SACM - United States of America
Permanent URI for this collectionhttps://drepo.sdl.edu.sa/handle/20.500.14154/9668
Browse
850 results
Search Results
Item Restricted Scope and Word Order: Evidence from Najdi Arabic(Saudi Digital Library, 2025) Alhammami, Fatemah M; Schreiner, SylviaThis thesis investigates a phenomenon at the syntax-semantics interface in Najdi Arabic (NA, henceforth): the scopal interaction between the prenominal universal quantifier /kilː/ and the negative particle /maː/ negating verbs. Based on NA native speaker judgments of interpretations, this interaction results in either scope ambiguity or scope rigidity, depending on the syntactic word orders specifically, VS(O) versus SV(O) constructions. Scope interpretations across VS(O) constructions in this study are analyzed within the frameworks of Quantifier Raising (QR, henceforth) as proposed by May (1977, 1985) to explain the potential presence of scope ambiguity within these constructions that are constrained by Fox’s (2000) Scope Economy and Shortest Move principles. Additionally, the study applies Chomsky’s (1973, 1981) Ban on Improper Movement (BIM, henceforth) to explain why preverbal quantifier phrases in SV(O) constructions, functioning as topics derived through movement, are blocked from undergoing further movement to yield alternative scope interpretations at Logical Form (LF, henceforth), resulting in scope rigidity. The study also notes that base-generated topics in SV(O) constructions do not reconstruct at LF, which also accounts for scope rigidity in this case. This study contributes to understanding the syntax-semantics interface in Arabic dialects by offering a principled account of the behavior of scope in relation to word order in NA, an area that has not been addressed within the existing literature on the dialect.6 0Item Restricted IMPROVING SMART HOME ACCESS CONTROL MECHANISMS TO ACCOUNT FOR COMMUNITY-BASED SHARING BEYOND THE HOME(Saudi Digital Library, 2025) Alghamdi, Leena; Hughes, Charles; Wisniewski, PamelaThe rapid proliferation of smart home devices has reshaped daily living, offering convenience and enhanced security. However, extending access to these devices beyond household boundaries introduces significant challenges, including balancing privacy, security, and usability. Through three studies, this dissertation investigates these challenges and proposes solutions to improve access control mechanisms for sharing smart home devices with external individuals. First, we conducted 26 co-design interviews with 50 smart home device owners to understand their perspectives on co-monitoring in emergencies with trusted external contacts. Participants emphasized benefits such as enhanced safety, reduced material loss, and peace of mind through swift responses and threat verification. However, privacy concerns, burdening others, and unauthorized access highlighted the complexity of implementing such systems. These insights informed the development of design considerations, emphasizing flexibility, granular controls, and fail-safe mechanisms to mitigate these concerns and address user needs effectively. Building on these insights, we systematically analyzed 11 existing smart home management systems and two open-source platforms to evaluate how they support external sharing. The analysis uncovered significant limitations, such as reliance on rigid "all-or-nothing" access models, limited granularity in permissions, and insufficient transparency. These findings highlighted the need for more adaptable and user-centered mechanisms that empower users to manage access securely and intuitively while addressing privacy and usability concerns. To address these gaps, we developed and evaluated a novel mobile application, "MiSu," to enable flexible and secure smart home device sharing. MiSu introduced features like time-based permissions, device specific access, and real-time activity logs to accommodate diverse sharing scenarios. Then, we conducted a user study involving 15 smart home users and their trusted external contacts (N=30), revealing that participants valued the app’s precision and transparency but encountered usability challenges and privacy concerns, such as potential misuse of permissions and overexposure of personal spaces. These findings highlight the need for intuitive, user-centered designs that balance advanced functionality with privacy protection.15 0Item Restricted International Agreements Enforcements in Saudi Arabia: by Finding Defined Enforceable Mechanism(Saudi Digital Library, 2025-05-15) Nofal, Ibrahim; Bendistis, Brett EIntroduction 9 Chapter 1: Study Context - Modern International Concerns for Saudi Arabia. 21 1.1. Introduction 21 1.2. Saudi Arabia’s Vision 2030 22 1.3. International Concerns in the Context of Vision 2030 26 1.3. International Investment 32 1.4. International Concerns on Expropriation. 40 1.5. Application of Shari’ah Law in the Expropriation Context 43 1.6. International Dispute Resolutions 44 1.7. Gulf Cooperation Council (GCC) 47 1.8. Saudi Arabia and International Organizations 52 1.8.1. World Trade Organization (WTO) 52 1.8.2. United Nations (UN) 63 1.9. Conclusion 65 Chapter 2: King’s Regulation of International Affairs 69 2.1. Introduction 69 2.2. Monarchy and International Relations 70 2.2. King's Competences in The Field of Executive Authority (Administrative Field). 72 2.3. King's Competences in The Field of Regulatory Authority. 75 2.4. King's Competences in Extraordinary Circumstances. 79 2.5. State of Emergency (Exception). 80 2.6. The State of War. 82 2.8. Implications for Treaty-Making and Enforcement 84 2.7. Chapter Summary 85 Chapter 3: Crown Prince’s Authority 87 3.1. Introduction 87 3.2. Authority of the Crown Prince 88 3.3. Reference of Regulations When it Comes to Inheritance of The Kingdom. 89 3.4. Procedures of Appointing Crown Prince. 90 3.5. Powers of the Crown Prince. 92 3.6. Implications of the Crown Prince’s Powers on the Treaty-Making Process 94 3.7. Chapter Summary 95 Chapter 4: A Brief Overview of The Saudi Legal System 99 4.1. Introduction 99 4.2. The Basic Law of Governance 100 4.3. Saudi Government Authorities (Executive, Legislative, and Judicial). 102 4.3.1. The Executive Branch 102 4.3.2. The Legislative (Regulatory) Branch 104 4.3.3. The Judicial Branch 110 4.4. Regulatory Tools used at Royal Discretion in Kingdom of Saudi Arabia 117 4.4. Distinguishing Characteristics of Treaties 121 4.4.1. Definition of Treaties 122 Closed Treaties 124 Semi-Open Treaties 126 Open Treaties 129 4.5. Creation of Treaties 131 4.5.1. Negotiation 131 4.5.2. Signature 135 4.5.3. Approval 138 4.5.4. Ratification 141 4.5.5. Reservations, Declarations, Understandings, and Provisos 143 4.5.6. Entry into Force and Treaty Publication 145 4.6. Enforcement of Treaties 148 4.7. Interpretation of Treaties 154 Evolutionary Interpretation 157 Emerging Consensus 158 Margin of Appreciation 160 4.8. Ratification 162 4.8.1. Actors in the Making and Ratification of International Agreements 162 4.8.1.1. The Executive Branch 163 4.8.1.2. The Judicial Branch 165 4.8.1.3. The States 166 4.8.2. Laws Governing the Making of International Agreements 166 4.8.3. United States Constitution 167 4.8.3.1. Treaties 167 4.8.3.2. Executive Agreements 167 4.8.4. Federal statutes 172 4.8.4.1. Treaties 172 4.8.4.2. State laws and regulations 174 Chapter Summary 177 Chapter 5: The Saudi Arabia Treaty-Making Process and Mechanisms for Internal Enforcement 179 5.1. Introduction 179 5.2. Treaties in the Context of Shari’ah Law and its Importance in Saudi Arabia 180 5.3. Importance of Treaties in Saudi Arabia 182 5.4. Overview of the Treaty-Making Process in Saudi Arabia 183 5.4.1. Negotiation and Drafting 184 5.4.2. Review by Relevant Authorities 185 5.4.3. Approval by the Government 186 5.4.4. Ratification by the King 186 5.4.5. Publication and Implementation 187 5.5. Historical Context of Saudi Arabia Treaty-Making 188 5.6. The Constitutional Framework for the Saudi Arabia Treaty Process 191 5.6.1. The Saudi Basic Law of Governance (1992) 192 5.6.2. Royal Decrees 192 5.6.3. The Council of Ministers 193 5.6.4. Ministry of Foreign Affairs (MOFA) 193 5.6.5. Shari’ah Law 194 5.6.6. The National Assembly (Shura Council) 194 5.6.7. Implementation of Treaties 194 5.7. The King’s Role in Treaty Approval, Ratification, and Implementation 195 5.8. Saudi Public Interest under Shari’ah and its Implications on Treaty Ratification Process 197 5.8.1. Definition of Maslahah (Public Interest) in Shari’ah 198 5.8.2. Applications of Public Interest (Maslahah) 199 5.8.3. Maslahah in Treaty Decisions 199 5.8.3.1. Maslahah in Treaties Relating to Economic Cooperation 200 5.8.3.2. Human Rights Treaties and Shari’ah Principles 201 5.8.3.4. Environmental Treaties and Maslahah 202 5.8.3.5. National Security Treaties and Maslahah 202 5.8.3.6. Rejection of Treaties Based on Maslahah 203 5.8.4. Governance Institutions and their Role in ensuring that Maslahah in Treaty-Making Process in Saudi Arabia 203 5.8.4.1. Board of Senior Scholars (Hay'at Kibar al-Ulama) 204 5.8.4. 2. Shura Council (Majlis al-Shura) 205 5.8.4.3. Council of Ministers 207 5.8.4.4. Supreme Judicial council 208 5.8.4.5. Ministry of Justice 210 5.8.4.6. Islamic Banking and Finance Institutions 211 5.8.4.7. King Salman Humanitarian Aid and Relief Center 212 5.8.4.8. Public Prosecution 212 5.8.4.9. Specialized Committees and Councils 214 5.8.5. Case Studies on Treaties that have been Affected by Maslahah 216 5.9. Implementation of Treaties Within Saudi Arabia Domestic Laws 220 5.9.1. The Need for Implementing Legislation 220 5.9.2. The Impact of Treaties on Domestic Law 224 5.10. Mechanisms for Enforcing Treaties Internally in Saudi Arabia 230 5.10.1. Royal Decrees 230 5.10.2. The Council of Ministers 230 5.10.3. Ministries and Government Agencies 231 5.10.4. The Shura Council (Consultative Council) 231 5.10.5. Judiciary and Legal Framework 232 5.10.6. Regulations and Administrative Orders 232 5.10.7. International Organizations and Committees 232 5.11. Effectiveness of Saudi Arabia Treaty Enforcement Mechanisms 233 5.11.1. Successes in Implementation and Compliance 233 5.12. Challenges and Limitations of Enforcing Treaties 237 5.12.1. Compliance with Shari’ah Law 237 5.12.2. Sovereignty and National Interests 238 5.12.4. Conflict with Domestic Laws 240 5.12.5. Public Opinion and Cultural Sensitivities 242 5.13. Ongoing Debates and Political Dynamics in Saudi Arabia’s Treaty Process 244 5.13.1. Shari’ah Law vs. International Norms 244 5.13.2. The Role of Religious Authorities 245 5.13.3. Economic Globalization and Sovereignty 245 5.13.4. The Impact of Regional Politics 246 5.13.5. Saudi Arabia's Relationship with the United States and Other Western Powers 247 5.14. Chapter Summary 247 Chapter 6: The United States Treaty-Making Process and Mechanisms for Internal Enforcement in Comparison to Saudi Arabia 251 6.1. Introduction 251 6.2. Overview of the Treaty-Making Process in the U.S. 252 6.3. Historical Context of U.S. Treaty-Making 254 6.3.1. Constitutional Foundations 255 6.3.2. Key Historical Treaties and Their Impact 256 Treaty of Paris (1783) 256 Louisiana Purchase Treaty (1803) 258 North Atlantic Treaty (1949) 259 Treaty of Versailles (1919) 260 General Agreement on Tariffs and Trade (GATT) (1947) 260 United Nations Convention on the Law of the Sea (UNCLOS) (1982) 261 6.4. The Constitutional Framework for the U.S. Treaty Process 262 6.4.1. Article (2), Section (2) of the U.S. Constitution 262 6.4.2. The Roles of the President, Senate, and House of Representatives 263 The President 263 The Senate 263 The House of Representatives 264 6.4.3. Negotiation and Drafting of Treaties in the U.S. 266 6.4.4. U.S. Senate Approval Process 267 6.4.5. Historical Examples of Successful and Failed Ratifications 268 The Paris Agreement 268 Comprehensive Nuclear-Test-Ban Treaty (CTBT) 268 New START Treaty (2010) 269 6.5. Implementation of Treaties Within U.S. Domestic Laws 270 6.5.1. The Need for Implementing Legislation 270 6.5.2. The Impact of Treaties on Domestic Law 272 6.6. Mechanisms for Enforcing Treaties Internally in the U.S. 274 6.6.1. Federal and State Compliance 274 6.6.2. Role of Federal Agencies 275 6.6.3. Judicial Enforcement of Treaties 275 6.7. Effectiveness of U.S. Treaty Enforcement Mechanisms 277 6.7.1. Successes in Implementation and Compliance 277 6.7.2. Challenges and Limitations of Enforcing Treaties 277 6.7.3 Ongoing Debates and Political Dynamics 280 6.8. Comparison of Saudi Arabia Treaty Process with the U.S. Approach 282 6.9. Applicability of U.S. Treaty-Making and Enforcement Mechanisms to Saudi Arabia 284 6.9.1. Potential Adaptations and Challenges 284 6.9.2. Cultural and Political Considerations 285 6.10. Chapter Summary 287 Chapter 7: Treaty-Making and Enforcement in France: A Comparative Analysis with Saudi Arabia 288 7.1. Introduction 288 7.2. The Treaty-Making Process in France 289 7.2.1. Constitutional Framework 289 7.2.2. Types of Treaties 290 7.2.3. Procedure for Ratification 291 7.2.4. Role of the Executive and Legislative Branches 291 7.3. Internal Enforcement Mechanisms in France 292 7.3.1. Incorporation into Domestic Law 292 7.3.2. Judicial Mechanisms 292 7.3.3. Role of Government Agencies 292 7.4. Effectiveness of France’s Treaty Enforcement Mechanisms 293 7.4.1. Case Studies on International Treaties 293 The Treaty of Maastricht of 1992 293 The European Constitution of 2005 293 7.4.2. Challenges and Limitations 294 7.5. Comparative Analysis: Applicability of France’s Treaty Process to Saudi Arabia 294 7.5.1. Political Environment Considerations 295 7.5.2. Cultural and Legal Considerations 295 7.6. Potential Recommendations for Adaptations and Reforms 296 1. Enhancing Public Participation in Treaty-Making 296 2. Strengthening Legislative Oversight and Parliamentary Involvement 297 3. Aligning Treaty Processes with International Best Practices 298 4. Addressing Compliance and Enforcement Challenges 299 7.7. Chapter Summary 300 Chapter 8: Treaty-Making and Enforcement in United Arab Emirates (UAE): A Comparative Analysis with Saudi Arabia 302 8.1. Introduction 302 8.2. The Treaty-Making Process in the UAE 303 8.2.1. Constitutional and Legislative Framework 303 8.2.2. Steps Involved in Formulating Treaties 310 8.2.3. Role of the Executive and Legislative Branches 310 8.3. Internal Enforcement Mechanisms in the UAE 311 8.3.1. Incorporation into Domestic Law 313 8.3.2. Judicial Mechanisms 315 8.3.3. Role of Government Agencies and Compliance Bodies 316 8.4. Effectiveness of the UAE’s Treaty Enforcement Mechanisms 19 8.4.1. Case Studies on International Treaties 316 8.4.2. Challenges and Limitations 317 8.5. Comparative Analysis: Applicability of UAE’s Treaty Process to Saudi Arabia 318 8.5.1. Overview of Saudi Arabia’s Legal Framework for Treaties Error! Bookmark not defined. 8.5.2. Comparison with UAE Treaty Process Error! Bookmark not defined. 8.6. Potential Recommendations for Adaptations and Reforms Error! Bookmark not defined. 8.7. Chapter Summary Error! Bookmark not defined. Chapter 9: Conclusion and Recommendations 319 9.1. Overview 321 9.2. Recommendations for Improving Saudi Treaty-Making Process 322 9.2.1. Legislative Oversight and Public Accountability (Lesson from the USA): 322 9.2.2. Judicial Review for Constitutional Consistency (Lesson from France): 324 9.2.3. Modernization and Flexibility (Lesson from UAE): 326 9.2.4. Balancing Domestic and International Obligations (Lessons from All): 328 9.3. Chapter Summary 331 References 33233 0Item Restricted Leveraging LLMs for the Analysis of Mobile App User Feedback: In-Depth Evaluation of User Perspectives on AI-Enabled Mobile Apps(Saudi Digital Library, 2025-05-10) Alsanousi, Bassam Jameel A; Ludi, Stephanie; Do, HyunsookThe expanding use of artificial intelligence (AI) in mobile applications has intensified the need to investigate how integrated AI features impact user experience (UX). While research in this area is growing, a significant gap exists in evaluating the usability of AI-enabled apps across languages, platforms, and domains. Furthermore, analyzing large-scale user feedback remains challenging despite the automation potential of recent large language models (LLMs). Interestingly, evaluating mobile apps using International Organization for Standardization (ISO) standards in exploring UX has shown promise while uncovering weaknesses and emerging issues. Accordingly, in this study, we evaluated mobile apps by analyzing user reviews through the lens of the ISO 9241-11 usability model and the ISO/International Electrotechnical Commission’s (IEC’s) 25010 quality standard. This dissertation has two main objectives. The first is to examine the performance of AI-enabled apps across different domains and platforms (iOS and Android) in multiple languages to identify emerging usability issues. The second objective is to develop trustworthy automated tools using LLMs and ISO standards that improve the semantic analysis of user feedback regarding usability and software quality and thus support the handling of large amounts of data. Our research results provide valuable insights into the benefits and difficulties of AI-enabled mobile apps in various domains. By conducting sentiment analysis, we find that users are generally positive about these apps; however, there are critical issues underlying the negative reviews related to AI (e.g., giving unclear responses, algorithmic bias, privacy concerns, voice and image recognition limitations, ethical sensitivity, and insufficient transparency in AI decision-making processes). Furthermore, the advanced tools we developed demonstrate their effectiveness in automatically analyzing user reviews according to the ISO standards compared to other advanced models (e.g., GPT-4o, Llama2, and Gemini). In addition, our research has uniquely applied interpretability techniques—local interpretable model-agnostic explanations (LIME)—to develop LLMs capable of interpreting their output, aiding in the creation of trustworthy models. These findings provide developers, app owners, and researchers with insights into user perceptions of AI-enabled apps while presenting advanced strategies for automating the analysis of user reviews effectively.17 0Item Restricted ROLE OF MACROPHAGES IN DIABETES-ASSOCIATED OCULAR SURFACE INJURY(Saudi Digital Library, 2025) Alfuraih, Saleh Mohammed G; Ansari, RaisDiabetes mellitus is a major global health concern characterized by impaired carbohydrate metabolism and chronic hyperglycemia. Approximately 589 million individuals worldwide are currently affected, with projections reaching nearly 853 million by 2050. In the United States alone, around 51 million people live with diabetes, with a significant proportion remaining prediabetic. Poor glycemic control leads to both microvascular and macrovascular complications. Diabetes causes multifactorial ocular complications like diabetic retinopathy, cataracts, glaucoma, diabetic papillopathy, and ocular surface damage. These complications substantially elevate the risk of vision impairment and negatively impact quality of life. The ocular surface, including the cornea, conjunctiva, eyelids, limbus, tear film, and associated glands, acts as the eye’s first barrier against environmental insults. Hyperglycemia disrupts this system by impairing tear production, increasing osmolarity, reducing epithelial cell regeneration, and promoting apoptosis, thus enhancing susceptibility to infection. In parallel, diabetes induces immune dysfunction, impairing key innate immune cells like macrophages, neutrophils, dendritic cells, and NK cells. Despite their critical role, the effects of diabetes on macrophages within the lacrimal functional unit have not been systematically studied. To address this, we established a method for detecting and localizing macrophages in the cornea, conjunctiva, and lacrimal glands using markers such as CD11b, F4/80, and CD206. We then investigated the effect of hyperglycemia on macrophages within the lacrimal functional unit utilizing a mouse model of streptozotocin-induced diabetes. Our data demonstrate that short-term hyperglycemia alters the macrophage population and activation, leading to compromised immune defense. Our findings emphasize that even short-term poor glycemic control induces tissue-specific damage within the lacrimal functional unit. These results highlight the necessity for glycemic control to protect immune cell function and maintain ocular surface health, ultimately reducing the risk of diabetes-associated vision complications.6 0Item Restricted ORTHOGRAPHIC EFFECTS IN L2 ARABIC WORD PROCESSING: A PRIMING STUDY(University of Maryland, College Park, 2025) Aljohani, Raneem; Jiang, NanLate Arabic learners seem to process words in a similar manner to native speakers, distinguishing their processing pattern from the commonly held assumption that form-relatedness drives lexical access in L2 learners. The morphologically driven facilitation witnessed in L2 Arabic learners inspired the current study to further investigate if orthographic effects can be obtained within the same population. Therefore, the current study investigated if late Arabic learners process orthographically related prime-target pairs in a similar manner to native speakers. The study measured participants' reaction times during a lexical decision task while being primed by orthographic neighbors ( شاب – باب ) and orthographic embedded words ( أسباب - باب ). The results contradicted the prediction and challenge the notion that L2 learners are generally primed by form similarities. L2 Arabic learners seem to differ from L2 speakers of concatenative languages. The results also confirmed previous claims suggesting a lack of orthographic priming effects in L2 Arabic learners, indicating that their processing could be morphologically driven.10 0Item Restricted Differential response of osteocytes to tensile and compressive cues during loading, unloading, spaceflight and artificial gravity(Saudi Digital Library, 2025-05) BDS, Zainah Salloot; Baron, RolandIn bone, osteocytes are vital contributors to the processes of mechanosensation and mechanotransduction. Recently, there has been an increased interest in differential bone adaptation in response to different mechanical cues. To date, there are no reports about osteocytes' differential response to tension versus compression forces. We aimed to study the differential effects of tension and compression cues on osteocytes in vivo, in mice tibia at steady state and when subjected to different mechanical challenges. Areas in mice tibial midshaft subjected to tensile and compressive forces have been previously identified by utilizing finite element modeling. Mice were subjected to 1) mechanical loading, 2) unloading though hindlimb suspension, and 3) spaceflight and artificial gravity. Samples were analyzed using Backscatter Scanning Electron Microscopy (BSEM) imaging to visualize the morphological changes in osteocyte lacunae, as well as light microscopy to visualize the morphology of the Lacuno- Canalicular Network (LCN). Bulk RNA sequencing was performed to explore whole genome differential gene expression associated with the morphological changes. Depending upon whether the osteocytes were subjected to tension or compression, they behaved differently in terms of 1) peri-lacunar remodeling, 2) macro-remodeling and 3) their transcriptome; in which lacuna were lower in density and larger in size larger in compression cortices. The compression cortices were thicker and more porous than tension cortices, and the osteocytes’ transcriptome revealed differentially express neuronal genes that are involved in dendrite formation and regulation, ion transport genes, which regulate the ionic microenvironment, and Extra-Cellular Matrix (ECM) related genes, which regulate ECM resorption or formation.4 0Item Restricted Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach(IEEE, 2025-02-03) ALRUWAILI, MUSAAD; KIM, JUNGHWANDevice-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and privacy challenges, such as unauthorized access, data eavesdropping, and privacy breaches. To address these issues, we propose a robust and adaptive security framework that integrates AI-enhanced physical layer key generation, full-duplex adaptive jamming, and differential privacy. Our approach employs secure multi-party computation (MPC) and lightweight encryption to protect user preferences and communication data during resource allocation while ensuring optimal system performance. AI-driven key generation dynamically adapts to changing network conditions, whereas the full-duplex adaptive jamming mechanism effectively counteracts eavesdropping threats. We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. The results confirm the efficacy of the framework in safeguarding D2D communications, making it well suited for mission-critical 5G applications, where both performance and security are paramount.11 0Item Restricted A Monte Carlo Simulation Approach to Solve Two-Stage Stochastic Programming and Its Application to Bond Portfolio Optimization(Saudi Digital Library, 2025-05) Albaqami, Hissah Munif; Subasi, Munevver MineWe present a Monte Carlo simulation-based approach for solving a stochastic twostage bond portfolio optimization problem, where the main objective is to minimize the total cost of the bond portfolio while making strategic decisions on bond purchases, holdings, and sales under uncertain market conditions such as interest rate fluctuations and future liabilities. The proposed algorithm not only identifies the appropriate number of randomly generated scenarios required to transform the stochastic problem into a deterministic one but also includes a stopping criterion to terminate the scenario generation process once further samples yield no significant improvement in the optimal solution. Additionally, we formulate a comprehensive two-stage model that allows the investor to make a buying, holding, or selling decision in both of the first and second stages, capturing the dynamic nature of investment strategy over time. The practical relevance of the methodology is demonstrated through its application to a real-world bond market dataset. The numerical results show that the proposed approach effectively minimizes costs, satisfies liability constraints, and provides a robust and flexible solution for bond portfolio optimization14 0Item Restricted An Adapted Framework for the Interaction of Parenting Style in Shaping/Facilitating Attachment to God and Parents in Islamic, Middle Eastern Culture(Widener University, 2025-06-23) Alotaibi, Ohud; Boyer, BretThis study sought to further research regarding the relationship between parenting and interpersonal attachment styles, attachment to God, and life satisfaction, by extending the Western centric theoretical framework and data to cultural contexts and values of Islamic faith in the Middle East, specifically, Saudi Arabia. Data was collected from 474 participants. Multiple regression results indicate a strong positive relationship between authoritative parenting and life satisfaction, and a negative correlation with insecure interpersonal attachment. Conversely, individuals exposed to authoritarian parenting are at a higher risk of developing insecure attachment styles, which can manifest as difficulty forming secure interpersonal relationships, which further relate to attachment relationships to God (Allah), and life satisfaction.53 0