Sarah Abdulkhaleq Ali Sallam, Intesar Yahya Hussin
{"title":"Prevalence of awareness Hazards and Dependence of Smartphone Usage among Students of the Faculty of Computer and Information Technology at Sanaa University: مدى انتشار الوعي بمخاطر استخدام الهاتف الذكي والاعتماد عليه بين طلاب كلية الحاسوب وتكنولوجيا المعلومات بجامعة صنعاء","authors":"Sarah Abdulkhaleq Ali Sallam, Intesar Yahya Hussin","doi":"10.26389/ajsrp.s190819","DOIUrl":"https://doi.org/10.26389/ajsrp.s190819","url":null,"abstract":" Background: Mobile phone addiction is a type of technological addiction. With regard to large number of mobile users especially among college students in Yemen, dependence of mobile phone is attracting increasing concern. This study examines validity and reliability of the Yemeni college student version of mobile phone addiction scale in college students. Object: To study the addiction behavior and awareness of mobile phone on Electromagnetic Radiation (EMR) among a college student sample. Material and method: A cross-sectional study was conducted among undergraduate college students aged ≥18 years studying at Sana’a University, Sana’a, Yemen, from November 1st 2017 until Feb 2nd, 2018.A pretested self-administered questionnaire was used for data collection. The study instrument comprised eight segments, namely, informed consent information, consent acceptance page, demographic details, habituation, mobile phone fact and EMR, mobile phone awareness, psychomotor analysis, Data analyzed using IBM SPSS Version 17. Results: Totally, 204 individuals participated in the study, of which 42.3% were males and 57.7% were females, between the age group of 20 ->31 years. Nearly 75.9% of the respondents were between the age group of 21 and 25 years. The mean age of the study participants was 22.88 (standard error = 0.24) years.. Around 55%of the study participants use mobile phone for an hour (approximately) and remaining use it for more than an hour. Nearly36.7% checking mobile phones in between sleep, while 27.1% felt inconvenience with mobile phone use. Majority using mobile phone for communication purposes (87.8%), photo shooting (59.7%), entertainment (58.2%), and educational purposes (43.8%). The study results indicate that 86.8% of the participants are aware about EMR and 82.6% of the study participants are aware about the dangers of EMR. Conclusion: Mobile phone use with increasing adoption promotes an addiction-like behavior that is evolving a public health problem in a large proportion in Yemen.","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"236 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77137046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logistic planning for industrial cities in Jeddah using geometrics techniques: التخطيط اللوجستي لمواقع المدن الصناعية في محافظة جدة باستخدام تقنيات الجيوماتكس","authors":"Nada Soliman Abdulaziz Al - Khalifi Al – Enezi","doi":"10.26389/ajsrp.n300419","DOIUrl":"https://doi.org/10.26389/ajsrp.n300419","url":null,"abstract":"This study examined the spatial distribution of the industrial cities in Jeddah governorate, as well as the phases of the industrial cities and the reasons for their development. The study also examined the relationship between the sites of the industrial cities and the transportation methods, and reached through the logistical planning of many proposals for the industrial cities. The study was based on Jeddah satellite satellite Landsat for the year 1440 H / 2018, as well as on geomatics techniques through two programs (Erdas Imagine 2014 / Arcmap10.5). The study concluded with a number of results, the most important of which is that Jeddah has the largest share of the industrial cities with 4 industrial cities. The study recommended distinguishing the new industrial zones with a green belt and setting the penalties so as not to be infringed and thus interfering between the urban scope and the industrial use. In addition to attract investors and stimulate the industrial market through the establishment of facilities for the investor such as loans and assistance in the means of transport for industrial products. The study recommended benefiting from the proposals and urging researchers to activate the role of scientific techniques in solving the problems of urban planning.","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77327757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation and Comparison of GRP and OLSR Routing Protocols for Video Streaming Over Mobile Ad Hoc Networks Using OPNET 14.5: مقارنة وتقييم الأداء لبروتوكولات التوجيه (GRP، OLSR) في إرسال الفيديو عبر الشبكات الخاصة المتنقلة باستخدام OPNET 14.5","authors":"Hanadi Yahya Darwisho","doi":"10.26389/ajsrp.h050819","DOIUrl":"https://doi.org/10.26389/ajsrp.h050819","url":null,"abstract":" Due to the increased use of mobile devices with the high demand for applications such as video application, most companies have tended to pay attention to Mobile Ad hoc Networks. This type of network is characterized by multi-hop wireless networks where data packets are sent in a \"store and forward\" manner from the source to an arbitrary destination via intermediate nodes. The mobile nodes are connected by multi-routes routing as the nodes in this network not only serve as hosts but also as routers where data is routed to and from other nodes in the network and therefore the mobile node not only sends its data packets but also sends data packets of other mobile nodes. The network architecture changes dynamically, mainly because of Mobility of nodes, so we need routing protocols to establish the connection. Routing protocols are categorized into proactive routing protocols, reactive routing protocols and hybrid routing protocols. So in this research, we has been studied Geographical Routing Protocol (GRP ), Optimized Link State Routing Protocol (OLSR) routing protocols which is one of proactive routing protocols and hybrid routing protocols respectively on the basis of Throughput, Delay and Load..etc and evaluated the performance in a large mobile ad hoc network and in a small mobile ad hoc network as well as for different video resolutions, the OPNET 14.5 network simulator was used to obtain research results. It was found that the GRP protocol performs better for a small number of nodes whether the video resolution is low or high while its performance decreases when the number of nodes increases in the network but the OLSR protocol improves when the number of nodes is increased. ","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89278533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
RANEEM MAHMOUD MEREI AL-HALABI, IBRAHIM OMAR AL-SH
{"title":"Study, Build and Analyze CAN 2.0 Network Model Using MATLAB: دراسة وبناء وتحليل نموذج لشبكة اتصال تعمل وفق بروتوكول CAN 2.0 باستخدام الماتلاب","authors":"RANEEM MAHMOUD MEREI AL-HALABI, IBRAHIM OMAR AL-SH","doi":"10.26389/ajsrp.r180419","DOIUrl":"https://doi.org/10.26389/ajsrp.r180419","url":null,"abstract":" This research shows designing a model that simulates the performance of CAN 2.0 Protocol (Controller Area Network Protocol) in a seven-node network and a data bus. This model is designed using MATLAB and SimEvents library in Simulink, library (SimEvents) which provides a simulation environment for intermittent events that enables modeling and simulation of any event-based system. This model included simulation of the transmission algorithm used by CAN Protocol, so that data frames are fully integrated and generated on time for some nodes and depending on a given event (whatever) for each other. Thus, all types of messages sent over the real-world network are included. This study presents the building of software model of the network, and the application of several vales of BitRates on the network, and then taking the statistical results and analysis compared to reference values. After drawing diagrams between the priority level of the sent node and the delay time of the message- depending on the values taken from the results of the study-we note that the delay times are significantly increased when the BitRate decreases on the one hand and the priority score decreases on the other hand, which is similar to the real-world network and reference values of the protocol. ","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73774873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SUSTAINABILITY OF THE LIBYAN HOUSH IN THE OLD CITY OF TRIPOLI: استدامة الحوش الليبي في المدينة القديمة طرابلس","authors":"NADIR NASIR MOHAMMED SHEMBES","doi":"10.26389/ajsrp.n260319","DOIUrl":"https://doi.org/10.26389/ajsrp.n260319","url":null,"abstract":"The ancient city of Tripoli was founded by Phoenicians around 3,000 years ago. As a result of various civilizations taking place, there are architectural and artistic works that constitute a real treasure in the city. The city, located in North Africa, has been serving as a transition between Europe and Africa. During Roman, Islamic States, Ottoman and Principalities period, especially commercial center and rich residences in this center were formed. These residences, which are called \"Housh\" with traces of the Ottoman and Qaramanli Periods, are buildings shaped around a courtyard. In fact, these \"Housh\", which combine the characteristics of the Mediterranean architecture plan with local materials and techniques, have suffered from long-term disuse. Today, lack of financial resources, combined with a lack of historical consciousness, created a different demographic and social structure in the historical city. The primary aim of the thesis is to document the current situation, to examine the sustainability of \"Housh\" type structures and to develop suggestions for sustainability of the Libyan Housh. based on research on websites, articles, and books, which deals with the idea of knowledge of environmental assessment and personal impressions of the place is good knowledge and we can provide the reader with new information on this subject.","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"93 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90402297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marwa Mahmoud Galal Mohamed Osman, Rania Ragab Abd
{"title":"Utilizing Farasan Architectural Heritage to enrich the aesthetic values in the contemporary tourist buildings: الاستفادة من التراث المعمارى الفرسانى لإثراء القيم الجمالية فى المبانى السياحية المعاصرة","authors":"Marwa Mahmoud Galal Mohamed Osman, Rania Ragab Abd","doi":"10.26389/ajsrp.r100619","DOIUrl":"https://doi.org/10.26389/ajsrp.r100619","url":null,"abstract":" The contemporary tourist buildings provide a unique visual experience for its visitors. A vision combined with the heritage sites around it affords a closer connection between the past and the present, confirming its identity and making it special. The architectural heritage is a rich source of fine values to enrich the tourist buildings. Hence, the idea of research arises as the Farasan Islands is a unique tourist area with its heritage buildings of special architectural values, The problem of research is how the artistic treatment of traditional decorations in Farasan as a source of innovative designs for the tourist buildings, and the research aims to study the aesthetics of Farasan's architectural heritage , study its aesthetic values and design of the interfaces of tourist buildings and its fabrics furnished using computer program ,The importance of research to highlight the archaeological sites of Farasan and to guide the society towards the importance of its architectural and cultural heritage, and also benefit from it in contemporary architecture by following a historical approach, analytical for the architectural vocabulary of the heritage buildings of Farasan and an applied technical approach to create innovative designs to enrich its touristic building .The researchers have reached through the results of the research: The vocabulary of the heritage in farasan architecture rich with formative elements to enrich the design of the architectural facades of tourist buildings and the design of its furnishing fabrics , where the researchers used design solutions inspired by the study of the architectural heritage of Farasan combines the originality and modernity, which gives the tourist buildings in the islands of Farasan unique identity. ","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88072415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the process of recognition the treated teeth in the Panoramic images based on the optimal features selection: تحسين عملية التعرف على الأسنان المعالجة في الصور البانورامية بالاعتماد على الاختيار الأمثل للسمات","authors":"Alaa Khaled Zakaria, Yasser Khadra, Eid Al-Abboud","doi":"10.26389/ajsrp.a010519","DOIUrl":"https://doi.org/10.26389/ajsrp.a010519","url":null,"abstract":" Due to the significant development in the field of machine learning and patterns recognitions, the area of image processing has an important role in this context, especially in the field of medical images of various kinds. In this research, we have been developed powerful, simple, cost-effective and more accurate interpretation algorithm for recognition treated teeth In the X-ray images. There are many difficulties in determining the objects such as it is difficult to interpret the radiographic image because there are very subtle differences in X-rays, poor image quality representation and the splitting of all the teeth in the image of radiographic imaging. In this research, comprehensive methodology was proposed that enables the identification of the teeth that have been treated by the optimal features selection. Where the digital image was processed and then extracted statistical features of it using second order statistical and gray level co-occurrence matrix GLCM. Then, the optimal features were chosen, which express the pattern to be recognized, be categorized then to classify the extracted features. The results obtained showed great accuracy in the results obtained, where the features of homogeneity, contrast and correlation were chosen as expressive features of pulp canal therapy with standard deviations, 0.647%, 1.602% and 1.925% respectively, as well as the reconstructed dental crown with standard deviations of the aforementioned features\", 1.07%, 2.80% and 0.57%, respectively, because they gave the lowest values of the standard deviation and thus the lowest percentage of error and therefore can be adopted as expressive features of the treated tooth. ","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"138 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90627791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study the effect of sound encodings on AD-HOC networks using TORA routing protocol and VOIP application: دراسة تأثير ترميزات الصوت على شبكات AD-HOCباستخدام بروتوكول التوجيه TORA وتطبيق VOIP","authors":"Suleiman Zidan Aldarf, Jamal Al-yassin","doi":"10.26389/ajsrp.s160519","DOIUrl":"https://doi.org/10.26389/ajsrp.s160519","url":null,"abstract":"Mobile Ad-Hoc Networks are used for data transfer. The nodes of such networks do not require presetting. They are characterized by dynamic data transfer during their movement of the nodes. Routing protocols of mobile ad-hoc networks differ from the existing internet protocols which are designed for the fixed structure based wireless networks. MANET protocols have to face high challenges due to dynamically changing of topologies, low transmission power and asymmetric links. Due to link instability, node mobility and frequently changing topologies routing becomes one of the core issues in MANETs. Currently existent routing protocols provide routing solutions up to a certain level and most of them are designed and implemented in small areas. Many researchers are still working on the developments of MANET routing protocols. This research study effect of some voice codecs on ad-hoc networks using the (TORA routing protocol) and by running the VOIP application on a network randomized scenario. This effect will be compared through several performance parameters for the network used. The Network Simulation Program (OPNET), which is the first program in the area of telecommunications networks in general, is used to provide accurate results for studies in the field of networks. ","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79265992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khaled M. Alalayah - Khadija M. H. Alaidarous - Ib
{"title":"Black Box Attack of Simulation Secret Key using Neural-Identifier: هجوم الصندوق الأسود لمحاكاة أنظمة التشفير الانسيابي باستخدام المعرف العصبي","authors":"Khaled M. Alalayah - Khadija M. H. Alaidarous - Ib","doi":"10.26389/ajsrp.u310119","DOIUrl":"https://doi.org/10.26389/ajsrp.u310119","url":null,"abstract":" The issue of the cryptanalysis is defined as the unknown issue or problem related to the identification of the system where the major goal of the cryptanalysis is for the design of the system for various steps involved. Neural networks will be ideal tool for Black-Box system identification. The black-Box attacks against secret key cryptosystems (stream cipher system) would be presented by considering a Black-Box Neuro-Identifier model to retain two different objectives: first is for finding out the key from the provided plaintext-cipher to pair, while the second objective is to emulator construction a neuro-model for the target cipher system. There are many researches going on considering the various models of encryption where ANN is being used as single layered or multi layered perceptron. The above defined cryptographic techniques are sometimes also termed as the Neural Cryptography. As the ANN model relies on the feedforward working criteria means it can be used for the generation of some effective and efficient encryption methodologies. Cryptanalysis is considered as significant footstep for evaluating and checking quality of any cryptosystem. A portion of these cryptosystem guarantees secrecy and security of huge data trade from source to goal utilizing symmetric key cryptography. The cryptanalyst researches the quality and distinguishes the shortcoming of the key just as enciphering calculation. With the expansion in key size, the time and exertion required anticipating the right key increments. These systems for cryptanalysis are changing radically to decrease cryptographic multifaceted nature. In this paper a point by point study has been directed. Much cryptography strategies are accessible which depend on number hypothesis however it has the hindrance of necessity a substantial computational power, unpredictability and time utilization. To defeat these disadvantages, artificial neural networks (ANNs) have been connected to take care of numerous issues. The ANNs have numerous qualities, for example, learning, speculation, less information necessity, quick calculation, simplicity of usage, and programming and equipment accessibility, which make it exceptionally alluring for some applications. This paper gives a cutting-edge survey on the utilization of counterfeit neural systems in cryptography and concentrates their execution on estimation issues identified with cryptography. ","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84295148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Mohammed Almashyakhi Naif Mohammed Jabli Ahmad Moham
{"title":"Factors Affecting the Adoption of one Unified Electronic system that includes all Government services in Saudi Arabia: العوامل المؤثرة في تبني نظام إلكتروني شامل وموحد لجميع الخدمات الحكومية في المملكة العربية السعودية","authors":"Ali Mohammed Almashyakhi Naif Mohammed Jabli Ahmad Moham","doi":"10.26389/AJSRP.Y220319","DOIUrl":"https://doi.org/10.26389/AJSRP.Y220319","url":null,"abstract":"E-government systems have contributed considerably in increasing the productivity in many different workplace environments. Previous research studies such as (Ashour, 2010, Wafi Al-Balawi, 2014, Hamidallah, Abdel Aziz, Hamdan, 2013) indicated that there is still a need for more research studies about e-Government systems. According to the literature review, there appears to be no study conducted in Saudi Arabia that investigate individuals’ behavioral intention to use a specific e-Government system as a one-stop destination for all electronic services that provided by the Saudi government. Therefore, this study investigated how the perceived ease of use and perceived usefulness of Abshir system can predict Saudi citizens’ behavioral intention to use it as a one-stop destination for all electronic services that provided by the Saudi government. This study sought to answer the following questions: 1) To what extent do the following variables (perceived ease of use and perceived usefulness) predict the behavioral intention to use the Abshir system as a one-stop destination for all electronic services that provided by the Saudi government? And 2) What are Saudi citizens’ views toward the use of the Abshir system as a one-stop destination for all electronic services that provided by the Saudi government? The results of this study showed that the application of e-government appears to be an effective tool for increasing work productivity. It was also found that the use of Abshir system as a one-stop destination for all electronic services can be predicted through its perceived usefulness and perceived ease of use. More of the results and discussion are discussed in this research. Recommendations and suggestions are also discussed and explained for decision-makers and there are worth considering.","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79510505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}