International Journal of Computer Science & Network Security
International Journal of Computer Science & Network Security (IJCSNS)
- Monthly
- /
- 1738-7906(pISSN)
Volume 23 Issue 2
-
S. Khrypko;Qi Yang;M. Kozlovets;I. Chornomordenko;M. Kolinko ;V. Havronenko;O. Lobanchuk;Н. Salo 1
The article examines the axiological psycho-philosophical understanding of the phenomenon of money and its value role in modern society. The traditional and virtual context of the representation of the money phenomenon is considered.Following the ideas of G. Simmel, the authors consider money not only as a purely economic, but also a psycho-philosophical, cultural and social phenomenon. Money appears as a result of cultural development of the world and gradually forms a monetary culture as a space of economic and social interaction of people. Under the influence of the monetary culture of one or another historical period, the character of a person's economic activity, values and life orientations are formed. Modern money culture is often called financial civilization. Peculiarities of modern monetary culture are studied, its main features and problems are determined in the article. The problem of the peculiarities of the constructive and destructive attitude of the individual towards money is identified; a psycho-philosophical and cultural-identification typology of people is described, which is based on clinical observations and interpreted through the prism of psychoanalytic theory. The concept of money is highlighted from the standpoint of a social-psychological approach. The theoretical foundations of money's influence on the decision-making process and human behavior are also revealed. -
Sawsan Alowa;Lama Alzahrani;Noura Alhakbani;Hend Alrasheed 13
Since the COVID-19 vaccine became available, people have been sharing their opinions on social media about getting vaccinated, causing discussions of the vaccine to trend on Twitter alongside certain events, making the website a rich data source. This paper explores people's perceptions regarding the COVID-19 vaccine during certain events and how these events influenced public opinion about the vaccine. The data consisted of tweets sent during seven important events that were gathered within 14 days of the first announcement of each event. These data represent people's reactions to these events without including irrelevant tweets. The study targeted tweets sent in Arabic from users located in Saudi Arabia. The data were classified as positive, negative, or neutral in tone. Four classifiers were used-support vector machine (SVM), naïve Bayes (NB), logistic regression (LOGR), and random forest (RF)-in addition to a deep learning model using BiLSTM. The results showed that the SVM achieved the highest accuracy, at 91%. Overall perceptions about the COVID-19 vaccine were 54% negative, 36% neutral, and 10% positive. -
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.
-
The purpose of this study is to introduce a proposed Framework for Evaluating the Return on Investment (ROI) of E-Learning Programs at Saudi Universities. To achieve this goal, the descriptive analysis methodology is used to analyze the literature review about e-learning and its evaluation from different viewpoints, especially from the ROI-related perspective. As well as the literature reviews related to ROI and the methods of calculating it inside society institutes. This study suggests a conceptual framework for evaluating the ROI of E-Learning Programs at Saudi Universities. This framework is based on the merging process among the analyze, design, develop, implement, and evaluate (ADDIE) model for designing e-learning programs, which gives detailed procedures for executing the program, several evaluating models for e-learning, and the Kirkpatrick model for evaluating the ROI of e-learning. It consists of seven stages (analysis, calculating the costs, design, development, implementation, calculation of the benefits, and calculation of the final ROI).
-
Consciousness, Cognition and Neural Networks in the Brain: Advances and Perspectives in NeuroscienceThis article reviews recent advances and perspectives in neuroscience related to consciousness, cognition, and neural networks in the brain. The neural mechanisms underlying cognitive processes, such as perception, attention, memory, and decision-making, are explored. The article also examines how these processes give rise to our experience of consciousness. The implications of these findings for our understanding of the brain and its functions are presented, as well as potential applications of this knowledge in fields such as medicine, psychology, and artificial intelligence. Additionally, the article explores the concept of a quantum viewpoint concerning consciousness, cognition, and creativity and how incorporating DNA as a key element could reconcile classical and quantum perspectives on human behaviour, consciousness, and cognition, as explained by genomic psychological theory. Furthermore, the article explains how the human brain processes external stimuli through the sensory nervous system and how it can be simulated using an artificial neural network (ANN) consisting of one input layer, multiple hidden layers, and an output layer. The law of learning is also discussed, explaining how ANNs work and how the modification of weight values affects the output and input values. The article concludes with a discussion of future research directions in this field, highlighting the potential for further discoveries and advancements in our understanding of the brain and its functions.
-
Zakir Hussain Ahmed;Majid Yousefikhoshbakht;Abdul Khader Jilani Saudagar;Shakir Khan 55
The travelling salesman problem (TSP) is an important combinatorial optimization problem that is used in several engineering science branches and has drawn interest to several researchers and scientists. In this problem, a salesman from an arbitrary node, called the warehouse, starts moving and returns to the warehouse after visiting n clients, given that each client is visited only once. The objective in this problem is to find the route with the least cost to the salesman. In this study, a meta-based ant colony system algorithm (ACSA) is suggested to find solution to the TSP that does not use local pheromone update. This algorithm uses the global pheromone update and new heuristic information. Further, pheromone evaporation coefficients are used in search space of the problem as diversification. This modification allows the algorithm to escape local optimization points as much as possible. In addition, 3-opt local search is used as an intensification mechanism for more quality. The effectiveness of the suggested algorithm is assessed on a several standard problem instances. The results show the power of the suggested algorithm which could find quality solutions with a small gap, between obtained solution and optimal solution, of 1%. Additionally, the results in contrast with other algorithms show the appropriate quality of competitiveness of our proposed ACSA. -
Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.
-
To find research that concentrated on the use of augmented reality to address issues with teaching abstract concepts, several international databases were examined. Thirty research, published between the years (2013-2022), were analyzed to determine the many functions of augmented reality in resolving issues with abstract notions. These studies discovered numerous roles, which are listed below. The use of augmented reality in the following areas: the simplification of abstract ideas, the embodiment of abstract ideas, the enrichment of examples of abstract ideas, the resolution of conceptual misunderstandings, the stimulation of interest in learning abstract ideas, and more, and the research ended with the presentation of the conclusions.
-
Islam abdalla mohamed;Loay F. Hussein;Anis Ben Aissa;Tarak kallel 89
Cloud computing today provides huge computational resources, storage capacity, and many kinds of data services. Data sharing in the cloud is the practice of exchanging files between various users via cloud technology. The main difficulty with file sharing in the public cloud is maintaining privacy and integrity through data encryption. To address this issue, this paper proposes an Enhanced RSA encryption schema (ERSA) for data sharing in the public cloud that protects privacy and strengthens data integrity. The data owners store their files in the cloud after encrypting the data using the ERSA which combines the RSA algorithm, XOR operation, and SHA-512. This approach can preserve the confidentiality and integrity of a file in any cloud system while data owners are authorized with their unique identities for data access. Furthermore, analysis and experimental results are presented to verify the efficiency and security of the proposed schema. -
In this paper, each inconsistency management process activities was addressed. In addition, a guideline to deal with inconsistency by viewpoints method are introduced. At the end of the paper you should have clear idea to support inconsistency management in future research and having good knowledge of inconsistency management process activities and research issues. Moreover, it gives the researcher ability to design new framework by using powerful concept in inconsistency management and viewpoint techniques. The paper is organized as follows: an introduction is presented in section one, section two contains process viewpoint, while section three includes the proposed model and conclusions are in section four.
-
Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen 101
Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers. -
Loay F. Hussein;Islam Abdalla Mohamed Abass;Anis Ben Aissa;Mishaal Hammoud Al-Ruwaili 111
Due to the car's central role in modern life, the industry has become more fiercely competitive, with each manufacturer doing everything it can to attract buyers with features like plush interiors, comprehensive warranties, and helpful customer service departments. Customers may not have the luxury of buying a new car, so they will have to buy a used car. Nevertheless, in most cases, the customer (car driver) may be deceived about the vehicle information and history and thus will be confused in making his/her decision to purchase. In addition, after all attempts to obtain vehicle information (plate number, model, year of manufacture, number of maintenance times, accidents, etc.), the customer's many attempts may fail. In general, the government records and verifies the information of all cars, even those that pass through their borders. However, there might still be some trouble in obtaining this information. From this standpoint, we will design a website that makes it easier for car drivers, car companies and governments to carry out all the above-mentioned processes. It will also allow users, whether a driver or a car company, to inquire about all vehicle information through detailed and integrated reports on its condition since its entry into the Kingdom of Saudi Arabia until the present time, in addition to information supported by numbers and statistics to ensure the integrity and reliability of the information. This platform will save the trouble of searching for car information for drivers and car companies. It will also help governments keep track of the information of all cars entering and leaving the Kingdom of Saudi Arabia, which will contribute to facilitating the process of viewing the history of any car that has previously entered the Kingdom's borders. -
Muhammad Faraz Hyder;Muhammad Umer Farooq;Mustafa Latif;Faizan Razi Khan;Abdul Hameed;Noor Qayyum Khan;M. Ahsan Siddiqui 126
Web technology is evolving with the passage of time, from a single node server to high availability and then in the form of Kubernetes. In recent years, the research community have been trying to provide high availability in the form of multi master cluster with a solid election algorithm. This is helpful in increasing the resources in the form of pods inside the worker node. There are new impact of known DDoS attack, which is utilizing the resources at its peak, known as Yoyo attack. It is kind of burst attack that can utilize CPU and memory to its limit and provide legit visitors with a bad experience. In this research, we tried to mitigate the Yoyo attack by introducing a firewall at load-balancer level to prevent the attack from going to the cluster network. -
As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a quantitative method for analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.
-
Meriem DRISSI;Nabil BENJELLOUN;Philippe DESCAMPS;Ali GHARSALLAH 140
With the rapid growth of new users and massive need for very high data rate in 5G communications system, different technologies have been developed and applied to enhance communication efficiency. One of those technologies is the MISO, MISO and MIMO which transmits and receives information with more reliability by using multiple antennas on transmitter or/and receiver side. This paper presents the latest trends in 5G telecommunications system based on software defined radio, A novel low-cost SIMO, MISO and MIMO using flexibility between USRP and Simulink is implemented tested and validated. -
The article reviews the quality of information on the Internet in general and health information in particular, where the accumulation and steady increase of information available on the Internet, without concern for its quality or importance, and regardless of the target audience, in addition to the lack of evidence of its credibility such as the availability of the name of the editor and references, and the availability of the name of an academic or research body responsible for that information. Add to this the lack of bibliographic data that can help infer the novelty of the information, and verify the element of trust in it . The problem is exacerbated with regard to the health information available on the Internet, due to its danger resulting from the presence of false health information that may cause danger to human health if relied upon. Through this article, the researcher proposes criteria that can help users search for information to measure the degree of quality, trust, and credibility of information in general and health information available on the Internet in particular.
-
Osama Mohamed Ahmed Salem;Mohammed bin Muthayb Al-Baqami 152
This research aimed at investigating Islamic Studies teachers' attitudes towards utilizing virtual learning environment in distance teaching among primary stage pupils. It also aimed at determining the statistical differences among variables due to sex, educational qualification, number of years of experience, and training sessions. This research adopted the descriptive approach. The sample consisted of male and female primary teachers of Islamic Studies (N=250) in governmental schools in Taif. The questionnaire was used as a main research tool. It included (20) items. Results showed that Islamic Studies teachers' attitudes towards utilizing virtual learning environment in distance teaching among primary stage pupils were ranked to a medium degree. There was a statistically significant difference among primary Islamic Studies teachers' attitudes due to sex variable. It was recommended to adopt more training sessions and seminars for adopting the idea of utilizing virtual learning environments among Islamic Studies teachers at boys' and girls' school in Mecca through emphasizing its significance and benefits in Teaching. -
Sharing power data between electrical power grids is crucial in energy management. The multi-agent approach has been applied in various applications to improve the development of complex systems by making them both independent and collaborative. The smart grid is one of the most intricate systems that requires a higher level of independence, reliability, protection, and adaptability to user requests. In this paper, a multi-agent system is utilized to share knowledge and tackle challenges in smart grids. The shared information is used to make decisions that aid in power distribution management within the grid and with other networks. The proposed multi-agent mechanism improves the reliability of the power system by providing the necessary information at critical times. The results indicate that the multi-agent system operates efficiently and promptly, making it a highly promising candidate for smart grid management.
-
Omar Abdulrahmanal Alattas Alhashmi;Mohd Faizal Abdullah;Raihana Syahirah Abdullah 173
The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries. -
Mohammed S. Ahmed;Mohamed Tarek El-Wakad;Mohammed A. Hassan 183
Radiofrequency ablation (RFA) is an alternative treatment for liver cancer to the surgical intervention preferred by surgeons. However, the main challenge remains the use of RF for the ablation of large tumours (i.e., tumours with a diameter of >3 cm). For large tumours, RFA takes a large duration in the ablation process compared with surgery, which increases patient pain. Therefore, RFA for large tumours is not preferred by surgeons. The currently materials used in RF electrodes, such as the nickeltitanium alloy (nitinol), are characterized by low thermal and electrical conductivities. On the other hand, the use of materials that have high thermal and electrical conductivities, such as titanium aluminide alloy (gamma titanium), produces more thermal energy for tumours. In this paper, we developed a cool-tip RF electrode model that uses nickel-titanium alloy and replaced it with titanium aluminide alloy by using the finite element model (FEM). The aim of this paper is to study the effect of the thermal and electrical conductivities of gamma titanium on the ablation volume. Results showed that the proposed design of the electrode increased the ablation rate by 1 cm3 /minute and 6.3 cm3/10 minutes, with a decrease in the required time ablation. Finally, the proposed model reduces the ablation time and damages healthy tissue while increasing the ablation volume from 22.5% cm3 to 62.5% cm3 in ten minutes compared to recent studies. -
Viktoriya L. Pogrebnaya;Natalia O. Kodatska;Viktoriia D. Khurdei;Vitalii M. Razzhyvin;Lada Yu. Lichman;Hennadiy A. Senkevich 193
The article focuses on the areas of education activities in using techniques for teaching and learning with information and communication technologies (ICTs), researching and analyzing the available ICTs, gearing the technologies to the specific psychological and pedagogical conditions, independently building and modeling ICTs, enlarging and developing their use in the learning environment. The visualization of scientific research has been determined to be part of the educational support for building students' ICT competence during teaching and learning and is essential to the methodology culture. There have been specified main tasks for pedagogy technologies (PTs) to develop the skills of adaptability to the global digital space in students, their effective database operation and using the data bases as necessary elements for learning and as part of professional training for research. We provided rationalization for implementing the latest ICTs into the Ukrainian universities' curricula, as well as creating modern methods for using the technologies in the learning / teaching process and scientific activities. -
Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. Automated testing can help to quickly identify CRLF vulnerabilities, and is particularly useful for companies to test their applications before releasing them. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Security automation is an important issue for companies trying to protect themselves against security threats. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance their security.
-
Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi 203
The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment. -
It is difficult to transform a blockchain initiative from the feasibility stage to the fully commercialized the technology's products or services, especially considering the significant investment required and the lack of studies on the benefits and barriers from deployment perspective. Whereas some organizations have come up with their own solutions to moving beyond the feasibility stage, commercial applications do not yet exist and few organizations are willing to invest beyond the prototype phase and fill in the gap between the expected and actual business value of these types of projects. This study aims to develop a blockchain model using a survey to gather qualitative data on experts' opinions on the deployment of blockchain technology. Our model will measure how business professionals could take advantage of blockchain's disruptive technology to develop business opportunities. This study's contribution is to show blockchain technology's potential strategic business value. The findings from this exploration include the prospective for delivering comprehensions to businesses for different creating investment choices on the embracing of the blockchain technology.
-
The research aims to identify the degree of the organizational citizenship, satisfaction and performance quality of the teachers and relationship between organizational citizenship, job satisfaction and performance quality for physical education teachers . The researcher used the descriptive method, The participants were (195) teachers. The researcher conducted the research main study in the period from 05/12/2022 to 30/12/2022 use the website to distribute and collect the questionnaire: https://www.surveymonkey.com. The researcher used the computer in the statistical processing, using the SPSS statistical program, and the following methods: Mean, SD, percentages, Correlation Coefficient, Alpha Cronbach coefficient, differences Indicator using chi2 . Conclusions: There is high degree of organizational citizenship behavior practices, job satisfaction and performance quality for some teachers at the schools. Recommendation the importance of enhancing the organizational citizenship behavior in schools, according to the positive effects of these behaviors on the individual and group performances.