• Title/Summary/Keyword: UMM

Search Result 279, Processing Time 0.016 seconds

Growing Hadiths Ontology

  • Alamri, Salah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.317-322
    • /
    • 2021
  • The modern technological era has brought about the Semantic Web. Ontologies are essential to achieve the vision of the Semantic Web. Ontologies enable machines to understand data. The Arabic Language currently does not have a significant presence on the Web. To achieve a comparable level of Arabic access to other important languages, further work is needed to build Arabic ontologies. A goal is to design and create a robust Arabic ontology that represents the concepts from a large and significant subset of Arabic. We use a source of Hadiths (prophet saying and deeds) from Riyadh As-Saliheen. Preliminary results are very promising.

The Impact of Convenience on Saudi Teachers and Supervisors for Using Online Professional Development in Saudi Arabia

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.389-395
    • /
    • 2022
  • This quantitative study explored the extent to which convenience enhances professional development (PD) online. The sample of the study consisted of 421 teachers and supervisors. Findings evinced that convenience stimulated online PD. Another salient finding is the absence of significant differences among participants' responses concerning position and gender. Nonetheless, a significant difference exists in the variable of teaching experience. Teachers with more than 26-year experience were motivated to use online PD, which evidently could be attributed to the convenience they had over teachers with fewer years of experience.

5th Generation Wireless Networks Security: Challenges and Solutions

  • Siddiq, Bashayer Ahmed Bin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.157-162
    • /
    • 2022
  • In reason of the high capacity and low latency, the 5G wireless networks used nowadays in many of life applications such as: remote surgery and guiding vehicle. The high requirements of 5G networks makes it more vulnerable for security threats and attacks. This paper presents some challenges faced by 5G networks and presets some of the security solutions.

ON AMR-ALGEBRA

  • AMIN, AMR K.
    • Journal of applied mathematics & informatics
    • /
    • v.40 no.5_6
    • /
    • pp.1105-1115
    • /
    • 2022
  • The main objective of this paper is to introduce the notion of AMR-algebra and its generalization, and to compare them with other algebras such as BCK, BCI, BCH, · · ·, etc. We show moreover that the K-part of AMR-algebra is an abelian group, and the weak AMR-algebra is also an abelian group and generalizes many known algebras like BCI, BCH, and G.

Gamification in Educational Institutions: Concepts and Difficulties

  • Bakhit Al-Salami, Sami Ben Shamlan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.208-216
    • /
    • 2022
  • This paper provides an account of gamification in education. Apart from its emergence, it clarifies how gamification differs from gaming and game-based learning. It also discusses the elements of gamification, its advantages and its principles. It also sketches the theoretical underpinning of the concept, the models, its various applications, and the obstacles to using it in the educational process.

The Historical Development of Consumer Protection

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.392-398
    • /
    • 2022
  • Consumers are continually in need of protection both locally and globally. The importance of providing consumer protection stems from the fact that the consumer represents the weaker party in the contractual process. This research focuses on examining the extent to which Saudi Law guarantees the protection of consumers using e-commerce from the expected legal problems such as antifraud locally and globally.

Consumer Protection in E-commerce: Synthesis Review of Related Books

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.413-419
    • /
    • 2022
  • To have a complete and comprehensive understanding of the research subject and to form an integrated legal framework for it, I have sought comprehensively to cover the major written literature on the issue under consideration. I also benefitted from a wide range of research and academic studies pertaining to the same topic, although that literature did not specifically address the issue of consumer rights in electronic contracting in the Saudi e-commerce system. Rather, it addressed only the civil and criminal protection of the consumer in e-commerce.

Gifted Students' Viewpoints on Using Educational Technology in their Schools in the Saudi Context

  • Alammari, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.245-249
    • /
    • 2022
  • This paper explored gifted students' perspectives on using educational technologies in their schools in the Saudi context. Adopting a descriptive research approach, a questionnaire was used to collect information from a sample of 196 gifted secondary school students in Jeddah. Findings showed that educational technology was used to a high degree, with an overall mean of 3.74 and 4.06 for the degree of importance of technological usage. Based on the findings, the researcher forwards some recommendations for effectively using such technologies to promote gifted students' abilities and talents.

Micro-Learning Concepts and Principles

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.327-329
    • /
    • 2022
  • Education is affected by technical and scientific developments. Progress in one of these areas leads give way to new educational methods and strategies. One of these advanced learning modes is what has been conventionally termed as Micro-learning (ML). It has emerged in educational technology as a result of advances in information technology as well as advances in research in memory, brain, and social-cognitive processes.In this paper, the researcher discusses micro-learning in terms of its concepts, tools, and associated concepts, advantages and disadvantages.

Didactic Games and Gamification in Education

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.417-419
    • /
    • 2022
  • This paper undertakes educational games and gamification, their features, importance, and integration into the educational process. Besides outlining features, benefits, and difficulties, it highlights the difference between gaming, gamification, and game-based learning. The article contends that game-based learning and gamification elements such as reward, completion, and cooperation develop students' positive attitudes toward the curriculum and boost their learning motivation.