• 제목/요약/키워드: Umm Al-Qura University

검색결과 239건 처리시간 0.021초

Challenges Experienced Use of Distance-Learning by High School Teachers Responses to Students with Depression

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.192-198
    • /
    • 2021
  • Trustless, depression, happiness is a normal human emotion that everyone experiences at times. People face problems and hard circumstances every day due to an environment, social life, or traumatic developments in their lives. This study focused on a particular type of inconsistency patterns of behavior that experiences' students during the school time. Some students find depression interferes with their learning and test taking to such an extent that their grades are seriously affected. This study examined the awareness and readiness of a sample of Saudi Arabian high school teachers to recognize, understand, and respond to the ways in which students may respond to testing situations with depression. Findings suggest teachers learn from experience to use both direct and indirect ways to identify students with depression; employ test preparation and test taking strategies to help students reduce depression; and reach out to parents for additional assistance where teacher strategies are not sufficient.

Social Media Security and Attacks

  • Almalki, Sarah;Alghamdi, Reham;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.174-183
    • /
    • 2021
  • The advent of social media has revolutionized the speed of communication between millions of people around the world in various cultures and disciplines. Social media is the best platform for exchanging opinions and ideas, interacting with other users of similar interests and sharing different types of media and files. With the phenomenal increase in the use of social media platforms, the need to pay attention to protection and security from attacks and misuse has also increased. The present study conducts a comprehensive survey of the latest and most important research studies published from 2018-20 on security and privacy on social media and types of threats and attacks that affect the users. We have also reviewed the recent challenges that affect security features in social media. Furthermore, this research pursuit also presents effective and feasible solutions that address these threats and attacks and cites recommendations to increase security and privacy for the users of social media.

The Views of Teachers and Parents of Special Education Schools in Saudi Arabia

  • Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.304-310
    • /
    • 2022
  • This research examines the views of teachers and parents of special schools in Saudi Arabia, exploring the schools' strengths and disadvantages, as well as their impact on teachers, parents, and students with disabilities. The respondents' key views of the schools are identified, including the areas of consensus and conflict, and recommendations are made for the future, based on the findings. This research concerns a specific special education school in Saudi Arabia, and focuses on the understanding of special education in the country. The approach to the study is targeted and qualitative, with the six participants, three teachers and three parents, intentionally selected. The data collection is conducted via semi-structured interviews that explore the participants' views of special education in Saudi Arabia. A number of issues emerge from the results, and one raised by all three teachers is the need to improve school facilities. Although all three parents report that their children clearly benefited from attending a special school, two felt that the offering was insufficient, in terms of the teaching methods, and of supporting cognitive skills.

Predicting the Saudi Student Perception of Benefits of Online Classes during the Covid-19 Pandemic using Artificial Neural Network Modelling

  • Beyari, Hasan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.145-152
    • /
    • 2022
  • One of the impacts of Covid-19 on education systems has been the shift to online education. This shift has changed the way education is consumed and perceived by students. However, the exact nature of student perception about online education is not known. The aim of this study was to understand the perceptions of Saudi higher education students (e.g., post-school students) about online education during the Covid-19 pandemic. Various aspects of online education including benefits, features and cybersecurity were explored. The data collected were analysed using statistical techniques, especially artificial neural networks, to address the research aims. The key findings were that benefits of online education was perceived by students with positive experience or when ensured of safe use of online platforms without the fear cyber security breaches for which recruitment of a cyber security officer was an important predictor. The issue of whether perception of online education as a necessity only for Covid situation or a lasting option beyond the pandemic is a topic for future research.

LTE Packet Scheduling with Bandwidth Type Consideration

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.351-357
    • /
    • 2022
  • LTE (Long-Term Evolution, sometimes known as 4G LTE) is a wireless high-speed data communication technology for mobile phones and data terminals. The Packet Scheduler (PS) is an important component in improving network performance. Physical Resource Blocks (PRBs) are assigned to associated User Equipment by the packet scheduler (UEs). The primary contribution of this study is a comparison of the eNodeB throughput between a suggested method and the Round Robin (RR) Algorithm. The RR Algorithm distributes PRBs among all associated UEs without taking channel circumstances into account. In this research, we present a new scheduling method that takes into account the number of PRBs and associated UEs and produces higher throughput than the RR algorithm.

Effects of Flipped Classroom Strategy on Students' Achievements in the Computer and Information Technology Course and Their Attitudes Towards It

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.157-164
    • /
    • 2021
  • This endeavor is an attempt to explore the effect of flipped classroom strategy (FCS) on (a) academic achievement in the computer and information technology course and (b) students' attitudes towards this strategy. The sample of the study consisted of 64 students, divided into two groups: experimental and control groups. Two instruments were used to collect the data: a test and a questionnaire. The test was used to measure the students' achievement and the questionnaire to measure their attitudes towards the FCS. The results show statistically significant differences at the level of 0.05 in support of the experimental group at all Bloom's levels. Similarly, students' positive attitude towards the FCS was evident. Therefore, expanding this strategy in different courses is highly recommended because it positively impacts students' achievements. Organizing workshops and designing courses that encourage teachers to implement the strategy in the classroom and develop their technical skills are also recommended.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

Parental Involvement and Education of Children with Intellectual Disabilities in Saudi Arabia

  • Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.259-265
    • /
    • 2022
  • This research aims to increase understanding of family participation in special education programs, to gain a deeper understanding of the programs themselves, and to determine the consequences of the research findings. It addresses the opportunities for families to participate in their children's learning journey and focuses on enhancing the experience of families participating in the education of students with intellectual disabilities. This study interviews four teachers of students with intellectual disabilities, and three important themes emerge from their discussion of whether parents should participate in special education programs for their children. The findings of this study have several important implications for future practice.

Flipping EFL Classrooms: Impacts on Students' Achievement and Life Skills Learning

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.229-236
    • /
    • 2022
  • This study investigates the impact of flipped classroom strategy in developing students' achievement and acquisition of life skills. The study employed a quasi-experimental design where students were divided into two groups: an experimental (N=22) and a control (N=22). The randomly selected and assigned sample consisted of sixth-year elementary school students studying English as a basic course. The findings revealed statistically significant differences between the two group's means in both achievement and life skills tests in favor of the experimental group. Students of the experimental group who studied using the flipped classroom strategy outperformed the control group who studied in the standard way in achieving the English language and in the life situations test, where the effect size of the use of the strategy was large in both dependent variables. The study is concluded with some recommendations to facilitate the use of flipped classroom strategy for EFL teachers. This can be achieved by training teachers on using the strategy and providing technological resources at schools to implement the strategy efficiently.

Femtocell Networks Interference Management Approaches

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.329-339
    • /
    • 2022
  • Small cells, particularly femtocells, are regarded a promising solution for limited resources required to handle the increasing data demand. They usually boost wireless network capacity. While widespread usage of femtocells increases network gain, it also raises several challenges. Interference is one of such concerns. Interference management is also seen as a main obstacle in the adoption of two-tier networks. For example, placing femtocells in a traditional macrocell's geographic area. Interference comes in two forms: cross-tier and co-tier. There have been previous studies conducted on the topic of interference management. This study investigates the principle of categorization of interference management systems. Many methods exist in the literature to reduce or eliminate the impacts of co-tier, cross-tier, or a combination of the two forms of interference. Following are some of the ways provided to manage interference: FFR, Cognitive Femtocell and Cooperative Resource Scheduling, Beamforming Strategy, Transmission Power Control, and Clustering/Graph-Based. Approaches, which were proposed to solve the interference problem, had been presented for each category in this work.