• Title/Summary/Keyword: international network

Search Result 4,257, Processing Time 0.032 seconds

Deep Structured Learning: Architectures and Applications

  • Lee, Soowook
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.262-265
    • /
    • 2018
  • Deep learning, a sub-field of machine learning changing the prospects of artificial intelligence (AI) because of its recent advancements and application in various field. Deep learning deals with algorithms inspired by the structure and function of the brain called artificial neural networks. This works reviews basic architecture and recent advancement of deep structured learning. It also describes contemporary applications of deep structured learning and its advantages over the treditional learning in artificial interlligence. This study is useful for the general readers and students who are in the early stage of deep learning studies.

Growing Hadiths Ontology

  • Alamri, Salah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.317-322
    • /
    • 2021
  • The modern technological era has brought about the Semantic Web. Ontologies are essential to achieve the vision of the Semantic Web. Ontologies enable machines to understand data. The Arabic Language currently does not have a significant presence on the Web. To achieve a comparable level of Arabic access to other important languages, further work is needed to build Arabic ontologies. A goal is to design and create a robust Arabic ontology that represents the concepts from a large and significant subset of Arabic. We use a source of Hadiths (prophet saying and deeds) from Riyadh As-Saliheen. Preliminary results are very promising.

Review Of Some Cryptographic Algorithms In Cloud Computing

  • Alharbi, Mawaddah Fouad;Aldosari, Fahd;Alharbi, Nawaf Fouad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.41-50
    • /
    • 2021
  • Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

Wideband Rectangular Planar Monopole Antenna for OAM Wave Generation

  • Qasem, Nidal;Alamayreh, Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.55-59
    • /
    • 2021
  • Generating electromagnetic waves with Orbital Angular Momentum (OAM) properties is a fast-growing research subject in both radio and optics. This paper describes the generation of OAM carrying waves using a circular array of rectangular planar monopole antennas. The proposed design combines simplicity, compactness, and most importantly very wideband of operating frequencies (about 20-160 GHz, bandwidth ratio about 1:8) which makes it suitable for future applications.

The Viability of the Malaysian Penal Code in Handling Physical Damage Caused by Malware

  • Rahman, Rizal;Zakaria, Mohd Sophian
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.52-56
    • /
    • 2021
  • There is no assurance that malware could only cause virtual damage to computer programs and data as its potential is endless. However, legal provisions were earlier developed to cater to either a physical damage caused by a physical action or a virtual damage caused by a virtual action. When crossovers occur, it becomes quite uncertain as to how viable the current laws are in handling this matter. The author seeks to address the issue from the perspective of the laws of Malaysia.

The Impact of Convenience on Saudi Teachers and Supervisors for Using Online Professional Development in Saudi Arabia

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.389-395
    • /
    • 2022
  • This quantitative study explored the extent to which convenience enhances professional development (PD) online. The sample of the study consisted of 421 teachers and supervisors. Findings evinced that convenience stimulated online PD. Another salient finding is the absence of significant differences among participants' responses concerning position and gender. Nonetheless, a significant difference exists in the variable of teaching experience. Teachers with more than 26-year experience were motivated to use online PD, which evidently could be attributed to the convenience they had over teachers with fewer years of experience.

Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study

  • Hakami, Mazen;Alshaikh, Moneer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.299-309
    • /
    • 2022
  • Human factor represents a very challenging issue to organizations. Human factor is responsible for many cybersecurity incidents by noncompliance with the organization security policies. In this paper we conduct a comprehensive review of the literature to identify strategies to address human factor. Security awareness, training and education program is the main strategy to address human factor. Scholars have consistently argued that importance of security awareness to prevent incidents from human behavior.

Generic Multidimensional Model of Complex Data: Design and Implementation

  • Khrouf, Kais;Turki, Hela
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.643-647
    • /
    • 2021
  • The use of data analysis on large volumes of data constitutes a challenge for deducting knowledge and new information. Data can be heterogeneous and complex: Semi-structured data (Example: XML), Data from social networks (Example: Tweets) and Factual data (Example: Spreading of Covid-19). In this paper, we propose a generic multidimensional model in order to analyze complex data, according to several dimensions.

Gamification in Educational Institutions: Concepts and Difficulties

  • Bakhit Al-Salami, Sami Ben Shamlan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.208-216
    • /
    • 2022
  • This paper provides an account of gamification in education. Apart from its emergence, it clarifies how gamification differs from gaming and game-based learning. It also discusses the elements of gamification, its advantages and its principles. It also sketches the theoretical underpinning of the concept, the models, its various applications, and the obstacles to using it in the educational process.

The Historical Development of Consumer Protection

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.392-398
    • /
    • 2022
  • Consumers are continually in need of protection both locally and globally. The importance of providing consumer protection stems from the fact that the consumer represents the weaker party in the contractual process. This research focuses on examining the extent to which Saudi Law guarantees the protection of consumers using e-commerce from the expected legal problems such as antifraud locally and globally.