• 제목/요약/키워드: Umm Al-Qura University

검색결과 240건 처리시간 0.026초

Side-Channel Attacks Detection Methods: A Survey

  • Assaeedi, Joanna;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.288-296
    • /
    • 2022
  • Side-channel attacks are a quiet mighty type of attack that targets specific physical implementations vulnerabilities. Even though several researchers have examined diverse means and methods of detecting side-channel attacks, at the present time a systematic review of these approaches does not exist. The purposes of this paper are to give an extensive analysis of literature on side-channel attack detection and offer intuitiveness from past research studies. In this study, a literature survey is conducted on articles related to side-channel attack detection between 2020 and 2022 from ACM and IEEE digital libraries. From the 10 publications included in the study, it appears they target either a single type of side-channel attacks or multiple types of side-channel attacks. Therefore, a vital review of each of the two categories is provided, as well as possible prospective research in this field of study.

A Survey on Cloud Storage System Security via Encryption Mechanisms

  • Alsuwat, Wejdan;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.181-186
    • /
    • 2022
  • Cloud computing is the latest approach that is developed for reducing the storage of space to store the data and helps the quick sharing of the data. An increase in the cloud computing users is observed that is also making the users be prone to hacker's attacks. To increase the efficiency of cloud storage encryption mechanisms are used. The encryption techniques that are discussed in this survey paper are searchable encryption, attribute-based, Identity-based encryption, homomorphic encryption, and cloud DES algorithms. There are several limitations and disadvantages of each of the given techniques and they are discussed in this survey paper. Techniques are found to be effective and they can increase the security of cloud storage systems.

Application of Topic Modeling Techniques in Arabic Content: A Systematic Review

  • Maram Alhmiyani;Huda Alhazmi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.1-12
    • /
    • 2023
  • With the rapid increase of user generated data on digital platforms, the task of categorizing and classifying theses huge data has become difficult. Topic modeling is an unsupervised machine learning technique that can be used to get a summary from a large collection of documents. Topic modeling has been widely used in English content, yet the application of topic modeling in Arabic language is limited. Therefore, the aim of this paper is to provide a systematic review of the application of topic modeling algorithms in Arabic content. Using a well-known and trusted databases including ScienceDirect, IEEE Xplore, Springer Link, and Google Scholar. Considering the publication date from 2012 to 2022, we got 60 papers. After refining the papers based on predefined criteria, we resulted in 32 papers. Our result show that unfortunately the application of topic modeling techniques in Arabic content is limited.

The Effectiveness of a Training Program based on the Social Story Strategy for Developing Self-Determination Skills among Students with Autism Spectrum Disorder

  • AL haosawi, Amal H.;Sharadqah, Maher T.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.149-156
    • /
    • 2022
  • The study aimed to identify the effectiveness of the training program based on the social story strategy for developing self-determination skills among students with autism spectrum disorder. The population of the study consisted of all students with autism spectrum disorder in the Desired Hope Association for People with Disabilities in Makkah Al-Mukarramah and the sample of the study consisted of (6) students. The study used the quasi-experimental approach with one group. To achieve the objectives of the study, the ARCS scale for self-determination skills was used, Hassan Al-Masry (2018). The results of the study revealed, through comparing the students' performances in their pre and post-tests regarding to the ARKS scale and through their answers on the scale, the effectiveness of the training program based on the social story for developing the skills of self-determination among students with autism spectrum disorder. The results also showed that there were statistically significant differences after applying the program when significance level was (0.001). The result came in favor of the post-test.

Effects of Tobacco Smoking on the Dorsum of the Tongue and Buccal Epithelium

  • Al Shammari, Abdullah Faraj;AL Ibrahim, Ibrahim Khalil;Alaauldeen, Amjad Ibrahim;Merza, Randa Fouad;Ahmed, Hussain Gadelkarim
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제17권10호
    • /
    • pp.4713-4718
    • /
    • 2016
  • Objective: The aim of this study was to assess the effects of tobacco smoking on the dorsum of the tongue and buccal epithelium. Methodology: This case control cross-sectional study was conducted with 174 smoking and non-smoking volunteers living in the city of Hail, Northern KSA. Cytological Materials were obtained from buccal mucosa and dorsum of the tongue, and assessed using cytopathological methods. Results: In buccal smears, cytological atypia was observed in 17 out of 101 (16.8%) smoker cases but only 3/73(4.1%) of the controls. For cytological atypia in buccal and tongue smears, the adjusted odd ratio (OR) and the 95% confidence interval (CI) were found to be 4.7 (1.3-16.8), P < 0.016)) and 4.3 (0.93- 20.2), P <0.06)), respectively, in the two sites. Conclusion: Tobacco smoking is a major risk factor for occurrence of cytological atypia, which might subsequently develop into oral precancerous and cancerous lesions. Oral exfoliative cytology is an easy and cheap non-invasive procedure which appears highly suitable for screening populations at risk of developing oral cancer.

ON EXTREMALLY DISCONNECTED SPACES VIA m-STRUCTURES

  • Al-Omari, Ahmad;Al-Saadi, Hanan;Noiri, Takashi
    • 대한수학회논문집
    • /
    • 제34권1호
    • /
    • pp.351-359
    • /
    • 2019
  • In this paper, we introduce a modification of extremally disconnected spaces which is said to be m-extremally disconnected. And we obtain many characterizations of m-extremally disconnected spaces. The concepts of ${\ast}$-extremally disconnected spaces, ${\ast}$-hyperconnected spaces, and generalized hyperconnectedness are as examples for this paper.

SEMISIMPLE INJECTIVE COMODULE

  • AMR AMIN;NASR ZEYADA
    • Journal of applied mathematics & informatics
    • /
    • 제41권4호
    • /
    • pp.831-838
    • /
    • 2023
  • In this paper, we define the concept of a semisimple injective comodule. We show that it is a generalization of some known comodules, and we give a useful characterization of this notion. Finally, we obtain a new characterization of simple semiartinian coring using semisimple injective comodules.

Information Seeking Behaviour of Distance Learners: What has Changed During the Covid-19?

  • Alturki, Ryan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.182-192
    • /
    • 2022
  • All the aspects of human life have been affected by the novel coronavirus (Covid-19). It has rapidly spread in most countries including the Kingdom of Saudi Arabia. As a result, early precautionary actions aiming to minimise the virus effect are taken by the Saudi government. One of these actions is the sudden shift to online classes and suspending the attendees to all educational institutes. Such immediate change can have a significant effect on the educational process, especially for students. One can argue that students' information-seeking behaviour within the current situation can affect their learning quality and outcomes. Therefore, this paper examines the Saudi students' information-seeking behaviour by taking a sample of students from Umm Al-Qura University. A descriptive analysis is conducted with 193 students and two approaches are used to collect data, questionnaire and semi-structured interview. The results showed that the majority of students face difficulties when searching and retrieving e-resources from the university library website. The problems range from mainly poor User Experience (UX), network connection, multiple errors and lack of subscription with academic publishers.

The Effect of an Educational Program Based on the 3D Glasses as a Technological Innovation on the Academic Achievement and Attitude towards E-Learning

  • Osama Mohamed Ahmed Salem;Noheir Taha Hassan Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.169-186
    • /
    • 2023
  • The research aimed to identify the effectiveness of an educational program using 3D glasses as a technological innovation on academic achievement and attitude towards elearning in science in the preparatory stage. The research relied on the analytical descriptive approach and the semi-experimental approach. The research tools were the achievement test and the scale of attitude towards e-learning. An educational program was designed and produced using 3D glasses. The study sample consisted of 60 students from the second grade in the preparatory stage at the Rural Jeddah School. The research concluded to the following results: There was a satistically sigificant difference at the level of sig. (0.05) among the -mean scores of the experiemtal and control group students in the post assessment atthe level of achievement in favor of the experiemental group and therewas a satistically sigificant difference at the level of sig. (0.05) among mean scores of the experiemtal and control group students in the post assessment at the level of attitude towards e-learning in favor of the experiemental group. And it was found that the positive effect of the 3D educational program for improving the level of achievement and the attitude towards e-learning for the students. The program allowed the experimental group students to practice self-learning, interaction, and achievement according to the individual differences among them.

New Cellular Neural Networks Template for Image Halftoning based on Bayesian Rough Sets

  • Elsayed Radwan;Basem Y. Alkazemi;Ahmed I. Sharaf
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.85-94
    • /
    • 2023
  • Image halftoning is a technique for varying grayscale images into two-tone binary images. Unfortunately, the static representation of an image-half toning, wherever each pixel intensity is combined by its local neighbors only, causes missing subjective problem. Also, the existing noise causes an instability criterion. In this paper an image half-toning is represented as a dynamical system for recognizing the global representation. Also, noise is reduced based on a probabilistic model. Since image half-toning is considered as 2-D matrix with a full connected pass, this structure is recognized by the dynamical system of Cellular Neural Networks (CNNs) which is defined by its template. Bayesian Rough Sets is used in exploiting the ideal CNNs construction that synthesis its dynamic. Also, Bayesian rough sets contribute to enhance the quality of the halftone image by removing noise and discovering the effective parameters in the CNNs template. The novelty of this method lies in finding a probabilistic based technique to discover the term of CNNs template and define new learning rules for CNNs internal work. A numerical experiment is conducted on image half-toning corrupted by Gaussian noise.