CINXE.COM
Search results for: Hajer Azaiez
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Hajer Azaiez</title> <meta name="description" content="Search results for: Hajer Azaiez"> <meta name="keywords" content="Hajer Azaiez"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Hajer Azaiez" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Hajer Azaiez"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 18</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Hajer Azaiez</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Seismic Reflection Highlights of New Miocene Deep Aquifers in Eastern Tunisia Basin (North Africa)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mourad%20B%C3%A9dir">Mourad Bédir</a>, <a href="https://publications.waset.org/abstracts/search?q=Sami%20Khomsi"> Sami Khomsi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hakim%20Gabtni"> Hakim Gabtni</a>, <a href="https://publications.waset.org/abstracts/search?q=Hajer%20Azaiez"> Hajer Azaiez</a>, <a href="https://publications.waset.org/abstracts/search?q=Ramzi%20Gharsalli"> Ramzi Gharsalli</a>, <a href="https://publications.waset.org/abstracts/search?q=Riadh%20Chebbi"> Riadh Chebbi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Eastern Tunisia is a semi-arid area; located in the northern Africa plate; southern Mediterranean side. It is facing water scarcity, overexploitation, and decreasing of water quality of phreatic water table. Water supply and storage will not respond to the demographic and economic growth and demand. In addition, only 5 109 m3 of rainwater from 35 109 m3 per year renewable rain water supply can be retained and remobilized. To remediate this water deficiency, researches had been focused to near new subsurface deep aquifers resources. Among them, Upper Miocene sandstone deposits of Béglia, Saouaf, and Somaa Formations. These sandstones are known for their proven Hydrogeologic and hydrocarbon reservoir characteristics in the Tunisian margin. They represent semi-confined to confined aquifers. This work is based on new integrated approaches of seismic stratigraphy, seismic tectonics, and hydrogeology, to highlight and characterize these reservoirs levels for aquifer exploitation in semi-arid area. As a result, five to six third order sequence deposits had been highlighted. They are composed of multi-layered extended sandstones reservoirs; separated by shales packages. These reservoir deposits represent lowstand and highstand system tracts of these sequences, which represent lowstand and highstand system tracts of these sequences. They constitute important strategic water resources volumes for the region. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tunisia" title="Tunisia">Tunisia</a>, <a href="https://publications.waset.org/abstracts/search?q=Hydrogeology" title=" Hydrogeology"> Hydrogeology</a>, <a href="https://publications.waset.org/abstracts/search?q=sandstones" title=" sandstones"> sandstones</a>, <a href="https://publications.waset.org/abstracts/search?q=basin" title=" basin"> basin</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic" title=" seismic"> seismic</a>, <a href="https://publications.waset.org/abstracts/search?q=aquifers" title=" aquifers"> aquifers</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling" title=" modeling"> modeling</a> </p> <a href="https://publications.waset.org/abstracts/142805/seismic-reflection-highlights-of-new-miocene-deep-aquifers-in-eastern-tunisia-basin-north-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142805.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> Implementation of a Baseline RISC for the Realization of a Dynamically Reconfigurable Processor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hajer%20Najjar">Hajer Najjar</a>, <a href="https://publications.waset.org/abstracts/search?q=Riad%20Bourguiba"> Riad Bourguiba</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaouhar%20Mouine"> Jaouhar Mouine</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Reduced instruction set computer (RISC) processors are widely used because of their multiple advantages. In fact, they are based on a simple instruction set so that they increase the speed of the processor and reduce its energy consumption. In this paper, we will present a basic RISC architecture processor that will be developed later to converge to a new architecture with runtime reconfiguration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=processor" title="processor">processor</a>, <a href="https://publications.waset.org/abstracts/search?q=RISC" title=" RISC"> RISC</a>, <a href="https://publications.waset.org/abstracts/search?q=DLX" title=" DLX"> DLX</a>, <a href="https://publications.waset.org/abstracts/search?q=pipeline" title=" pipeline"> pipeline</a>, <a href="https://publications.waset.org/abstracts/search?q=runtime%20reconfiguration" title=" runtime reconfiguration"> runtime reconfiguration</a> </p> <a href="https://publications.waset.org/abstracts/16176/implementation-of-a-baseline-risc-for-the-realization-of-a-dynamically-reconfigurable-processor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16176.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> Towards Natively Context-Aware Web Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hajer%20Taktak">Hajer Taktak</a>, <a href="https://publications.waset.org/abstracts/search?q=Faouzi%20Moussa"> Faouzi Moussa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the ubiquitous computing’s emergence and the evolution of enterprises’ needs, one of the main challenges is to build context-aware applications based on Web services. These applications have become particularly relevant in the pervasive computing domain. In this paper, we introduce our approach that optimizes the use of Web services with context notions when dealing with contextual environments. We focus particularly on making Web services autonomous and natively context-aware. We implement and evaluate the proposed approach with a pedagogical example of a context-aware Web service treating temperature values. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context-aware" title="context-aware">context-aware</a>, <a href="https://publications.waset.org/abstracts/search?q=CXF%20framework" title=" CXF framework"> CXF framework</a>, <a href="https://publications.waset.org/abstracts/search?q=ubiquitous%20computing" title=" ubiquitous computing"> ubiquitous computing</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20service" title=" web service"> web service</a> </p> <a href="https://publications.waset.org/abstracts/20623/towards-natively-context-aware-web-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20623.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> A Multi-Attribute Utility Model for Performance Evaluation of Sustainable Banking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sonia%20Rebai">Sonia Rebai</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a>, <a href="https://publications.waset.org/abstracts/search?q=Dhafer%20Saidane"> Dhafer Saidane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we develop a performance evaluation model based on a multi-attribute utility approach aiming at reaching the sustainable banking (SB) status. This model is built accounting for various banks’ stakeholders in a win-win paradigm. In addition, it offers the opportunity for adopting a global measure of performance as an indication of a bank’s sustainability degree. This measure is referred to as banking sustainability performance index (BSPI). This index may constitute a basis for ranking banks. Moreover, it may constitute a bridge between the assessment types of financial and extra-financial rating agencies. A real application is performed on three French banks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multi-attribute%20utility%20theory" title="multi-attribute utility theory">multi-attribute utility theory</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20banking" title=" sustainable banking"> sustainable banking</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20rating" title=" financial rating "> financial rating </a> </p> <a href="https://publications.waset.org/abstracts/10643/a-multi-attribute-utility-model-for-performance-evaluation-of-sustainable-banking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10643.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">467</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Ben%20Yaghlane">Asma Ben Yaghlane</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehdi%20Mrad"> Mehdi Mrad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defense%2Fattack%20strategies" title="defense/attack strategies">defense/attack strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=large%20scale" title="large scale">large scale</a>, <a href="https://publications.waset.org/abstracts/search?q=networks" title=" networks"> networks</a>, <a href="https://publications.waset.org/abstracts/search?q=partitioning%20a%20network" title=" partitioning a network"> partitioning a network</a> </p> <a href="https://publications.waset.org/abstracts/40317/system-survivability-in-networks-in-the-context-of-defenseattack-strategies-the-large-scale" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40317.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Ben%20Yaghlane">Asma Ben Yaghlane</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CAR%20processes" title="CAR processes">CAR processes</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%2Fattack%20strategies" title=" defense/attack strategies"> defense/attack strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=exponential%20failure" title=" exponential failure"> exponential failure</a>, <a href="https://publications.waset.org/abstracts/search?q=survivability" title=" survivability"> survivability</a> </p> <a href="https://publications.waset.org/abstracts/83569/modeling-intelligent-threats-case-of-continuous-attacks-on-a-specific-target" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">395</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Investigation of Main Operating Parameters Affecting Gas Turbine Efficiency and Gas Releases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farhat%20Hajer">Farhat Hajer</a>, <a href="https://publications.waset.org/abstracts/search?q=Khir%20Tahar"> Khir Tahar</a>, <a href="https://publications.waset.org/abstracts/search?q=Ammar%20Ben%20Brahim"> Ammar Ben Brahim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work presents a study on the influence of the main operating variables on the gas turbine cycle. A numerical simulation of a gas turbine cycle is performed for a real net power of 100 MW. A calculation code is developed using EES software. The operating variables are taken in conformity with the local environmental conditions adopted by the Tunisian Society of Electricity and Gas. Results show that the increase of ambient temperature leads to an increase of Tpz and NO<sub>x</sub> emissions rate and a decrease of cycle efficiency and UHC emissions. The CO emissions decrease with the raise of residence time, while NO<sub>x</sub> emissions rate increases and UHC emissions rate decreases. Furthermore, both of cycle efficiency and NOx emissions increase with the increase of the pressure ratio. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carbon%20monoxide" title="Carbon monoxide">Carbon monoxide</a>, <a href="https://publications.waset.org/abstracts/search?q=Efficiency" title=" Efficiency"> Efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=Emissions" title=" Emissions"> Emissions</a>, <a href="https://publications.waset.org/abstracts/search?q=Gas%20Turbine" title=" Gas Turbine"> Gas Turbine</a>, <a href="https://publications.waset.org/abstracts/search?q=Nox" title=" Nox"> Nox</a>, <a href="https://publications.waset.org/abstracts/search?q=UHC" title=" UHC"> UHC</a> </p> <a href="https://publications.waset.org/abstracts/69221/investigation-of-main-operating-parameters-affecting-gas-turbine-efficiency-and-gas-releases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69221.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">436</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Energy and Exergy Performance Optimization on a Real Gas Turbine Power Plant</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farhat%20Hajer">Farhat Hajer</a>, <a href="https://publications.waset.org/abstracts/search?q=Khir%20Tahar"> Khir Tahar</a>, <a href="https://publications.waset.org/abstracts/search?q=Cherni%20Rafik"> Cherni Rafik</a>, <a href="https://publications.waset.org/abstracts/search?q=Dakhli%20Radhouen"> Dakhli Radhouen</a>, <a href="https://publications.waset.org/abstracts/search?q=Ammar%20Ben%20Brahim"> Ammar Ben Brahim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the energy and exergy optimization of a real gas turbine power plant performance of 100 MW of power, installed in the South East of Tunisia. A simulation code is established using the EES (Engineering Equation Solver) software. The parameters considered are those of the actual operating conditions of the gas turbine thermal power station under study. The results show that thermal and exergetic efficiency decreases with the increase of the ambient temperature. Air excess has an important effect on the thermal efficiency. The emission of NOx rises in the summer and decreases in the winter. The obtained rates of NOx are compared with measurements results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=efficiency" title="efficiency">efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=exergy" title=" exergy"> exergy</a>, <a href="https://publications.waset.org/abstracts/search?q=gas%20turbine" title=" gas turbine"> gas turbine</a>, <a href="https://publications.waset.org/abstracts/search?q=temperature" title=" temperature"> temperature</a> </p> <a href="https://publications.waset.org/abstracts/88904/energy-and-exergy-performance-optimization-on-a-real-gas-turbine-power-plant" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88904.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">284</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Ben%20Yaghlane">Asma Ben Yaghlane</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attacker" title="attacker">attacker</a>, <a href="https://publications.waset.org/abstracts/search?q=defender" title=" defender"> defender</a>, <a href="https://publications.waset.org/abstracts/search?q=game%20theory" title=" game theory"> game theory</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a> </p> <a href="https://publications.waset.org/abstracts/38429/a-game-of-information-in-defenseattack-strategies-case-of-poisson-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">468</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> System Survivability in Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Ben%20Yaghlane">Asma Ben Yaghlane</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defense%2Fattack%20strategies" title="defense/attack strategies">defense/attack strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=networks" title=" networks"> networks</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=survivability" title=" survivability"> survivability</a> </p> <a href="https://publications.waset.org/abstracts/40316/system-survivability-in-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40316.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> Robust Features for Impulsive Noisy Speech Recognition Using Relative Spectral Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hajer%20Rahali">Hajer Rahali</a>, <a href="https://publications.waset.org/abstracts/search?q=Zied%20Hajaiej"> Zied Hajaiej</a>, <a href="https://publications.waset.org/abstracts/search?q=Noureddine%20Ellouze"> Noureddine Ellouze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The goal of speech parameterization is to extract the relevant information about what is being spoken from the audio signal. In speech recognition systems Mel-Frequency Cepstral Coefficients (MFCC) and Relative Spectral Mel-Frequency Cepstral Coefficients (RASTA-MFCC) are the two main techniques used. It will be shown in this paper that it presents some modifications to the original MFCC method. In our work the effectiveness of proposed changes to MFCC called Modified Function Cepstral Coefficients (MODFCC) were tested and compared against the original MFCC and RASTA-MFCC features. The prosodic features such as jitter and shimmer are added to baseline spectral features. The above-mentioned techniques were tested with impulsive signals under various noisy conditions within AURORA databases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=auditory%20filter" title="auditory filter">auditory filter</a>, <a href="https://publications.waset.org/abstracts/search?q=impulsive%20noise" title=" impulsive noise"> impulsive noise</a>, <a href="https://publications.waset.org/abstracts/search?q=MFCC" title=" MFCC"> MFCC</a>, <a href="https://publications.waset.org/abstracts/search?q=prosodic%20features" title=" prosodic features"> prosodic features</a>, <a href="https://publications.waset.org/abstracts/search?q=RASTA%20filter" title=" RASTA filter"> RASTA filter</a> </p> <a href="https://publications.waset.org/abstracts/8911/robust-features-for-impulsive-noisy-speech-recognition-using-relative-spectral-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8911.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Pharmaceutical Evaluation of Five Different Generic Brands of Prednisolone </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20A.%20Ben%20Ahmed">Asma A. Ben Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Hajer%20M.%20Alborawy"> Hajer M. Alborawy</a>, <a href="https://publications.waset.org/abstracts/search?q=Alaa%20A.%20Mashina"> Alaa A. Mashina</a>, <a href="https://publications.waset.org/abstracts/search?q=Pradeep%20K.%20Velautham"> Pradeep K. Velautham</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdulmonem%20Gobassa"> Abdulmonem Gobassa</a>, <a href="https://publications.waset.org/abstracts/search?q=Emhemmed%20Elgallal"> Emhemmed Elgallal</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20N.%20El%20Attug"> Mohamed N. El Attug</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Generic medicines are those where patent protection has expired, and which may be produced by manufacturers other than the innovator company. Use of generic medicines has been increasing in recent years, primarily as a cost saving measure in healthcare provision. Generic medicines are typically 20 – 90 % cheaper than originator equivalents. Physicians often continue to prescribe brand-name drugs to their patients even when less expensive pharmacologically equivalent generic drugs are available. Because generics are less expensive than their brand-name counterparts, the cost-savings to the patient is not the only factor that physicians consider when choosing between generic and brand-name drugs. Unfortunately Physicians in general and Libyan Physicians in particular tend to prescribe brand-name drugs, even without evidence of their therapeutic superiority, because neither they nor their insured patients bear these drugs’ increased cost with respect to generic substitutes. This study is to compare the quality of five different prednisolone tablets of the same strength from different companies under different trade names: Julphar, October pharma, Akums, Actavis, Pfizer compared them with pure prednisolone reference (BPCRS). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quality%20control" title="quality control">quality control</a>, <a href="https://publications.waset.org/abstracts/search?q=pharmaceutical%20analysis" title=" pharmaceutical analysis"> pharmaceutical analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=generic%20medicines" title=" generic medicines"> generic medicines</a>, <a href="https://publications.waset.org/abstracts/search?q=prednisolone" title=" prednisolone "> prednisolone </a> </p> <a href="https://publications.waset.org/abstracts/19693/pharmaceutical-evaluation-of-five-different-generic-brands-of-prednisolone" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19693.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">514</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Inhibitory Effect of Potential Bacillus Probiotic Strains against Pathogenic Bacteria and Yeast Isolated from Oral Cavity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fdhila%20Walid">Fdhila Walid</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayar%20Sihem"> Bayar Sihem</a>, <a href="https://publications.waset.org/abstracts/search?q=Khouidi%20Bochra"> Khouidi Bochra</a>, <a href="https://publications.waset.org/abstracts/search?q=Ma%C3%A2touk%20Fethi"> Maâtouk Fethi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ben%20Amor%20Feten"> Ben Amor Feten</a>, <a href="https://publications.waset.org/abstracts/search?q=Hajer%20Hentati"> Hajer Hentati</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahdhi%20Abdelkarim"> Mahdhi Abdelkarim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The presence of resistant bacteria in the oral cavity can be the major cause of dental antibiotic prophylaxis failure. Multidrug efflux has been described for many organisms, including bacteria and fungi as part of their drugs resistance strategy. The potential use of probiotic bacteria can be considered as a new alternative in the prevention or cure of oral cavity diseases. In this study, different Bacillus strains isolated from the environment were isolated and characterized using biochemical and molecular procedures. The inhibitory activity against different pathogenic bacteria and yeast strains was tested using diffusion agar assay method. Our data revealed that the tested strains have an antimicrobial effect against the pathogenic strains such as Streptococcus mutants. The inhibitory effect was variable depending from the probiotic and pathogenic strains. The obtained result demonstrated that Bacillus can be used as a potential candidates probiotic and help in the prevention and treatment of oral infections, including dental caries, periodontal disease and halitosis. Our data, partly encourage the use of probiotic strains because they do not produce acid which can contribute to faster installation decay and these are spore-forming bacteria that can withstand the stress of the oral cavity (acids, alkalis, and salty foods). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=probiotic" title="probiotic">probiotic</a>, <a href="https://publications.waset.org/abstracts/search?q=pathogenic%20bacteria" title=" pathogenic bacteria"> pathogenic bacteria</a>, <a href="https://publications.waset.org/abstracts/search?q=yeast" title=" yeast"> yeast</a>, <a href="https://publications.waset.org/abstracts/search?q=oral%20cavity" title=" oral cavity"> oral cavity</a> </p> <a href="https://publications.waset.org/abstracts/1415/inhibitory-effect-of-potential-bacillus-probiotic-strains-against-pathogenic-bacteria-and-yeast-isolated-from-oral-cavity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">378</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> Practice, Observation, and Gender Effects on Students’ Entrepreneurial Skills Development When Teaching through Entrepreneurship Is Adopted: Case of University of Tunis El Manar</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hajer%20Chaker%20Ben%20Hadj%20Kacem">Hajer Chaker Ben Hadj Kacem</a>, <a href="https://publications.waset.org/abstracts/search?q=Thouraya%20Slama"> Thouraya Slama</a>, <a href="https://publications.waset.org/abstracts/search?q=N%C3%A9jiba%20El%20Yetim%20Zribi"> Néjiba El Yetim Zribi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper analyzes the effects of gender, affiliation, prior work experience, social work, and vicarious learning through family role models on entrepreneurial skills development by students when they have learned through the entrepreneurship method in Tunisia. Authors suggest that these variables enhance the development of students’ entrepreneurial skills when combined with teaching through entrepreneurship. The article assesses the impact of these combinations by comparing their effects on the development of thirteen students’ entrepreneurial competencies, namely entrepreneurial mindset, core self-evaluation, entrepreneurial attitude, entrepreneurial knowledge, creativity, financial literacy, managing ambiguity, marshaling of resources, planning, teaching methods, entrepreneurial teachers, innovative employee, and Entrepreneurial intention. Authors use a two-sample independent t-test to make the comparison, and the results indicate that, when combined with teaching through the entrepreneurship method, students with prior work experience developed better six entrepreneurial skills; students with social work developed better three entrepreneurial skills, men developed better four entrepreneurial skills than women. However, all students developed their entrepreneurial skills through this practical method regardless of their affiliation and their vicarious learning through family role models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=affiliation" title="affiliation">affiliation</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurial%20skills" title=" entrepreneurial skills"> entrepreneurial skills</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=role%20models" title=" role models"> role models</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20work" title=" social work"> social work</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching%20through%20entrepreneurship" title=" teaching through entrepreneurship"> teaching through entrepreneurship</a>, <a href="https://publications.waset.org/abstracts/search?q=vicarious%20learning" title=" vicarious learning"> vicarious learning</a>, <a href="https://publications.waset.org/abstracts/search?q=work%20experience" title=" work experience"> work experience</a> </p> <a href="https://publications.waset.org/abstracts/164745/practice-observation-and-gender-effects-on-students-entrepreneurial-skills-development-when-teaching-through-entrepreneurship-is-adopted-case-of-university-of-tunis-el-manar" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164745.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> Remittances, Unemployement and Demographic Changes between Tunisia and Europe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hajer%20Habib">Hajer Habib</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghazi%20Boulila"> Ghazi Boulila</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this paper is to present our contribution to the theoretical literature through a simple theoretical model dealing with the effect of transferring funds on the labor market of the countries of origin and on the other hand to test this relationship empirically in the case of Tunisia. The methodology used consists of estimating a panel of the nine main destinations of the Tunisian diaspora in Europe between 1994 and 2014 in order to better value the net effect of these migratory financial flows on unemployment through population growth. The empirical results show that the main factors explaining the decision to emigrate are the economic factors related mainly to the income differential, the demographic factors related to the differential age structure of the origin and host populations, and the cultural factors linked basically to the mastery of the language. Indeed, the stock of migrants is one of the main determinants of the transfer of migratory funds to Tunisia. But there are other variables that do not lack importance such as the economic conditions linked by the host countries. This shows that Tunisian migrants react more to economic conditions in European countries than in Tunisia. The economic situation of European countries dominates the numbers of emigrants as an explanatory factor for the amount of transfers from Tunisian emigrants to their country of origin. Similarly, it is clear that there is an indirect effect of transfers on unemployment in Tunisia. This suggests that the demographic transition conditions the effects of transferring funds on the level of unemployment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=demographic%20changes" title="demographic changes">demographic changes</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20migration" title=" international migration"> international migration</a>, <a href="https://publications.waset.org/abstracts/search?q=labor%20market" title=" labor market"> labor market</a>, <a href="https://publications.waset.org/abstracts/search?q=remittances" title=" remittances"> remittances</a> </p> <a href="https://publications.waset.org/abstracts/100738/remittances-unemployement-and-demographic-changes-between-tunisia-and-europe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100738.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Borderline Ovarian Tumor: Management of Recurrence After Conservative Surgical Treatment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghorbeli%20Eya">Ghorbeli Eya</a>, <a href="https://publications.waset.org/abstracts/search?q=Naija%20Lamia"> Naija Lamia</a>, <a href="https://publications.waset.org/abstracts/search?q=Khessairi%20Nayssem"> Khessairi Nayssem</a>, <a href="https://publications.waset.org/abstracts/search?q=Saadallah%20Fatma"> Saadallah Fatma</a>, <a href="https://publications.waset.org/abstracts/search?q=Slimane%20Maher"> Slimane Maher</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarek%20Ben%20Dhiab"> Tarek Ben Dhiab</a> </p> <p class="card-text"><strong>Abstract:</strong></p> INTRODUCTION: Borderline ovarian tumors account for 15 to 20% of ovarian tumors. Prognostic factors of recurrence include the stage of the disease, presence of peritoneal implants, micropapillary pattern, microinvasion and intra-epithelial carcinoma. Fertility sparing constitutes a major therapeutic issue in young patients that leads to conservative surgical treatment in specific cases. METHODS: We conducted a retrospective descriptive study including patients treated at the Salah Azaiez Institute for Borderline Ovarian Tumor who underwent conservative surgical treatment from 2003 to 2018. RESULTS: Nine patients were included in our study. The median age was 33 years. Three patients were nulliparous. Given the age, conservative treatment was indicated in all these patients. Cystectomy without ovariectomy was indicated in 5 of the 9 women, which was within the margin of tumor resection on definitive anatomopathic examination in 3 of the 5 women. In contrast, given the impossibility of ovarian conservation, total annexectomy was carried out in 4 of all these women. All of the patients were followed regularly postoperatively; three had a carcinomatous transformation as an ovarian adenocarcinoma at an average interval of 18 months. Among these three patients, a single one presented intra-peritoneal metastases, requiring radical surgical treatment and adjuvant chemotherapy with 6 cures of Carbo-Taxol, with a good tolerance and a complete response. Moreover, one patient had a recurrence on the contralateral ovary as a Borderline mucinous ovarian tumor. For the remaining four women, after a median follow-up of 35 months, one patient fell spontaneously pregnant during follow-up, and three patients were in complete remission at 16 months. CONCLUSION: Borderline tumors of the ovary usually occur in young patients, which makes conservative treatment advisable if possible, but this always comes with a risk of recurrence and/or carcinomatous transformation, especially if the conservative surgical procedure was a cystectomy instead of a total annexectomy, and even more so if the resection margins were tumoral. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ovarian%20tumor" title="ovarian tumor">ovarian tumor</a>, <a href="https://publications.waset.org/abstracts/search?q=conservative%20treatment" title=" conservative treatment"> conservative treatment</a>, <a href="https://publications.waset.org/abstracts/search?q=surgical%20management" title=" surgical management"> surgical management</a>, <a href="https://publications.waset.org/abstracts/search?q=borderline%20ovarian%20tumor" title=" borderline ovarian tumor"> borderline ovarian tumor</a>, <a href="https://publications.waset.org/abstracts/search?q=recurrence%20management" title=" recurrence management"> recurrence management</a> </p> <a href="https://publications.waset.org/abstracts/190122/borderline-ovarian-tumor-management-of-recurrence-after-conservative-surgical-treatment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">28</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> Obtaining Norms for Arabic Translated Version of the Consortium to Establish a Registry for Alzheimer's Disease (CERAD) Neuropsychological Battery in Normal Elderly Omanis Attending a Tertiary Hospital in Oman</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ammar%20Alobaidy">Ammar Alobaidy</a>, <a href="https://publications.waset.org/abstracts/search?q=Lamees%20Alsawafi"> Lamees Alsawafi</a>, <a href="https://publications.waset.org/abstracts/search?q=Malak%20Almawali"> Malak Almawali</a>, <a href="https://publications.waset.org/abstracts/search?q=Balqees%20Alabri"> Balqees Alabri</a>, <a href="https://publications.waset.org/abstracts/search?q=Hajer%20Alhamrashdi"> Hajer Alhamrashdi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: There is scarce data in the literature concerning the use of Arabic version neuron psychological cognitive tests in the geriatric age group of the Omani population. Objectives: Our aim is to obtain norms for normal elderly Omanis assessed by The Consortium to Establish a Registry for Alzheimer's disease (CERAD) neuro psychological battery and to compare these norms with other studies in the literature. Methods: 84 attendants and visitors of in-patients at Sultan Qaboos University Hospital, elder than 55 years, were interviewed. All participants were assessed by Dementia Rating Scale & Geriatric Depression Scale to ensure the integrity of their activities of daily living and the absence of depression, respectively. The performance of all participants in the CERAD battery was rated by a single rater to optimize the inter-rater reliability. Results: The cut-point for average performance in CERAD battery is dependent on the age, sex, and level of education and cannot be set as a single cut-point for all elderly Omanis. Conclusion: This study has shown the effect of age, sex, and level of education on the cognitive performance of normal elderly Omanis. The normative data obtained from this study can be utilized to differentiate between the cognitive decline of normal aging and the cognitive impairment due to various neuro cognitive disorders in the elderly Omanis, and probably culturally similar Arabic speaking communities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CERAD" title="CERAD">CERAD</a>, <a href="https://publications.waset.org/abstracts/search?q=neuropsychological%20battery" title=" neuropsychological battery"> neuropsychological battery</a>, <a href="https://publications.waset.org/abstracts/search?q=normal%20aging" title=" normal aging"> normal aging</a>, <a href="https://publications.waset.org/abstracts/search?q=elderly%20Omanis" title=" elderly Omanis"> elderly Omanis</a> </p> <a href="https://publications.waset.org/abstracts/18881/obtaining-norms-for-arabic-translated-version-of-the-consortium-to-establish-a-registry-for-alzheimers-disease-cerad-neuropsychological-battery-in-normal-elderly-omanis-attending-a-tertiary-hospital-in-oman" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18881.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> Biocontrol Effectiveness of Indigenous Trichoderma Species against Meloidogyne javanica and Fusarium oxysporum f. sp. radicis lycopersici on Tomato </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hajji%20Lobna">Hajji Lobna</a>, <a href="https://publications.waset.org/abstracts/search?q=Chattaoui%20Mayssa"> Chattaoui Mayssa</a>, <a href="https://publications.waset.org/abstracts/search?q=Regaieg%20Hajer"> Regaieg Hajer</a>, <a href="https://publications.waset.org/abstracts/search?q=M%27Hamdi-Boughalleb%20Naima"> M'Hamdi-Boughalleb Naima</a>, <a href="https://publications.waset.org/abstracts/search?q=Rhouma%20Ali"> Rhouma Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Horrigue-Raouani%20Najet"> Horrigue-Raouani Najet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, three local isolates of <em>Trichoderma</em> (Tr1: <em>T. viride</em>, Tr2: <em>T. harzianum</em> and Tr3: <em>T. asperellum</em>) were isolated and evaluated for their biocontrol effectiveness under <em>in vitro</em> conditions and in greenhouse. <em>In vitro</em> bioassay revealed a biopotential control against <em>Fusarium oxysporum</em> f. sp. <em>radicis lycopersici</em> and <em>Meloidogyne javanica </em>(RKN) separately. All species of <em>Trichoderma</em> exhibited biocontrol performance and (Tr1) <em>Trichoderma viride</em> was the most efficient. In fact, growth rate inhibition of <em>Fusarium oxysporum</em> f. sp. <em>radicis lycopersici</em> (FORL) was reached 75.5% with Tr1. Parasitism rate of root-knot nematode was 60% for juveniles and 75% for eggs with the same one. Pots experiment results showed that Tr1 and Tr2, compared to chemical treatment, enhanced the plant growth and exhibited better antagonism against root-knot nematode and root-rot fungi separated or combined. All <em>Trichoderma</em> isolates revealed a bioprotection potential against <em>Fusarium oxysporum</em> f. sp. <em>radicis lycopersici</em>. When pathogen fungi inoculated alone, Fusarium wilt index and browning vascular rate were reduced significantly with Tr1 (0.91, 2.38%) and Tr2 (1.5, 5.5%), respectively. In the case of combined infection with Fusarium and nematode, the same isolate of <em>Trichoderma</em> Tr1 and Tr2 decreased Fusarium wilt index at 1.1 and 0.83 and reduced the browning vascular rate at 6.5% and 6%, respectively. Similarly, the isolate Tr1 and Tr2 caused maximum inhibition of nematode multiplication. Multiplication rate was declined at 4% with both isolates either tomato infected by nematode separately or concomitantly with Fusarium. The chemical treatment was moderate in activity against <em>Meloidogyne javanica</em> and <em>Fusarium oxysporum f. sp. </em><em>radicis lycopersici</em> alone and combined. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trichoderma%20spp." title="trichoderma spp.">trichoderma spp.</a>, <a href="https://publications.waset.org/abstracts/search?q=meloidogyne%20javanica" title=" meloidogyne javanica"> meloidogyne javanica</a>, <a href="https://publications.waset.org/abstracts/search?q=Fusarium%20oxysporum%20f.sp.radicis%20lycopersici" title=" Fusarium oxysporum f.sp.radicis lycopersici"> Fusarium oxysporum f.sp.radicis lycopersici</a>, <a href="https://publications.waset.org/abstracts/search?q=biocontrol" title=" biocontrol"> biocontrol</a> </p> <a href="https://publications.waset.org/abstracts/50717/biocontrol-effectiveness-of-indigenous-trichoderma-species-against-meloidogyne-javanica-and-fusarium-oxysporum-f-sp-radicis-lycopersici-on-tomato" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50717.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>