Search results for: Bendjaballah Malek; Makhlouf Mohammed Rabeh; Boukerche Imane; Benhamza Mohammed El Hocine
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 859

Search results for: Bendjaballah Malek; Makhlouf Mohammed Rabeh; Boukerche Imane; Benhamza Mohammed El Hocine

739 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 473
738 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 258
737 Development of an Elastic Functionally Graded Interphase Model for the Micromechanics Response of Composites

Authors: Trevor Sabiston, Mohsen Mohammadi, Mohammed Cherkaoui, Kaan Inal

Abstract:

A new micromechanics framework is developed for long fibre reinforced composites using a single fibre surrounded by a functionally graded interphase and matrix as a representative unit cell. The unit cell is formulated to represent any number of aligned fibres by a single fibre. Using this model the elastic response of long fibre composites is predicted in all directions. The model is calibrated to experimental results and shows very good agreement in the elastic regime. The differences between the proposed model and existing models are discussed.

Keywords: computational mechanics, functionally graded interphase, long fibre composites, micromechanics

Procedia PDF Downloads 293
736 Seat Assignment Model for Student Admissions Process at Saudi Higher Education Institutions

Authors: Mohammed Salem Alzahrani

Abstract:

In this paper, student admission process is studied to optimize the assignment of vacant seats with three main objectives. Utilizing all vacant seats, satisfying all program of study admission requirements and maintaining fairness among all candidates are the three main objectives of the optimization model. Seat Assignment Method (SAM) is used to build the model and solve the optimization problem with help of Northwest Coroner Method and Least Cost Method. A closed formula is derived for applying the priority of assigning seat to candidate based on SAM.

Keywords: admission process model, assignment problem, Hungarian Method, Least Cost Method, Northwest Corner Method, SAM

Procedia PDF Downloads 471
735 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 446
734 Restoring Ecosystem Balance in Arid Regions: A Case Study of a Royal Nature Reserve in the Kingdom of Saudi Arabia

Authors: Talal Alharigi, Kawther Alshlash, Mariska Weijerman

Abstract:

The government of Saudi Arabia has developed an ambitious “Vision 2030”, which includes a Green Initiative (i.e., the planting of 10 billion trees) and the establishment of seven Royal Reserves as protected areas that comprise 13% of the total land area. The main objective of the reserves is to restore ecosystem balance and reconnect people with nature. Two royal reserves are managed by The Imam Abdulaziz bin Mohammed Royal Reserve Development Authority, including Imam Abdulaziz bin Mohammed Royal Reserve and King Khalid Royal Reserve. The authority has developed a management plan to enhance the habitat through seed dispersal and the planting of 10 million trees, and to restock wildlife that was once abundant in these arid ecosystems (e.g., oryx, Nubian ibex, gazelles, red-necked ostrich). Expectations are that with the restoration of the native vegetation, soil condition and natural hydrologic processes will improve and lead to further enhancement of vegetation and, over time, an increase in biodiversity of flora and fauna. To evaluate the management strategies in reaching these expectations, a comprehensive monitoring and evaluation program was developed. The main objectives of this program are to (1) monitor the status and trends of indicator species, (2) improve desert ecosystem understanding, (3) assess the effects of human activities, and (4) provide science-based management recommendations. Using a random stratified survey design, a diverse suite of survey methods will be implemented, including belt and quadrant transects, camera traps, GPS tracking devices, and drones. Data will be gathered on biotic parameters (plant and animal diversity, density, and distribution) and abiotic parameters (humidity, temperature, precipitation, wind, air, soil quality, vibrations, and noise levels) to meet the goals of the monitoring program. This case study intends to provide a detailed overview of the management plan and monitoring program of two royal reserves and outlines the types of data gathered which can be made available for future research projects.

Keywords: camera traps, desert ecosystem, enhancement, GPS tracking, management evaluation, monitoring, planting, restocking, restoration

Procedia PDF Downloads 85
733 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 46
732 Material Selection for Footwear Insole Using Analytical Hierarchal Process

Authors: Mohammed A. Almomani, Dina W. Al-Qudah

Abstract:

Product performance depends on the type and quality of its building material. Successful product must be made using high quality material, and using the right methods. Many foot problems took place as a result of using poor insole material. Therefore, selecting a proper insole material is crucial to eliminate these problems. In this study, the analytical hierarchy process (AHP) is used to provide a systematic procedure for choosing the best material adequate for this application among three material alternatives (polyurethane, poron, and plastzote). Several comparison criteria are used to build the AHP model including: density, stiffness, durability, energy absorption, and ease of fabrication. Poron was selected as the best choice. Inconsistency testing indicates that the model is reasonable, and the materials alternative ranking is effective.

Keywords: AHP, footwear insole, insole material, materials selection

Procedia PDF Downloads 322
731 Graphene Materials for Efficient Hybrid Solar Cells: A Spectroscopic Investigation

Authors: Mohammed Khenfouch, Fokotsa V. Molefe, Bakang M. Mothudi

Abstract:

Nowadays, graphene and its composites are universally known as promising materials. They show their potential in a large field of applications including photovoltaics. This study reports on the role of nanohybrids and nanosystems known as strong light harvesters in the efficiency of graphene hybrid solar cells. Our system included Graphene/ZnO/Porphyrin/P3HT layers. Moreover, the physical properties including surface/interface, optical and vibrational properties were also studied. Our investigations confirmed the interaction between the different components as well as the sensitivity of their photonics to the synthesis conditions. Remarkable energy and charge transfer were detected and deeply investigated. Hence, the optimization of the conditions will lead to the fabrication of higher conversion efficiency in graphene solar cells.

Keywords: graphene, optoelectronics, nanohybrids, solar cells

Procedia PDF Downloads 142
730 Impact of Graduates’ Quality of Education and Research on ICT Adoption at Workplace

Authors: Mohammed Kafaji

Abstract:

This paper aims to investigate the influence of quality of education and quality of research, provided by local educational institutions, on the adoption of Information and Communication Technology (ICT) in managing business operations for companies in Saudi market. A model was developed and tested using data collected from 138 CEO’s of foreign companies in diverse business sectors. The data is analysed and managed using multivariate approaches through standard statistical packages. The results showed that educational quality has little contribution to the ICT adoption while research quality seems to play a more prominent role. These results are analysed in terms of business environment and market constraints and further extended to the perceived effectiveness of applied pedagogical approaches in schools and universities.

Keywords: quality of education, quality of research, mediation, domestic competition, ICT adoption

Procedia PDF Downloads 424
729 The Decision to Remit is a Matter of Interpersonal Trust

Authors: Kamal Kasmaoui, Farid Makhlouf

Abstract:

This article seeks to assess the role of the level of interpersonal trust in a country in the remittance landscape. Using historical data from the 2010-2014 wave of the World Value Survey (WVS) for interpersonal trust, our findings underline the substitution role played by the interpersonal trust with remittances. More accurately, remittances tend to drop when the rate of interpersonal trust in the country of origin is high. Overall, a rise in trust is likely to underpin social cohesion, limiting, therefore, the need for remittances. These results are still fairly solid and unambiguous after controlling for confounding factors and possible reverse causality.

Keywords: interpersonal trust, social capital, remittances, 2SLS

Procedia PDF Downloads 139
728 iPSC-derived MSC Mediated Immunosuppression during Mouse Airway Transplantation

Authors: Mohammad Afzal Khan, Fatimah Alanazi, Hala Abdalrahman Ahmed, Talal Shamma, Kilian Kelly, Mohammed A. Hammad, Abdullah O. Alawad, Abdullah Mohammed Assiri, Dieter Clemens Broering

Abstract:

Lung transplantation is a life-saving surgical replacement of diseased lungs in patients with end-stage respiratory malfunctions. Despite the remarkable short-term recovery, long-term lung survival continues to face several significant challenges, including chronic rejection and severe toxic side-effects due to global immunosuppression. Stem cell-based immunotherapy has been recognized as a crucial immunoregulatory regimen in various preclinical and clinical studies. Despite initial therapeutic outcomes, conventional stem cells face key limitations. The Cymerus™ manufacturing facilitates the production of a virtually limitless supply of consistent human induced pluripotent stem cell (iPSC)-derived mesenchymal stem cells, which could play a key role in selective immunosuppression and graft repair during rejection. Here, we demonstrated the impact of iPSC-derived human MSCs on the development of immune-tolerance and long-term graft survival in mouse orthotopic airway allografts. BALB/c→C57BL/6 allografts were reconstituted with iPSC-derived MSCs (2 million/transplant/ at d0), and allografts were examined for regulatory T cells (Tregs), oxygenation, microvascular blood flow, airway epithelium and collagen deposition during rejection. We demonstrated that iPSC-derived MSC treatment leads to significant increase in tissue expression of hTSG-6 protein, followed by an upregulation of mouse Tregs and IL-5, IL-10, IL-15 cytokines, which augments graft microvascular blood flow and oxygenation, and thereby maintained a healthy airway epithelium and prevented the subepithelial deposition of collagen at d90 post-transplantation. Collectively, these data confirmed that iPSC-derived MSC-mediated immunosuppression has potential to establish immune-tolerance and rescue allograft from sustained hypoxic/ischemic phase and subsequently limits long-term airway epithelial injury and collagen progression, which therapeutically warrant a study of Cymerus iPSC-derived MSCs as a potential management option for immunosuppression in transplant recipients.

Keywords: stem cell therapy, immunotolerance, regulatory T cells, hypoxia and ischemia, microvasculature

Procedia PDF Downloads 131
727 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 513
726 Using the Internet of Things to Deal with Ventilators for Minimizing the Direct Contact with COVID-19 Patients

Authors: Mohammed Al-Shalabi

Abstract:

In recent years, the Internet of Things (IoT) has become an important technology for connecting various smart objects in many applications, especially in health monitoring applications. The IoT technology develops healthcare applications from traditional to personalized ones by making the treatment and monitoring of patients easier. Nowadays, especially during the COVID-19 pandemic, the necessity of enhancing healthcare monitoring applications to avoid the spreading of this pandemic is increased. In this paper, a mechanism is proposed to minimize direct contact with COVID-19 patients who need ventilators by using IoT technology. The proposed mechanism saves medical providers from COVID-19 infection and then minimizes the spreading of this disease.

Keywords: internet of things, healthcare monitoring, COVID-19, ventilators, thingspeak, clouds

Procedia PDF Downloads 97
725 Traditional Medicine and Islamic Holistic Approach in Palliative Care Management of Terminal Illpatient of Cancer

Authors: Mohammed Khalil Ur Rahman, Mohammed Alsharon, Arshad Muktar, Zahid Shaik

Abstract:

Any ailment can go into terminal stages, cancer being one such disease which is many times detected in latent stages. Cancer is often characterized by constitutional symptoms which are agonizing in nature which disturbs patients and their family as well. In order to relieve such intolerable symptoms treatment modality employed is known to be ‘Palliative Care’. The goal of palliative care is to enhance patient’s quality of life by relieving or rather reducing the distressing symptoms of patients such as pain, nausea/ vomiting, anorexia/loss of appetite, excessive salivation, mouth ulcers, weight loss, constipation, oral thrush, emaciation etc. which are due to the effect of disease or due to the undergoing treatment such as chemotherapy, radiation etc. Ayurveda and Unani as well as other traditional medicines is getting more and more international attention in recent years and Ayurveda and Unani holistic perspective of the disease, it seems that there are many herbs and herbomineral preparation which can be employed in the treatment of malignancy and also in palliative care. Though many of them have yet to be scientifically proved as anti-cancerous but there is definitely a positive lead that some of these medications relieve the agonising symptoms thereby making life of the patient easy. Health is viewed in Islam in a holistic way. One of the names of the Quran is al-shifa' meaning ‘that which heals’ or ‘the restorer of health’ to refer to spiritual, intellectual, psychological, and physical health. The general aim of medical science, according to Islam, is to secure and adopt suitable measures which, with Allah’s permission, help to preserve or restore the health of the human body. Islam motivates the Physician to view the patient as one organism. The patient has physical, social, psychological, and spiritual dimensions that must be considered in synthesis with an integrated, holistic approach. Aims & Objectives: - To suggest herbs which are mentioned in Ayurveda Unani with potential palliative activity in case of Cancer patients. - Most of tibb nabawi [Prophetic Medicine] is preventive medicine and must have been divinely inspired. - Spiritual Aspects of Healing: Prayer, dua, recitation of the Quran - Remembrance of Allah play a central role.Materials & Method: Literary review of the herbs supported with experiential evidence will be discussed. Discussion: On the basis of collected data subject will be discussed in length. Conclusion: Will be presented in paper.

Keywords: palliative care, holistic, Ayurvedic and Unani traditional system of medicine, Quran, hadith

Procedia PDF Downloads 311
724 Utilising Unground Oil Palm Ash in Producing Foamed Concrete and Its Implementation as an Interlocking Mortar-Less Block

Authors: Hanizam Awang, Mohammed Zuhear Al-Mulali

Abstract:

In this study, the possibility of using unground oil palm ash (UOPA) for producing foamed concrete is investigated. The UOPA used in this study is produced by incinerating palm oil biomass at a temperature exceeding 1000ºC. A semi-structural density of 1300kg/m3 was used with filler to binder ratio of 1.5 and preliminary water to binder ratio of 0.45. Cement was replaced by UOPA at replacement levels of 0, 25, 35, 45, 55 and 65% by weight of binder. Properties such as density, compressive strength, drying shrinkage and water absorption were investigated to the age of 90 days. The mix with a 35% of UOPA content was chosen to be used as the base material of a newly designed interlocking, mortar-less block system.

Keywords: foamed concrete, oil palm ash, strength, interlocking block

Procedia PDF Downloads 240
723 Routing in IP/LEO Satellite Communication Systems: Past, Present and Future

Authors: Mohammed Hussein, Abualseoud Hanani

Abstract:

In Low Earth Orbit (LEO) satellite constellation system, routing data from the source all the way to the destination constitutes a daunting challenge because LEO satellite constellation resources are spare and the high speed movement of LEO satellites results in a highly dynamic network topology. This situation limits the applicability of traditional routing approaches that rely on exchanging topology information upon change or setup of a connection. Consequently, in recent years, many routing algorithms and implementation strategies for satellite constellation networks with Inter Satellite Links (ISLs) have been proposed. In this article, we summarize and classify some of the most representative solutions according to their objectives, and discuss their advantages and disadvantages. Finally, with a look into the future, we present some of the new challenges and opportunities for LEO satellite constellations in general and routing protocols in particular.

Keywords: LEO satellite constellations, dynamic topology, IP routing, inter-satellite-links

Procedia PDF Downloads 330
722 Pros and Cons of Teaching/Learning Online during COVID-19: English Department at Tahri Muhammed University of Bechar as a Case Study

Authors: Fatiha Guessabi

Abstract:

Students of the Tahri Muhammed University of Bechar shifted to the virtual platform using E-learning platforms when the lockdown started due to the Coronavirus. This paper aims to explore the advantages and inconveniences of online learning and teaching in EFL classes at Tahri Mohammed University. For this investigation, a questionnaire was addressed to EFL students and an interview was arranged with EFL teachers. Data analysis was obtained from 09 teachers and 70 students. After the investigation, the results show that some of the most applied educational technologies and applications are used to turn online EFL classes effectively exciting. Thus, EFL classes became more interactive. Although learners give positive viewpoints about online learning/teaching, they prefer to learn in the classroom.

Keywords: advantages, disadvantages, COVID19, EFL, online learning/teaching, university of Bechar

Procedia PDF Downloads 134
721 Durability of Lightweight Concrete Material Made from Date Palma Seeds

Authors: Mohammed Almograbi

Abstract:

Libya is one of the largest producers of dates from date palm, generating about 60000 tonnes of date palm seeds (DPS) annually. This large amount of seeds led to studies into the possible use as aggregates in lightweight concrete for some special structures. The utilization of DPS as aggregate in concrete provides a good solution as alternative aggregate to the stone aggregate. It has been recognized that, DPS can be used as coarse aggregate in structural lightweight concrete industry. For any structure member, the durability is one of the most important considerations during its service life. This paper presents the durability properties of DPS concrete. These include the water permeability, water absorption, sorptivity and chloride penetration. The test results obtained were comparable to the conventional lightweight concrete.

Keywords: date palm seeds, lightweight concrete, durability, sustainability, permeability of concrete, water absorption of concrete, sorptivity of concrete

Procedia PDF Downloads 619
720 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 353
719 Numerical Solution to Coupled Heat and Moisture Diffusion in Bio-Sourced Composite Materials

Authors: Mnasri Faiza, El Ganaoui Mohammed, Khelifa Mourad, Gabsi Slimane

Abstract:

The main objective of this paper is to describe the hydrothermal behavior through porous material of construction due to temperature gradient. The construction proposed a bi-layer structure which composed of two different materials. The first is a bio-sourced panel named IBS-AKU (inertia system building), the second is the Neopor material. This system (IBS-AKU Neopor) is developed by a Belgium company (Isohabitat). The study suggests a multi-layer structure of the IBS-AKU panel in one dimension. A numerical method was proposed afterwards, by using the finite element method and a refined mesh area to strong gradients. The evolution of temperature fields and the moisture content has been processed.

Keywords: heat transfer, moisture diffusion, porous media, composite IBS-AKU, simulation

Procedia PDF Downloads 476
718 Content-Based Color Image Retrieval Based on the 2-D Histogram and Statistical Moments

Authors: El Asnaoui Khalid, Aksasse Brahim, Ouanan Mohammed

Abstract:

In this paper, we are interested in the problem of finding similar images in a large database. For this purpose we propose a new algorithm based on a combination of the 2-D histogram intersection in the HSV space and statistical moments. The proposed histogram is based on a 3x3 window and not only on the intensity of the pixel. This approach can overcome the drawback of the conventional 1-D histogram which is ignoring the spatial distribution of pixels in the image, while the statistical moments are used to escape the effects of the discretisation of the color space which is intrinsic to the use of histograms. We compare the performance of our new algorithm to various methods of the state of the art and we show that it has several advantages. It is fast, consumes little memory and requires no learning. To validate our results, we apply this algorithm to search for similar images in different image databases.

Keywords: 2-D histogram, statistical moments, indexing, similarity distance, histograms intersection

Procedia PDF Downloads 423
717 Developed Text-Independent Speaker Verification System

Authors: Mohammed Arif, Abdessalam Kifouche

Abstract:

Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.

Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis

Procedia PDF Downloads 19
716 A Neural Approach for Color-Textured Images Segmentation

Authors: Khalid Salhi, El Miloud Jaara, Mohammed Talibi Alaoui

Abstract:

In this paper, we present a neural approach for unsupervised natural color-texture image segmentation, which is based on both Kohonen maps and mathematical morphology, using a combination of the texture and the image color information of the image, namely, the fractal features based on fractal dimension are selected to present the information texture, and the color features presented in RGB color space. These features are then used to train the network Kohonen, which will be represented by the underlying probability density function, the segmentation of this map is made by morphological watershed transformation. The performance of our color-texture segmentation approach is compared first, to color-based methods or texture-based methods only, and then to k-means method.

Keywords: segmentation, color-texture, neural networks, fractal, watershed

Procedia PDF Downloads 312
715 To Remit or not to Remit: It is a Question of Interpersonal Trust

Authors: Kasmaoui Kamal, Makhlouf farid

Abstract:

This article seeks to assess the role of the level of interpersonal trust in a country in the remittance landscape. Using historical data from the 2010-2014 wave of the World Value Survey (WVS) for interpersonal trust, our findings underline the substitution role played by the interpersonal trust with remittances. More accurately, remittances tend to drop when the rate of interpersonal trust in the country of origin is high. Overall, a rise in trust is likely to underpin social cohesion, limiting, therefore, the need for remittances. These results are still fairly solid and unambiguous after controlling for confounding factors and possible reverse causality.

Keywords: interpersonal trust, remittances, social capital, social cohesion

Procedia PDF Downloads 68
714 Observing Vocabulary Teaching Strategies in English Classrooms in Saudi Schools

Authors: Mohammed Hassan Alshaikhi

Abstract:

Teaching vocabulary is a fundamental step in helping students to develop a good grasp of language. Exploring new strategies is an essential part of improving the teaching of vocabulary. The study aimed to explore the teaching vocabulary strategies in Saudi primary classrooms (aged 11 and 12 years old) in Jeddah, Saudi Arabia. The study was based on qualitative data collected from a large-scale case study, which utilised observations at eight male state and private primary schools during the academic year 2016-2017. The observations were transcribed, coded and entered into Nvivo software to be organised and analysed. Varying teaching vocabulary strategies were explored, and then they were circulated to many English teachers to be used in their classes.

Keywords: case study, English language, Saudi teachers, teaching vocabulary strategies

Procedia PDF Downloads 346
713 Lithium-Ion Battery State of Charge Estimation Using One State Hysteresis Model with Nonlinear Estimation Strategies

Authors: Mohammed Farag, Mina Attari, S. Andrew Gadsden, Saeid R. Habibi

Abstract:

Battery state of charge (SOC) estimation is an important parameter as it measures the total amount of electrical energy stored at a current time. The SOC percentage acts as a fuel gauge if it is compared with a conventional vehicle. Estimating the SOC is, therefore, essential for monitoring the amount of useful life remaining in the battery system. This paper looks at the implementation of three nonlinear estimation strategies for Li-Ion battery SOC estimation. One of the most common behavioral battery models is the one state hysteresis (OSH) model. The extended Kalman filter (EKF), the smooth variable structure filter (SVSF), and the time-varying smoothing boundary layer SVSF are applied on this model, and the results are compared.

Keywords: state of charge estimation, battery modeling, one-state hysteresis, filtering and estimation

Procedia PDF Downloads 409
712 Effect of Angles Collision, Absorption, Dash and Their Relationship with the Finale Results Case the Algerian Elite Team Triple Jump

Authors: Guebli Abdelkader, Zerf Mohammed, Mekkades Moulay Idriss, BenGoua Ali, Atouti Nouredinne, Habchi Nawel

Abstract:

The paper aims to show the influence of angles in the results of triple jump. Whereas our background confirms that a series of motions are characterized by complex angles in the properties phase (hop, step, and jump) as a combination of the pushed phase on ultimate phases in the result. For the purpose, our results are obtained from the National Athletics Championship 2013, which was filmed and analysis by the software kinovea. Based on the statistical analysis we confirm: there is a positive relationship between angle of the leg, hip angle, angle of the trunk in the collision during (hop, step, and jump), and there is a negative correlation to the angle of the knee relationship in a collision during.

Keywords: kinematics variables, the triple jump, the finale results, digital achievement

Procedia PDF Downloads 297
711 Survival and Hazard Maximum Likelihood Estimator with Covariate Based on Right Censored Data of Weibull Distribution

Authors: Al Omari Mohammed Ahmed

Abstract:

This paper focuses on Maximum Likelihood Estimator with Covariate. Covariates are incorporated into the Weibull model. Under this regression model with regards to maximum likelihood estimator, the parameters of the covariate, shape parameter, survival function and hazard rate of the Weibull regression distribution with right censored data are estimated. The mean square error (MSE) and absolute bias are used to compare the performance of Weibull regression distribution. For the simulation comparison, the study used various sample sizes and several specific values of the Weibull shape parameter.

Keywords: weibull regression distribution, maximum likelihood estimator, survival function, hazard rate, right censoring

Procedia PDF Downloads 412
710 Awareness for Air Pollution Impacts on Lung Cancer in Southern California: A Pilot Study for Designed Smartphone Application

Authors: M. Mohammed Raoof, A. Enkhtaivan, H. Aljuaid

Abstract:

This study follows the design science research methodology to design and implement a smartphone application artifact. The developed artifact was evaluated through three phases. The System Usability Scale (SUS) metric was used for the evaluation. The designed artifact aims to spread awareness about reducing air pollution, decreasing lung cancer development, and checking the air quality status in Southern California Counties. Participants have been drawn for a pilot study to facilitate awareness of air pollution. The study found that smartphone applications have a beneficial effect on the study’s aims.

Keywords: air pollution, design science research, indoor air pollution, lung cancer, outdoor air pollution, smartphone application

Procedia PDF Downloads 80