Search results for: Talal Alqahtani
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 64

Search results for: Talal Alqahtani

64 The Job of Rhetoric in Public Relations Practice

Authors: Talal Alqahtani

Abstract:

For all institutions, either public or private, communication is important now more than ever. This is because the importance of communication has grown over the years, and it has the ability to either break or make an organization. With globalization, the changing technology, and other emergent issues that affect organizations, the communication given out has had to be better, sharper, and both proactive and reactive. This is the reason why the importance of public relations has been on the increase. Institutions realize the importance of having a good image and having public relations experts who can effectively manage communication in an institution easily in times of crisis. Public relations itself is not, however, effective, and this has led to the adoption of rhetoric in communication. Rhetoric use has had a long transformation because, in the past, it was only used in politics. Rhetoric in communication has come to be appreciated and adopted by many diverse fields and sectors. This study looks at the job of rhetoric in public relations practice and how it can identify with the administration of an institution's notoriety.

Keywords: communication, notoriety, rhetoric, public relation

Procedia PDF Downloads 198
63 The Application of the Enterprise Systems through the Cloud Computing in Company: A Review and Suggestions

Authors: Mohanaad Talal Shakir, Saad AJAJ Khalaf, Nawar Ahmed Aljumaily, Mustafa Talal Shakere

Abstract:

Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Objectives of this paper are to investigate the role of the Enterprise System and Cloud Computing Services to assist and guide him to ensure the initiative become successful. The cloud computing technology offers great potential for Enterprise such as the speed of dealing with data and product introductions, innovations and speed of response. The use of cloud computing technology leads to the rapid development and competitiveness of enterprises in various fields.

Keywords: cloud computing, information management, marketing, enterprise systems

Procedia PDF Downloads 653
62 Screening for Internet Addiction among Medical Students in a Saudi Community

Authors: Nawaf A. Alqahtani, Ali M. Alqahtani, Khalid A. Alqahtani, Huda S. Abdullfattah, Ebtehal A. Alessa, Khalid S. Al Gelban, Ossama A. Mostafa

Abstract:

Background: The internet is an exciting medium that is becoming an essential part of everyday life. Although the internet is fully observed in Saudi Arabia, young people may be vulnerable to problematic internet use, possibly leading to addiction. Aim of study: To explore the magnitude of internet addiction (IA) among medical students associated risk factors and its impact on students' academic achievement. Subjects and Methods: A cross sectional study was conducted in 2014 on 571 medical students (293 males and 278 females) at the College of Medicine, King Khalid University, Abha, Saudi Arabia. Data Collection was done through using the Arabic version of the Compulsive Internet Use Scale and a checklist of demographic characteristics. Results: Age of participants ranged from 19 to 26 years (Mean+SD: 21.9+1.5 years). Internet access was available to 97.4% of students at home and to 80.2% of students at their mobile phones. The most frequently accessed websites by medical students were the social media (90.7%), scientific website (50.4%) and the news websites (31.3%). IA was mild in 47.8% of medical students while 5.8% had moderate IA. None of the students had severe IA. Prevalence of IA was significantly higher among female medical students (p=0.002), availability of internet at home (p=0.022), and availability of internet at the students' mobile phone (p=0.041). The mean General Point Average (GPA) was highest among students with mild IA (4.0+0.6), compared with 3.6+0.6 among those with moderate addiction, and 3.9+0.6 among those who did not show IA. Differences in mean GPA according to grade of IA were statistically significant ((P=0.001). Conclusions: Prevalence of IA is high among medical students in Saudi Arabia. Risk factors for IA include female gender, availability of internet at home or at the mobile phone. IA has a significant impact on students' GPA. Periodic screening of medical students for IA and raising their awareness toward the possible risk of IA are recommended.

Keywords: internet addiction, medical students, risk factors, Saudi Arabia

Procedia PDF Downloads 486
61 Stakeholders Perspectives on the Social Determinants of Health and Quality of Life in Aseer Healthy Cities

Authors: Metrek Almetrek, Naser Alqahtani, Eisa Ghazwani, Mona Asiri, Mohammed Alqahtani, Magboolah Balobaid

Abstract:

Background: Advocacy of potential for community coalitions to positively address social determinants of health and quality of life, little is known about the views of stakeholders involved in such efforts. This study sought to assess the provinces leaders’ perspectives about social determinants related to the Health Neighborhood Initiative (HNI), a new county effort to support community coalitions. Method and Subjects: We used a descriptive, qualitative study using personal interviews in 2022. We conducted it in the community coalition's “main cities committees” set across service planning areas that serve vulnerable groups located in the seven registered healthy cities to WHO (Abha, Tareeb, Muhayel, Balqarn, Alharajah, Alamwah, and Bisha). We conducted key informant interviews with 76 governmental, profit, non-profit, and community leaders to understand their perspectives about the HNI. As part of a larger project, this study focused on leaders’ views about social determinants of health related to the HNI. All interviews were audio-recorded and transcribed. An inductive approach to coding was used, with text segments grouped by social determinant categories. Results: Provinces leaders described multiple social determinants of health and quality of life that were relevant to the HNI community coalitions: housing and safety, community violence, economic stability, city services coordination and employment and education. Leaders discussed how social determinants were interconnected with each other and the need for efforts to address multiple social determinants simultaneously to effectively improve health and quality of life. Conclusions: Community coalitions have an opportunity to address multiple social determinants of health and quality of life to meet the social needs of vulnerable groups. Future research should examine how community coalitions, like those in the HNI, can actively engage with community members to identify needs and then deliver evidence-based care.

Keywords: social determinants, health and quality of life, vulnerable groups, qualitative research

Procedia PDF Downloads 54
60 3D Multimedia Model for Educational Design Engineering

Authors: Mohanaad Talal Shakir

Abstract:

This paper tries to propose educational design by using multimedia technology for Engineering of computer Technology, Alma'ref University College in Iraq. This paper evaluates the acceptance, cognition, and interactiveness of the proposed model by students by using the statistical relationship to determine the stage of the model. Objectives of proposed education design are to develop a user-friendly software for education purposes using multimedia technology and to develop animation for 3D model to simulate assembling and disassembling process of high-speed flow.

Keywords: CAL, multimedia, shock tunnel, interactivity, engineering education

Procedia PDF Downloads 594
59 Google Translate: AI Application

Authors: Shaima Almalhan, Lubna Shukri, Miriam Talal, Safaa Teskieh

Abstract:

Since artificial intelligence is a rapidly evolving topic that has had a significant impact on technical growth and innovation, this paper examines people's awareness, use, and engagement with the Google Translate application. To see how familiar aware users are with the app and its features, quantitative and qualitative research was conducted. The findings revealed that consumers have a high level of confidence in the application and how far people they benefit from this sort of innovation and how convenient it makes communication.

Keywords: artificial intelligence, google translate, speech recognition, language translation, camera translation, speech to text, text to speech

Procedia PDF Downloads 120
58 Arabic Quran Search Tool Based on Ontology

Authors: Mohammad Alqahtani, Eric Atwell

Abstract:

This paper reviews and classifies most of the important types of search techniques that have been applied on the holy Quran. Then, it addresses the limitations in these techniques. Additionally, this paper surveys most existing Quranic ontologies and what are their deficiencies. Finally, it explains a new search tool called: A semantic search tool for Al Quran based on Qur’anic ontologies. This tool will overcome all limitations in the existing Quranic search applications.

Keywords: holy Quran, natural language processing (NLP), semantic search, information retrieval (IR), ontology

Procedia PDF Downloads 541
57 Using of Bimolecular Fluorescence Complementation (BiFC) Assays to Study Homo and/ or Heterodimerization of Laminin Receptor 37 LRP/ 67 LR with Galectin-3

Authors: Fulwah Alqahtani, Jafar Mahdavi, Lee Weldon, Nick Holliday, Dlawer Ala'Aldeen

Abstract:

There are two isoforms of laminin receptor; monomeric 37 kDa laminin receptor precursor (37 LRP) and mature 67 kDa laminin receptor (67 LR). The relationship between the 67 LR and its precursor 37 LRP is not completely understood, but previous observations have suggested that 37 LRP can undergo homo- and/or hetero- dimerization with Galectin-3 (Gal-3) to form mature 67 LR. Gal-3 is the only member of the chimera-type group of galectins, and has one C-terminal carbohydrate recognition domain (CRD) that is responsible for binding the ß-galactoside moieties of mono- or oligosaccharides on several host and microbial molecules. The aim of this work was to investigate homo- and hetero-dimerization among the 37 LRP and Gal-3 to form mature 67 LR in mammalian cells using bimolecular fluorescence complementation (BiFC).

Keywords: 37 LRP, 67 LR, Gal-3, BiFC

Procedia PDF Downloads 476
56 Construction of Green Aggregates from Waste Processing

Authors: Fahad K. Alqahtani

Abstract:

Nowadays construction industry is developing means to incorporate waste products in concrete to ensure sustainability. To meet the need of construction industry, a synthetic aggregate was developed using optimized technique called compression moulding press technique. The manufactured aggregate comprises mixture of plastic, waste which acts as binder, together with by-product waste which acts as fillers. The physical properties and microstructures of the inert materials and the manufactured aggregate were examined and compared with the conventional available aggregates. The outcomes suggest that the developed aggregate has potential to be used as substitution of conventional aggregate due to its less weight and water absorption. The microstructure analysis confirmed the efficiency of the manufacturing process where the final product has the same mixture of binder and filler.

Keywords: fly ash, plastic waste, quarry fine, red sand, synthetic aggregate

Procedia PDF Downloads 196
55 The Effectiveness of Goldstein’s Social Skillstreaming Model on Social Skills of Special Education Pre-Service Teachers

Authors: Prof. Ragea Alqahtani

Abstract:

The purpose of the study was to measure the effectiveness of the Goldstein’s social skill streaming model based on the special and general pre-service teachers’ knowledge about controlling their emotions in conflict situations. A review of previous pieces of literature guided the design and measurement of the effectiveness of the approach to the control of emotions. The teachers were assessed using the coping strategy, adult anger, and Goldstein’s skill streaming inventories. Lastly, the paper provides various recommendations on the sensitization of the Goldstein’s Social Skill streaming model to both the special and pre-service teachers to promote their knowledge about controlling emotions in conflicts.

Keywords: emotional control, goldstein social skillstreaming model, modeling technique, self-as-a-model, self-efficacy, self-regulation

Procedia PDF Downloads 24
54 Laminar Burning Velocity NH₃/H₂+Air Mixtures at Elevated Temperatures and Pressures

Authors: Talal Hasan, Akram Mohammad

Abstract:

Carbon-free combustion has great attention in today’s research for its unlimited benefits regarding various factors, and ammonia is considered a potential carbon-free alternative gas despite its flame characteristics. The Shrestha mechanism and Chemkin-Pro software will be used for numerical data. Firstly, experimental and numerical results should show good agreement to move for studying the laminar flame speed of ammonia under various conditions. Ammonia flame speed will be investigated under normal conditions (298 K, 1 atm) as well as under the influence of a range of equivalence ratios (0.6-1.8), elevated temperatures (298,323,373,423, and 473), elevated pressures (1 atm- 70 atm) and finally at varying hydrogen content (0-100%). Therefore, this work will understand the ammonia laminar flame speed characteristics and how and to what extent hydrogen can improve ammonia combustion intensity.

Keywords: laminar burning velocity, ammonia, hydrogen, combustion

Procedia PDF Downloads 76
53 A Taxonomy of Routing Protocols in Wireless Sensor Networks

Authors: A. Kardi, R. Zagrouba, M. Alqahtani

Abstract:

The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.

Keywords: routing, sensor, survey, wireless sensor networks, WSNs

Procedia PDF Downloads 153
52 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 297
51 Thermodynamically Predicting the Impact of Temperature on the Performance of Drilling Bits as a Function of Time

Authors: Talal Al-Bazali

Abstract:

Air drilling has recently received increasing acceptance by the oil and gas industry due to its unique advantages. The main advantages of air drilling include the higher rate of penetration, less formation damage, lower risk of loss of circulation. However, these advantages cannot be fully realized if thermal effects in air drilling are not well understood and minimized. Due to its high frictional coefficient, low heat conductivity, and high compressibility, air can impact the temperature distribution of bit and thus affect its bit performances. Based on energy and mass balances, a transient thermal model that predicts bit temperature is presented along with numerical solutions in this paper. In addition, several important parameters that influence bit temperature distribution are analyzed. Simulation results show that the bit temperature increases with increasing weight on bit and rotary speed but decreases as the standpipe pressure and flow rate increase. These results can be used to optimize drilling operations and flow parameters for an improved bit performance as shown in this paper.

Keywords: air drilling, rate of penetration, temperature, rotary speed

Procedia PDF Downloads 260
50 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 107
49 Seismic Retrofit of Existing Bridge Foundations with Micropiles: 3D Finite Element Analysis

Authors: Mohanad Talal Alfach

Abstract:

This paper concerns the seismic behaviour of soil-piles-bridge reinforced by additional micropiles. The analysis carried out by three-dimensional finite element modelling using the FE software ABAQUS. The soil behaviour is assumed to be elastic with Rayleigh damping, while the micropiles are modeled as 3D elastic beam elements. The bridge deck slab was represented by a concentrated mass at the top of the pier column. The interaction between the added micropiles and the existing piles as well as the performance of the retrofitted soil-pile-superstructure system were investigated for different configurations of additional micropiles (number, position, inclination). Numerical simulation results show that additional micropiles constitute an efficient retrofitting solution. Analysis of results also shows that spacing between existing piles and retrofitting micropiles has little effect; while it is observed a substantial improvement (in case of weak piles/micropiles - soil interface) with reducing the inclination angle of retrofitting micropiles.

Keywords: retrofitting, seismic, finite element, micropiles, elastic

Procedia PDF Downloads 120
48 An Empirical Study of Barriers to Total Quality Management Implementation in Construction Industries

Authors: Dhafer Alqahtani

Abstract:

Total quality management (TQM) has become a widely accepted approach in the modern industry over recent years. There is a general consensus that by adopting TQM, the overall effectiveness and performance of an industry can be improved. It is also proved that as long as TQM is adopted fully and practiced effectively in the industry, potential benefits of TQM will be delivered. But despite the benefits of TQM as articulated by many quality gurus and academicians, these benefits are not achieved in practice. Many service industries have found it difficult to implement TQM successfully. This paper, therefore, explores the barriers to TQM’s successful implementation in construction firms. The aim is to identify and rank the barriers to successful TQM implementation in order to make them know and get a better understanding by the managers and practitioners of the Construction Industries. The research methodology adopted in this study was an extensive literature review on barriers to TQM implementation followed by a survey of selected construction firms using the self-administered instrument. The results also showed that only lack of effective communication and lack of top management support were not significantly associated with the level of implementation of TQM.

Keywords: total quality management, construction firms, barriers, successful implementation

Procedia PDF Downloads 62
47 Design and Optimization of a Customized External Fixation Device for Lower Limb Injuries

Authors: Mohammed S. Alqahtani, Paulo J. Bartolo

Abstract:

External fixation is a common technique for the treatment and stabilization of bone fractures. Different designs have been proposed by companies and research groups, but all of them present limitations such as high weight, not comfortable to use, and not customized to individual patients. This paper proposes a lightweight customized external fixator, overcoming some of these limitations. External fixators are designed using a set of techniques such as medical imaging, CAD modelling, finite element analysis, and full factorial design of experiments. Key design parameters are discussed, and the optimal set of parameters is used to design the final external fixator. Numerical simulations are used to validate design concepts. Results present an optimal external fixation design with weight reduction of 13% without compromising its stiffness and structural integrity. External fixators are also designed to be additively manufactured, allowing to develop a strategy for personalization.

Keywords: computer-aided design modelling, external fixation, finite element analysis, full factorial, personalization

Procedia PDF Downloads 125
46 Structuring of Multilayer Aluminum Nickel by Lift-off Process Using Cheap Negative Resist

Authors: Muhammad Talal Asghar

Abstract:

The lift-off technique of the photoresist for metal patterning in integrated circuit (IC) packaging has been widely utilized in the field of microelectromechanical systems and semiconductor component manufacturing. The main advantage lies in cost-saving, reduction in complexity, and maturity of the process. The selection of photoresist depends upon many factors such as cost, the thickness of the resist, comfortable and valuable parameters extraction. In the present study, an extremely cheap dry film photoresist E8015 of thickness 38-micrometer is processed for the first time for edge profiling, according to the author's best knowledge. Successful extraction of the helpful parameter range for resist processing is performed. An undercut angle of 66 to 73 degrees is realized by parameter variation like exposure energy and development time. Finally, 10-micrometer thick metallic multilayer aluminum nickel is lifted off on the plain silicon wafer. Possible applications lie in controlled self-propagating reactions within structured metallic multilayer that may be utilized for IC packaging in the future.

Keywords: lift-off, IC packaging, photoresist, multilayer

Procedia PDF Downloads 179
45 Clarification of the Essential of Life Cycle Cost upon Decision-Making Process: An Empirical Study in Building Projects

Authors: Ayedh Alqahtani, Andrew Whyte

Abstract:

Life Cycle Cost (LCC) is one of the goals and key pillars of the construction management science because it comprises many of the functions and processes necessary, which assist organisations and agencies to achieve their goals. It has therefore become important to design and control assets during their whole life cycle, from the design and planning phase through to disposal phase. LCCA is aimed to improve the decision making system in the ownership of assets by taking into account all the cost elements including to the asset throughout its life. Current application of LCC approach is impractical during misunderstanding of the advantages of LCC. This main objective of this research is to show a different relationship between capital cost and long-term running costs. One hundred and thirty eight actual building projects in United Kingdom (UK) were used in order to achieve and measure the above-mentioned objective of the study. The result shown that LCC is one of the most significant tools should be considered on the decision making process.

Keywords: building projects, capital cost, life cycle cost, maintenance costs, operation costs

Procedia PDF Downloads 523
44 A Critical Appraisal of CO₂ Entrance Pressure with Heat

Authors: Abrar Al-Mutairi, Talal Al-Bazali

Abstract:

In this study, changes in capillary entry pressure of shale, as it interacts with CO₂, under different temperatures (25 °C to 250 °C) have been investigated. The combined impact of temperature and petrophysical properties (water content, water activity, permeability and porosity) of shale was also addressed. Results showed that the capillary entry pressure of shale when it interacted with CO₂ was highly affected by temperature. In general, increasing the temperature decreased capillary entry pressure of shale. We believe that pore dilation, where pore throat size expands due to the application of heat, may have caused this decrease in capillary entry pressure of shale. However, in some cases we found that at higher temperature some shale samples showed that the temperature activated clay swelling may have caused an apparent decrease in pore throat radii of shale which translates into higher capillary entry pressure of shale. Also, our results showed that there is no distinct relationship between shale’s water content, water activity, permeability, and porosity on the capillary entry pressure of shale samples as it interacted with CO₂ at different temperatures.

Keywords: heat, threshold pressure, CO₂ sequestration, shale

Procedia PDF Downloads 86
43 A Spiral Dynamic Optimised Hybrid Fuzzy Logic Controller for a Unicycle Mobile Robot on Irregular Terrains

Authors: Abdullah M. Almeshal, Mohammad R. Alenezi, Talal H. Alzanki

Abstract:

This paper presents a hybrid fuzzy logic control strategy for a unicycle trajectory following robot on irregular terrains. In literature, researchers have presented the design of path tracking controllers of mobile robots on non-frictional surface. In this work, the robot is simulated to drive on irregular terrains with contrasting frictional profiles of peat and rough gravel. A hybrid fuzzy logic controller is utilised to stabilise and drive the robot precisely with the predefined trajectory and overcome the frictional impact. The controller gains and scaling factors were optimised using spiral dynamics optimisation algorithm to minimise the mean square error of the linear and angular velocities of the unicycle robot. The robot was simulated on various frictional surfaces and terrains and the controller was able to stabilise the robot with a superior performance that is shown via simulation results.

Keywords: fuzzy logic control, mobile robot, trajectory tracking, spiral dynamic algorithm

Procedia PDF Downloads 461
42 Adversarial Disentanglement Using Latent Classifier for Pose-Independent Representation

Authors: Hamed Alqahtani, Manolya Kavakli-Thorne

Abstract:

The large pose discrepancy is one of the critical challenges in face recognition during video surveillance. Due to the entanglement of pose attributes with identity information, the conventional approaches for pose-independent representation lack in providing quality results in recognizing largely posed faces. In this paper, we propose a practical approach to disentangle the pose attribute from the identity information followed by synthesis of a face using a classifier network in latent space. The proposed approach employs a modified generative adversarial network framework consisting of an encoder-decoder structure embedded with a classifier in manifold space for carrying out factorization on the latent encoding. It can be further generalized to other face and non-face attributes for real-life video frames containing faces with significant attribute variations. Experimental results and comparison with state of the art in the field prove that the learned representation of the proposed approach synthesizes more compelling perceptual images through a combination of adversarial and classification losses.

Keywords: disentanglement, face detection, generative adversarial networks, video surveillance

Procedia PDF Downloads 93
41 Feasibility of Battery Electric Vehicles in Saudi Arabia: Cost and Sensitivity Analysis

Authors: Tawfiq Albishri, Abdulmajeed Alqahtani

Abstract:

Battery electric vehicles (BEVs) are increasingly seen as a sustainable alternative to internal combustion engine (ICE) vehicles, primarily due to their environmental and economic benefits. Saudi Arabia's interest in investing in renewable energy and reducing greenhouse gas emissions presents significant potential for the widespread adoption of BEVs in the country. However, several factors have hindered the adoption of BEVs in Saudi Arabia, with high ownership costs being the most prominent barrier. This cost discrepancy is primarily due to the lack of localized production of BEVs and their components, leading to increased import costs, as well as the high initial cost of BEVs compared to ICE vehicles. This paper aims to evaluate the feasibility of BEVs compared to ICE vehicles in Saudi Arabia by conducting a cost of ownership analysis. Furthermore, a sensitivity analysis will be conducted to determine the most significant contributor to the ownership costs of BEVs that, if changed, could expedite their adoption in Saudi Arabia.

Keywords: battery electric vehicles, internal combustion engine, renewable energy, greenhouse gas emissions, total cost of ownership

Procedia PDF Downloads 51
40 Experimental and Analytical Study of Various Types of Shear Connector Used for Cold-Formed Steel-Ferrocement Composite Beam

Authors: Talal Alhajri, Mahmood M. Tahir, Khaled Alenezi, Mohamad Ragaee

Abstract:

This work presents the experimental tests carried out to evaluate the behaviour of different types of shear connectors proposed for cold formed steel (CFS) section integrated with ferrocement slab as potential used for composite beam. Ten push-out test specimens of cold-formed steel lipped channel sections connected with ferrocement slab were tested. Three types of shear connectors were studied comprised of bolts, self-drilling-screw and bar angle. The connection behavior is analysed in terms of its load-slip relationship and the failure mode. The parametric studies were performed to investigate the effect on the shear connector’s capacity by varying the number of layers of wire mesh used in ferrocement slab and types of shear connector used. An analytical analysis using ANSYS program and theoretical analysis (Eurocode 4) were carried out to verify the experiment results. The results show that the experimental, theoretical, and numerical values proved to have good agreement with each other.

Keywords: cold-formed steel, composite beam, ferrocement, finite element method, push-out test, shear connector

Procedia PDF Downloads 335
39 Sparse Modelling of Cancer Patients’ Survival Based on Genomic Copy Number Alterations

Authors: Khaled M. Alqahtani

Abstract:

Copy number alterations (CNA) are variations in the structure of the genome, where certain regions deviate from the typical two chromosomal copies. These alterations are pivotal in understanding tumor progression and are indicative of patients' survival outcomes. However, effectively modeling patients' survival based on their genomic CNA profiles while identifying relevant genomic regions remains a statistical challenge. Various methods, such as the Cox proportional hazard (PH) model with ridge, lasso, or elastic net penalties, have been proposed but often overlook the inherent dependencies between genomic regions, leading to results that are hard to interpret. In this study, we enhance the elastic net penalty by incorporating an additional penalty that accounts for these dependencies. This approach yields smooth parameter estimates and facilitates variable selection, resulting in a sparse solution. Our findings demonstrate that this method outperforms other models in predicting survival outcomes, as evidenced by our simulation study. Moreover, it allows for a more meaningful interpretation of genomic regions associated with patients' survival. We demonstrate the efficacy of our approach using both real data from a lung cancer cohort and simulated datasets.

Keywords: copy number alterations, cox proportional hazard, lung cancer, regression, sparse solution

Procedia PDF Downloads 14
38 Advancing Epilepsy Diagnosis through EEG Analysis and Independent Component Analysis Algorithms

Authors: Eyad Talal Attar

Abstract:

Epilepsy is a prevalent neurological condition that impacts a considerable population of around 50 million individuals globally, rendering it one of the most widespread neurological disorders. The condition is distinguished by recurring seizures, which are abrupt and transient disruptions in a cerebral activity that can induce alterations in perception, conduct, and awareness. Seizures can be classified as focal or generalized, based on the specific site and scope of the atypical brain activity. Focal seizures are identified by confinement to a particular brain area and can elicit localized manifestations. Generalized seizures are identified by extensive electrical activity throughout the brain, and they can appear in various symptoms such as convulsions, muscle rigidity, and loss of consciousness. This study represents seven individuals chosen according to the number of seizures in the range of three to five seizure and investigates the ability to detect brain seizure activity. The EEG recording Siena Scalp Database was used from PhysioNet databases. EEGLAB is a robust tool utilized for processing and analyzing electroencephalogram (EEG) data and is used to analyze the raw data. The efficacy of Independent Component Analysis ICA algorithms has been demonstrated in the separation of arterial EEG sources and neuronal-generated EEG sources.

Keywords: EEG, MATLAB software, power spectral density, PSD, signal analysis, attention, alpha, beta, gamma

Procedia PDF Downloads 27
37 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 375
36 Evaluating Machine Learning Techniques for Activity Classification in Smart Home Environments

Authors: Talal Alshammari, Nasser Alshammari, Mohamed Sedky, Chris Howard

Abstract:

With the widespread adoption of the Internet-connected devices, and with the prevalence of the Internet of Things (IoT) applications, there is an increased interest in machine learning techniques that can provide useful and interesting services in the smart home domain. The areas that machine learning techniques can help advance are varied and ever-evolving. Classifying smart home inhabitants’ Activities of Daily Living (ADLs), is one prominent example. The ability of machine learning technique to find meaningful spatio-temporal relations of high-dimensional data is an important requirement as well. This paper presents a comparative evaluation of state-of-the-art machine learning techniques to classify ADLs in the smart home domain. Forty-two synthetic datasets and two real-world datasets with multiple inhabitants are used to evaluate and compare the performance of the identified machine learning techniques. Our results show significant performance differences between the evaluated techniques. Such as AdaBoost, Cortical Learning Algorithm (CLA), Decision Trees, Hidden Markov Model (HMM), Multi-layer Perceptron (MLP), Structured Perceptron and Support Vector Machines (SVM). Overall, neural network based techniques have shown superiority over the other tested techniques.

Keywords: activities of daily living, classification, internet of things, machine learning, prediction, smart home

Procedia PDF Downloads 312
35 Immunomodulation by Interleukin-10 Therapy in Mouse Airway Transplantation

Authors: Mohammaad Afzal Khan, Ghazi Abdulmalik Ashoor , Fatimah Alanazi, Talal Shamma, Abdullah Altuhami, Hala Abdalrahman Ahmed, Abdullah Mohammed Assiri, Dieter Clemens Broering

Abstract:

Microvascular injuries during inflammation are key causes of transplant malfunctioning and permanent failure, which play a major role in the development of chronic rejection of the transplanted organ. Inflammation-induced microvascular loss is a promising area to investigate the decisive roles of regulatory and effector responses. The present study was designed to investigate the impact of IL-10 on immunotolerance, in particular, the microenvironment of the allograft during rejection. Here, we investigated the effects of IL-10 blockade/ reconstitution and serially monitored regulatory T cells (Tregs), graft microvasculature, and airway epithelium in rejecting airway transplants. We demonstrated that the blocking/reconstitution of IL-10 significantly modulates CD4+FOXP3+ Tregs, microvasculature, and airway epithelium during rejection. Our findings further highlighted that blockade of IL-10 upregulated proinflammatory cytokines, IL-2, IL-1β, IFN-γ, IL-15, and IL-23, but suppressed IL-5 secretion during rejection; however, reconstitution of IL-10 significantly upregulated CD4+FOXP3+ Tregs, tissue oxygenation/blood flow and airway repair. Collectively, these findings demonstrate a potential reparative modulation of IL-10 during microvascular and epithelial repair, which could provide a vital therapeutic window to rejecting transplants in clinical practice.

Keywords: interleukin -10, regulatory T cells, allograft rejection, immunotolerance

Procedia PDF Downloads 149