardless of the operating system running the application, with there being no major differences between Windows and Mac.Keywords: volatile memory, REGEX, digital forensics, memory acquisition
Procedia PDF Downloads 19163 A Taxonomy of Routing Protocols in Wireless Sensor Networks
Authors: A. Kardi, R. Zagrouba, M. Alqahtani
Abstract:
The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.Keywords: routing, sensor, survey, wireless sensor networks, WSNs
Procedia PDF Downloads 18262 Integrated Model for Enhancing Data Security Performance in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 47761 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children
Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani
Abstract:
Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.Keywords: access control, cyber security, kids, parental monitoring
Procedia PDF Downloads 13760 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 35959 Creating Inclusive Educational Environments for Women Faculty of Color Harnessing Ubuntu Perspectives
Authors: Gonzaga Mukasa, Faith Maina, Amani Zaier
Abstract:
This study investigated whether harnessing Ubuntu perspectives can aid in healing wounds Hierarchical Microaggressive intersectionalities inflict on African immigrant women faculty in predominantly white institutions. The study interviewed 8 African immigrant faculty from different higher education institutions in the United States selected using the snowball sampling technique. The Ubuntu Theory anchored the study. Findings indicated that women faculty of color experience Hierarchical Microaggressive intersectionalities leading them to lose job satisfaction and feel deprofessionalized and isolated. The recommendations were that institutions make their recruitment more inclusive of women of color to avoid isolation. And should embrace Ubuntu perspectives such as survival, solidarity, compassion, dignity, and mutual respect to architect educational environments that foster diversity and inclusion.Keywords: ubuntu, women faculty, African immigrants, hierarchical microaggressive intersectionalities
Procedia PDF Downloads 6758 An Empirical Study of Barriers to Total Quality Management Implementation in Construction Industries
Authors: Dhafer Alqahtani
Abstract:
Total quality management (TQM) has become a widely accepted approach in the modern industry over recent years. There is a general consensus that by adopting TQM, the overall effectiveness and performance of an industry can be improved. It is also proved that as long as TQM is adopted fully and practiced effectively in the industry, potential benefits of TQM will be delivered. But despite the benefits of TQM as articulated by many quality gurus and academicians, these benefits are not achieved in practice. Many service industries have found it difficult to implement TQM successfully. This paper, therefore, explores the barriers to TQM’s successful implementation in construction firms. The aim is to identify and rank the barriers to successful TQM implementation in order to make them know and get a better understanding by the managers and practitioners of the Construction Industries. The research methodology adopted in this study was an extensive literature review on barriers to TQM implementation followed by a survey of selected construction firms using the self-administered instrument. The results also showed that only lack of effective communication and lack of top management support were not significantly associated with the level of implementation of TQM.Keywords: total quality management, construction firms, barriers, successful implementation
Procedia PDF Downloads 10057 Design and Optimization of a Customized External Fixation Device for Lower Limb Injuries
Authors: Mohammed S. Alqahtani, Paulo J. Bartolo
Abstract:
External fixation is a common technique for the treatment and stabilization of bone fractures. Different designs have been proposed by companies and research groups, but all of them present limitations such as high weight, not comfortable to use, and not customized to individual patients. This paper proposes a lightweight customized external fixator, overcoming some of these limitations. External fixators are designed using a set of techniques such as medical imaging, CAD modelling, finite element analysis, and full factorial design of experiments. Key design parameters are discussed, and the optimal set of parameters is used to design the final external fixator. Numerical simulations are used to validate design concepts. Results present an optimal external fixation design with weight reduction of 13% without compromising its stiffness and structural integrity. External fixators are also designed to be additively manufactured, allowing to develop a strategy for personalization.Keywords: computer-aided design modelling, external fixation, finite element analysis, full factorial, personalization
Procedia PDF Downloads 15956 Urea Amperometric Biosensor Based on Entrapment Immobilization of Urease onto a Nanostructured Polypyrrol and Multi-Walled Carbon Nanotube
Authors: Hamide Amani, Afshin FarahBakhsh, Iman Farahbakhsh
Abstract:
In this paper, an amprometric biosensor based on surface modified polypyrrole (PPy) has been developed for the quantitative estimation of urea in aqueous solutions. The incorporation of urease (Urs) into a bipolymeric substrate consisting of PPy was performed by entrapment to the polymeric matrix, PPy acts as amperometric transducer in these biosensors. To increase the membrane conductivity, multi-walled carbon nanotubes (MWCNT) were added to the PPy solution. The entrapped MWCNT in PPy film and the bipolymer layers were prepared for construction of Pt/PPy/MWCNT/Urs. Two different configurations of working electrodes were evaluated to investigate the potential use of the modified membranes in biosensors. The evaluation of two different configurations of working electrodes suggested that the second configuration, which was composed of an electrode-mediator-(pyrrole and multi-walled carbon nanotube) structure and enzyme, is the best candidate for biosensor applications.Keywords: urea biosensor, polypyrrole, multi-walled carbon nanotube, urease
Procedia PDF Downloads 32955 Clarification of the Essential of Life Cycle Cost upon Decision-Making Process: An Empirical Study in Building Projects
Authors: Ayedh Alqahtani, Andrew Whyte
Abstract:
Life Cycle Cost (LCC) is one of the goals and key pillars of the construction management science because it comprises many of the functions and processes necessary, which assist organisations and agencies to achieve their goals. It has therefore become important to design and control assets during their whole life cycle, from the design and planning phase through to disposal phase. LCCA is aimed to improve the decision making system in the ownership of assets by taking into account all the cost elements including to the asset throughout its life. Current application of LCC approach is impractical during misunderstanding of the advantages of LCC. This main objective of this research is to show a different relationship between capital cost and long-term running costs. One hundred and thirty eight actual building projects in United Kingdom (UK) were used in order to achieve and measure the above-mentioned objective of the study. The result shown that LCC is one of the most significant tools should be considered on the decision making process.Keywords: building projects, capital cost, life cycle cost, maintenance costs, operation costs
Procedia PDF Downloads 54654 Minimizing Mutant Sets by Equivalence and Subsumption
Authors: Samia Alblwi, Amani Ayad
Abstract:
Mutation testing is the art of generating syntactic variations of a base program and checking whether a candidate test suite can identify all the mutants that are not semantically equivalent to the base: this technique is widely used by researchers to select quality test suites. One of the main obstacles to the widespread use of mutation testing is cost: even small pro-grams (a few dozen lines of code) can give rise to a large number of mutants (up to hundreds): this has created an incentive to seek to reduce the number of mutants while preserving their collective effectiveness. Two criteria have been used to reduce the size of mutant sets: equiva-lence, which aims to partition the set of mutants into equivalence classes modulo semantic equivalence, and selecting one representative per class; subsumption, which aims to define a partial ordering among mutants that ranks mutants by effectiveness and seeks to select maximal elements in this ordering. In this paper we analyze these two policies using analytical and em-pirical criteria.Keywords: mutation testing, mutant sets, mutant equivalence, mutant subsumption, mutant set minimization
Procedia PDF Downloads 6353 Annotation Ontology for Semantic Web Development
Authors: Hadeel Al Obaidy, Amani Al Heela
Abstract:
The main purpose of this paper is to examine the concept of semantic web and the role that ontology and semantic annotation plays in the development of semantic web services. The paper focuses on semantic web infrastructure illustrating how ontology and annotation work to provide the learning capabilities for building content semantically. To improve productivity and quality of software, the paper applies approaches, notations and techniques offered by software engineering. It proposes a conceptual model to develop semantic web services for the infrastructure of web information retrieval system of digital libraries. The developed system uses ontology and annotation to build a knowledge based system to define and link the meaning of a web content to retrieve information for users’ queries. The results are more relevant through keywords and ontology rule expansion that will be more accurate to satisfy the requested information. The level of results accuracy would be enhanced since the query semantically analyzed work with the conceptual architecture of the proposed system.Keywords: semantic web services, software engineering, semantic library, knowledge representation, ontology
Procedia PDF Downloads 17352 Higher Order Thinking Skills Workshop: Faculty Professional Development and Its Effect on Their Teaching Strategies
Authors: Amani Hamdan
Abstract:
A post-workshop of higher-order thinking skills (HOTS), for faculty from diverse academic disciplines, was conducted and the researcher surveyed the participants’ intentions and plans to include HOTS as a goal, as learning and teaching task in their practices. Follow-up interviews with a random sample of participants were used to determine if they fulfilled their intentions three 3 months after the workshop. The degree of planned and enacted HOTS then was analyzed against the post-workshop HOT ability and knowledge. This is one topic that has not been adequately explored in faculty professional development literature where measuring the effect of learning on their ability to use what they learned. This qualitative method study explored a group of male and female faculty members (n=85) enrolled in HOTS 2 day workshop. The results showed that 89% of faculty members although were mostly enthused to apply what they learned after a 3 months period they were caught up with routine presentations and lecturing.Keywords: higher education, faculty development, Saudi Arabia, higher order thinking skills
Procedia PDF Downloads 45751 Computational Study of Passive Scalar Diffusion of a Counterflowing round Jet
Authors: Amani Amamou, Sabra Habli, Nejla Mahjoub Saïd, Georges Le Palec
Abstract:
Round jets have been widely studied due to their important application in industry. Many configurations of round jet were encountered in literature as free jet, co-flow jet, couterflowing jet and cross flow jet. In this paper, we are concerned with turbulent round jet in uniform counterflow stream which is known to enhance mixing and dispersion efficiency owing to flow reversal. This type of flow configuration is a typical application in environmental engineering such as the disposal of wastewater into seas or rivers. A computational study of a turbulent circular jet discharging into a uniform counterflow is conducted in order to investigate the characteristics of the diffusion field of the jet effluent. The investigation is carried out for three different cases of jet-to-current velocity ratios; low, medium and high velocity ratios. The Reynolds Stress Model (RSM) is used in the comparison with available experimental measurements. The decay of the center line velocity and the dynamic proprieties of the flow together with the centerline dilution of the passive scalar and the other characteristics of the concentration field are computationally analyzed in this paper.Keywords: Counterflow stream, jet, velocity, concentration
Procedia PDF Downloads 38450 Adversarial Disentanglement Using Latent Classifier for Pose-Independent Representation
Authors: Hamed Alqahtani, Manolya Kavakli-Thorne
Abstract:
The large pose discrepancy is one of the critical challenges in face recognition during video surveillance. Due to the entanglement of pose attributes with identity information, the conventional approaches for pose-independent representation lack in providing quality results in recognizing largely posed faces. In this paper, we propose a practical approach to disentangle the pose attribute from the identity information followed by synthesis of a face using a classifier network in latent space. The proposed approach employs a modified generative adversarial network framework consisting of an encoder-decoder structure embedded with a classifier in manifold space for carrying out factorization on the latent encoding. It can be further generalized to other face and non-face attributes for real-life video frames containing faces with significant attribute variations. Experimental results and comparison with state of the art in the field prove that the learned representation of the proposed approach synthesizes more compelling perceptual images through a combination of adversarial and classification losses.Keywords: disentanglement, face detection, generative adversarial networks, video surveillance
Procedia PDF Downloads 12949 Numerical Investigation of a Slightly Oblique Round Jet Flowing into a Uniform Counterflow Stream
Authors: Amani Amamou, Sabra Habli, Nejla Mahjoub Saïd, Philippe Bournot, Georges Le Palec
Abstract:
A counterflowing jet is a particular configuration of turbulent jets issuing into a moving ambient which has not carried much attention in literature compared with jet in a coflow or in a crossflow. This is due to the marked instability of the jet in a counterflow coupled with experimental and theoretical difficulties related to the flow inversion phenomenon. Nevertheless, jets in a counterflow are encountered in many engineering applications which required enhanced mixing as combustion, process and environmental engineering. In this work, we propose to investigate a round turbulent jet flowing into a uniform counterflow stream through a numerical approach. A hydrodynamic and thermal study of a slightly oblique round jets issuing into a uniform counterflow stream is carried out for different jet-to-counterflow velocity ratios ranging between 3.1 and 15. It is found that even a slight inclination of the jet in the vertical direction of the flow affects the structure and the velocity field of the counterflowing jet. In addition, the evolution of passive scalar temperature and pertinent length scales are presented at various velocity ratios, confirming that the flow is sensitive to directional perturbations.Keywords: jet, counterflow, velocity, temperature, jet inclination
Procedia PDF Downloads 26948 Validity and Reliability of the Iranian Version of the Self-Expansion Questionnaire
Authors: Mehravar Javid, James Sexton, Farzaneh Amani, Kainaz Patravala
Abstract:
Self-expansion is a procedure through which people expand the dimensions of their self-concept by incorporating novel content into their sense and experience of identity. Greater self-expansion predicts positive consequences for individuals and romantic relationships. The self-expansion questionnaire (SEQ) originally developed by Lewandowski & Aron (2002) assumes that self-expansion is constituted of key components from the self-expansion model. This study aimed to confirm the factor structure of SEQ and adapt the questions of the scale to the Iranian culture. The sample included 190 participants who responded to 14 items and were selected by simple random sampling. Using Amos-21 and SPSS-21, descriptive statistics, Pearson correlation and Confirmatory Factor Analysis (CFA) were calculated. Cronbach’s alpha coefficient for total SEQ items was 0.92. Results of CFA supported the factor structure SEQ [RMSEA=0.08, GFI=0.88 and CFI=0.92] that showed the model has a good fit and also all the items of SEQ, have a high correlation and have a direct and significant relationship. So, the SEQ demonstrated acceptable psychometric properties in Tehran University students. Looking forward, it would be interesting and exciting to see the implications of the scale as applied to romantic relationships.Keywords: validity, reliability, confirmatory factor analysis, self-expansion questionnaire
Procedia PDF Downloads 8147 Feasibility of Battery Electric Vehicles in Saudi Arabia: Cost and Sensitivity Analysis
Authors: Tawfiq Albishri, Abdulmajeed Alqahtani
Abstract:
Battery electric vehicles (BEVs) are increasingly seen as a sustainable alternative to internal combustion engine (ICE) vehicles, primarily due to their environmental and economic benefits. Saudi Arabia's interest in investing in renewable energy and reducing greenhouse gas emissions presents significant potential for the widespread adoption of BEVs in the country. However, several factors have hindered the adoption of BEVs in Saudi Arabia, with high ownership costs being the most prominent barrier. This cost discrepancy is primarily due to the lack of localized production of BEVs and their components, leading to increased import costs, as well as the high initial cost of BEVs compared to ICE vehicles. This paper aims to evaluate the feasibility of BEVs compared to ICE vehicles in Saudi Arabia by conducting a cost of ownership analysis. Furthermore, a sensitivity analysis will be conducted to determine the most significant contributor to the ownership costs of BEVs that, if changed, could expedite their adoption in Saudi Arabia.Keywords: battery electric vehicles, internal combustion engine, renewable energy, greenhouse gas emissions, total cost of ownership
Procedia PDF Downloads 8546 Involvement in Health Policy and Political Efficacy among Hospital Nurses in Jordan: A Descriptive Survey
Authors: Raeda F. Abualrub, Amani Abdulnabi
Abstract:
Aim: The aims of this study were to (a) examine the levels of nurses' political efficacy and involvement in health policy; and (b) explore the relationships between political efficacy, involvement in health policy, and participants’ background variables. Background: Nurses as citizens and health care providers have the right to express their opinions and beliefs in regard to issues that are concerned with the health care system or the public health domain. Methods: A descriptive, cross-sectional design using was utilized. A self-administered questionnaire (Political Efficacy Scale & Involvement in Health Policy Scale) was completed by a convenience sample of 302 nurses. Results: The results of this study showed low levels of involvement in health policy and political efficacy and a positive weak correlation between political efficacy and involvement in health policy. The perceived level of political efficacy was associated positively with nurses’ age and experience. Conclusions: Nurse administrators and managers may empower, support, and encourage nurses to enhance their involvement in health policy. Implications for Nursing Management: The findings have implications for nursing leaders and administrators to design appropriate strategies to enhance nurses’ involvement in health policy development.Keywords: health policy, Jordan, nurses, political efficacy
Procedia PDF Downloads 9545 Early Recognition and Grading of Cataract Using a Combined Log Gabor/Discrete Wavelet Transform with ANN and SVM
Authors: Hadeer R. M. Tawfik, Rania A. K. Birry, Amani A. Saad
Abstract:
Eyes are considered to be the most sensitive and important organ for human being. Thus, any eye disorder will affect the patient in all aspects of life. Cataract is one of those eye disorders that lead to blindness if not treated correctly and quickly. This paper demonstrates a model for automatic detection, classification, and grading of cataracts based on image processing techniques and artificial intelligence. The proposed system is developed to ease the cataract diagnosis process for both ophthalmologists and patients. The wavelet transform combined with 2D Log Gabor Wavelet transform was used as feature extraction techniques for a dataset of 120 eye images followed by a classification process that classified the image set into three classes; normal, early, and advanced stage. A comparison between the two used classifiers, the support vector machine SVM and the artificial neural network ANN were done for the same dataset of 120 eye images. It was concluded that SVM gave better results than ANN. SVM success rate result was 96.8% accuracy where ANN success rate result was 92.3% accuracy.Keywords: cataract, classification, detection, feature extraction, grading, log-gabor, neural networks, support vector machines, wavelet
Procedia PDF Downloads 332