• 제목/요약/키워드: Umm Al-Qura University

검색결과 237건 처리시간 0.024초

Automatic Categorization of Islamic Jurisprudential Legal Questions using Hierarchical Deep Learning Text Classifier

  • AlSabban, Wesam H.;Alotaibi, Saud S.;Farag, Abdullah Tarek;Rakha, Omar Essam;Al Sallab, Ahmad A.;Alotaibi, Majid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.281-291
    • /
    • 2021
  • The Islamic jurisprudential legal system represents an essential component of the Islamic religion, that governs many aspects of Muslims' daily lives. This creates many questions that require interpretations by qualified specialists, or Muftis according to the main sources of legislation in Islam. The Islamic jurisprudence is usually classified into branches, according to which the questions can be categorized and classified. Such categorization has many applications in automated question-answering systems, and in manual systems in routing the questions to a specialized Mufti to answer specific topics. In this work we tackle the problem of automatic categorisation of Islamic jurisprudential legal questions using deep learning techniques. In this paper, we build a hierarchical deep learning model that first extracts the question text features at two levels: word and sentence representation, followed by a text classifier that acts upon the question representation. To evaluate our model, we build and release the largest publicly available dataset of Islamic questions and answers, along with their topics, for 52 topic categories. We evaluate different state-of-the art deep learning models, both for word and sentence embeddings, comparing recurrent and transformer-based techniques, and performing extensive ablation studies to show the effect of each model choice. Our hierarchical model is based on pre-trained models, taking advantage of the recent advancement of transfer learning techniques, focused on Arabic language.

KAB: Knowledge Augmented BERT2BERT Automated Questions-Answering system for Jurisprudential Legal Opinions

  • Alotaibi, Saud S.;Munshi, Amr A.;Farag, Abdullah Tarek;Rakha, Omar Essam;Al Sallab, Ahmad A.;Alotaibi, Majid
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.346-356
    • /
    • 2022
  • The jurisprudential legal rules govern the way Muslims react and interact to daily life. This creates a huge stream of questions, that require highly qualified and well-educated individuals, called Muftis. With Muslims representing almost 25% of the planet population, and the scarcity of qualified Muftis, this creates a demand supply problem calling for Automation solutions. This motivates the application of Artificial Intelligence (AI) to solve this problem, which requires a well-designed Question-Answering (QA) system to solve it. In this work, we propose a QA system, based on retrieval augmented generative transformer model for jurisprudential legal question. The main idea in the proposed architecture is the leverage of both state-of-the art transformer models, and the existing knowledge base of legal sources and question-answers. With the sensitivity of the domain in mind, due to its importance in Muslims daily lives, our design balances between exploitation of knowledge bases, and exploration provided by the generative transformer models. We collect a custom data set of 850,000 entries, that includes the question, answer, and category of the question. Our evaluation methodology is based on both quantitative and qualitative methods. We use metrics like BERTScore and METEOR to evaluate the precision and recall of the system. We also provide many qualitative results that show the quality of the generated answers, and how relevant they are to the asked questions.

Digital Competencies Required for Information Science Specialists at Saudi Universities

  • Yamani, Hanaa;AlHarthi, Ahmed;Elsigini, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.212-220
    • /
    • 2021
  • The objectives of this research were to identify the digital competencies required for information science specialists at Saudi universities and to examine whether there existed conspicuous differences in the standpoint of these specialists due to years of work experience with regard to the importance of these competencies. A descriptive analytical method was used to accomplish these objectives while extracting the required digital competency list and ascertaining its importance. The research sample comprised 24 experts in the field of information science from several universities in the Kingdom of Saudi Arabia. The participants in the sample were asked to complete a questionnaire prepared to acquire the pertinent data in the period between January 5, 2021 and January 20, 2021. The results reveal that the digital competencies required for information science specialists at Saudi universities encompass general features such as the ability to use computer, Internet, Web2, Web3, and smartphone applications, digital learning resource development, data processing (big data) and its sharing via the Internet, system analysis, dealing with multiple electronic indexing applications and learning management systems and its features, using electronic bibliographic control tools, artificial intelligence tools, cybersecurity system maintenance, ability to comprehend and use different programming languages, simulation, and augmented reality applications, and knowledge and skills for 3D printing. Furthermore, no statistically significant differences were observed between the mean ranks of scores of specialists with less than 10 years of practical experience and those with practical experience of 10 years or more with regard to conferring importance to digital competencies.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

CONVECTION IN A HORIZONTAL POROUS LAYER UNDERLYING A FLUID LAYER IN THE PRESENCE OF NON LINEAR MAGNETIC FIELD ON BOTH LAYERS

  • Bukhari, Abdul-Fattah K.;Abdullah, Abdullah A.
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제11권1호
    • /
    • pp.1-11
    • /
    • 2007
  • A linear stability analysis applied to a system consist of a horizontal fluid layer overlying a layer of a porous medium affected by a vertical magnetic field on both layers. Flow in porous medium is assumed to be governed by Darcy's law. The Beavers-Joseph condition is applied at the interface between the two layers. Numerical solutions are obtained for stationary convection case using the method of expansion of Chebyshev polynomials. It is found that the spectral method has a strong ability to solve the multilayered problem and that the magnetic field has a strong effect in his model.

  • PDF

Comparison of Machine Learning Techniques for Cyberbullying Detection on YouTube Arabic Comments

  • Alsubait, Tahani;Alfageh, Danyah
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.1-5
    • /
    • 2021
  • Cyberbullying is a problem that is faced in many cultures. Due to their popularity and interactive nature, social media platforms have also been affected by cyberbullying. Social media users from Arab countries have also reported being a target of cyberbullying. Machine learning techniques have been a prominent approach used by scientists to detect and battle this phenomenon. In this paper, we compare different machine learning algorithms for their performance in cyberbullying detection based on a labeled dataset of Arabic YouTube comments. Three machine learning models are considered, namely: Multinomial Naïve Bayes (MNB), Complement Naïve Bayes (CNB), and Linear Regression (LR). In addition, we experiment with two feature extraction methods, namely: Count Vectorizer and Tfidf Vectorizer. Our results show that, using count vectroizer feature extraction, the Logistic Regression model can outperform both Multinomial and Complement Naïve Bayes models. However, when using Tfidf vectorizer feature extraction, Complement Naive Bayes model can outperform the other two models.

Selecting the Right ERP System for SMEs: An Intelligent Ranking Engine of Cloud SaaS Service Providers based on Fuzziness Quality Attributes

  • Fallatah, Mahmoud Ibrahim;Ikram, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.35-46
    • /
    • 2021
  • Small and Medium Enterprises (SMEs) are increasingly using ERP systems to connect and manage all their functions, whether internally between the different departments, or externally with customers in electronic commerce. However, the selection of the right ERP system is usually an issue, due to the complexities of identifying the criteria, weighting them, and selecting the best system and provider. Because cost is usually important for SMEs, ERP systems based on Cloud Software as a Service (SaaS) has been adopted by many SMEs. However, SMEs face an issue of selecting the right system. Therefore, this paper proposes a fuzziness ranking engine system in order to match the SMEs requirements with the most suitable service provider. The extensive experimental result shows that our approach has better result compared with traditional approaches.

Experience of e-Learning during Lockdown for Students with Intellectual Disabilities

  • Alharthi, Emad M.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.33-38
    • /
    • 2022
  • This study examines the impact of e-learning on the educational level of students with intellectual disabilities from the viewpoint of their teachers. The study sample consisted of seven teachers: two working in primary school, two in middle school, and three in secondary school. The research applied a qualitative approach, using interviews with the participants. The results showed that the following are required for the effective use of e-learning: firstly, appropriate training courses need to be offered to teachers, students, and families and secondly, it is vital students are provided with the appropriate digital devices to maintain contact with their teachers. The study concludes by recommending the development of educational applications and/or programs capable of supporting teachers and students in their use of e-learning.

Cloud Computing Platforms for Big Data Adoption and Analytics

  • Hussain, Mohammad Jabed;Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.290-296
    • /
    • 2022
  • Big Data is a data analysis technology empowered by late advances in innovations and engineering. In any case, big data involves a colossal responsibility of equipment and handling assets, making reception expenses of big data innovation restrictive to little and medium estimated organizations. Cloud computing offers the guarantee of big data execution to little and medium measured organizations. Big Data preparing is performed through a programming worldview known as MapReduce. Normally, execution of the MapReduce worldview requires organized joined stockpiling and equal preparing. The computing needs of MapReduce writing computer programs are frequently past what little and medium measured business can submit. Cloud computing is on-request network admittance to computing assets, given by an external element. Normal arrangement models for cloud computing incorporate platform as a service (PaaS), software as a service (SaaS), framework as a service (IaaS), and equipment as a service (HaaS).

Teaching Assistants as a Prerequisite for Best Practice in Special Education Settings in Saudi Arabia

  • Bagadood, Nizar H.;Saigh, Budor H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.101-106
    • /
    • 2022
  • The Saudi Arabian Special Education Regulations define the role and requirements from teaching assistants within the educational process. Although all public special education programs are subject to such regulations, their implementation in practice sometimes appears contradictory. Therefore, special educators frequently encounter a range of problems when they fail to comply with such regulations. This article discusses how teaching assistants influence the teaching practices delivered to students with disabilities in special education settings. A qualitative case study approach was conducted using 22 semi-structured interviews. The results suggest a need to focus on the role of the teaching assistant in special education classes to ensure exposure to effective learning practices for students with disabilities. Based on these findings, a number of important implications for future practice, in terms adopting appropriate provisions are suggested.