CINXE.COM
Search results for: Wassim Rammal
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Wassim Rammal</title> <meta name="description" content="Search results for: Wassim Rammal"> <meta name="keywords" content="Wassim Rammal"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Wassim Rammal" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Wassim Rammal"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 12</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Wassim Rammal</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Combination between Intrusion Systems and Honeypots</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Majed%20Sanan">Majed Sanan</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Rammal"> Mohammad Rammal</a>, <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Rammal"> Wassim Rammal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection" title=" intrusion detection"> intrusion detection</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention" title=" intrusion prevention"> intrusion prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=honeypot" title=" honeypot"> honeypot</a>, <a href="https://publications.waset.org/abstracts/search?q=anomaly-based%20detection" title=" anomaly-based detection"> anomaly-based detection</a>, <a href="https://publications.waset.org/abstracts/search?q=signature-based%20detection" title=" signature-based detection"> signature-based detection</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=kfsensor" title=" kfsensor"> kfsensor</a> </p> <a href="https://publications.waset.org/abstracts/40174/combination-between-intrusion-systems-and-honeypots" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40174.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">382</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Code Switching: A Case Study Of Lebanon</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Bekai">Wassim Bekai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Code switching, as its name states, is altering between two or more languages in one sentence. The speaker tends to use code switching in his/her speech for better clarification of his/her message to the receiver. It is commonly used in sociocultural countries such as Lebanon because of the various cultures that have come across its lands through history, considering Lebanon is geographically located in the heart of the world, and hence between many cultures and languages. In addition, Lebanon was occupied by Turkish authorities for about 400 years, and later on by the French mandate, where both of these countries forced their languages in official papers and in the Lebanese educational system. In this paper, the importance of code switching in the Lebanese workplace will be examined, stressing the efficiency and amount of the production resulting from code switching in the workplace (factories, universities among other places) in addition to exploring the social, education, religious and cultural factors behind this phenomenon in Lebanon. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code%20switching" title="code switching">code switching</a>, <a href="https://publications.waset.org/abstracts/search?q=Lebanon" title=" Lebanon"> Lebanon</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural" title=" cultural"> cultural</a>, <a href="https://publications.waset.org/abstracts/search?q=factors" title=" factors"> factors</a> </p> <a href="https://publications.waset.org/abstracts/143945/code-switching-a-case-study-of-lebanon" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143945.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">287</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> Biological Control of Tuta absoluta (Meyrick) (Lep: Gelechiidae) with Enthomopathogenic Fungi</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dahliz%20Abderrahm%C3%A8ne">Dahliz Abderrahmène</a>, <a href="https://publications.waset.org/abstracts/search?q=Lakhdari%20Wassim"> Lakhdari Wassim</a>, <a href="https://publications.waset.org/abstracts/search?q=Bouchikh%20Yamina"> Bouchikh Yamina</a>, <a href="https://publications.waset.org/abstracts/search?q=Hammi%20Hamida"> Hammi Hamida</a>, <a href="https://publications.waset.org/abstracts/search?q=Soud%20Adila"> Soud Adila</a>, <a href="https://publications.waset.org/abstracts/search?q=M%E2%80%99lik%20Randa"> M’lik Randa</a>, <a href="https://publications.waset.org/abstracts/search?q=Benglia%20Sara"> Benglia Sara </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Devastating insects constitute one of strains for cultivate tomato. Among this vandal insects, the tomato leafminer (T. absoluta), which has been introduced in Algeria constitute a challenge for both agricultures and scientists. Firstly, this insect is introduced without their natural enemies which may reduce their damage. Secondly, this species has developed insecticide resistance to many active matters. To contribute to establish a control strategy for T. absoluta we have mad an inventory for their enthomopathogenic fungi. Two fungi were identified among others taken from adults and pupae. These fungi are Aspergillus flavus and Metarhizium sp. A study was conducted in laboratory to recognize the efficiency of these antagonists. These species had unregistered a mortality mounts of 42% and 56% respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tuta%20absoluta" title="Tuta absoluta">Tuta absoluta</a>, <a href="https://publications.waset.org/abstracts/search?q=enthomopathogenic%20fungi" title=" enthomopathogenic fungi"> enthomopathogenic fungi</a>, <a href="https://publications.waset.org/abstracts/search?q=Aspergillus%20flavus" title=" Aspergillus flavus"> Aspergillus flavus</a>, <a href="https://publications.waset.org/abstracts/search?q=Metarhizium%20sp" title=" Metarhizium sp"> Metarhizium sp</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20strategy" title=" control strategy"> control strategy</a> </p> <a href="https://publications.waset.org/abstracts/14173/biological-control-of-tuta-absoluta-meyrick-lep-gelechiidae-with-enthomopathogenic-fungi" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14173.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Propagation of DEM Varying Accuracy into Terrain-Based Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Katerji">Wassim Katerji</a>, <a href="https://publications.waset.org/abstracts/search?q=Mercedes%20Farjas"> Mercedes Farjas</a>, <a href="https://publications.waset.org/abstracts/search?q=Carmen%20Morillo"> Carmen Morillo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrain-Based Analysis results in derived products from an input DEM and these products are needed to perform various analyses. To efficiently use these products in decision-making, their accuracies must be estimated systematically. This paper proposes a procedure to assess the accuracy of these derived products, by calculating the accuracy of the slope dataset and its significance, taking as an input the accuracy of the DEM. Based on the output of previously published research on modeling the relative accuracy of a DEM, specifically ASTER and SRTM DEMs with Lebanon coverage as the area of study, analysis have showed that ASTER has a low significance in the majority of the area where only 2% of the modeled terrain has 50% or more significance. On the other hand, SRTM showed a better significance, where 37% of the modeled terrain has 50% or more significance. Statistical analysis deduced that the accuracy of the slope dataset, calculated on a cell-by-cell basis, is highly correlated to the accuracy of the input DEM. However, this correlation becomes lower between the slope accuracy and the slope significance, whereas it becomes much higher between the modeled slope and the slope significance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrain-based%20analysis" title="terrain-based analysis">terrain-based analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=slope" title=" slope"> slope</a>, <a href="https://publications.waset.org/abstracts/search?q=accuracy%20assessment" title=" accuracy assessment"> accuracy assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=Digital%20Elevation%20Model%20%28DEM%29" title=" Digital Elevation Model (DEM)"> Digital Elevation Model (DEM)</a> </p> <a href="https://publications.waset.org/abstracts/16142/propagation-of-dem-varying-accuracy-into-terrain-based-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16142.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">446</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> Platform-as-a-Service Sticky Policies for Privacy Classification in the Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maha%20Shamseddine">Maha Shamseddine</a>, <a href="https://publications.waset.org/abstracts/search?q=Amjad%20Nusayr"> Amjad Nusayr</a>, <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Itani"> Wassim Itani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a Platform-as-a-Service (PaaS) model for controlling the privacy enforcement mechanisms applied on user data when stored and processed in Cloud data centers. The proposed architecture consists of establishing user configurable ‘sticky’ policies on the Graphical User Interface (GUI) data-bound components during the application development phase to specify the details of privacy enforcement on the contents of these components. Various privacy classification classes on the data components are formally defined to give the user full control on the degree and scope of privacy enforcement including the type of execution containers to process the data in the Cloud. This not only enhances the privacy-awareness of the developed Cloud services, but also results in major savings in performance and energy efficiency due to the fact that the privacy mechanisms are solely applied on sensitive data units and not on all the user content. The proposed design is implemented in a real PaaS cloud computing environment on the Microsoft Azure platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=privacy%20enforcement" title="privacy enforcement">privacy enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=platform-as-a-service%20privacy%20awareness" title=" platform-as-a-service privacy awareness"> platform-as-a-service privacy awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing%20privacy" title=" cloud computing privacy"> cloud computing privacy</a> </p> <a href="https://publications.waset.org/abstracts/131754/platform-as-a-service-sticky-policies-for-privacy-classification-in-the-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131754.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">227</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Research Study on the Concept of Unity of Ummah and Its Sources in the Light of Islamic Teachings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghazi%20Abdul%20Rehman%20Qasmi">Ghazi Abdul Rehman Qasmi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Islam is the preacher and torch-bearer of unity and solidarity. All the followers of Islam are advised to be united. Islam strongly condemns those elements which disunite the unity of Muslim Ummah. Like pearls in a rosary, Islam has united the Muslims from all over the world in the wreath of unity and forbade the Muslims to avoid separation and to be disintegrated. The aspect of unity is prominent in all divine injunctions and about worship. By offering five times obligatory congregational prayers, passion of mutual love and affection is increased and on the auspicious days like Friday, Eid-ul-fiter and Eid-ul-azha, majority of the Muslims come together at central places to offer these congregational prayers. Thus unity and harmony among the Muslims can be seen. Similarly the Muslim pilgrims from all over the world eliminate all kind of worldly discrimination to perform many rituals of pilgrimage while wearing white color cloth as a dress. Pilgrimage is a demonstration of Islamic strength. When the Muslims from all over the world perform the same activities together and they offer their prayers under the leadership of one leader (IMAM). Muslims come together on the occasion of pilgrimage to perform Tawaf (seven circuits,first three circuits at a hurried pace(Rammal) and followed by four times, more closely, at a leisurely pace, round the Holy Kaabah to perform circumambulation known as Tawaf in religious terminology,Saee(running or walking briskly seven times between two small hills Safa&Marwa), Ramy-al-jamarat (throwing pebbles at the stone pillars, symbolizing the devil). In this way dignity and sublimity of Islam is increased and unity and integrity of Muslim Ummah is promoted also. By studying the life history of Hazrat Muhammad (P.B.U.H) we come to know that our Holy Prophet (P.B.U.H) has put emphasis on unity and integrity. We have to follow the Islamic teachings to create awareness among the members of Muslim Ummah. In the light of the Holy Quran and Sunnah, we have to utilize all the sources and potential for this noble cause. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=unity" title="unity">unity</a>, <a href="https://publications.waset.org/abstracts/search?q=Ummah" title=" Ummah"> Ummah</a>, <a href="https://publications.waset.org/abstracts/search?q=sources" title=" sources"> sources</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20teaching" title=" Islamic teaching"> Islamic teaching</a> </p> <a href="https://publications.waset.org/abstracts/67178/research-study-on-the-concept-of-unity-of-ummah-and-its-sources-in-the-light-of-islamic-teachings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67178.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">294</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Evaluating Performance of Value at Risk Models for the MENA Islamic Stock Market Portfolios</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abderrazek%20Ben%20Maatoug">Abderrazek Ben Maatoug</a>, <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Fatnassi"> Ibrahim Fatnassi</a>, <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Ben%20Ayed"> Wassim Ben Ayed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper we investigate the issue of market risk quantification for Middle East and North Africa (MENA) Islamic market equity. We use Value-at-Risk (VaR) as a measure of potential risk in Islamic stock market, for long and short position, based on Riskmetrics model and the conditional parametric ARCH class model volatility with normal, student and skewed student distribution. The sample consist of daily data for the 2006-2014 of 11 Islamic stock markets indices. We conduct Kupiec and Engle and Manganelli tests to evaluate the performance for each model. The main finding of our empirical results show that (i) the superior performance of VaR models based on the Student and skewed Student distribution, for the significance level of α=1% , for all Islamic stock market indices, and for both long and short trading positions (ii) Risk Metrics model, and VaR model based on conditional volatility with normal distribution provides the best accurate VaR estimations for both long and short trading positions for a significance level of α=5%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=value-at-risk" title="value-at-risk">value-at-risk</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title=" risk management"> risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=islamic%20finance" title=" islamic finance"> islamic finance</a>, <a href="https://publications.waset.org/abstracts/search?q=GARCH%20models" title=" GARCH models"> GARCH models</a> </p> <a href="https://publications.waset.org/abstracts/24208/evaluating-performance-of-value-at-risk-models-for-the-mena-islamic-stock-market-portfolios" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">592</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> A Framework for Secure Information Flow Analysis in Web Applications </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ralph%20Adaimy">Ralph Adaimy</a>, <a href="https://publications.waset.org/abstracts/search?q=Wassim%20El-Hajj"> Wassim El-Hajj</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghassen%20Ben%20Brahim"> Ghassen Ben Brahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Hazem%20Hajj"> Hazem Hajj</a>, <a href="https://publications.waset.org/abstracts/search?q=Haidar%20Safa"> Haidar Safa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=web%20applications%20security" title="web applications security">web applications security</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20information%20flow" title=" secure information flow"> secure information flow</a>, <a href="https://publications.waset.org/abstracts/search?q=program%20dependence%20graph" title=" program dependence graph"> program dependence graph</a>, <a href="https://publications.waset.org/abstracts/search?q=database%20annotation" title=" database annotation"> database annotation</a> </p> <a href="https://publications.waset.org/abstracts/19919/a-framework-for-secure-information-flow-analysis-in-web-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19919.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">471</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> Protective Potential of Hyperhalophilic Diatoms Extract Against Lead Induced Oxidative Stress in Rats and Human HepG2 and HEK293 Cells Line</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Guermazi">Wassim Guermazi</a>, <a href="https://publications.waset.org/abstracts/search?q=Saoussan%20Boukhris"> Saoussan Boukhris</a>, <a href="https://publications.waset.org/abstracts/search?q=Neila%20Annabi%20Trabelsi"> Neila Annabi Trabelsi</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarek%20Rebai"> Tarek Rebai</a>, <a href="https://publications.waset.org/abstracts/search?q=Alya%20Sellami-Kamoun"> Alya Sellami-Kamoun</a>, <a href="https://publications.waset.org/abstracts/search?q=Habib%20Ayadi"> Habib Ayadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work investigates the protective effects of the microalga Halamphora sp. extract (H. Ext) as a natural product on lead-intoxicated liver and kidney human cells in vitro and in vivo on rats wistar. HepG2 cells line derived from human hepatocellular carcinoma and HEK293 cells line derived from human embryonic kidney were used for the in vitro study. The analysis of the fatty acids methyl esters of the extract was performed by a GC/MS. Four groups of rats, each of which was composed of six animals, were used for the in vivo experiment. The pretreatment of HepG2 and HEK293 cells line with the extract (100 µg mL-1) significantly (p < 0.05) protected against cytotoxicity induced by lead exposure. In vivo, the biochemical parameters in serum, namely malondialdehyde level (MDA), superoxide dismutase (SOD), catalase (CAT) and glutathione peroxidase (GPx) activities, were measured in supernatants of organ homogenates. H. Ext was found to be rich in fatty acids, essentially palmitic and palmitoleic accounting respectively 29.46% and 42.07% of total fatty acids. Both in vitro and in vivo, the co-treatment with H. Ext allowed the protection of the liver and kidney cells structure, as well as the significant preservation of normal antioxidant and biochemical parameters in rats. Halamphora extract rich in fatty acids has been proven to be effective in protection against Pb-induced toxicity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microalga%20extract" title="microalga extract">microalga extract</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20cells%20line" title=" human cells line"> human cells line</a>, <a href="https://publications.waset.org/abstracts/search?q=fatty%20acid" title=" fatty acid"> fatty acid</a>, <a href="https://publications.waset.org/abstracts/search?q=lead%20exposure" title=" lead exposure"> lead exposure</a>, <a href="https://publications.waset.org/abstracts/search?q=oxidative%20stress" title=" oxidative stress"> oxidative stress</a>, <a href="https://publications.waset.org/abstracts/search?q=rats" title=" rats"> rats</a> </p> <a href="https://publications.waset.org/abstracts/163424/protective-potential-of-hyperhalophilic-diatoms-extract-against-lead-induced-oxidative-stress-in-rats-and-human-hepg2-and-hek293-cells-line" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163424.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> O-LEACH: The Problem of Orphan Nodes in the LEACH of Routing Protocol for Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Jerbi">Wassim Jerbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Abderrahmen%20Guermazi"> Abderrahmen Guermazi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hafedh%20Trabelsi"> Hafedh Trabelsi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The optimum use of coverage in wireless sensor networks (WSNs) is very important. LEACH protocol called Low Energy Adaptive Clustering Hierarchy, presents a hierarchical clustering algorithm for wireless sensor networks. LEACH is a protocol that allows the formation of distributed cluster. In each cluster, LEACH randomly selects some sensor nodes called cluster heads (CHs). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node joins a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus, several sensor nodes cannot reach any CH. to solve this problem. We created an O-LEACH Orphan nodes protocol, its role is to reduce the sensor nodes which do not belong the cluster. The cluster member called Gateway receives messages from neighboring orphan nodes. The gateway informs CH having the neighboring nodes that not belong to any group. However, Gateway called (CH') attaches the orphaned nodes to the cluster and then collected the data. O-Leach enables the formation of a new method of cluster, leads to a long life and minimal energy consumption. Orphan nodes possess enough energy and seeks to be covered by the network. The principal novel contribution of the proposed work is O-LEACH protocol which provides coverage of the whole network with a minimum number of orphaned nodes and has a very high connectivity rates.As a result, the WSN application receives data from the entire network including orphan nodes. The proper functioning of the Application requires, therefore, management of intelligent resources present within each the network sensor. The simulation results show that O-LEACH performs better than LEACH in terms of coverage, connectivity rate, energy and scalability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WSNs%3B%20routing%3B%20LEACH%3B%20O-LEACH%3B%20Orphan%20nodes%3B%20sub-cluster%3B%20gateway%3B%20CH%E2%80%99" title="WSNs; routing; LEACH; O-LEACH; Orphan nodes; sub-cluster; gateway; CH’">WSNs; routing; LEACH; O-LEACH; Orphan nodes; sub-cluster; gateway; CH’</a> </p> <a href="https://publications.waset.org/abstracts/43405/o-leach-the-problem-of-orphan-nodes-in-the-leach-of-routing-protocol-for-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43405.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">371</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> Bio-Mimetic Foam Fractionation Technology for the Treatment of Per- and PolyFluoroAlkyl Substances (PFAS) in Contaminated Water</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hugo%20Carronnier">Hugo Carronnier</a>, <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Almouallem"> Wassim Almouallem</a>, <a href="https://publications.waset.org/abstracts/search?q=Eric%20Branquet"> Eric Branquet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Per- and polyfluoroalkyl Substances (PFAS) are a group of man-made refractory compounds that have been widely used in a variety of industrial and commercial products since the 1940s, leading to contamination of groundwater and surface water systems. They are persistent, bioaccumulative and toxic chemicals. Foam fractionation is a potential remedial technique for treating PFAS-contaminated water, taking advantage of the high surface activity to remove them from the solution by adsorption onto the surface of the air bubbles. Nevertheless, traditional foam fractionation technology developed for PFAS is challenging and found to be ineffective in treating the less surface-active compounds. Different chemicals were the subject of investigation as amendments to achieve better removal. However, most amendments are toxic, expensive and complicated to use. In this situation, patent-pending PFAS technology overcomes these challenges by using rather biological amendments. Results from the first laboratory trial showed remarkable results using a simple and cheap BioFoam Fractionation (BioFF) process based on biomimetics. The study showed that the BioFF process is effective in removing greater than 99% of PFOA (C8), PFOS (C8), PFHpS (C7) and PFHxS (C6) in PFAS-contaminated water. For other PFAS such as PFDA (C10) and 6:2 FTAB, a slightly less stable removal between 94% and 96% was achieved while between 34% and 73% removal efficiency was observed for PFBA (C4), PFBS (C4), PFHxA (C6), and Gen-X. In sum, the advantages of the BioFF presented as a low-waste production, a cost and energy-efficient operation and the use of a biodegradable amendment requiring no separation step after treatment, coupled with these first findings, suggest that the BioFF process is a highly applicable treatment technology for PFAS contaminated water. Additional investigations are currently carried on in order to optimize the process and establish a promising strategy for on-site PFAS remediation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=PFAS" title="PFAS">PFAS</a>, <a href="https://publications.waset.org/abstracts/search?q=treatment" title=" treatment"> treatment</a>, <a href="https://publications.waset.org/abstracts/search?q=foam%20fractionation" title=" foam fractionation"> foam fractionation</a>, <a href="https://publications.waset.org/abstracts/search?q=contaminated%20amendments" title=" contaminated amendments"> contaminated amendments</a> </p> <a href="https://publications.waset.org/abstracts/160800/bio-mimetic-foam-fractionation-technology-for-the-treatment-of-per-and-polyfluoroalkyl-substances-pfas-in-contaminated-water" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160800.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> The Impact of Artificial Intelligence on Autism Attitudes and Laws</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Azmy%20Abdalla%20Ishak">Wassim Azmy Abdalla Ishak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A descriptive statistical analysis of the data showed that the most important factor evoking negative attitudes among teachers is student behavior. have been presented as useful models for understanding the risk factors and protective factors associated with the emergence of autistic traits. Although these "syndrome" forms of autism reach clinical thresholds, they appear to be distinctly different from the idiopathic or "non-syndrome" autism phenotype. Most teachers reported that kindergartens did not prepare them for the educational needs of children with autism, particularly in relation to non-verbal skills. The study is important and points the way for improving teacher inclusion education in Thailand. Inclusive education for students with autism is still in its infancy in Thailand. Although the number of autistic children in schools has increased significantly since the Thai government introduced the Education Regulations for Persons with Disabilities Act in 2008, there is a general lack of services for autistic students and their families. This quantitative study used the Teaching Skills and Readiness Scale for Students with Autism (APTSAS) to test the attitudes and readiness of 110 elementary school teachers when teaching students with autism in general education classrooms. To uncover the true nature of these co morbidities, it is necessary to expand the definition of autism to include the cognitive features of the disorder, and then apply this expanded conceptualization to examine patterns of autistic syndromes. This study used various established eye-tracking paradigms to assess the visual and attention performance of children with DS and FXS who meet the autism thresholds defined in the Social Communication Questionnaire. To study whether the autistic profiles of these children are associated with visual orientation difficulties ("sticky attention"), decreased social attention, and increased visual search performance, all of which are hallmarks of the idiopathic autistic child phenotype. Data will be collected from children with DS and FXS, aged 6 to 10 years, and two control groups matched for age and intellectual ability (i.e., children with idiopathic autism).In order to enable a comparison of visual attention profiles, cross-sectional analyzes of developmental trajectories are carried out. Significant differences in the visual-attentive processes underlying the presentation of autism in children with FXS and DS have been suggested, supporting the concept of syndrome specificity. The study provides insights into the complex heterogeneity associated with autism syndrome symptoms and autism itself, with clinical implications for the utility of autism intervention programs in DS and FXS populations <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attitude" title="attitude">attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=autism" title=" autism"> autism</a>, <a href="https://publications.waset.org/abstracts/search?q=teachers" title=" teachers"> teachers</a>, <a href="https://publications.waset.org/abstracts/search?q=sports%20activities" title=" sports activities"> sports activities</a>, <a href="https://publications.waset.org/abstracts/search?q=movement%20skills" title=" movement skills"> movement skills</a>, <a href="https://publications.waset.org/abstracts/search?q=motor%20skills" title=" motor skills"> motor skills</a> </p> <a href="https://publications.waset.org/abstracts/187962/the-impact-of-artificial-intelligence-on-autism-attitudes-and-laws" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187962.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">36</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>