2018 21st Saudi Computer Society National Computer Conference (NCC)最新文献

筛选
英文 中文
Classifying Digital Arabic Fonts Based on Design Characteristics 基于设计特征的数字阿拉伯字体分类
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593037
Jehan Janbi
{"title":"Classifying Digital Arabic Fonts Based on Design Characteristics","authors":"Jehan Janbi","doi":"10.1109/NCG.2018.8593037","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593037","url":null,"abstract":"PANOSE is a system for classifying and matching typefaces based on their design features. It composes of 10 digits where each digit represents a specific design feature. It uses in several font management tools as option for ordering and searching fonts regarding their design features. Also, it uses in font replacement process when an application or an operating system detects a missing font in an immigrant document or website. Currently, PANOSE is only defined for fonts that have Latin characters. In this paper, a new model is defined to extend PANOSE coverage to include Arabic characters. The reliability of the model has been evaluated by conducting two clustering processes for 30 fonts of Naskh style. Our model, PANOSE-A, is used to measure a similarity matrix for one clustering process while the other process used a similarity matrix produced by using font matching tool. The Silhouette coefficient for both clustering was calculated, giving 97.6 with the font matching tool and 96.6 with PANOSE-A, which indicate the validity and consistency of the results.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Dark Side of Digital Technologies 数字技术的阴暗面
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593065
Nahier Aldhafferi
{"title":"The Dark Side of Digital Technologies","authors":"Nahier Aldhafferi","doi":"10.1109/NCG.2018.8593065","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593065","url":null,"abstract":"Digital technology is at the forefront of the newest revolution in the worlds of science and communication. The foundational concepts for this area of knowledge were based upon a system of binary computing. Digital technology has accomplished much in its relatively short lifespan, including the inspiration of the invention of ASCII (American Standard Code for Information Interchange) codes used to encode basic symbols using numerical digits. This can be seen as the most important use of digital technology - to vastly increase the rate of data transmission by encoding information in the combinations of the binary digits 0 and 1. It has become so influential that the modern world as we know it is virtually incapable of proceeding without its assistance. However, despite of its benefits, there exists, undeniably, a dark side to this technology. The chief aim of this paper is to present a detailed analysis of the negative aspects related to the use of digital technology, which too often go unmentioned. The discussion will be based upon an organized review of such literature as uses a sound research methodology. This will include undertaking a review of some crucial studies conducted around the globe related to this. Other reviews currently in existence will also be taken into consideration. This method review will help assemble innovative and fresh pragmatic solutions regarding the titular topic. The paper will be concluded with recommendations to help eliminate future threats and to mitigate possible risk factors. A few sectors which could be aided by further scientific exploration will also be highlighted in the final concluding statements.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting the suitability of IS students’ skills for the recruitment in Saudi Arabian industry 预测IS学生的技能是否适合沙特阿拉伯工业的招聘
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593016
M. Almutairi, Mozaherul Hoque Abul Hasanat
{"title":"Predicting the suitability of IS students’ skills for the recruitment in Saudi Arabian industry","authors":"M. Almutairi, Mozaherul Hoque Abul Hasanat","doi":"10.1109/NCG.2018.8593016","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593016","url":null,"abstract":"Soft and hard skills have become a challenging issue for Information Systems (IS) graduates and recruiters in Saudi industry. IS students are lacking the skills that are required by Saudi industry. Recruiters, on the other hand, consider the GPA as a major factor for hiring IS candidates. This paper discusses the impacts of self-regulated learning strategies and academic achievements on matching the required skills of Saudi industry. Therefore, it identifies the most required skills of IS jobs in Saudi industry and how the skills of IS students in major Saudi universities can match them. Two questionnaires were distributed, one for recruiters and another for students. First questionnaire is to assess the required IS skills in Saudi industry by recruiters. Second questionnaire is to capture the skills, self-regulated learning (SRL), and academic achievement of IS students. The collected data was used to develop a classification model using Decision Tree, Naïve Bayes, and Nearest Neighbor algorithms to predict the suitability of IS graduates to the Saudi industry. The results show that the Naïve Bayes algorithm performed the best (with accuracy 69% and ROC 0.62). Finally, this paper demonstrated a novel way to predict student skills’ suitability for the industry and thereby helping the universities to design better curriculum and the students to prepare better for the job market.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134307411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big Data Framework for Health Informatics : A Solution for Influenza Surveillance in Saudi Arabia 健康信息学大数据框架:沙特阿拉伯流感监测解决方案
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593083
M. Elhussein, H. Gull, Aeshah Alobaid, Aseel Ajez, Reem Aldulaijan, M. Alasfoor, N. Algaraawi
{"title":"Big Data Framework for Health Informatics : A Solution for Influenza Surveillance in Saudi Arabia","authors":"M. Elhussein, H. Gull, Aeshah Alobaid, Aseel Ajez, Reem Aldulaijan, M. Alasfoor, N. Algaraawi","doi":"10.1109/NCG.2018.8593083","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593083","url":null,"abstract":"After the discovery of the first Corona case in Saudi Arabia in 2012, it became a government priority to provide accurate information for the local and the international community. The disease which has influenza-like symptoms requires surveillance in order to know how to direct resources to where it is needed. Big Data has been successfully used in disaster management and in reporting wildfires in the US. By applying this framework, real-time insight to the status of the spread of the disease can deliver invaluable information that can be used in saving lives. This paper proposes a Big Data framework for collecting Health Informatics and it’s accompanying analytical framework for the purpose of reporting on influenza and Corona cases in the Saudi Arabia.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131142600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Challenges Faced by Educational Institution in Middle East to Accept and Implement Cloud-Based Data Storage 中东地区教育机构接受和实施云数据存储面临的挑战
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592952
Kusum Yadav, Afraa Sayah Alshammari, S. Albakri, A. Aljedaie
{"title":"Challenges Faced by Educational Institution in Middle East to Accept and Implement Cloud-Based Data Storage","authors":"Kusum Yadav, Afraa Sayah Alshammari, S. Albakri, A. Aljedaie","doi":"10.1109/NCG.2018.8592952","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592952","url":null,"abstract":"Education is a one of the most important pillar to play a key role in a consistent growth of any economy, especially for developing and under-developed countries. Today, the education has come out from the traditional class room scenario and spread its wings to collaborate with technology. The faculties and students have become more tech savvy as the learning and teaching process is utilizing the advance technology on regular basis. Due to digitalization and virtualization of teaching resources through the Internet, and adoption of Cloud Computing by educational institutions has been significantly increased. Despite the heavily increasing pressure of financial obligations for educational institutions to deliver state of art facilities with minimum resources and maximum efforts the Educational institutions, both public and private must utilize the potential advantage of Cloud Computing to ensure high quality service regardless of the minimal resources available the cloud computing is growing and acting as a game changer in academia because of its various advantages and usages. Now Educational institutions are using various cloud-based applications provided by the various service providers to ensure that their faculties, wards and other stack holders can perform both academic as well as non-academics tasks. Thus, this research will seek to establish the benefits associated with the use of cloud computing in Educational Institution. The solutions provided by the cloud technology ensure that the research and development, as well as the teaching is more sustainable and efficient, thus positively influencing the quality of learning and teaching within Educational Institution. This has also led to all the educational institutions to adopt cloud technology as a solution to various technological challenges they face on a daily routine.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Privacy Policies Awareness on Snapchat Saudi users Discontinuous Usage Intention 隐私政策意识对Snapchat沙特用户间断使用意图的影响
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593089
Noora Sami Al-Saqer, M. Seliaman
{"title":"The Impact of Privacy Policies Awareness on Snapchat Saudi users Discontinuous Usage Intention","authors":"Noora Sami Al-Saqer, M. Seliaman","doi":"10.1109/NCG.2018.8593089","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593089","url":null,"abstract":"This paper used a cross sectional survey to investigate Saudi users awareness of Snapchat privacy policy and its effect on their discontinuous usage intention. The study sample included (201) participants. The structural equation model technique (SEM) was used to test the research hypotheses. The research findings showed that awareness level of Snap chat privacy policy had a significant influence on privacy protection behaviors but does not have an influence on information privacy concerns. In addition, Information privacy concern is affected positively by social influence and is positively affecting the privacy protection behaviors and discontinuous usage intention.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133096496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Millimeter Wave Switching in Radio over Fiber Networks using Semiconductor Optical Amplifier (SOA) 基于半导体光放大器(SOA)的光纤无线毫米波交换
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593081
Yazan Alkhlefat, A. Ragheb, M. Esmail, S. Alshebeili
{"title":"Millimeter Wave Switching in Radio over Fiber Networks using Semiconductor Optical Amplifier (SOA)","authors":"Yazan Alkhlefat, A. Ragheb, M. Esmail, S. Alshebeili","doi":"10.1109/NCG.2018.8593081","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593081","url":null,"abstract":"5G wireless communication systems promise efficient spectrum utilization, advanced modulation and access techniques, and high data rate. To obtain these requirements, millimeter wave (MMW) signals and subsystems are the most suitable to be used. The Modules and devices, proposed for these networks, are intended to use the efficient capabilities of photonic technologies. In this paper, a photonics-based millimeter wave switch, for orthogonal frequency division multiplexing (OFDM) signals, is proposed by exploiting the nonlinear effects in semiconductor optical amplifiers (SOAs). This includes four wave mixing (FWM), self-phase modulation (SPM) and cross-gain modulation (XGM). A 10 Gbps/16QAM-OFDM signal carried over 30 GHz MMW carrier is considered for signal switching. Moreover, we studied the up- and down-wavelength conversion schemes, in terms of probe and pump signal’s power. Furthermore, we investigate the effects of SOA’s injection current and wavelength spacing between the two injected beams that enable optical single sideband (OSSB) generation and switching. Simulation results show possibility of transmitting and switching OFDM signal with 1 x10-3and 13 % rms symbol error rate (SER) and error vector magnitude (EVM), at -22 dBm received power. The simulation is carried out using Virtual Photonic Integrated (VPI) software.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133726352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey on Steps of Truth Detection on Arabic Tweets 阿拉伯语推文的真相检测步骤调查
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593060
Rabeaa Mouty, A. Gazdar
{"title":"Survey on Steps of Truth Detection on Arabic Tweets","authors":"Rabeaa Mouty, A. Gazdar","doi":"10.1109/NCG.2018.8593060","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593060","url":null,"abstract":"The speed of the Internet, the rapid development of mobile devices, the availability to all and the benefits of easy communication and connection, led to ease dissemination of news and information individuals on social media networks without censorship of the content provided through these sites. This poses a serious risk to the truthiness of online publishing. The deceptive information disseminated through social media sites spreads rapidly and causes negative effects in various areas. Twitter is one of the most popular social networking sites for getting the news and information, especially in the Arab world. There has been a great deal of research on the truthiness of Twitter publications in many languages, but research in Arabic blogs is still a fertile area and needs more work. In this paper, we present a general model of Truth Detection Steps on Arabic Tweets. We survey as well the latest Arabic research and surveys in truth detection. Then we present Arab research in terms of used approaches at each Step.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security Related Issues In Saudi Arabia Small Organizations: A Saudi Case Study 沙特阿拉伯小型组织的安全相关问题:沙特案例研究
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593058
Dhoha A. Almubayedh, Mashael Al khalis, Ghadeer Alazman, M. Alabdali, Rouqaiah Al-Refai, Naya Nagy
{"title":"Security Related Issues In Saudi Arabia Small Organizations: A Saudi Case Study","authors":"Dhoha A. Almubayedh, Mashael Al khalis, Ghadeer Alazman, M. Alabdali, Rouqaiah Al-Refai, Naya Nagy","doi":"10.1109/NCG.2018.8593058","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593058","url":null,"abstract":"The paper emphasizes that the precise awareness of information security policy, its aspects and practices is a significant point that organizations must pay attention to prevent potential security threats. However, some Saudi organizations lack the security awareness. This paper represents some previous studies that were conducted to evaluate the state of policy and information security awareness and application in a Saudi organization. The paper considers a small Saudi organization to perform a case study, to audit its state and describe the possible risk scenarios that may take place. Most information about the company was gathered by interviewing its CEO. The audit found five possible risk scenarios, named lack of security policy, personal information leakage from the website, the risk of damage of the CEO’s device and two scenarios related to outsourcing companies. The paper provided some recommendations to the audited organization which may serve other organizations that have the same characteristics, which are adopting and documenting a comprehensive security policy and procedures from beginning stages of a company, ensure that the employees are aware of these documents and the required practices to secure sensitive information. In addition, introduce a mechanism to ensure that security controls are met and to secure personal information transmitted over their website and recommending to regularly checks that the website is bugs free. Additionally, recommends considering more security details on the outsourcing contracts and involve a specialized attorney on it. Also, prefer short-term out-sourcing contracts and take possible alternatives third-party companies into consideration as a precaution.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116919681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reversible Watermarking for the Security of Medical Image Databases 用于医学图像数据库安全的可逆水印
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593009
Fatima Abbasi, N. Memon
{"title":"Reversible Watermarking for the Security of Medical Image Databases","authors":"Fatima Abbasi, N. Memon","doi":"10.1109/NCG.2018.8593009","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593009","url":null,"abstract":"Medical images of different modalities are produced on a daily basis in the medical centers around the globe. The same is transmitted over the Internet to other medical practitioner to get the second opinion from doctors located in remote areas. Numbers of issues are raised with this transmission of medical information, for example, authenticity and confidentiality of medical information. To overcome these important issues, a medical image watermarking system has been proposed which first segments the input medical image into a region of interest (ROI) and region of non interest (RONI) areas. Later it implants two different watermarks in ROI and RONI. The first watermark is fragile watermark which is a binary pattern and is inserted in ROI and the other is robust watermark which is the composite watermark and is inserted in the RONI. The simple Least Significant Bit (LSB) substitution technique is employed for casting the watermarks. CT scan medical images are used for experiments. The simulation results reveal that proposed system provides better security of medical images as well addresses both the issues of authenticity and confidentiality.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116457688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信