Search results for: Nouf Al Harbi
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11

Search results for: Nouf Al Harbi

11 Observations of Conformity in the Health Professions

Authors: Tanya N. Beran, Michelle A. Drefs, Ghazwan Altabbaa, Nouf Al Harbi, Noof Al Baz, Elizabeth Oddone Paolucci

Abstract:

Although interprofessional practice is a collaborative approach for problem solving among health professionals, its implementation can present challenges to its team members. In particular, they may feel pressured to agree with or conform to other members who share information that is contrary to their own understanding. Obtaining evidence of this phenomenon is challenging, as team members may underreport their conformity behaviors due to reasons such as social desirability. In this paper, a series of studies are reviewed in which several approaches to assessing conformity in the health care professions are tested. Simulations, questionnaires, and behavior checklists can be used to measure conformity behaviors. Insights from these studies show that a significant proportion of people conform either in the presence or absence of others, express a variety of verbal and nonverbal behaviors when considering whether to conform to others, may shift between conforming and moments later not conforming (and vice versa), and may not accurately report whether they conformed. A method of measuring conformity using the implicit bias test is also discussed. People at all levels in the healthcare system are encouraged to develop both formal and informal strategies to manage the conformity pressures that people face.

Keywords: Conformity, decision-making, interprofessional teams, medical simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 433
10 Maximum Norm Analysis of a Nonmatching Grids Method for Nonlinear Elliptic Boundary Value Problem −Δu = f(u)

Authors: Abida Harbi

Abstract:

We provide a maximum norm analysis of a finite element Schwarz alternating method for a nonlinear elliptic boundary value problem of the form -Δu = f(u), on two overlapping sub domains with non matching grids. We consider a domain which is the union of two overlapping sub domains where each sub domain has its own independently generated grid. The two meshes being mutually independent on the overlap region, a triangle belonging to one triangulation does not necessarily belong to the other one. Under a Lipschitz assumption on the nonlinearity, we establish, on each sub domain, an optimal L∞ error estimate between the discrete Schwarz sequence and the exact solution of the boundary value problem.

Keywords: Error estimates, Finite elements, Nonlinear PDEs, Schwarz method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2756
9 Measurement and Prediction of Speed of Sound in Petroleum Fluids

Authors: S. Ghafoori, A. Al-Harbi, B. Al-Ajmi, A. Al-Shaalan, A. Al-Ajmi, M. Ali Juma

Abstract:

Seismic methods play an important role in the exploration for hydrocarbon reservoirs. However, the success of the method depends strongly on the reliability of the measured or predicted information regarding the velocity of sound in the media. Speed of sound has been used to study the thermodynamic properties of fluids. In this study, experimental data are reported and analyzed on the speed of sound in toluene and octane binary mixture. Three-factor three-level Box-Benhkam design is used to determine the significance of each factor, the synergetic effects of the factors, and the most significant factors on speed of sound. The developed mathematical model and statistical analysis provided a critical analysis of the simultaneous interactive effects of the independent variables indicating that the developed quadratic models were highly accurate and predictive.

Keywords: Experimental design, octane, speed of sound, toluene.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1413
8 The Relationship between Military Expenditure, Military Personnel, Economic Growth, and the Environment

Authors: El Harbi Sana, Ben Afia Neila

Abstract:

In this paper, we study the relationship between the military effort and pollution. A distinction is drawn between the direct and indirect impact of the military effort (military expenditure and military personnel) on pollution, which operates through the impact of military effort on per capita income and the resultant impact of income on pollution. Using the data of 121 countries covering the period 1980–2011, both the direct and indirect impacts of military effort on air pollution emissions are estimated. Our results show that the military effort is estimated to have a positive direct impact on per capita emissions. Indirect effects are found to be positive, the total effect of military effort on emissions is positive for all countries.

Keywords: Military expenditure, military personnel, income, emissions of CO2 and panel data.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1969
7 Design Management Applications to Improve Work Environment for Female Academics in Saudi Arabia

Authors: Nouf Saad Alnassar, Susan Grant, Ray Holland

Abstract:

This research study examines cases of Saudi Arabian universities and female academics for work environment issues within the context of design management applications. The study proposes use of design research, ergonomics and systems design thinking to develop the university design which facilitates removal of physical and cognitive barriers for female academics. Review of literature demonstrates that macro and micro ergonomic combined with design management and system design strategies can significantly improve the workplace design for female academics. The university design model would be prepared based on the analyses of primary data obtained from archived documents, participants' observation logs, photo audits, focus groups and semi-structured interviews of currently employed female academics in the selected case universities.

Keywords: Design management, workplace design, university design, ergonomics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1781
6 Effects of Crushed Waste Aggregate from the Manufacture of Clay Bricks on Rendering Cement Mortar Performance

Authors: Benmalek M. Larbi, R. Harbi, S. Boukor

Abstract:

This paper reports an experimental work that aimed to investigate the effects of clay brick waste, as part of fine aggregate, on rendering mortar performance. The brick, in crushed form, was from a local brick manufacturer that was rejected due to being of-standard. It was used to replace 33.33 %, 50 %, 66.66 % and 100 % by weight of the quarry sand in mortar. Effects of the brick replacement on the mortar key properties intended for wall plastering were investigated; these are workability, compressive strength, flexural strength, linear shrinkage, water absorption by total immersion and by capillary suction. The results showed that as the brick replacement level increased, the mortar workability reduced. The linear shrinkage increases over time and decreases with the introduction of brick waste. The compressive and flexural strengths decrease with the increase of brick waste because of their great water absorption.

Keywords: Clay brick waste, mortar, properties, quarry sand.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1959
5 Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification

Authors: Dewan Md. Farid, Jerome Darmont, Nouria Harbi, Nguyen Huu Hoa, Mohammad Zahidur Rahman

Abstract:

In this paper, a new learning approach for network intrusion detection using naïve Bayesian classifier and ID3 algorithm is presented, which identifies effective attributes from the training dataset, calculates the conditional probabilities for the best attribute values, and then correctly classifies all the examples of training and testing dataset. Most of the current intrusion detection datasets are dynamic, complex and contain large number of attributes. Some of the attributes may be redundant or contribute little for detection making. It has been successfully tested that significant attribute selection is important to design a real world intrusion detection systems (IDS). The purpose of this study is to identify effective attributes from the training dataset to build a classifier for network intrusion detection using data mining algorithms. The experimental results on KDD99 benchmark intrusion detection dataset demonstrate that this new approach achieves high classification rates and reduce false positives using limited computational resources.

Keywords: Attributes selection, Conditional probabilities, information gain, network intrusion detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2697
4 Attacks Classification in Adaptive Intrusion Detection using Decision Tree

Authors: Dewan Md. Farid, Nouria Harbi, Emna Bahri, Mohammad Zahidur Rahman, Chowdhury Mofizur Rahman

Abstract:

Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today's commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98% detection rate (DR) in comparison with other existing methods.

Keywords: Detection rate, decision tree, intrusion detectionsystem, network security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3628
3 Scaling up Detection Rates and Reducing False Positives in Intrusion Detection using NBTree

Authors: Dewan Md. Farid, Nguyen Huu Hoa, Jerome Darmont, Nouria Harbi, Mohammad Zahidur Rahman

Abstract:

In this paper, we present a new learning algorithm for anomaly based network intrusion detection using improved self adaptive naïve Bayesian tree (NBTree), which induces a hybrid of decision tree and naïve Bayesian classifier. The proposed approach scales up the balance detections for different attack types and keeps the false positives at acceptable level in intrusion detection. In complex and dynamic large intrusion detection dataset, the detection accuracy of naïve Bayesian classifier does not scale up as well as decision tree. It has been successfully tested in other problem domains that naïve Bayesian tree improves the classification rates in large dataset. In naïve Bayesian tree nodes contain and split as regular decision-trees, but the leaves contain naïve Bayesian classifiers. The experimental results on KDD99 benchmark network intrusion detection dataset demonstrate that this new approach scales up the detection rates for different attack types and reduces false positives in network intrusion detection.

Keywords: Detection rates, false positives, network intrusiondetection, naïve Bayesian tree.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2280
2 Non-Melanoma Skin Cancer in Ha’il Region in the Kingdom of Saudi Arabia: A Clinicopathological Study

Authors: Laila Seada, Nouf Al Gharbi, Shaimaa Dawa

Abstract:

Although skin cancers are prevalent worldwide, it is uncommon in Ha’il region in the Kingdom of Saudi Arabia, mostly non-melanoma sub-type. During a 4-year period from 2014 to 2017, out of a total of 120 cases of skin lesions, 29 non-melanoma cancers were retrieved from histopathology files obtained from King Khalid Hospital. As part of the study, all cases of skin cancer diagnosed during 2014 -2017 have been revised and the clinicopathological data recorded. The results show that Basal cell carcinoma (BCC) was the most common neoplasm (36%), followed by cutaneous lymphomas (mostly mycosis fungoides 25%), squamous cell carcinoma (SCC) (21%) and dermatofibrosarcoma protuberans (DFSP) (11%). Only one case of metastatic carcinoma was recorded. BCC nodular type was the most prevalent, with a mean age 57.6 years and mean size 2.73 cm. SCC was mostly grade 2, with mean size 1.9 cm and an older mean age of 72.3 cm. Increased size of lesion positively correlated with older age (p = 0.001). Non-melanoma skin cancer in Ha’il region is not frequently encountered. BCC is the most frequent followed by cutaneous T-cell lymphomas and SCC. The findings in this study were in accordance with other parts of, but much lower than other parts of the world.

Keywords: Non melanoma skin cancer, Hail Region, histopathology, BCC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1117
1 Mining Network Data for Intrusion Detection through Naïve Bayesian with Clustering

Authors: Dewan Md. Farid, Nouria Harbi, Suman Ahmmed, Md. Zahidur Rahman, Chowdhury Mofizur Rahman

Abstract:

Network security attacks are the violation of information security policy that received much attention to the computational intelligence society in the last decades. Data mining has become a very useful technique for detecting network intrusions by extracting useful knowledge from large number of network data or logs. Naïve Bayesian classifier is one of the most popular data mining algorithm for classification, which provides an optimal way to predict the class of an unknown example. It has been tested that one set of probability derived from data is not good enough to have good classification rate. In this paper, we proposed a new learning algorithm for mining network logs to detect network intrusions through naïve Bayesian classifier, which first clusters the network logs into several groups based on similarity of logs, and then calculates the prior and conditional probabilities for each group of logs. For classifying a new log, the algorithm checks in which cluster the log belongs and then use that cluster-s probability set to classify the new log. We tested the performance of our proposed algorithm by employing KDD99 benchmark network intrusion detection dataset, and the experimental results proved that it improves detection rates as well as reduces false positives for different types of network intrusions.

Keywords: Clustering, detection rate, false positive, naïveBayesian classifier, network intrusion detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5535