• Title/Summary/Keyword: Umm Al-Qura University

Search Result 239, Processing Time 0.023 seconds

Effectiveness of A Proposed Program for Training Social Studies Teachers in the Light of Electronic Functional Competencies

  • Atef Mohamed Saied, Abdallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.139-145
    • /
    • 2022
  • The study aimed to build a proposed program for training Social Studies teachers in the light of electronic functional competencies, the researcher used the experimental method with a quasi-experimental design, the study sample consisted of (37) Social studies teachers in Ismailia. A proposed program in the light of electronic functional competencies. A measure of awareness of the dimensions and components of electronic feasibility. The study concluded several results: There is a statistically significant difference at the level of (a ≤0.01) between the average scores of the teachers of the research group in the pre and post measurements of the measure of awareness of the dimensions and components of electronic functional competencies in favor of the teachers scores in the post-measurement. Training Social studies teachers on the functional electronic competencies necessary for them to keep up with educational developments.

Evaluating Higher Diploma in English Language Teaching for the Primary Stage from the Teachers' Perspectives

  • Hashem A. Alsamadani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.91-94
    • /
    • 2023
  • This study aims to evaluate the Higher Diploma in English for the Primary Stage from the diploma students' perspectives. A questionnaire was designed consisting of 25 items distributed in two areas: cognitive/academic preparation and professional/skill preparation. The following statistical analyses were used: means, standard deviations, t-test, and one-way analysis of variance (ANOVA). The study results showed that the level of evaluation of the two domains in the program was low. The study also showed no statistically significant differences between the means of educational diploma students when evaluating the Higher Diploma in English for the Primary Stage due to their academic specialization (Arabic language, social sciences, and Islamic studies). In conclusion, the researcher suggested a developmental mechanism derived from the study results to improve the higher Diploma in English for the Primary Stage.

FinTech in Saudi Arabia: A User Experience Aanalysis of FinTech Platforms

  • Abdulhadi M. Eidaroos
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.177-185
    • /
    • 2023
  • The global FinTech industry has experienced significant growth, with key projects developing the financial sector. In Saudi Arabia, startups have used technology to offer FinTech services. In this area, it is important to investigate the usability of platforms that offer FinTech services. This research aims to examine the usability of samples of Saudi FinTech websites and identify design issues impacting user experience. Usability testing was conducted on the websites of two FinTech firms identified design issues, including navigation problems on the homepage and a lack of transparency in displaying investment details, negatively impacting end users. Employing usability methods can assist in enhancing the development of FinTech platforms and addressing these issues. This study contributes to a deeper understanding of FinTech usability problems and the user experience, enabling advancements in the industry.

Application of Different Tools of Artificial Intelligence in Translation Language

  • Mohammad Ahmed Manasrah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.144-150
    • /
    • 2023
  • With progressive advancements in Man-made consciousness (computer based intelligence) and Profound Learning (DL), contributing altogether to Normal Language Handling (NLP), the precision and nature of Machine Interpretation (MT) has worked on complex. There is a discussion, but that its no time like the present the human interpretation became immaterial or excess. All things considered, human flaws are consistently dealt with by its own creations. With the utilization of brain networks in machine interpretation, its been as of late guaranteed that keen frameworks can now decipher at standard with human interpreters. In any case, simulated intelligence is as yet not without any trace of issues related with handling of a language, let be the intricacies and complexities common of interpretation. Then, at that point, comes the innate predispositions while planning smart frameworks. How we plan these frameworks relies upon what our identity is, subsequently setting in a one-sided perspective and social encounters. Given the variety of language designs and societies they address, their taking care of by keen machines, even with profound learning abilities, with human proficiency looks exceptionally far-fetched, at any rate, for the time being.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

Data Visualization and Visual Data Analytics in ITSM

  • Donia Y. Badawood
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.68-76
    • /
    • 2023
  • Nowadays, the power of data analytics in general and visual data analytics, in particular, have been proven to be an important area that would help development in any domain. Many well-known IT services best practices have touched on the importance of data analytics and visualization and what it can offer to information technology service management. Yet, little research exists that summarises what is already there and what can be done to utilise further the power of data analytics and visualization in this domain. This paper is divided into two main parts. First, a number of IT service management tools have been summarised with a focus on the data analytics and visualization features in each of them. Second, interviews with five senior IT managers have been conducted to further understand the usage of these features in their organisations and the barriers to fully benefit from them. It was found that the main barriers include a lack of good understanding of some visualization design principles, poor data quality, and limited application of the technology and shortage in data analytics and visualization expertise.

External vs. Internal: An Essay on Machine Learning Agents for Autonomous Database Management Systems

  • Fatima Khalil Aljwari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.164-168
    • /
    • 2023
  • There are many possible ways to configure database management systems (DBMSs) have challenging to manage and set.The problem increased in large-scale deployments with thousands or millions of individual DBMS that each have their setting requirements. Recent research has explored using machine learning-based (ML) agents to overcome this problem's automated tuning of DBMSs. These agents extract performance metrics and behavioral information from the DBMS and then train models with this data to select tuning actions that they predict will have the most benefit. This paper discusses two engineering approaches for integrating ML agents in a DBMS. The first is to build an external tuning controller that treats the DBMS as a black box. The second is to incorporate the ML agents natively in the DBMS's architecture.

Teachers' Perspectives towards Online Learning in Saudi Elementary Schools

  • Hashem A. Alsamadani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.135-138
    • /
    • 2024
  • The elementary stage is of great importance in establishing and supporting students during the beginning of their school life. Therefore, the current study aims to explore the Saudi teachers' perspectives about online learning and its effectiveness on some students' skills. The sample consisted of 250 male and female elementary teachers from different Saudi regions, and they responded to an online questionnaire consisting of both open and closed items to investigate their perspectives on online learning and face-to-face learning. The results showed a great perception and awareness among male and female teachers about the advantages and disadvantages of online learning. In addition, the results show that elementary teachers prefer face-to-face learning because it is the most stable and avoids many of the disadvantages mentioned for online learning. From this point of view, the study emphasizes the importance of integrating the two types of learning and directing teachers' professional development practices towards enhancing and developing their digital skills.

The Role of Data Technologies with Machine Learning Approaches in Makkah Religious Seasons

  • Waleed Al Shehri
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.26-32
    • /
    • 2023
  • Hajj is a fundamental pillar of Islam that all Muslims must perform at least once in their lives. However, Umrah can be performed several times yearly, depending on people's abilities. Every year, Muslims from all over the world travel to Saudi Arabia to perform Hajj. Hajj and Umrah pilgrims face multiple issues due to the large volume of people at the same time and place during the event. Therefore, a system is needed to facilitate the people's smooth execution of Hajj and Umrah procedures. Multiple devices are already installed in Makkah, but it would be better to suggest the data architectures with the help of machine learning approaches. The proposed system analyzes the services provided to the pilgrims regarding gender, location, and foreign pilgrims. The proposed system addressed the research problem of analyzing the Hajj pilgrim dataset most effectively. In addition, Visualizations of the proposed method showed the system's performance using data architectures. Machine learning algorithms classify whether male pilgrims are more significant than female pilgrims. Several algorithms were proposed to classify the data, including logistic regression, Naive Bayes, K-nearest neighbors, decision trees, random forests, and XGBoost. The decision tree accuracy value was 62.83%, whereas K-nearest Neighbors had 62.86%; other classifiers have lower accuracy than these. The open-source dataset was analyzed using different data architectures to store the data, and then machine learning approaches were used to classify the dataset.

New mathematical approach to calculate the geometrical efficiency using different radioactive sources with gamma-ray cylindrical shape detectors

  • Thabet, Abouzeid A.;Hamzawy, A.;Badawi, Mohamed S.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.6
    • /
    • pp.1271-1276
    • /
    • 2020
  • The geometrical efficiency of a source-to-detector configuration is considered to be necessary in the calculation of the full energy peak efficiency, especially for NaI(Tl) and HPGe gamma-ray spectroscopy detectors. The geometrical efficiency depends on the solid angle subtended by the radioactive sources and the detector surfaces. The present work is basically concerned to establish a new mathematical approach for calculating the solid angle and geometrical efficiency, based on conversion of the geometrical solid angle of a non-axial radioactive point source with respect to a circular surface of the detector to a new equivalent geometry. The equivalent geometry consists of an axial radioactive point source with respect to an arbitrary elliptical surface that lies between the radioactive point source and the circular surface of the detector. This expression was extended to include coaxial radioactive circular disk source. The results were compared with a number of published data to explain how significant this work is in the efficiency calibration procedure for the γ-ray detection systems, especially in case of using isotropic radiating γ-ray sources in the form of point and disk shapes.