International Journal of Computer Science & Network Security
International Journal of Computer Science & Network Security (IJCSNS)
- Monthly
- /
- 1738-7906(pISSN)
Volume 22 Issue 12
-
Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha 1
Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks -
V., Zabolotnyuk;S., Khrypko;I., Ostashchuk;D., Chornomordenko;A., Timchenko;T., Motruk;K., Pasko;O., Lobanchuk 13
In the post-information era, most of technologies have a visual part, or at least some functions related to visualization. It is also one of the popular means of presenting materials in education area. However, despite its popularity, the impact of visualization on the effectiveness of learning still remains controversial. Even more controversial is its usefulness in developing creativity, which is one of the most important skills for today's employee. The authors considered the use of visualization as a tool for the development of children's creativity on the example of learning video games, in particular, ClassCraft to distinguish features that, from the point of view of psychology, may lead to developing creativity even being not useful for educational purposes. It is concluded that video games useful for learning may have features, that are inappropriate in formal educational context, but important to develop creative thinking. -
The study aimed to identify the impact of Applications of Internet of things on practice of knowledge management in organizations: the mediating role of employees' Engagement. A quantitative questionnaire survey is conducted. The study population consisted of all senior and middle administrations in small and medium enterprises in Jordan. The study sample consisted of (350) senior and middle administrations. The study sample was selected by random stratified method. The results revealed that There is an impact of Applications of Internet of things on the practice of knowledge management at (α ≤ 0.05) in the small and medium enterprises in Jordan. Furthermore, there is an impact of Applications of Internet of things on the employees' Engagement. The current study provided some important insights into an issue that requires further research. Understanding the applications of the Internet of Things and their impact on improving knowledge management is of paramount importance in raising the quality of products and improving the company's image, as shown in this research.
-
Smart grid (SG) software platforms and communication networks that run and manage the entire grid are increasingly concerned about cyber security. Characteristics of the smart grid networks, including heterogeneity, time restrictions, bandwidth, scalability, and other factors make it difficult to secure. The age-old strategy of "building bigger walls" is no longer sufficient given the rise in the quantity and size of cyberattacks as well as the sophisticated methods threat actor uses to hide their actions. Cyber security experts utilize technologies and procedures to defend IT systems and data from intruders. The primary objective of every organization's cybersecurity team is to safeguard data and information technology (IT) infrastructure. Consequently, further research is required to create guidelines and methods that are compatible with smart grid security. In this study, we have discussed objectives of of smart grid security, challenges of smart grid security, defensive cybersecurity techniques, offensive cybersecurity techniques and open research challenges of cybersecurity.
-
Omimah, Alsaedi;Omar, Batarfi;Mohammed, Dahab 37
Modern supply chains include multiple activities from collecting raw materials to transferring final products. These activities involve many parties who share a huge amount of valuable data, which makes managing supply chain systems a challenging task. Current supply chain management (SCM) systems adopt digital technologies such as the Internet of Things (IoT) and blockchain for optimization purposes. Although these technologies can significantly enhance SCM systems, they have their own limitations that directly affect SCM systems. Security, performance, and scalability are essential components of SCM systems. Yet, confidentiality and scalability are one of blockchain's main limitations. Moreover, IoT devices are lightweight and have limited power and storage. These limitations should be considered when developing blockchain-based IoT-SCM systems. In this paper, the requirements of efficient supply chain systems are analyzed and the role of both IoT and blockchain technologies in providing each requirement are discussed. The limitations of blockchain and the challenges of IoT integration are investigated. The limitations of current literature in the same field are identified, and a secure and scalable blockchain-based IoT-SCM system is proposed. The proposed solution employs a Hyperledger fabric blockchain platform and tackles confidentiality by implementing private data collection to achieve confidentiality without decreasing performance. Moreover, the proposed framework integrates IoT data to stream live data without consuming its limited resources and implements a dualstorge model to support supply chain scalability. The proposed framework is evaluated in terms of security, throughput, and latency. The results demonstrate that the proposed framework maintains confidentiality, integrity, and availability of on-chain and off-chain supply chain data. It achieved better performance through 31.2% and 18% increases in read operation throughput and write operation throughput, respectively. Furthermore, it decreased the write operation latency by 83.3%. -
In space based constellation network, users are allowed to enter or leave the network arbitrarily. Hence, the number, identities and transmitted data of active users vary with time and have considerable impacts on the receiver's performance. The so-called problem of multiuser detection means identifying the identity of each active user and detecting the data transmitted by each active user. Traditional methods assume that the number of active users is equal to the maximum number of users that the network can hold. The model of traditional methods are simple and the performance are suboptimal. In this paper a Maximum A Posteriori Probability (MAP) based multiuser detection method is proposed. The proposed method models the activity state of users as Markov chain and transforms multiuser detection into searching optimal path in grid map with BCJR algorithm. Simulation results indicate that the proposed method obtains 2.6dB and 1dB Eb/N0 gains respectively when activity detection error rate and symbol error rate reach 10-3, comparing with reference methods.
-
The Sambodana project is a mobile communication security system development project using Hardening Android. The initial idea for this project is that information leakage occurs outside of a communications application with end-to-end cryptographic security. Android hardening prevents unwanted applications and bloatware from being installed, such as unavailable Google Play Store or install restrictions.
-
Oleksandr, Makarenko;Inna, Levenok;Valentyna, Shakhrai;Liudmyla, Koval;Tetiana, Tyulpa;Andrii, Shevchuk;Olena, Bida 63
The essence of the definition of "tolerance" is analyzed. Motivational, knowledge and behavioral criteria for tolerance of future teachers are highlighted. Indicators of the motivational criterion are the formation of value orientations, motivational orientation, and the development of empathy. Originality and productivity of thoughts and judgments, tact of dialogue, pedagogical ethics and tact are confirmed as indicators of the knowledge criterion. The behavioral criterion includes social activity as a life position, emotional and volitional endurance, and self-control of one's own position. The formation of tolerance is influenced by a number of factors: the social environment, the information society, existing stereotypes and ideas in society, the system of education and relationships between people, and the system of values. The main factors that contribute to the education of tolerance in future teachers are highlighted. Analyzing the structure of tolerance, it is necessary to distinguish the following functions of tolerance: - motivational (determines the composition and strength of motivation for social activity and behavior, promotes the development of life experience, because it allows the individual to accept other points of view and vision of the solution; - informational (understanding the situation, the personality of another person); - regulatory (tolerance has a close connection with the strong - willed qualities of a person: endurance, selfcontrol, self-regulation, which were formed in the process of Education); - adaptive (allows the individual to develop in the process of joint activity a positive, emotional, stable attitude to the activity itself, which the individual carries out, to the object and subject of joint relations). The implementation of pedagogical functions in the information society: educational, organizational, predictive, informational, communicative, controlling, etc. provides grounds to consider pedagogical tolerance as an integrative personal quality of a representative of any profession in the field of "person-person". The positions that should become conditions for the formation of tolerance of the future teacher in the information society are listed. -
Asim Seedahmed Ali, Osman;Eman Galaleldin Ahmed, Kalil 71
Electronic measuring devices have an important role in agricultural projects and in various fields. Electronic measuring devices play a vital role in controlling and saving soil information. They are designed to measure the temperature, acidity and moisture of the soil. In this paper, a new methodology to manage irrigation and soil fertility using an electronic system is proposed. This is designed to operate the electronic irrigation and adds inorganic fertilizers automatically. This paper also explains the concept of remote management and control of agricultural projects using electronic soil measurement devices. The proposed methodology is aimed at managing the electronic irrigation process, reading the moisture percentage, elements of soil and controlling the addition of inorganic fertilizers. The system also helps in sending alert messages to the user when an error occurs in measuring the percentage of soil moisture specified for crop and a warning message when change happens to the fertility of soil as many workers find difficulty in daily checking of soil and operating agricultural machines such as irrigation machine and soil fertilizing machine, especially in large projects. -
Iryna, Lychenko;Natalia, Lesko;Nataliia, Pavliuk;Zoryana, Dobosh;Rostyslav, Bundz 79
The main purpose of the study is to identify the key aspects of legislative support standards in the countries of the European Union in the field of building a system of local self-government. The European Union during the history of its existence has developed a set of standards on which the systems of local self-government of the European Union member states and applicants for this status are built. The complexity and at the same time the importance of legislative regulation of the functioning of this system is evidenced by the fact that the legislation and principles of international law used by the European Union in the field of local self-government are among the "youngest". This is due to the role played by local self-government in the development of a democratic political system, as well as the search for an optimal balance between centralization and decentralization. Thus, the main task of the study is to analyze the legislative support standards in the countries of the European Union in the field of building a system of local self-government. As a result of the study, current trends and prerequisites for the legislative support standards in the countries of the European Union in the field of building a system of local self-government were investigated. -
Nataliia, Veselovska;Serhii, Krushynskyi;Oleh, Kravchuk;Olеksandr, Punda;Ivan, Piskun 85
The article is devoted to the consideration of the features of the application of criminal and legal countermeasures against cybercrime in the conditions of martial law. While conducting this research, we found an opportunity to formulate the author's recommendations for solving the most complex law enforcement problems, as well as to propose changes to the Criminal Code of Ukraine aimed at eliminating the flaws of the analyzed Law, the adoption of which will contribute to the achievement of higher efficiency of the relevant criminal law prescriptions. It is argued that the removal of the previously existing in the footnote of Art. 361 of the Criminal Code of a fundamentally important caveat regarding the fact that when assessing "significant damage", the mentioned property equivalent was to be taken into account only when such damage consisted in causing material damage, which led to a significant and unjustified narrowing of the scope of potential application of Part 4 of Article 361 of the Criminal Code. -
Olena, Dobosh;Daria, Koval;Natalya, Paslavska;Natalia, Cherednichenko;Iryna, Bondar;Oksana, Vytrykhovska;Olena, Bida 91
Analyzing the psychological and pedagogical literature, we showed the interest of researchers in the problem posed. The concept of competence is considered, which is interpreted as giving the key to solving a wide range of educational and life tasks. Research competence implies the ability to cooperate, enter into contacts, readiness for changes, for self-determination and is an integral quality of the individual, expressed in the readiness and ability to independently search for solutions to new problems and creative transformation of reality based on a set of personal and meaningful knowledge, skills, methods of activity and value attitudes.The article offers conditions that certify the improvement of forms and methods of training students in the formation of research competence of future specialists. The use of innovative technologies contributes to improving the level of training of future specialists: students are better prepared for classes, take an active part in the assimilation of program material in laboratory classes. It is noted that this creates a subject-subject relationship between the student and the teacher, and changes the attitude of students to classes. In the process of such organization of educational activities, students are convinced of the need for knowledge and its effectiveness, learn to compare, generalize, classify, establish cause-and-effect relationships, express opinions, defend their point of view, they ensure success in their studies, and develop research competence. It is proved that in order to apply the latest technologies, the teacher himself must know them well, that is, constantly improve himself, master new methods, techniques, ideas, which will help him create new pedagogical technologies and implement them in the educational process. -
A condition of the retina known as hypertensive retinopathy (HR) is connected to high blood pressure. The severity and persistence of hypertension are directly correlated with the incidence of HR. To avoid blindness, it is essential to recognize and assess HR as soon as possible. Few computer-aided systems are currently available that can diagnose HR issues. On the other hand, those systems focused on gathering characteristics from a variety of retinopathy-related HR lesions and categorizing them using conventional machine-learning algorithms. Consequently, for limited applications, significant and complicated image processing methods are necessary. As seen in recent similar systems, the preciseness of classification is likewise lacking. To address these issues, a new CAD HR-diagnosis system employing the advanced Deep Dense CNN Learning (DD-CNN) technology is being developed to early identify HR. The HR-diagnosis system utilized a convolutional neural network that was previously trained as a feature extractor. The statistical investigation of more than 1400 retinography images is undertaken to assess the accuracy of the implemented system using several performance metrics such as specificity (SP), sensitivity (SE), area under the receiver operating curve (AUC), and accuracy (ACC). On average, we achieved a SE of 97%, ACC of 98%, SP of 99%, and AUC of 0.98. These results indicate that the proposed DD-CNN classifier is used to diagnose hypertensive retinopathy.
-
Ashwaq A., Al-otaibi;Reem M., Alotaibi;Nermin, Hamza 107
Recently, big data applications need another database different from the Relation database. NoSQL databases are used to save and handle massive amounts of data. NoSQL databases have many advantages over traditional databases like flexibility, efficiently processing data, scalability, and dynamic schemas. Most of the current applications are based on the web, and the size of data is in increasing. NoSQL databases are expected to be used on a more and large scale in the future. However, NoSQL suffers from many security issues, and one of them is access control. Many recent applications need Fine-Grained Access control (FGAC). The integration of the NoSQL databases with FGAC will increase their usability in various fields. It will offer customized data protection levels and enhance security in NoSQL databases. There are different NoSQL database models, and a document-based database is one type of them. In this research, we choose the CouchDB NoSQL document database and develop an access control mechanism that works at a fain-grained level. The proposed mechanism uses role-based access control of CouchDB and restricts read access to work at the document level. The experiment shows that our mechanism effectively works at the document level in CouchDB with good execution time. -
Oksana, Vytrykhovska;Alina, Dmytrenko;Olena, Terenko;Iryna, Zabiiaka;Mykhailo, Stepanov;Tetyana, Koycheva;Oleksandr, Priadko 116
Information and communication technologies used in the social sphere are born due to the development of computer technologies. The main task of the distance learning process in higher education institutions is not to provide information, but to teach how to obtain and use it. The purpose of the article: to identify innovative approaches in the training of specialists in higher education institutions in the context of distance learning. Various innovative approaches to organizing the work of students of higher educational institutions in the context of distance learning are considered. Based on the conducted research, it is concluded that each of the approaches described by us outlines the study of the phenomenon of professional training of a specialist in the condition of distance learning. All the described approaches significantly contribute to the improvement of professional training of specialists, encourage students to self-improvement, professional development and enrich their professional competence in modern conditions. The emergence and spread of innovative technologies means not only a change in the activity itself and its inherent means and mechanisms of its implementation, but also a significant restructuring of goals, value orientations, specific knowledge, skills and abilities. Therefore, the current stage of the development of civilization, scientific and technological progress requires the emergence of such specialists who would have broad humanitarian thinking, would have good psychological training, would be able to build professional activities according to laws that take into account the relationship between economic productivity and creativity, as well as the desire of the individual for constant renewal, self-realization. Only such qualities will help you master the specifics of innovative technologies well. We see the prospects in the study of innovative approaches to training specialists in higher education institutions in the condition of distance learning in foreign countries. -
Egor, Trofimov;Oleg, Metsker;Georgy, Kopanitsa 125
The diversity and complexity of criminal, administrative and civil cases resolved by the courts makes it difficult to develop universal automated tools for the analysis and evaluation of justice. However, big data generated in the scope of justice gives hope that this problem will be resolved as soon as possible. The big data applying makes it possible to identify typical options for resolving cases, form detailed rules for the individualization of a court decision, and correlate these rules with an abstract provisions of law. This approach allows us to somewhat overcome the contradiction between the abstract and the concrete in law, to automate the analysis of justice and to model e-justice for scientific and practical purposes. The article presents the results of using dimension reduction, SHAP value, and p-value to identify, analyze and evaluate the individualization of justice and the differentiation of legal regulation. Processing and analysis of arrays of court decisions by computational methods make it possible to identify the typical views of courts on questions of fact and questions of law. This knowledge, obtained automatically, is promising for the scientific study of justice issues, the improvement of the prescriptions of the law and the probabilistic prediction of a court decision with a known set of facts. -
Ahd, Aljarf;Eman Noor, Al-Islam;Kawther, Al-shamrani;Nada, Al-Sufyini;Shatha Tariq, Bugis;Aisha, Sharif 132
Due to the impacts of the current pandemic COVID-19 and the continuation of studying online. There is an urgent need for an effective and efficient education platform to help with the continuity of studying online. Therefore, the question bank system (QB) is introduced. The QB system is designed as a website to create a single platform used by faculty members in universities to generate questions and store them in a bank of questions. In addition to allowing them to add two types of questions, to help the lecturer create exams and present the results of the students to them. For the implementation, two languages were combined which are PHP and Python to generate questions by using Artificial Intelligence (AI). These questions are stored in a single database, and then these questions could be viewed and included in exams smoothly and without complexity. This paper aims to help the faculty members to reduce time and efforts by using the Question Bank System by using AI and Natural Language Processing (NLP) to extract and generate questions from given text. In addition to the tools used to create this function such as NLTK and TextBlob. -
The study aimed to build a proposed program for training Social Studies teachers in the light of electronic functional competencies, the researcher used the experimental method with a quasi-experimental design, the study sample consisted of (37) Social studies teachers in Ismailia. A proposed program in the light of electronic functional competencies. A measure of awareness of the dimensions and components of electronic feasibility. The study concluded several results: There is a statistically significant difference at the level of (a ≤0.01) between the average scores of the teachers of the research group in the pre and post measurements of the measure of awareness of the dimensions and components of electronic functional competencies in favor of the teachers scores in the post-measurement. Training Social studies teachers on the functional electronic competencies necessary for them to keep up with educational developments.
-
Olha, Oseredchuk;Mykola, Mykhailichenko;Nataliia, Rokosovyk;Olha, Komar;Valentyna, Bielikova;Oleh, Plakhotnik;Oleksandr, Kuchai 146
The National Agency for Quality Assurance in Higher Education plays a crucial role in education in Ukraine, as an independent entity creates and ensures quality standards of higher education, which allow to properly implement the educational policy of the state, develop the economy and society as a whole. The purpose of the article: to reveal the crucial role of the National Agency for Quality Assurance in Higher Education to create quality management of higher education institutions, to show its mechanism as an independent entity that creates and ensures quality standards of higher education. and society as a whole. The mission of the National Agency for Quality Assurance in Higher Education is to become a catalyst for positive changes in higher education and the formation of a culture of its quality. The strategic goals of the National Agency are implemented in three main areas: the quality of educational services, recognition of the quality of scientific results, ensuring the systemic impact of the National Agency. The National Agency for Quality Assurance in Higher Education exercises various powers, which can be divided into: regulatory, analytical, accreditation, control, communication. The effectiveness of the work of the National Agency for Quality Assurance in Higher Education for 2020 has been proved. The results of a survey conducted by 183 higher education institutions of Ukraine conducted by the National Agency for Quality Assurance in Higher Education are shown. Emphasis was placed on the development of "Recommendations of the National Agency for Quality Assurance in Higher Education regarding the introduction of an internal quality assurance system." The international activity and international recognition of the National Agency for Quality Assurance in Higher Education are shown. -
Oksana, Popovych;Rostislav, Motsyk;Iryna, Mozul;Karina, Fedchenko;Andrii, Zhbanchyk;Olena, Terenko;Oleksandr, Kuchai 153
The article discusses the use of smart technologies in the training of future specialists. Today, learning using smart technologies is becoming a new educational standard, where information is presented in a logical sequence, computer training systems have powerful functions for the educational process. The functions of smart technologies are highlighted. It is noted that smart technologies are successfully used in the field of education and professional training. The concept of "smart education" is characterized. Smart education is an educational paradigm that underlies a new type of education system. The implementation of the smart education paradigm is aimed at the process of obtaining competencies and competencies for flexible and adapted interaction with the social, economic and technological environment. Smart education should ensure that the benefits of the global information society can be used to meet educational needs and interests. A special place is occupied by computer-based educational multimedia systems that allow you to deepen your knowledge, reduce the duration of training, and increase the number of students per teacher. The main principles of smart education are highlighted. Improving the efficiency of training in a modern higher education institution is impossible without the introduction of smart technologies in the organization of the educational process. -
Fatima Rayan Awad, Ahmed;Thowiba E., Ahmed;Rashid A., Saeed;Elmustafa Sayed, Ali;Ghada Elnour Elterafi, Abdelrhman;Somia Yousif Ahmed, Abutiraima 160
COVID pandemic has reshaped the world as it has been known to us and the education system is one of the most affected by it. Due to social distancing, quarantines and isolations have made it impossible for the knowledge transition to the masses using conventional methods. For cope with pandemic, the only other way available for some of the fortunate countries is the use of E-learning having somewhat the same traditional teaching method. This paper is concerned with the study of the preparedness of the learning system in some Sudanese universities due to the impact of the COVID-19 pandemic. Critical analysis has been performed to evaluate the current developing scenario, usage of the facilities available in open-source platforms, and the interaction of the universities folks with e-learning systems. The impact of such measures has been thoroughly investigated in this paper for Sudan which is already deprived of a proper education system. The investigation shows that the interact of the staff and the students with the system was acceptable where more than 85% of those enrolled to the system were interact properly and efficiently. The lecturers conducted through the platform were attended with more than 75% of the students. We also found that most of the lecturer were avoid to exam students by utilize the platform; where only 45% of the uploaded courses were conducted exams over Moodle platform. As Moodle is an open source and still need to be improved to be used for high examination credibility. -
Hana, Mujlid;Haneen Daifallah, Alghamdi;Hind Abdulaziz, Alkharashi;Marah Awadh, Alkhaldi 171
The number of people who own indoor plants is growing today, but as a result of their busy lifestyles-such as work or travel-as well as a lack of enthusiasm in caring for their plants, their plants wither. The use of an irrigation control system with a surveillance camera can assist such folks in taking care of their plants. Such a device can assist in remotely watering plants at predetermined times and checking on the health of the plants. The proprietors would be able to live comfortably without feeling bad thanks to this change. Internet access is required for this technology in order to monitor the plants and control the watering through apps. A sensor is installed in the soil to monitor soil humidity and send data to the microcontroller for irrigation, allowing the owner to schedule irrigation as they see fit and keep an eye on their plants all day. With the use of a remote irrigation control system, the plants will grow properly and be irrigated with the proper amount of water, and the owners will be so glad and delighted to watch their plants. Knowing the time and quantity of water are vital parts of the plant growth. -
Leonid, Serejkin;Boris, Shifrin;Victor, Perov;Alexandr, Goldin 178
Renewable energy sources based on solar radiation, wind energy, geothermal energy, and biomass energy have now reached the level of industrial application. A new way to generate electricity using low-potential heat is to install a hydro-steam turbine. In hydro-steam turbines, hot water is supplied directly to turbine rotor nozzles without prior separation into steam and water in separators, which significantly increases the efficiency of hot water energy use. Such turbines are suggested to be used as autonomous energy sources in geothermal heating systems, heating water boilers and cooling systems of chemical reactors, metallurgical furnaces, etc. The authors conclude that the installation of hydro-steam turbines in heating plants and process boiler plants can also be effective if the used exhaust steam-water mixture at the turbine outlet is used to heat the network water or as return water. -
Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio 185
The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory. -
Khaznah, Alhajri;Wala, Alsinan;Sahar, Almuhaishi;Fatimah, Alhmood;Narjis, AlJumaia;Azza., A.A 197
Sorting is an important data structure in many applications in the real world. Several sorting algorithms are currently in use for searching and other operations. Sorting algorithms rearrange the elements of an array or list based on the elements' comparison operators. The comparison operator is used in the accurate data structure to establish the new order of elements. This report analyzes and compares the time complexity and running time theoretically and experimentally of insertion, merge, and heap sort algorithms. Java language is used by the NetBeans tool to implement the code of the algorithms. The results show that when dealing with sorted elements, insertion sort has a faster running time than merge and heap algorithms. When it comes to dealing with a large number of elements, it is better to use the merge sort. For the number of comparisons for each algorithm, the insertion sort has the highest number of comparisons. -
Performing the rituals of Hajj and Umrah is an obligation of Allah Almighty to all Muslims from all over the world. Millions of Muslims visit the holy mosques in Makkah every year to perform Hajj and Umrah. One of the most important pillars in Performing Hajj/Umrah is Tawaf and Sa'ay. Tawaf finished by seven rounds around the holy house (Al-Kabaa) and Sa'ay is also seven runs between As-Safa and Al-Marwa. Counting/knowing the number of runs during Tawaf/Sa'ay is one of the difficulties that many pilgrims face. The pilgrim's confusing for counting (Tawaf/Sa'ay) rounds finished at a specific time leads pilgrims to stay more time in Mataff bowl or Masa'a run causing stampedes and more crowded as well as losing the desired time for prayers to get closer to Almighty Allah in this holy place. These issues can be solved using effective crowd management systems for Tawaf/Sa'ay pillars, which is the topic of this research paper. While smart devices and their applications are gaining popularity in helping pilgrims for performing Hajj/Umrah activities efficiently, little has been dedicated for solving these issues. We present an autonomous Mobile-based framework for guiding pilgrims during Tawaf/Sa'ay pillars with the aid of GPS for points tracking and rounds counting. This framework is specially designed to prevent and manage stampedes during Tawaf/Sa'ay pillars, by helping pilgrims automatically counting the rounds during Tawaf/Sa'ay with supported Supplications (in written/audio form with different languages) from the Quran and Sunna'a.
-
Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li 212
Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3. -
Aisha Bleyhesh, Al-Amri;Khaloud, Zainaddin;Abdulrahman Ahmed, Zahid;Jehan, Sulaimani 217
The study aimed to build an electronic strategy in innovative learning situations for the role of education in combating intellectual currents. A total of 525 Saudi university faculty members and general education teachers were surveyed using two electronic questionnaires. Arithmetic averages and standard deviations, One-way ANOVA, Scheffé's test, Pearson's correlation coefficient, and Cronbach's alpha stability coefficient were used as statistical methods. The study statistically identifies the differences between the study sample at the level of significance (0.05). and the design of a digital application for individual learning to combat deviant intellectual currents to activate them in light of Saudi Vision 2030 by combining the theoretical academic material and turning it into a learning e-game called (crosswords). The game is equipped with hyper media that supports education with entertainment to direct ideas towards the promotion of identity, the development of values towards moderation and the consolidation of intellectual security. Additionally, the learning e-game represents awareness messages in three short films to activate the role of curricula and intellectual awareness centers to apply realistically, innovatively, and effectively. -
Bh., Prashanthi;A.V. Praveen, Krishna;Ch. Mallikarjuna, Rao 229
Due to digitization, data has become a tsunami in almost every data-driven business sector. The information wave has been greatly boosted by man-to-machine (M2M) digital data management. An explosion in the use of ICT for farm management has pushed technical solutions into rural areas and benefited farmers and customers alike. This study discusses the benefits and possible pitfalls of using information and communication technology (ICT) in conventional farming. Information technology (IT), the Internet of Things (IoT), and robotics are discussed, along with the roles of Machine learning (ML), Artificial intelligence (AI), and sensors in farming. Drones are also being studied for crop surveillance and yield optimization management. Global and state-of-the-art Internet of Things (IoT) agricultural platforms are emphasized when relevant. This article analyse the most current publications pertaining to precision agriculture using ML and AI techniques. This study further details about current and future developments in AI and identify existing and prospective research concerns in AI for agriculture based on this thorough extensive literature evaluation. -
The study aimed to build a program in activities for early childhood students to develop some of the basic skills necessary for the age of artificial intelligence, to achieve the objectives of the study , the researcher used the experimental design, and the research sample consisted of 37 early childhood students. The study used the following tools: Experimental treatment subject: the proposed program in the activities, Measurement and evaluation tool: testing the basic skills needed for the age of artificial intelligence. The study concluded several results: There is a statistically significant difference (α≤0.05) between the average grades of the early childhood students in the research group in the tribal and remote measurements to test the basic skills necessary for the age of artificial intelligence in favor of the students grades in the dimensional measurements. Practical application of the study through benefiting from the proposed program of activities prepared in the current study in planning and implementing activities to develop the basic skills necessary for the age of artificial intelligence among early childhood students.
-
Permanand, Soothar;Hao, Wang;Zaheer Ahmed, Dayo;Falak, Naz;Badar, Muneer;Muhammad, Aamir 245
In this paper, a high gain, broadband planar vivaldi antenna (PVA) by utilizing a broadband stripline feed is developed for wireless communication for IoT systems. The suggested antenna is designed by attaching a tapered-slot construction to a typical vivaldi antenna, which improves the antenna's radiation properties. The PVA is constructed on a low-cost FR4 substrate. The dimensions of the patch are 1.886λ0×1.42λ0×0.026λ0, dielectric constant Ɛr=4.4, and loss tangent δ=0.02. The width of the feed line is reduced to improve the impedance bandwidth of the antenna. The computed reflection coefficient findings show that the suggested antenna has a 46.2% wider relative bandwidth calculated at a 10 dB return loss. At the resonance frequencies of 6.5 GHz, the studied results show an optimal gain of 5.82 dBi and 85% optimal radiation efficiency at the operable band. The optometric analysis of the proposed structure shows that the proposed antenna can achieve wide enough bandwidth at the desired frequency and hence make the designed antenna appropriate to work in satellite communication and medical internet of things (M-IoT) healthcare applications.