• Title/Summary/Keyword: Umm Al-Qura University

Search Result 240, Processing Time 0.02 seconds

Big Data Security and Privacy: A Taxonomy with Some HPC and Blockchain Perspectives

  • Alsulbi, Khalil;Khemakhem, Maher;Basuhail, Abdullah;Eassa, Fathy;Jambi, Kamal Mansur;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.43-55
    • /
    • 2021
  • The amount of Big Data generated from multiple sources is continuously increasing. Traditional storage methods lack the capacity for such massive amounts of data. Consequently, most organizations have shifted to the use of cloud storage as an alternative option to store Big Data. Despite the significant developments in cloud storage, it still faces many challenges, such as privacy and security concerns. This paper discusses Big Data, its challenges, and different classifications of security and privacy challenges. Furthermore, it proposes a new classification of Big Data security and privacy challenges and offers some perspectives to provide solutions to these challenges.

Dynamic Retry Adaptation Scheme to Improve Transmission of H.264 HD Video over 802.11 Peer-to-Peer Networks

  • Sinky, Mohammed;Lee, Ben;Lee, Tae-Wook;Kim, Chang-Gone;Shin, Jong-Keun
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1096-1107
    • /
    • 2015
  • This paper presents a dynamic retry adaptation scheme for H.264 HD video, called DRAS.264, which dynamically adjusts the retry limits of frames at the medium access control (MAC) layer according to the impact those frames have on the streamed H.264 HD video. DRAS.264 is further improved with a bandwidth estimation technique, better prediction of packet delays, and expanded results covering multi-slice video. Our study is performed using the Open Evaluation Framework for Video Over Networks as a simulation environment for various congestion scenarios. Results show improvements in average peak signal-to-noise ratios of up to 4.45 dB for DRAS.264 in comparison to the default MAC layer operation. Furthermore, the ability of DRAS.264 to prioritize data of H.264 bitstreams reduces error propagation during video playback, leading to noticeable visual improvements.

Mainstreaming of Students with Intellectual Disability in the Kingdom of Saudi Arabia: Special Education Teachers' Perceptions

  • Bagadood, Nizar H.;Sulaimani, Mona F.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.183-188
    • /
    • 2022
  • Educators have been making strides in the research into and practices supporting the policy of mainstreaming students with disability. A move towards including students with intellectual disability in community schools with all the other students can be seen in many countries' education systems, including that of the Kingdom of Saudi Arabia. The 'rights of the child' has been the main argument put forward by advocates of this policy in an attempt to move from the medical to the social model. This study argues that, although mainstreaming can be viewed as a positive trend toward effective education, its implementation remains somewhat problematic. It is believed that more investigative research into professionals' attitudes is needed to improve service provision and inform the administration of mainstreaming practices. The attitudes of special education teachers on the policy of mainstreaming are examined and emerging key themes discussed. Furthermore, challenges that continue to inhibit mainstreaming practices in Saudi Arabia are identified.

Human Right Requirements in the Metaverse Era

  • Alkhiri, Talal Agil Attas
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.67-74
    • /
    • 2022
  • This study is a theoretical account of HRs requirements in educational institutions in light of the growing influence of digital technology on human rights. It intends to reveal prominent human and civilizational values encapsulated in modern human rights regulations. It dwells on educational and societal requirements for educational inclusion in the school and university curricula in light of changes that have taken place in HRs in the digital age. Relying on the descriptive documentary research design, the study concluded that HRs are inherently moral duties and fixed values. They include the importance of tolerance, freedom, peace, justice, science, work, and equality. Because education is arguably based on human and civilized values, educational foundations require intake of awareness, systematic integration and responsibility from all academic and community institutions, including family and media institutions. The article closes on a note of how technology has impacted human rights in the digital age. It provides implications and recommendations to pedagogies accordingly.

Developing Student-Teacher Interaction Through Task-Based Instruction

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.47-52
    • /
    • 2022
  • The current study investigates how student-teacher interaction can be developed through task-based teaching in undergraduate students' Saudi teaching and learning context. An experiment was conducted for five weeks on 85 male undergraduate students at a Saudi public university based in Jeddah, Saudi Arabia. The study investigated different types of student-teacher interaction through task-based teaching (speaking activities). The results revealed that the experimental group (43 students) evinced much more enthusiasm, willingness, engagement and readiness in their inclass participation than their peers in the control group (42 students). The student-teacher interaction also helped students to be more responsive to general and specific topics in speaking activities. The study recommends that decision-makers in education make student-teacher interaction part of the student's monthly assessment. It also recommends that more efforts be made to foster the awareness of students, teachers, and parents awareness of the academic and non-academic importance of interaction. One final recommendation of the research is that student-teacher interaction should be more emphasized and integrated into the school curriculum and adopted as a critical teaching strategy.

Survey on Sustainable Smart Cities Development: Challenges and Solutions

  • Alotaibi, Youseef
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.108-118
    • /
    • 2021
  • This paper aims to presents the overview of research in the sustainable smart cities development domain. It investigates the key challenges of the sustainable smart cities development that faced by the developers from different countries. The qualitative research method via the interview is conducted to collect the data. 10 experts on the sustainable smart cities development project were interviewed in this study. The results indicate that there are 12 sustainable smart cities development challenges named: (1) budgetary constraint; (2) lack of resources; (3) lack of institutional capacity to deliver technology; (4) lack of systems integration; (5) social acceptability; (6) lack of awareness level in the smart city development among residents; (7) the need to drive towards content development; (8) lack of strategically approach in the smart city transformation; (9) disagreement on standardizing the smart city model; (10) lack of overarching institution to create the governance structure; (11) lack of sustainable focused strategies; and (12) lack of the smart city operational framework. Furthermore, the solutions framework for these challenges was proposed as the guidelines to overcome or minimize them.

On the Scale in the Kingdom of Saudi Arabia: Facebook vs. Snapchat

  • Alghamdi, Deena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.131-136
    • /
    • 2021
  • This research aims to analyse the practices adopted by social media users in the Kingdom of Saudi Arabia (KSA), specifically users of Facebook and Snapchat. To collect data from participants, a questionnaire was used, generating 915 responses. The analysis of the data shows a clear preference for Snapchat over Facebook in the KSA, where 89% of the participants have accounts on Snapchat compared to 66% of them with accounts on Facebook. Moreover, the preference for Snapchat over Facebook has been clearly shown in the daily usage of participants, where 83% of those with Snapchat accounts can be described as very active users. They have accessed their Snapchat accounts at least once a day compared to only 15% of Facebook users. Different reasons were provided by the participants explaining the practices they adopted. We believe that such research could help social media applications' designers and policy makers to understand the behaviour of users in the KSA when using social media applications and the rationale behind their behaviour and preferences. This understanding could help improve the performance of current applications and new ones.

A Novel Sensor Data Transferring Method Using Human Data Muling in Delay Insensitive Network

  • Basalamah, Anas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a novel data transferring method is introduced that can transmit sensor data without using data bandwidth or an extra-processing cycle in a delay insensitive network. The proposed method uses human devices as Mules, does not disturb the device owner for permission, and saves energy while transferring sensor data to the collection hub in a wireless sensor network. This paper uses IP addressing technique as the data transferring mechanism by embedding the sensor data with the IP address of a Mule. The collection hub uses the ARP sequence method to extract the embedded data from the IP address. The proposed method follows WiFi standard in its every step and ends when data collection is over. Every step of the proposed method is discussed in detail with the help of figures in the paper.

"How can you live without using Snapchat?" Practical Study for the Usage of Facebook and Snapchat in the Kingdom of Saudi Arabia

  • Alghamdi, Deena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.579-585
    • /
    • 2021
  • This study aims to provide an in-depth description of the practices of social media users in the Kingdom of Saudi Arabia (KSA)-specifically the users of Facebook and Snapchat-and the reasons for these practices, the decisions made, and the people involved. Qualitative methods were used to collect data in two rounds from 53 participants. The data analysis shows a clear preference for Snapchat over Facebook among the participants, as shown in their using the application many times daily and in the creation and use of new words derived from the application's name. On the other hand, one of the main reasons mentioned by the participants for not preferring Facebook was the unclear policy of security and privacy used in the application. This reason is important for all social media users, but, in particular, it is crucial for female users, as shown in the data. This is important for the designers and policymakers of the social media applications to understand and consider, as it would help them improve the current applications and create new ones.

User Interface Design & Evaluation of Mobile Applications

  • Samrgandi, Najwa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.55-63
    • /
    • 2021
  • The design functionality put forward by mapping the interactiveness of information. The presentation of such information with the user interface model indicates that the guidelines, concepts, and workflows form the deliverables and milestones for achieving a visualized design, therefore forming the right trend is significant to ensure compliance in terms of changing consideration and applying evaluation in the early stages. It is evidenced that prototype design is guided by improvement specifications, includes modes, and variables that increase improvements. The study presents five user interface testing methods. The testing methods are heuristic evaluation, perspective-based user interface testing, cognitive walkthrough, pluralistic walkthrough, and formal usability inspection. It appears that the five testing methods can be combined and matched to produce reasonable results. At last, the study presents different mobile application designs for student projects besides the evaluation of mobile application designs to consider the user needs and usability.