{"title":"Classifying Digital Arabic Fonts Based on Design Characteristics","authors":"Jehan Janbi","doi":"10.1109/NCG.2018.8593037","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593037","url":null,"abstract":"PANOSE is a system for classifying and matching typefaces based on their design features. It composes of 10 digits where each digit represents a specific design feature. It uses in several font management tools as option for ordering and searching fonts regarding their design features. Also, it uses in font replacement process when an application or an operating system detects a missing font in an immigrant document or website. Currently, PANOSE is only defined for fonts that have Latin characters. In this paper, a new model is defined to extend PANOSE coverage to include Arabic characters. The reliability of the model has been evaluated by conducting two clustering processes for 30 fonts of Naskh style. Our model, PANOSE-A, is used to measure a similarity matrix for one clustering process while the other process used a similarity matrix produced by using font matching tool. The Silhouette coefficient for both clustering was calculated, giving 97.6 with the font matching tool and 96.6 with PANOSE-A, which indicate the validity and consistency of the results.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Dark Side of Digital Technologies","authors":"Nahier Aldhafferi","doi":"10.1109/NCG.2018.8593065","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593065","url":null,"abstract":"Digital technology is at the forefront of the newest revolution in the worlds of science and communication. The foundational concepts for this area of knowledge were based upon a system of binary computing. Digital technology has accomplished much in its relatively short lifespan, including the inspiration of the invention of ASCII (American Standard Code for Information Interchange) codes used to encode basic symbols using numerical digits. This can be seen as the most important use of digital technology - to vastly increase the rate of data transmission by encoding information in the combinations of the binary digits 0 and 1. It has become so influential that the modern world as we know it is virtually incapable of proceeding without its assistance. However, despite of its benefits, there exists, undeniably, a dark side to this technology. The chief aim of this paper is to present a detailed analysis of the negative aspects related to the use of digital technology, which too often go unmentioned. The discussion will be based upon an organized review of such literature as uses a sound research methodology. This will include undertaking a review of some crucial studies conducted around the globe related to this. Other reviews currently in existence will also be taken into consideration. This method review will help assemble innovative and fresh pragmatic solutions regarding the titular topic. The paper will be concluded with recommendations to help eliminate future threats and to mitigate possible risk factors. A few sectors which could be aided by further scientific exploration will also be highlighted in the final concluding statements.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting the suitability of IS students’ skills for the recruitment in Saudi Arabian industry","authors":"M. Almutairi, Mozaherul Hoque Abul Hasanat","doi":"10.1109/NCG.2018.8593016","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593016","url":null,"abstract":"Soft and hard skills have become a challenging issue for Information Systems (IS) graduates and recruiters in Saudi industry. IS students are lacking the skills that are required by Saudi industry. Recruiters, on the other hand, consider the GPA as a major factor for hiring IS candidates. This paper discusses the impacts of self-regulated learning strategies and academic achievements on matching the required skills of Saudi industry. Therefore, it identifies the most required skills of IS jobs in Saudi industry and how the skills of IS students in major Saudi universities can match them. Two questionnaires were distributed, one for recruiters and another for students. First questionnaire is to assess the required IS skills in Saudi industry by recruiters. Second questionnaire is to capture the skills, self-regulated learning (SRL), and academic achievement of IS students. The collected data was used to develop a classification model using Decision Tree, Naïve Bayes, and Nearest Neighbor algorithms to predict the suitability of IS graduates to the Saudi industry. The results show that the Naïve Bayes algorithm performed the best (with accuracy 69% and ROC 0.62). Finally, this paper demonstrated a novel way to predict student skills’ suitability for the industry and thereby helping the universities to design better curriculum and the students to prepare better for the job market.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134307411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Elhussein, H. Gull, Aeshah Alobaid, Aseel Ajez, Reem Aldulaijan, M. Alasfoor, N. Algaraawi
{"title":"Big Data Framework for Health Informatics : A Solution for Influenza Surveillance in Saudi Arabia","authors":"M. Elhussein, H. Gull, Aeshah Alobaid, Aseel Ajez, Reem Aldulaijan, M. Alasfoor, N. Algaraawi","doi":"10.1109/NCG.2018.8593083","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593083","url":null,"abstract":"After the discovery of the first Corona case in Saudi Arabia in 2012, it became a government priority to provide accurate information for the local and the international community. The disease which has influenza-like symptoms requires surveillance in order to know how to direct resources to where it is needed. Big Data has been successfully used in disaster management and in reporting wildfires in the US. By applying this framework, real-time insight to the status of the spread of the disease can deliver invaluable information that can be used in saving lives. This paper proposes a Big Data framework for collecting Health Informatics and it’s accompanying analytical framework for the purpose of reporting on influenza and Corona cases in the Saudi Arabia.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131142600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kusum Yadav, Afraa Sayah Alshammari, S. Albakri, A. Aljedaie
{"title":"Challenges Faced by Educational Institution in Middle East to Accept and Implement Cloud-Based Data Storage","authors":"Kusum Yadav, Afraa Sayah Alshammari, S. Albakri, A. Aljedaie","doi":"10.1109/NCG.2018.8592952","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592952","url":null,"abstract":"Education is a one of the most important pillar to play a key role in a consistent growth of any economy, especially for developing and under-developed countries. Today, the education has come out from the traditional class room scenario and spread its wings to collaborate with technology. The faculties and students have become more tech savvy as the learning and teaching process is utilizing the advance technology on regular basis. Due to digitalization and virtualization of teaching resources through the Internet, and adoption of Cloud Computing by educational institutions has been significantly increased. Despite the heavily increasing pressure of financial obligations for educational institutions to deliver state of art facilities with minimum resources and maximum efforts the Educational institutions, both public and private must utilize the potential advantage of Cloud Computing to ensure high quality service regardless of the minimal resources available the cloud computing is growing and acting as a game changer in academia because of its various advantages and usages. Now Educational institutions are using various cloud-based applications provided by the various service providers to ensure that their faculties, wards and other stack holders can perform both academic as well as non-academics tasks. Thus, this research will seek to establish the benefits associated with the use of cloud computing in Educational Institution. The solutions provided by the cloud technology ensure that the research and development, as well as the teaching is more sustainable and efficient, thus positively influencing the quality of learning and teaching within Educational Institution. This has also led to all the educational institutions to adopt cloud technology as a solution to various technological challenges they face on a daily routine.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Privacy Policies Awareness on Snapchat Saudi users Discontinuous Usage Intention","authors":"Noora Sami Al-Saqer, M. Seliaman","doi":"10.1109/NCG.2018.8593089","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593089","url":null,"abstract":"This paper used a cross sectional survey to investigate Saudi users awareness of Snapchat privacy policy and its effect on their discontinuous usage intention. The study sample included (201) participants. The structural equation model technique (SEM) was used to test the research hypotheses. The research findings showed that awareness level of Snap chat privacy policy had a significant influence on privacy protection behaviors but does not have an influence on information privacy concerns. In addition, Information privacy concern is affected positively by social influence and is positively affecting the privacy protection behaviors and discontinuous usage intention.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133096496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yazan Alkhlefat, A. Ragheb, M. Esmail, S. Alshebeili
{"title":"Millimeter Wave Switching in Radio over Fiber Networks using Semiconductor Optical Amplifier (SOA)","authors":"Yazan Alkhlefat, A. Ragheb, M. Esmail, S. Alshebeili","doi":"10.1109/NCG.2018.8593081","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593081","url":null,"abstract":"5G wireless communication systems promise efficient spectrum utilization, advanced modulation and access techniques, and high data rate. To obtain these requirements, millimeter wave (MMW) signals and subsystems are the most suitable to be used. The Modules and devices, proposed for these networks, are intended to use the efficient capabilities of photonic technologies. In this paper, a photonics-based millimeter wave switch, for orthogonal frequency division multiplexing (OFDM) signals, is proposed by exploiting the nonlinear effects in semiconductor optical amplifiers (SOAs). This includes four wave mixing (FWM), self-phase modulation (SPM) and cross-gain modulation (XGM). A 10 Gbps/16QAM-OFDM signal carried over 30 GHz MMW carrier is considered for signal switching. Moreover, we studied the up- and down-wavelength conversion schemes, in terms of probe and pump signal’s power. Furthermore, we investigate the effects of SOA’s injection current and wavelength spacing between the two injected beams that enable optical single sideband (OSSB) generation and switching. Simulation results show possibility of transmitting and switching OFDM signal with 1 x10-3and 13 % rms symbol error rate (SER) and error vector magnitude (EVM), at -22 dBm received power. The simulation is carried out using Virtual Photonic Integrated (VPI) software.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133726352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on Steps of Truth Detection on Arabic Tweets","authors":"Rabeaa Mouty, A. Gazdar","doi":"10.1109/NCG.2018.8593060","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593060","url":null,"abstract":"The speed of the Internet, the rapid development of mobile devices, the availability to all and the benefits of easy communication and connection, led to ease dissemination of news and information individuals on social media networks without censorship of the content provided through these sites. This poses a serious risk to the truthiness of online publishing. The deceptive information disseminated through social media sites spreads rapidly and causes negative effects in various areas. Twitter is one of the most popular social networking sites for getting the news and information, especially in the Arab world. There has been a great deal of research on the truthiness of Twitter publications in many languages, but research in Arabic blogs is still a fertile area and needs more work. In this paper, we present a general model of Truth Detection Steps on Arabic Tweets. We survey as well the latest Arabic research and surveys in truth detection. Then we present Arab research in terms of used approaches at each Step.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dhoha A. Almubayedh, Mashael Al khalis, Ghadeer Alazman, M. Alabdali, Rouqaiah Al-Refai, Naya Nagy
{"title":"Security Related Issues In Saudi Arabia Small Organizations: A Saudi Case Study","authors":"Dhoha A. Almubayedh, Mashael Al khalis, Ghadeer Alazman, M. Alabdali, Rouqaiah Al-Refai, Naya Nagy","doi":"10.1109/NCG.2018.8593058","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593058","url":null,"abstract":"The paper emphasizes that the precise awareness of information security policy, its aspects and practices is a significant point that organizations must pay attention to prevent potential security threats. However, some Saudi organizations lack the security awareness. This paper represents some previous studies that were conducted to evaluate the state of policy and information security awareness and application in a Saudi organization. The paper considers a small Saudi organization to perform a case study, to audit its state and describe the possible risk scenarios that may take place. Most information about the company was gathered by interviewing its CEO. The audit found five possible risk scenarios, named lack of security policy, personal information leakage from the website, the risk of damage of the CEO’s device and two scenarios related to outsourcing companies. The paper provided some recommendations to the audited organization which may serve other organizations that have the same characteristics, which are adopting and documenting a comprehensive security policy and procedures from beginning stages of a company, ensure that the employees are aware of these documents and the required practices to secure sensitive information. In addition, introduce a mechanism to ensure that security controls are met and to secure personal information transmitted over their website and recommending to regularly checks that the website is bugs free. Additionally, recommends considering more security details on the outsourcing contracts and involve a specialized attorney on it. Also, prefer short-term out-sourcing contracts and take possible alternatives third-party companies into consideration as a precaution.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116919681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible Watermarking for the Security of Medical Image Databases","authors":"Fatima Abbasi, N. Memon","doi":"10.1109/NCG.2018.8593009","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593009","url":null,"abstract":"Medical images of different modalities are produced on a daily basis in the medical centers around the globe. The same is transmitted over the Internet to other medical practitioner to get the second opinion from doctors located in remote areas. Numbers of issues are raised with this transmission of medical information, for example, authenticity and confidentiality of medical information. To overcome these important issues, a medical image watermarking system has been proposed which first segments the input medical image into a region of interest (ROI) and region of non interest (RONI) areas. Later it implants two different watermarks in ROI and RONI. The first watermark is fragile watermark which is a binary pattern and is inserted in ROI and the other is robust watermark which is the composite watermark and is inserted in the RONI. The simple Least Significant Bit (LSB) substitution technique is employed for casting the watermarks. CT scan medical images are used for experiments. The simulation results reveal that proposed system provides better security of medical images as well addresses both the issues of authenticity and confidentiality.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116457688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}