International Journal of Computers and Informatics - EISSN: 2976-9361 (original) (raw)

Papers - IJCI, Vol 3, No 1 by International Journal of Computers and Informatics - EISSN: 2976-9361

Research paper thumbnail of Association Rules Elicitation for Customer’s Shopping on E-commerce Applications

IJCI, Vol (3), No (1), January 2024, Jan 1, 2024

This research provides an approach for eliciting association rules for customers’ shopping on e-c... more This research provides an approach for eliciting association rules for customers’ shopping on e-commerce applications based on the Apriori algorithm. The proposed system shows and displays some offers and deals from various branches. The system provides the analytics for the seller as the demand for some varieties and the weakness in other varieties and the whole application is organized on the Cloud. The architecture includes three levels; the front-end, middle, and back-end. The front-end level of the site-based Mobile shopping application is made up of Android Mobile devices, to buy miscellaneous products from various nearby branches. The front-end level also displays the link between items purchased. The middle repository level provides a Web service to generate returns from a relational database.
The Exchanged information and data between application and servers is stored in the Cloud. The background level offers a Web server and a MySQL database. In this paper, we propose an architecture that reduces the communication overhead in existing Mobile Agent-based Distributed Association Rule Mining (MAD-ARM).

Research paper thumbnail of Measuring the Performance of Information Systems Project Managers: Indicators and Metrics

IJCI, Vol (3), No (1), January 2024, Jan 2, 2024

Measuring performance is a process used in the domain of project management and quality processes... more Measuring performance is a process used in the domain of project management and quality processes to determine and communicate status and accomplishments measured against specific objectives, schedules, and milestones. This paper is concerned with the calculation of performance indicators of Information Systems Project Management (ISPM). It clarifies the relationships between ISPM domains, performance metrics, and performance indicators. This paper presents a proposed list of metrics for ISPM. Based on these ISPM metrics and a combination of statistical techniques, we built a model for calculating ISPM performance indicators. The quality reviewers can use this model to evaluate and track the performance of IS project managers.

Papers - IJCI, Vol 3, No 2 by International Journal of Computers and Informatics - EISSN: 2976-9361

Research paper thumbnail of Using Prototypes in Agile Software Development

IJCI, Vol (3), No (2), February 2024, Feb 2, 2024

Prototyping has now become an important and essential part of software development processes. As ... more Prototyping has now become an important and essential part of software development processes. As it is considered one of the ideal ways to receive new jobs through changing requirements during the development process due to its speed and efficiency in delivering models that simulate the final model and its ability to be developed and changed according to the opinions of stakeholders.
Agile development and its iterative advantage and adaptability to changing requirements from stakeholders allows business teams to clearly and accurately understand requirements.
This paper explores that the use of prototyping in agile software development has an essential role in early and continuous verification of requirements in the development process through the creation of quick, concrete models of proposed features and functionality. This helps in identifying errors, problems or misunderstandings early in the process. Development and this understanding helps save time and material costs allocated to the development process. Using prototypes and integrating them into agile development helps work teams and stakeholders adapt flexibly, obtain a clear vision of requirements, and identify weak points in the development process by holding meetings and Periodic meetings to obtain a highly efficient product that meets their desires and the desires of end users.

Research paper thumbnail of The Impact of Artificial Intelligence on Cybersecurity

IJCI, Vol (3), No (2), February 2024, Feb 3, 2024

The aim of this research is to examine the structure of the impact of AI technology on improving ... more The aim of this research is to examine the structure of the impact of AI technology on improving cybersecurity. Also, this research focuses on using machine learning and big data analysis techniques to enhance the ability to better detect and respond to cyber threats.
This research follows a qualitative methodology to meet the core research objectives of assessing the impact of Artificial Intelligence on Cybersecurity by reviewing the previous studies on this field. This research focuses on using machine learning and big data analysis techniques to enhance the ability to better detect and respond to cyber threats. The comprehensive analysis of over 20 studies published between 2015-2024 offers valuable insights into the current state and impact of AI in enhancing cybersecurity policies and practices.
The findings of the research revealed that artificial intelligence and machine learning significantly expand capabilities for cyber threat detection, incident alerting, and automated response through adaptive pattern recognition across diverse monitoring sources like network traffic, endpoint behaviors and security information feeds, performed at machine scale. By constantly retraining on evolving attack trends and benign usage shifts, AI holds immense potential enhancing protection. However, sizable gaps observed between touted expectations versus measured impact today highlight obstacles of practical integration like monitoring overheads, skills shortages, result interpretability, human-AI teaming dynamics, and adversarial manipulations that could undermine or reverse security aims. While transformative upside exists long-term, pragmatic roadmaps addressing these formidable challenges using best practices around responsible AI governance appear essential to maximize gains while minimizing unintended consequences of well-intentioned systems interacting with ever stealthier threats amid zones of high operational and ethical ambiguity.
The research recommends using machine learning and big data analysis techniques to enhance the ability to better detect and respond to cyber threats.

Papers - IJCI, Vol 3, No 3 by International Journal of Computers and Informatics - EISSN: 2976-9361

Research paper thumbnail of Exploiting the Capabilities of Classifiers to Examine a Website Defacement Data Set

IJCI, Vol (3), No (3), March 2024, Mar 1, 2024

Website defacement is the illegal electronic act of changing a website. In this paper, the capabi... more Website defacement is the illegal electronic act of changing a website. In this paper, the capabilities of robust machine learning classifiers are exploited to select the best input feature set for evaluation of a website’s defacement risk. A defacement mining data set was obtained from Zone-H, a private organization, and a sample consisting of 93,644 data points was pre-processed and used for modelling purposes. Using multi-dimensional features as input, enormous modelling computations were carried out to determine the optimal outputs, in terms of performance. Reason and hackmode presented the highest contributions for the evaluation of website defacement, and were thus chosen as outputs. Various machine learning models were examined, and decision tree (DT), k-nearest neighbours (k-NN), and random forest (RF) were found to be the most powerful algorithms for prediction of the target model. The input variables 'domain', 'system', 'web_server', 'redefacement', 'type', 'def_grade', and 'reason/hackmode' were tested and used to shape the final model. Using the cross-validation (CV) technique, the key performance factors of the models were calculated and reported. After calculating the average scores for the hyperparameter metrics (i.e., max-depth, min-sample-leaf, weight, max-features, and CV), both targets were evaluated, and the learning algorithms were ranked as RF > DT > k-NN. The reason and hackmode variables were thoroughly analysed, and the average score accuracies for the reason and hackmode targets were 0.85 and 0.585, respectively. The results comprise a significant development, in terms of modelling and optimizing website defacement risk. This study successfully addresses key cybersecurity concerns, particularly website defacement.

Research paper thumbnail of The Role of Cloud Storage in Rebuilding Governmental Data After Conflict: A Case Study of Sudan 2023

IJCI, Vol (3), No (3), March 2024, Mar 2, 2024

The aim of this research is to assess the Role of Cloud Storage in Rebuilding Governmental Data A... more The aim of this research is to assess the Role of Cloud Storage in Rebuilding Governmental Data After Conflict, with a deeper insight into Sudanese case.
To investigate the role of cloud storage in rebuilding governmental data after conflict in Sudan, this study employs a quantitative research methodology. The primary data collection instrument is a structured questionnaire designed to gather insights and perspectives from 80 participants of key stakeholders involved in the cloud storage adoption and data reconstruction efforts in Sudan, including (IT professionals and data management experts, Senior-level government officials and policymakers, Representatives from cloud service providers, End-users and data consumers from various government agencies).
The collected data underwent accurate statistical analysis, including descriptive and inferential techniques, to identify patterns, trends, and relationships among the variables under investigation. Quantitative data was analyzed using "SPSS" statistical software.
The findings of the research revealed that, a total of 18 participants representing (22.5%) agree that there is a high level of awareness and understanding of cloud storage technologies among government agencies in Sudan, while 28 participants representing (35%) disagree. Which indicates the need of spreading the awareness and understanding of cloud storage technologies among government agencies in Sudan. Furthermore, Pearson Chi-Square test was used to measure the role of cloud storage in rebuilding governmental data after conflict in Sudan, a significance value of (0.021) which is less than (p-value=.05) suggests that there is a significant role of cloud storage in rebuilding governmental data after conflict in Sudan.

Research paper thumbnail of Monte Carlo Simulation for Risk Management in ِِِAgile Software Development

IJCI, Vol (3), No (3), March 2024, Mar 3, 2024

Agile development methodologies are becoming increasingly popular in agile development projects d... more Agile development methodologies are becoming increasingly popular in agile development projects due to their iterative nature and adaptability. The Monte Carlo method is distinguished by its statistical technique of using random samples to obtain many satisfactory results for solving uncertainty. It can be used in agile software development by building different scenarios and measuring their impact on the project results through statistical operations. Its ability to meet significant challenges in managing risk and uncertainty mitigation.
In this study, we propose a Monte Carlo simulation-based approach to measure and analyze risks in the agile development process. It provides a probabilistic framework for risk assessment by integrating the Monte Carlo simulation methodology to model the various development process variables. It was addressed by identifying the main risk factors within agile projects, such as tasks, availability of resources, and external dependencies. The proposed approach contributes to mitigating potential risks in agile software development using Monte Carlo theory, which provides a systematic framework that enables work teams and management to overcome risk and uncertainty associated with the agile development process in dynamic project environments.

Papers - IJCI, Vol 3, No 4 by International Journal of Computers and Informatics - EISSN: 2976-9361

Research paper thumbnail of A Proposed Quality Measurements for Information Systems Development Projects

IJCI, Vol (3), No (4), April 2024, Apr 2, 2024

The objective of this paper is to propose quality measurements for ISDP to achieve higher quality... more The objective of this paper is to propose quality measurements for ISDP to achieve higher quality levels for information systems development projects (ISDP). The complexity of assessing information system quality stems from its many important dimensions. This paper presents important quality concepts and fundamentals related to ISDP. In addition, it presents the life cycle, phases, and activities of ISDP. Depending on the proposed steps and a combination of statistical techniques, this paper introduces a proposed quality assurance model for ISDP activities. This proposed model can be used for building a software tool for the quality assurance of ISDP.

Research paper thumbnail of Prospects of Employing Graduates of Computer Science and Technology Diploma Programs in Asir Region, Saudi Arabia: An Analysis for the Period 2019-2023

IJCI, Vol (3), No (4), April 2024, Apr 1, 2024

This paper aims to explore and analyze the employment processes of graduates from computer scienc... more This paper aims to explore and analyze the employment processes of graduates from computer science diploma programs in Saudi Arabia during the period from 2020 to 2023.
This paper employed a quantitative research approach and utilize the survey method to collect data. The survey instrument designed to address the research objectives and questions outlined earlier. The collected survey data was analyzed using the Statistical Package for the Social Sciences (SPSS) software. The target population for this study comprises all graduates of computer science and technology diploma programs in the Asir Region of Saudi Arabia for the period from 2019 to 2023. Since it is not feasible to survey the entire population, a representative sample of 60 participants had been selected using a random sampling technique.
The results indicate that there are 42 (70%) who are Employed, there are 10 (16.7%) who are Self-Employed, and there are only 8 (13.3%) who are Unemployed. Which indicates that Graduates of Computer Science and Technology Diploma Programs in Asir Region, Saudi Arabia have higher probabilities to be employed. There are 19 (31.7%) who were graduated in 2019 and 2020, and there are 10 (16.7%) who were graduated in 2022. While there are 9 (15%) who were graduated in 2023. And there are only 3 (5%) who were graduated in 2021. there are 26 (43.3%) who are Employed in Public Sector, there are 20 (33.3%) who are Employed in private Sector, there are 6 (10%) who are Employed in mixed Sector (public and private), and there are only 8 (13.3%) who are Unemployed. Which indicates that private sector faces greater challenges in employing computer science program graduates compared to the public sector.

Papers - IJCI, Vol 3, No 5 by International Journal of Computers and Informatics - EISSN: 2976-9361

Research paper thumbnail of أثر الخدمات الإلكترونية على رضا العملاء في الدوائر الحكومية – دراسة حالة: دائرة الجمارك الأردنية

IJCI, Vol (3), No (5), May 2024, May 1, 2024

تهدف هذه الدراسة بشكل أساسي إلى التعرف على أثر الخدمات الإلكترونية المقدمة في الدوائر الحكومية عل... more تهدف هذه الدراسة بشكل أساسي إلى التعرف على أثر الخدمات الإلكترونية المقدمة في الدوائر الحكومية على رضا العملاء وعلى مستوى الخدمة المقدمة لهم. حيث اعتمدت دائرة الجمارك الأردنية كحاله دراسية والتي يتم فيها استخدام بعض الأنظمة الإلكترونية في اجراءات التعامل مع العملاء مثل: نظام خدمة الجمهور الإلكتروني، خدمة نظام الأسيكودا العالمي، خدمة تطبيق التعريفة الجمركية عبر الأجهزة الخلوية، خدمة الإدخال المؤقت الإلكتروني، وخدمة التتبع الإلكتروني. ولتحقيق هذا الهدف تم تصميم استبانة تحتوي على 46 فقرة خاصة بمتغيرات الدراسة، مقسمة إلى: (32) فقرة تقيس أبعاد الخدمات الالكترونية، و(14) فقرة تقيس رضا العملاء.
وقد استخدم الباحثين في هذه الدراسة المنهج الوصفي التحليلي والمعتمد على المسح الميداني لمجتمع الدراسة، وقد توصلت الدراسة إلى مجموعة من النتائج تتمحور في وجود أثر ذو دلالة إحصائية للخدمات الإلكترونية المقدمة في دائرة الجمارك الأردنية وللأنظمة الإلكترونية الموجودة على رضا العملاء.
وفي ضوء النتائج فان الدراسة الحالية توصي بالآتي:
1. تعميم نتائج الدراسة على متخذي القرار في الجمارك الأردنية للاطلاع على مواطن القوة والضعف، وتجسيد مبدأ البحث والتطوير في الدائرة.
2. تطوير خدمة الجمهور الإلكتروني وابتكار آلية تساعد العميل على إنجاز عمله بمكان واحد بدلاً من التنقل بين مديريات مكاتب الدائرة الرئيسية أو بين المراكز الجمركية والدائرة.
3. ضرورة توفير شبكة وبرمجيات وبرامج قوية تدعم خدمة نظام الأسيكودا العالمي لمنع تكرار الانقطاع ووضع آلية ونظام يحفظ البيانات أولاً بأول بحال حصل انقطاع.
4. عرض خدمة الإدخال المؤقت الإلكتروني على لجنة مختصة من المبرمجين بهدف تحديثه وتطويره بحيث تسهل عملية استعماله وتصبح خدمة الإدخال المؤقت خالية من التعقيدات بالنسبة للعملاء.

Research paper thumbnail of Integrated Protection Mechanisms for Mitigating Microarchitectural Attacks in Cloud Computing

IJCI, Vol (3), No (5), May 2024, May 2, 2024

By utilising the multi-tenancy characteristic, cloud computing promises to reduce expenses throug... more By utilising the multi-tenancy characteristic, cloud computing promises to reduce expenses through less spending on hardware, infrastructure, and software. Even with all of its advantages, multi-tenancy poses hazards for cloud computing. Without suitable cloud security solutions, security concerns might end up being the main factor delaying adoption. Additionally, multi-tenancy enabled by virtualisation, which is one of the key elements of a cloud, creates significant security vulnerabilities and does not provide adequate isolation between various instances running on the same physical system. The three strategies we suggest to secure shared virtualised systems against microarchitectural attacks are presented in this re- search as a comprehensive solution. This includes experiments for combining the three approaches and assessing them in potential operational contexts. The assessment techniques have used several host systems to assess the system overhead, CPU usage, and protection accuracy. The studies we have conducted on both Debian 10 and Ubuntu 18.04 LTS physical servers utilising the KVM hypervisor demonstrate that our comprehensive protection can identify attacks with about 97% accuracy, and depending on how many mechanisms were used in the various experimental scenario settings, the proportion of CPU consumption has varied significantly. The CPU usage rate in experiments with different scenarios has ranged from 27% to 68%, while the average system load over 5 minutes has ranged from 1.40 to 4.2. This shows our proposed mechanisms are subject to refinement and enhancement, especially in cases that require a high processing load. Note that if we had used servers with more computing power, the results would certainly have been better.

Research paper thumbnail of Assessing the Level of Cybersecurity Awareness and Practices of Application Users and Their Impact on Privacy Policy Consents: A Case Study in Application Downloading

IJCI, Vol (3), No (5), May 2024, May 3, 2024

The aim of this study is to understand the level of cybersecurity awareness and practices of appl... more The aim of this study is to understand the level of cybersecurity awareness and practices of application users and determine the impact on their consent to privacy policies through a case study in application downloading. To achieve this aim, this study employs quantitative research methodology. The primary data collection instrument is a structured questionnaire designed to gather insights and perspectives from 65 participants of application users in the Kingdom of Saudi Arabia, including several types of applications. The collected data was collected and analyzed using SPSS software. The findings revealed that most of the study participants disagree that they understand the importance of cybersecurity measures when using mobile applications with a frequency of 27 and a percentage of 41.5%. Also, most of the study participants disagree that they are aware about negative cybersecurity practices with a frequency of 26 and a percentage of 40%. Furthermore, only 23 participants are paying attention to Download applications from only official app stores or trusted sources with a percentage of 35.4% The findings of the study also revealed that a p-value related to Pearson Chi-Square is (0.019) which is less than a significance level of (0.05), this proves a significant statistical relationship between cybersecurity awareness and practices of application users on privacy policy consents.

Research paper thumbnail of AI Driven Approaches in Swarm Robotics - A review

IJCI, Vol (3), No (5), May 2024, May 4, 2024

The integration of artificial intelligence (AI) and swarm robotics has brought about significant ... more The integration of artificial intelligence (AI) and swarm robotics has brought about significant advancements. Swarm robotics is based on decentralized control and self-organization, taking inspiration from natural swarms. It involves employing a large number of uncomplicated robots to collaboratively complete intricate tasks. The algorithms underpinning swarm robotics, which is artificial intelligence, vary depending on the specific role of AI - such as error detection, navigation, coordination, and optimization - and according to the tasks that these robots aim to undertake. In this systematic review, we aim to explore algorithms based on artificial intelligence in swarm robots and the advantages of applying them in the real world. In this systematic review, 74 scientific papers published between the years 2020 to 2024 were examined, but 53 of them were included after applying our methodology to them. The review investigated the common role of AI in swarm robotics, the most commonly used AI algorithms, and the percentage of the research that was conducted and tested in the real world. In conclusion, we discovered that there is a need for research that develops fault detection and coordination strategies, as well as a need for real-world testing.

Papers - IJCI, Vol 3, No 6 by International Journal of Computers and Informatics - EISSN: 2976-9361

Research paper thumbnail of Alsaif Dataset Creation and Evaluation for Gymnastics Movement

IJCI, Vol (3), No (6), June 2024, Jun 1, 2024

Computer vision systems play a major role in many areas of life, as reliance has clearly begun on... more Computer vision systems play a major role in many areas of life, as reliance has clearly begun on these systems in the medical field, where they help doctors diagnose diseases correctly. In addition, they are relied upon in the sports field, where they can help referees in giving correct arbitration decisions. The accuracy of computer vision systems has increased with the emergence of deep learning techniques, which require a large amount of data on which a deep learning model can be trained. Therefore, if any deep learning model is relied upon to detect and distinguish any movement or any entity within images or video clips, it must first Training this model on a set of images of these movements or objects to be discovered and distinguished. From this standpoint, this article presents the construction of a database for one of the important games, the gymnastics game, which is popular in many countries. A database has been built for the gymnastics game, which can be used in the application. Deep learning models were developed in order to help coaches and referees in this game, and for these movements there is no database available on the Internet. A group of video clips spread on the Internet was relied upon to build this base, where ten basic movements in the game of gymnastics were distinguished, and one of the models was evaluated. Deep learning on these images (yolo7).

Research paper thumbnail of Efficiency, Research, and Healthcare Economics: (Vital Threat Detection System) A Systematic Review

IJCI, Vol (3), No (6), June 2024, Jun 2, 2024

Monitoring vital signs and detecting diseases like diabetes and cancer at an early stage are incr... more Monitoring vital signs and detecting diseases like diabetes and cancer at an early stage are incredibly important for safeguarding patients' lives and ensuring a healthy environment. In this study, we present a comprehensive systematic review focusing on vital monitoring systems in diverse fields. We reviewed 85 articles spanning from 2019 to 2024. From the selected articles, our aim is to explore the frameworks and algorithms of vital signs monitoring, the latest techniques used in remote vital signs monitoring such as radar and smart watch, as well as the measurement of vital signs for heart rate and respiratory diseases. Also, we discuss the threats that may affect healthcare systems and how to secure against these threats. The findings emphasize the critical importance of acquiring continuous vital monitoring systems, which have immense potential for improving healthcare. These systems are crucial for early diagnosis and prediction of conditions that may negatively impact the patient's health. Additionally, it could be beneficial for doctors and healthcare staff by saving time and costs.

Research paper thumbnail of Sensory System for Swarm Drone: A Systematic Review

IJCI, Vol (3), No (6), June 2024, Jun 3, 2024

Drone swarms, or unmanned aerial vehicles (UAVs), are becoming a promising domain in many areas o... more Drone swarms, or unmanned aerial vehicles (UAVs), are becoming a promising domain in many areas of our lives. They are intricate, multidisciplinary systems, and most research projects concentrate on individual system components for particular use cases. Its involvement in missions and services has shown an imperatively positive influence. This review's objectives are to give a broad overview of the primary applications that spur most research efforts in this area. In our review, we have selected sixty articles between 2019 and 2024 about drone swarms. The review results outline the covered usage fields of drones in the chosen articles. It highlighted communication and control mostly in twenty-seven articles, services in nineteen articles, and tracking in fourteen articles, and we categorized the service domains more specifically as inventory, health care, defense, rescuing, and delivery. Besides that, the simulation aspect has been used for categorization as follows: twelve articles have specified their simulations, thirty-one articles haven’t specified their simulations, and seventeen articles haven’t used simulations. In addition, we have concluded the result of the SWOT analysis for the drone applications.

Research paper thumbnail of Enhancements in E-government using New Technologies and Approaches

IJCI, Vol (3), No (6), June 2024, Jun 4, 2024

E-Government aims to provide required services to required users at the required time. E-governme... more E-Government aims to provide required services to required users at the required time. E-government uses Information and Communication technologies (ICT) to provide essential government services and information exchange with the citizens and other stakeholders through the internet. Existing e-government faces many challenges, from development to implementation. The objective of this paper is to give insights about cloud computing, agile principles and how to use them for E-government. This paper reviews different cloud computing and agile development methodologies with new technologies that have come with new approaches.

Papers - IJCI, Vol 3, No 7 by International Journal of Computers and Informatics - EISSN: 2976-9361

Research paper thumbnail of Deploying Red Hat HPC Cluster in Al-Neelain University Labs

IJCI, Vol (3), No (7), July 2024, Jul 1, 2024

By using HPC Cluster, users can expedite their HPC workloads on elastic resources as needed and s... more By using HPC Cluster, users can expedite their HPC workloads on elastic resources as needed and save money by choosing from low-cost pricing models that match utilization needs. The researchers preferred the red hat open-source solution because it is the easiest pre-integrated, pre-tested, and certified configurations. Most HPC software forgets about keys like storage and data integrity also I/O performance, So the researchers recommend using third party tools and monitors to reduce this weakness.

Research paper thumbnail of Risk Management in Agile Software Methods

IJCI, Vol (3), No (7), July 2024, Jul 2, 2024

Project risk is the problems, which have not happened yet, that could cause some loss or threaten... more Project risk is the problems, which have not happened yet, that could cause some loss or threaten the success of the project, whereas risk management is the application of appropriate tools and procedures to contain risk within acceptable limits. Risk management is the application of appropriate tools and procedures to contain risk within acceptable limits. In this paper, the authors apply risk management to software development that uses extreme programming approach. A risk tool is designed and developed using Microsoft Excel. The tool is simple to use and would help risk analysis of the twelve practices of extreme programming. The tool has been used and experimented with. Information such as project budget, risk management budget, cost of controls, SLE, ARO have been entered into the tool to analyze the priority practices in order to decide which practice must be dealt with first.

Research paper thumbnail of إدارة المخاطر في مشروعات نظم المعلومات

IJCI, Vol (3), No (7), July 2024, Jul 3, 2024

تهتم هذه الورقة بدراسة الأخطار التي تواجه مشروعات نظم المعلومات من حيث تحديد أو تعريف الأخطار، در... more تهتم هذه الورقة بدراسة الأخطار التي تواجه مشروعات نظم المعلومات من حيث تحديد أو تعريف الأخطار، دراسة أهم هذه الأخطار وتحليل مسبباتها، تصنيف الأخطار إلى مستويات من حيث احتمالية الحدوث Probability وتأثيرات الحدوث Impacts. كما تتناول هذه الورقة كيفية ترتيب الأخطار وإعطاء أولويات لها، وكيفية التخطيط لمواجهة هذه الأخطار. أيضا يتم إلقاء الضوء على الإجراءات التي يجب القيام بها لعمل تحليل ورقابة مستمرة للأخطار بما يؤدي إلى تجنبها أو تخفيف آثارها.

Research paper thumbnail of Association Rules Elicitation for Customer’s Shopping on E-commerce Applications

IJCI, Vol (3), No (1), January 2024, Jan 1, 2024

This research provides an approach for eliciting association rules for customers’ shopping on e-c... more This research provides an approach for eliciting association rules for customers’ shopping on e-commerce applications based on the Apriori algorithm. The proposed system shows and displays some offers and deals from various branches. The system provides the analytics for the seller as the demand for some varieties and the weakness in other varieties and the whole application is organized on the Cloud. The architecture includes three levels; the front-end, middle, and back-end. The front-end level of the site-based Mobile shopping application is made up of Android Mobile devices, to buy miscellaneous products from various nearby branches. The front-end level also displays the link between items purchased. The middle repository level provides a Web service to generate returns from a relational database.
The Exchanged information and data between application and servers is stored in the Cloud. The background level offers a Web server and a MySQL database. In this paper, we propose an architecture that reduces the communication overhead in existing Mobile Agent-based Distributed Association Rule Mining (MAD-ARM).

Research paper thumbnail of Measuring the Performance of Information Systems Project Managers: Indicators and Metrics

IJCI, Vol (3), No (1), January 2024, Jan 2, 2024

Measuring performance is a process used in the domain of project management and quality processes... more Measuring performance is a process used in the domain of project management and quality processes to determine and communicate status and accomplishments measured against specific objectives, schedules, and milestones. This paper is concerned with the calculation of performance indicators of Information Systems Project Management (ISPM). It clarifies the relationships between ISPM domains, performance metrics, and performance indicators. This paper presents a proposed list of metrics for ISPM. Based on these ISPM metrics and a combination of statistical techniques, we built a model for calculating ISPM performance indicators. The quality reviewers can use this model to evaluate and track the performance of IS project managers.

Research paper thumbnail of Using Prototypes in Agile Software Development

IJCI, Vol (3), No (2), February 2024, Feb 2, 2024

Prototyping has now become an important and essential part of software development processes. As ... more Prototyping has now become an important and essential part of software development processes. As it is considered one of the ideal ways to receive new jobs through changing requirements during the development process due to its speed and efficiency in delivering models that simulate the final model and its ability to be developed and changed according to the opinions of stakeholders.
Agile development and its iterative advantage and adaptability to changing requirements from stakeholders allows business teams to clearly and accurately understand requirements.
This paper explores that the use of prototyping in agile software development has an essential role in early and continuous verification of requirements in the development process through the creation of quick, concrete models of proposed features and functionality. This helps in identifying errors, problems or misunderstandings early in the process. Development and this understanding helps save time and material costs allocated to the development process. Using prototypes and integrating them into agile development helps work teams and stakeholders adapt flexibly, obtain a clear vision of requirements, and identify weak points in the development process by holding meetings and Periodic meetings to obtain a highly efficient product that meets their desires and the desires of end users.

Research paper thumbnail of The Impact of Artificial Intelligence on Cybersecurity

IJCI, Vol (3), No (2), February 2024, Feb 3, 2024

The aim of this research is to examine the structure of the impact of AI technology on improving ... more The aim of this research is to examine the structure of the impact of AI technology on improving cybersecurity. Also, this research focuses on using machine learning and big data analysis techniques to enhance the ability to better detect and respond to cyber threats.
This research follows a qualitative methodology to meet the core research objectives of assessing the impact of Artificial Intelligence on Cybersecurity by reviewing the previous studies on this field. This research focuses on using machine learning and big data analysis techniques to enhance the ability to better detect and respond to cyber threats. The comprehensive analysis of over 20 studies published between 2015-2024 offers valuable insights into the current state and impact of AI in enhancing cybersecurity policies and practices.
The findings of the research revealed that artificial intelligence and machine learning significantly expand capabilities for cyber threat detection, incident alerting, and automated response through adaptive pattern recognition across diverse monitoring sources like network traffic, endpoint behaviors and security information feeds, performed at machine scale. By constantly retraining on evolving attack trends and benign usage shifts, AI holds immense potential enhancing protection. However, sizable gaps observed between touted expectations versus measured impact today highlight obstacles of practical integration like monitoring overheads, skills shortages, result interpretability, human-AI teaming dynamics, and adversarial manipulations that could undermine or reverse security aims. While transformative upside exists long-term, pragmatic roadmaps addressing these formidable challenges using best practices around responsible AI governance appear essential to maximize gains while minimizing unintended consequences of well-intentioned systems interacting with ever stealthier threats amid zones of high operational and ethical ambiguity.
The research recommends using machine learning and big data analysis techniques to enhance the ability to better detect and respond to cyber threats.

Research paper thumbnail of Exploiting the Capabilities of Classifiers to Examine a Website Defacement Data Set

IJCI, Vol (3), No (3), March 2024, Mar 1, 2024

Website defacement is the illegal electronic act of changing a website. In this paper, the capabi... more Website defacement is the illegal electronic act of changing a website. In this paper, the capabilities of robust machine learning classifiers are exploited to select the best input feature set for evaluation of a website’s defacement risk. A defacement mining data set was obtained from Zone-H, a private organization, and a sample consisting of 93,644 data points was pre-processed and used for modelling purposes. Using multi-dimensional features as input, enormous modelling computations were carried out to determine the optimal outputs, in terms of performance. Reason and hackmode presented the highest contributions for the evaluation of website defacement, and were thus chosen as outputs. Various machine learning models were examined, and decision tree (DT), k-nearest neighbours (k-NN), and random forest (RF) were found to be the most powerful algorithms for prediction of the target model. The input variables 'domain', 'system', 'web_server', 'redefacement', 'type', 'def_grade', and 'reason/hackmode' were tested and used to shape the final model. Using the cross-validation (CV) technique, the key performance factors of the models were calculated and reported. After calculating the average scores for the hyperparameter metrics (i.e., max-depth, min-sample-leaf, weight, max-features, and CV), both targets were evaluated, and the learning algorithms were ranked as RF > DT > k-NN. The reason and hackmode variables were thoroughly analysed, and the average score accuracies for the reason and hackmode targets were 0.85 and 0.585, respectively. The results comprise a significant development, in terms of modelling and optimizing website defacement risk. This study successfully addresses key cybersecurity concerns, particularly website defacement.

Research paper thumbnail of The Role of Cloud Storage in Rebuilding Governmental Data After Conflict: A Case Study of Sudan 2023

IJCI, Vol (3), No (3), March 2024, Mar 2, 2024

The aim of this research is to assess the Role of Cloud Storage in Rebuilding Governmental Data A... more The aim of this research is to assess the Role of Cloud Storage in Rebuilding Governmental Data After Conflict, with a deeper insight into Sudanese case.
To investigate the role of cloud storage in rebuilding governmental data after conflict in Sudan, this study employs a quantitative research methodology. The primary data collection instrument is a structured questionnaire designed to gather insights and perspectives from 80 participants of key stakeholders involved in the cloud storage adoption and data reconstruction efforts in Sudan, including (IT professionals and data management experts, Senior-level government officials and policymakers, Representatives from cloud service providers, End-users and data consumers from various government agencies).
The collected data underwent accurate statistical analysis, including descriptive and inferential techniques, to identify patterns, trends, and relationships among the variables under investigation. Quantitative data was analyzed using "SPSS" statistical software.
The findings of the research revealed that, a total of 18 participants representing (22.5%) agree that there is a high level of awareness and understanding of cloud storage technologies among government agencies in Sudan, while 28 participants representing (35%) disagree. Which indicates the need of spreading the awareness and understanding of cloud storage technologies among government agencies in Sudan. Furthermore, Pearson Chi-Square test was used to measure the role of cloud storage in rebuilding governmental data after conflict in Sudan, a significance value of (0.021) which is less than (p-value=.05) suggests that there is a significant role of cloud storage in rebuilding governmental data after conflict in Sudan.

Research paper thumbnail of Monte Carlo Simulation for Risk Management in ِِِAgile Software Development

IJCI, Vol (3), No (3), March 2024, Mar 3, 2024

Agile development methodologies are becoming increasingly popular in agile development projects d... more Agile development methodologies are becoming increasingly popular in agile development projects due to their iterative nature and adaptability. The Monte Carlo method is distinguished by its statistical technique of using random samples to obtain many satisfactory results for solving uncertainty. It can be used in agile software development by building different scenarios and measuring their impact on the project results through statistical operations. Its ability to meet significant challenges in managing risk and uncertainty mitigation.
In this study, we propose a Monte Carlo simulation-based approach to measure and analyze risks in the agile development process. It provides a probabilistic framework for risk assessment by integrating the Monte Carlo simulation methodology to model the various development process variables. It was addressed by identifying the main risk factors within agile projects, such as tasks, availability of resources, and external dependencies. The proposed approach contributes to mitigating potential risks in agile software development using Monte Carlo theory, which provides a systematic framework that enables work teams and management to overcome risk and uncertainty associated with the agile development process in dynamic project environments.

Research paper thumbnail of A Proposed Quality Measurements for Information Systems Development Projects

IJCI, Vol (3), No (4), April 2024, Apr 2, 2024

The objective of this paper is to propose quality measurements for ISDP to achieve higher quality... more The objective of this paper is to propose quality measurements for ISDP to achieve higher quality levels for information systems development projects (ISDP). The complexity of assessing information system quality stems from its many important dimensions. This paper presents important quality concepts and fundamentals related to ISDP. In addition, it presents the life cycle, phases, and activities of ISDP. Depending on the proposed steps and a combination of statistical techniques, this paper introduces a proposed quality assurance model for ISDP activities. This proposed model can be used for building a software tool for the quality assurance of ISDP.

Research paper thumbnail of Prospects of Employing Graduates of Computer Science and Technology Diploma Programs in Asir Region, Saudi Arabia: An Analysis for the Period 2019-2023

IJCI, Vol (3), No (4), April 2024, Apr 1, 2024

This paper aims to explore and analyze the employment processes of graduates from computer scienc... more This paper aims to explore and analyze the employment processes of graduates from computer science diploma programs in Saudi Arabia during the period from 2020 to 2023.
This paper employed a quantitative research approach and utilize the survey method to collect data. The survey instrument designed to address the research objectives and questions outlined earlier. The collected survey data was analyzed using the Statistical Package for the Social Sciences (SPSS) software. The target population for this study comprises all graduates of computer science and technology diploma programs in the Asir Region of Saudi Arabia for the period from 2019 to 2023. Since it is not feasible to survey the entire population, a representative sample of 60 participants had been selected using a random sampling technique.
The results indicate that there are 42 (70%) who are Employed, there are 10 (16.7%) who are Self-Employed, and there are only 8 (13.3%) who are Unemployed. Which indicates that Graduates of Computer Science and Technology Diploma Programs in Asir Region, Saudi Arabia have higher probabilities to be employed. There are 19 (31.7%) who were graduated in 2019 and 2020, and there are 10 (16.7%) who were graduated in 2022. While there are 9 (15%) who were graduated in 2023. And there are only 3 (5%) who were graduated in 2021. there are 26 (43.3%) who are Employed in Public Sector, there are 20 (33.3%) who are Employed in private Sector, there are 6 (10%) who are Employed in mixed Sector (public and private), and there are only 8 (13.3%) who are Unemployed. Which indicates that private sector faces greater challenges in employing computer science program graduates compared to the public sector.

Research paper thumbnail of أثر الخدمات الإلكترونية على رضا العملاء في الدوائر الحكومية – دراسة حالة: دائرة الجمارك الأردنية

IJCI, Vol (3), No (5), May 2024, May 1, 2024

تهدف هذه الدراسة بشكل أساسي إلى التعرف على أثر الخدمات الإلكترونية المقدمة في الدوائر الحكومية عل... more تهدف هذه الدراسة بشكل أساسي إلى التعرف على أثر الخدمات الإلكترونية المقدمة في الدوائر الحكومية على رضا العملاء وعلى مستوى الخدمة المقدمة لهم. حيث اعتمدت دائرة الجمارك الأردنية كحاله دراسية والتي يتم فيها استخدام بعض الأنظمة الإلكترونية في اجراءات التعامل مع العملاء مثل: نظام خدمة الجمهور الإلكتروني، خدمة نظام الأسيكودا العالمي، خدمة تطبيق التعريفة الجمركية عبر الأجهزة الخلوية، خدمة الإدخال المؤقت الإلكتروني، وخدمة التتبع الإلكتروني. ولتحقيق هذا الهدف تم تصميم استبانة تحتوي على 46 فقرة خاصة بمتغيرات الدراسة، مقسمة إلى: (32) فقرة تقيس أبعاد الخدمات الالكترونية، و(14) فقرة تقيس رضا العملاء.
وقد استخدم الباحثين في هذه الدراسة المنهج الوصفي التحليلي والمعتمد على المسح الميداني لمجتمع الدراسة، وقد توصلت الدراسة إلى مجموعة من النتائج تتمحور في وجود أثر ذو دلالة إحصائية للخدمات الإلكترونية المقدمة في دائرة الجمارك الأردنية وللأنظمة الإلكترونية الموجودة على رضا العملاء.
وفي ضوء النتائج فان الدراسة الحالية توصي بالآتي:
1. تعميم نتائج الدراسة على متخذي القرار في الجمارك الأردنية للاطلاع على مواطن القوة والضعف، وتجسيد مبدأ البحث والتطوير في الدائرة.
2. تطوير خدمة الجمهور الإلكتروني وابتكار آلية تساعد العميل على إنجاز عمله بمكان واحد بدلاً من التنقل بين مديريات مكاتب الدائرة الرئيسية أو بين المراكز الجمركية والدائرة.
3. ضرورة توفير شبكة وبرمجيات وبرامج قوية تدعم خدمة نظام الأسيكودا العالمي لمنع تكرار الانقطاع ووضع آلية ونظام يحفظ البيانات أولاً بأول بحال حصل انقطاع.
4. عرض خدمة الإدخال المؤقت الإلكتروني على لجنة مختصة من المبرمجين بهدف تحديثه وتطويره بحيث تسهل عملية استعماله وتصبح خدمة الإدخال المؤقت خالية من التعقيدات بالنسبة للعملاء.

Research paper thumbnail of Integrated Protection Mechanisms for Mitigating Microarchitectural Attacks in Cloud Computing

IJCI, Vol (3), No (5), May 2024, May 2, 2024

By utilising the multi-tenancy characteristic, cloud computing promises to reduce expenses throug... more By utilising the multi-tenancy characteristic, cloud computing promises to reduce expenses through less spending on hardware, infrastructure, and software. Even with all of its advantages, multi-tenancy poses hazards for cloud computing. Without suitable cloud security solutions, security concerns might end up being the main factor delaying adoption. Additionally, multi-tenancy enabled by virtualisation, which is one of the key elements of a cloud, creates significant security vulnerabilities and does not provide adequate isolation between various instances running on the same physical system. The three strategies we suggest to secure shared virtualised systems against microarchitectural attacks are presented in this re- search as a comprehensive solution. This includes experiments for combining the three approaches and assessing them in potential operational contexts. The assessment techniques have used several host systems to assess the system overhead, CPU usage, and protection accuracy. The studies we have conducted on both Debian 10 and Ubuntu 18.04 LTS physical servers utilising the KVM hypervisor demonstrate that our comprehensive protection can identify attacks with about 97% accuracy, and depending on how many mechanisms were used in the various experimental scenario settings, the proportion of CPU consumption has varied significantly. The CPU usage rate in experiments with different scenarios has ranged from 27% to 68%, while the average system load over 5 minutes has ranged from 1.40 to 4.2. This shows our proposed mechanisms are subject to refinement and enhancement, especially in cases that require a high processing load. Note that if we had used servers with more computing power, the results would certainly have been better.

Research paper thumbnail of Assessing the Level of Cybersecurity Awareness and Practices of Application Users and Their Impact on Privacy Policy Consents: A Case Study in Application Downloading

IJCI, Vol (3), No (5), May 2024, May 3, 2024

The aim of this study is to understand the level of cybersecurity awareness and practices of appl... more The aim of this study is to understand the level of cybersecurity awareness and practices of application users and determine the impact on their consent to privacy policies through a case study in application downloading. To achieve this aim, this study employs quantitative research methodology. The primary data collection instrument is a structured questionnaire designed to gather insights and perspectives from 65 participants of application users in the Kingdom of Saudi Arabia, including several types of applications. The collected data was collected and analyzed using SPSS software. The findings revealed that most of the study participants disagree that they understand the importance of cybersecurity measures when using mobile applications with a frequency of 27 and a percentage of 41.5%. Also, most of the study participants disagree that they are aware about negative cybersecurity practices with a frequency of 26 and a percentage of 40%. Furthermore, only 23 participants are paying attention to Download applications from only official app stores or trusted sources with a percentage of 35.4% The findings of the study also revealed that a p-value related to Pearson Chi-Square is (0.019) which is less than a significance level of (0.05), this proves a significant statistical relationship between cybersecurity awareness and practices of application users on privacy policy consents.

Research paper thumbnail of AI Driven Approaches in Swarm Robotics - A review

IJCI, Vol (3), No (5), May 2024, May 4, 2024

The integration of artificial intelligence (AI) and swarm robotics has brought about significant ... more The integration of artificial intelligence (AI) and swarm robotics has brought about significant advancements. Swarm robotics is based on decentralized control and self-organization, taking inspiration from natural swarms. It involves employing a large number of uncomplicated robots to collaboratively complete intricate tasks. The algorithms underpinning swarm robotics, which is artificial intelligence, vary depending on the specific role of AI - such as error detection, navigation, coordination, and optimization - and according to the tasks that these robots aim to undertake. In this systematic review, we aim to explore algorithms based on artificial intelligence in swarm robots and the advantages of applying them in the real world. In this systematic review, 74 scientific papers published between the years 2020 to 2024 were examined, but 53 of them were included after applying our methodology to them. The review investigated the common role of AI in swarm robotics, the most commonly used AI algorithms, and the percentage of the research that was conducted and tested in the real world. In conclusion, we discovered that there is a need for research that develops fault detection and coordination strategies, as well as a need for real-world testing.

Research paper thumbnail of Alsaif Dataset Creation and Evaluation for Gymnastics Movement

IJCI, Vol (3), No (6), June 2024, Jun 1, 2024

Computer vision systems play a major role in many areas of life, as reliance has clearly begun on... more Computer vision systems play a major role in many areas of life, as reliance has clearly begun on these systems in the medical field, where they help doctors diagnose diseases correctly. In addition, they are relied upon in the sports field, where they can help referees in giving correct arbitration decisions. The accuracy of computer vision systems has increased with the emergence of deep learning techniques, which require a large amount of data on which a deep learning model can be trained. Therefore, if any deep learning model is relied upon to detect and distinguish any movement or any entity within images or video clips, it must first Training this model on a set of images of these movements or objects to be discovered and distinguished. From this standpoint, this article presents the construction of a database for one of the important games, the gymnastics game, which is popular in many countries. A database has been built for the gymnastics game, which can be used in the application. Deep learning models were developed in order to help coaches and referees in this game, and for these movements there is no database available on the Internet. A group of video clips spread on the Internet was relied upon to build this base, where ten basic movements in the game of gymnastics were distinguished, and one of the models was evaluated. Deep learning on these images (yolo7).

Research paper thumbnail of Efficiency, Research, and Healthcare Economics: (Vital Threat Detection System) A Systematic Review

IJCI, Vol (3), No (6), June 2024, Jun 2, 2024

Monitoring vital signs and detecting diseases like diabetes and cancer at an early stage are incr... more Monitoring vital signs and detecting diseases like diabetes and cancer at an early stage are incredibly important for safeguarding patients' lives and ensuring a healthy environment. In this study, we present a comprehensive systematic review focusing on vital monitoring systems in diverse fields. We reviewed 85 articles spanning from 2019 to 2024. From the selected articles, our aim is to explore the frameworks and algorithms of vital signs monitoring, the latest techniques used in remote vital signs monitoring such as radar and smart watch, as well as the measurement of vital signs for heart rate and respiratory diseases. Also, we discuss the threats that may affect healthcare systems and how to secure against these threats. The findings emphasize the critical importance of acquiring continuous vital monitoring systems, which have immense potential for improving healthcare. These systems are crucial for early diagnosis and prediction of conditions that may negatively impact the patient's health. Additionally, it could be beneficial for doctors and healthcare staff by saving time and costs.

Research paper thumbnail of Sensory System for Swarm Drone: A Systematic Review

IJCI, Vol (3), No (6), June 2024, Jun 3, 2024

Drone swarms, or unmanned aerial vehicles (UAVs), are becoming a promising domain in many areas o... more Drone swarms, or unmanned aerial vehicles (UAVs), are becoming a promising domain in many areas of our lives. They are intricate, multidisciplinary systems, and most research projects concentrate on individual system components for particular use cases. Its involvement in missions and services has shown an imperatively positive influence. This review's objectives are to give a broad overview of the primary applications that spur most research efforts in this area. In our review, we have selected sixty articles between 2019 and 2024 about drone swarms. The review results outline the covered usage fields of drones in the chosen articles. It highlighted communication and control mostly in twenty-seven articles, services in nineteen articles, and tracking in fourteen articles, and we categorized the service domains more specifically as inventory, health care, defense, rescuing, and delivery. Besides that, the simulation aspect has been used for categorization as follows: twelve articles have specified their simulations, thirty-one articles haven’t specified their simulations, and seventeen articles haven’t used simulations. In addition, we have concluded the result of the SWOT analysis for the drone applications.

Research paper thumbnail of Enhancements in E-government using New Technologies and Approaches

IJCI, Vol (3), No (6), June 2024, Jun 4, 2024

E-Government aims to provide required services to required users at the required time. E-governme... more E-Government aims to provide required services to required users at the required time. E-government uses Information and Communication technologies (ICT) to provide essential government services and information exchange with the citizens and other stakeholders through the internet. Existing e-government faces many challenges, from development to implementation. The objective of this paper is to give insights about cloud computing, agile principles and how to use them for E-government. This paper reviews different cloud computing and agile development methodologies with new technologies that have come with new approaches.

Research paper thumbnail of Deploying Red Hat HPC Cluster in Al-Neelain University Labs

IJCI, Vol (3), No (7), July 2024, Jul 1, 2024

By using HPC Cluster, users can expedite their HPC workloads on elastic resources as needed and s... more By using HPC Cluster, users can expedite their HPC workloads on elastic resources as needed and save money by choosing from low-cost pricing models that match utilization needs. The researchers preferred the red hat open-source solution because it is the easiest pre-integrated, pre-tested, and certified configurations. Most HPC software forgets about keys like storage and data integrity also I/O performance, So the researchers recommend using third party tools and monitors to reduce this weakness.

Research paper thumbnail of Risk Management in Agile Software Methods

IJCI, Vol (3), No (7), July 2024, Jul 2, 2024

Project risk is the problems, which have not happened yet, that could cause some loss or threaten... more Project risk is the problems, which have not happened yet, that could cause some loss or threaten the success of the project, whereas risk management is the application of appropriate tools and procedures to contain risk within acceptable limits. Risk management is the application of appropriate tools and procedures to contain risk within acceptable limits. In this paper, the authors apply risk management to software development that uses extreme programming approach. A risk tool is designed and developed using Microsoft Excel. The tool is simple to use and would help risk analysis of the twelve practices of extreme programming. The tool has been used and experimented with. Information such as project budget, risk management budget, cost of controls, SLE, ARO have been entered into the tool to analyze the priority practices in order to decide which practice must be dealt with first.

Research paper thumbnail of إدارة المخاطر في مشروعات نظم المعلومات

IJCI, Vol (3), No (7), July 2024, Jul 3, 2024

تهتم هذه الورقة بدراسة الأخطار التي تواجه مشروعات نظم المعلومات من حيث تحديد أو تعريف الأخطار، در... more تهتم هذه الورقة بدراسة الأخطار التي تواجه مشروعات نظم المعلومات من حيث تحديد أو تعريف الأخطار، دراسة أهم هذه الأخطار وتحليل مسبباتها، تصنيف الأخطار إلى مستويات من حيث احتمالية الحدوث Probability وتأثيرات الحدوث Impacts. كما تتناول هذه الورقة كيفية ترتيب الأخطار وإعطاء أولويات لها، وكيفية التخطيط لمواجهة هذه الأخطار. أيضا يتم إلقاء الضوء على الإجراءات التي يجب القيام بها لعمل تحليل ورقابة مستمرة للأخطار بما يؤدي إلى تجنبها أو تخفيف آثارها.

Research paper thumbnail of الحوسبة السحابية: مفهومها واستخداماتها

IJCI, Vol (3), No (8), August 2024, Aug 1, 2024

السحابة هي تقنية ناشئة في عالم تقنية المعلومات، قامت بتقديم موارد تقنية المعلومات والحاسوب كخدمات... more السحابة هي تقنية ناشئة في عالم تقنية المعلومات، قامت بتقديم موارد تقنية المعلومات والحاسوب كخدمات. وهذه الخدمات التي تقدمها الحوسبة السحابية تتميز بأنها متوفرة حسب الطلب وقابلة للتطوير وذات مرونة ولا تعتمد على جهاز المستخدم وموثوق بها. والحوسبة السحابية مبنية على مفهوم المحاكاة الافتراضية. في هذا البحث نقدم لمحة عامة عن الحوسبة السحابية وأنواعها وأنماط خدماتها ومميزاتها ومعوقات استخدامها.

Research paper thumbnail of A Systematic Review on Deep Fake Image Generation, Detection Techniques, Ethical Implications, and Overcoming Challenges

IJCI, Vol (3), No (8), August 2024, Aug 3, 2024

Deepfake technology, rooted in sophisticated machine learning techniques, utilizes deep neural ne... more Deepfake technology, rooted in sophisticated machine learning techniques, utilizes deep neural networks to create highly realistic fake content such as videos, audio recordings, and images. This technology has rapidly evolved due to advancements in deep learning models, computational power, and data availability. The ethical implications, social impact, misuse, and legal frameworks surrounding Deepfake technology have been extensively studied. Detection techniques using deep learning approaches have been developed to combat the challenges posed by Deepfake content. Recommendations for future research include enhancing detection techniques, integrating explainable AI, and exploring real-time detection systems. Industry and policy implications emphasize the need for robust detection technologies, comprehensive legal frameworks, and collaborative efforts to address ethical concerns and regulate Deepfake content.
This systematic review explores the landscape of deep fake image generation, detection techniques and challenges, in addition to ethical considerations. By synthesizing existing research, we aim to provide insights into deep-fake technology's advancements, limitations, and societal implications. This review underscores the urgent need for interdisciplinary collaboration and robust frameworks to address the multifaceted issues surrounding deep fakes in the digital age.

Research paper thumbnail of Extracting Requirements of E-learning Systems

IJCI, Vol (3), No (8), August 2024, Aug 5, 2024

Extracting functional & non-functional requirements is a basic step in software development. The ... more Extracting functional & non-functional requirements is a basic step in software development. The process of requirements engineering includes seven main activities Elicitation, Negotiation, Specification, Modeling, Verification & Validation, Management, and Traceability, this study focuses on requirements engineering in E-learning systems to be performed in all educational systems. Non-functional requirements are considered more critical than functional requirements because the non-functional requirements can affect all the systems and some of non-functional requirements may become functional requirements like security. So, hoping that this constructed study is going to help the developers of the system to understand the requirements to build E-learning systems, especially in higher educational institutions.

Research paper thumbnail of أثر استخدام تقنيات الذكاء الاصطناعي في تحسين جودة إدارة المشروعات

IJCI, Vol (3), No (9), September 2024, Sep 1, 2024

في السنوات الأخيرة، برزت تقنيات الذكاء الاصطناعي في إدارة الأعمال وإدارة المشروعات. تهدف الدراسة ... more في السنوات الأخيرة، برزت تقنيات الذكاء الاصطناعي في إدارة الأعمال وإدارة المشروعات. تهدف الدراسة إلى استكشاف استخدامات الذكاء الاصطناعي في مختلف أنواع المشاريع، وتحليل تأثيرها على جودة الأداء. وتعرض الدراسة مفاهيم الذكاء الاصطناعي، بما في ذلك التعلم الآلي (Machine Learning)، والتعلم العميق (Deep Learning)، ومعالجة اللغة الطبيعية (Natural Language Processing)، والرؤية الحاسوبية (Computer Vision). كما تشمل تحليلًا مفصلاً لتطبيقات الذكاء الاصطناعي في أنواع عديدة من المشروعات، مثل مشروعات التصنيع، إدارة سلاسل الإمداد، تطوير البرمجيات، والتسويق الرقمي ...إلخ. وتركز الدراسة على كيفية استخدام هذه التقنيات لتحسين جودة أداء إدارة المشروعات. واعتمدت على دراسة حالات عملية وتحليل بيانات مستخلصة من استطلاعات وآراء المتخصصين العاملين في هذا المجال.

Research paper thumbnail of AI Powered Bioinformatics -Expediting Diagnostic Testing: A Survey

IJCI, Vol (3), No (9), September 2024, Sep 2, 2024

Research has demonstrated the positive impact of artificial intelligence and Bioinformatics in th... more Research has demonstrated the positive impact of artificial intelligence and Bioinformatics in the field of clinical diagnosis. The integration of AI methodologies into bioinformatics has opened new avenues for breakthroughs in genomics, proteomics, and personalized medicine. The document emphasizes the role of AI in early disease detection, improving patient outcomes, and enhancing healthcare systems by avoiding the need for expensive and time-consuming operations as illnesses worsen. The methodology section provides insights into the approach utilized, including the review of 30 articles from highly regarded journals about AI and bioinformatics that expedite diagnostic testing in the medical field. using survey to gather information and divide it into sub-sections focusing on diagnostic cancer diseases, COVID-19, and genetic and chronic diseases. The survey gathered 52 responses, and the results revealed significant agreements with the findings in the papers, particularly in the importance of developing novel biosensors and diagnostic tools for rapid and accessible detection of SARS-CoV-2, and the potential of AI in laboratory settings, pharmaceutical industry, and disease diagnosis. Overall, the document provides a comprehensive overview of the transformative role of AI in bioinformatics, emphasizing its potential to revolutionize disease diagnosis, treatment, and public health decision-making, while also addressing the challenges and opportunities associated with the integration of AI technologies in the healthcare industry. The rigorous methodology and alignment of survey results with the research findings validate the significance of AI-powered bioinformatics in expediting diagnostic testing and improving patient safety in healthcare.

Research paper thumbnail of أثر تكنولوجيا المعلومات والاتصالات في تعزيز مشاركة المرأة اليمنية في التنمية في ضوء مؤشرات أهداف التنمية المستدامة 2030

IJCI, Vol (3), No (9), September 2024, Sep 3, 2024

هدفت الدراسة الى معرفة أثر تكنولوجيا المعلومات والاتصالات في مشاركة المرأة اليمنية في التنمية في ... more هدفت الدراسة الى معرفة أثر تكنولوجيا المعلومات والاتصالات في مشاركة المرأة اليمنية في التنمية في ضوء مؤشرات أهداف التنمية المستدامة 2030. ولتحقيق أهداف الدراسة، استخدمت الدراسة المنهج الوصفي التحليلي، حيث تم الاعتماد على عينة قصدية تعتمد على معيار مشاركة المرأة في التنمية وتمثل الهيئات والأجهزة الحكومية في محافظتي صنعاء وعدن، وقد تم تصميم استبانة كأداة لجمع البيانات تم توزيعها على عينة الدراسة البالغ عددها (230) مفردة موزعة على تلك الجهات المشاركة في الدراسة، وقد تم استرجاع (215) استبانة قابلة للتحليل الإحصائي وتم استخدام برنامج SPSS الإحصائي لتحليل البيانات واختبار فرضيات الدراسة، وقد توصلت الدراسة الى عدد من النتائج أهمها: وجود أثر ذو دلالة إحصائية لتكنولوجيا المعلومات والاتصالات في مشاركة المرأة اليمنية في التنمية في ضوء مؤشرات أهداف التنمية المستدامة لبعدي المهارات التكنولوجية والتكاليف وعدم وجود أثر ذو دلالة إحصائية لمحور البنية التحتية، كما أظهرت النتائج وجود أثر ذو دلالة إحصائية لتأثير الوصول الى تكنولوجيا المعلومات والاتصالات على استخدام المرأة اليمنية لها فيما يتعلق بتحقيق أهداف التنمية المستدامة، كما كشفت النتائج الى وجود أثر ذو دلالة إحصائية لأهداف التنمية المستدامة في مشاركة المرأة اليمنية في التنمية في ظل الوصول لتكنولوجيا المعلومات والاتصالات. وقدمت الدراسة مجموعة من التوصيات أهمها: تعزيز مشاركة المرأة اليمنية في التنمية عبر استغلال الفرص التي تقدمها تكنولوجيا المعلومات والاتصالات في تحقيق أهداف التنمية المستدامة من خلال نشر الوعي لدى المرأة اليمنية بأهمية اكتساب وتنمية مهاراتها التكنولوجية والاستفادة من الخدمات الإلكترونية المختلفة عبر وسائل الإعلام المختلفة لتسليط الضوء على أهمية التكنولوجيا في المجالات الاقتصادية والتعليمية والثقافية والصحية والمشاركة المجتمعية ودعم القرار وما الى ذلك من مجالات التنمية.

Research paper thumbnail of Effect of Difference of Two Blended Learning Styles across the Web (Individual /Collective) on Developing Programming Skills for Secondary School Students

IJCI, Vol (3), No (10), October 2024, Oct 1, 2024

The study aimed to learn the effect of the differently integrated web learning (individual/group)... more The study aimed to learn the effect of the differently integrated web learning (individual/group) learning on the development of web page design skills for high school students, and the current study used the method of experimental, and the study sample consisted of (20) students from the first secondary school students, I also used the two -settling experimental design; Where the study of the first experimental group according to the web learning in the individual style and the second group was studied according to the web learning in the collective style; And to the existence of statistically significant differences at the level of significance 0.05) ≥ α) between the averages of the two experimental groups in the post -application in the skill test in favor of the experimental group that uses integrated learning across the web in its individual style, which confirms that the individual integrated learning outperformed the collective learning in the development of The cognitive and skill aspect assigned to the design of web pages. The study recommended attention in providing technical equipment in schools to turn from its traditional form to electronic, training teachers in schools to develop their skills in the use of modern digital applications and urge them to do them in the educational process, and to employ integrated learning in the classroom.

Research paper thumbnail of أثر إدارة سلاسل الإمداد نحو تحسين جودة خدمات المكتبات

IJCI, Vol (3), No (10), October 2024, Oct 2, 2024

تتناول الدراسة أثر مفهوم سلاسل الإمداد في تحسين الخدمات المكتبية، ومن أبرز أهداف الدراسة التعرف ع... more تتناول الدراسة أثر مفهوم سلاسل الإمداد في تحسين الخدمات المكتبية، ومن أبرز أهداف الدراسة التعرف على الإطار المفاهيمي لسلاسل الإمداد، كذلك التعرف على تطبيقات سلاسل الإمداد في الخدمات المكتبية، اعتمد الباحثان في تجميع معلومات الدراسة على الإنتاج الفكري بشقيه المطبوع والإلكتروني، كما اعتمدت الدراسة على المنهج الوصفي وهذا المنهج المناسب لهذا النوع من الدراسات، قام الباحثان باستعراض تطبيقات سلاسل الإمداد بشكل عام، وتطبيق سلاسل الإمداد في المكتبات من خلال عرض لبعض الخدمات التي يمكن من خلالها تطبيق مفهوم سلاسل الإمداد، كما قاما الباحثان باستعراض تجارب لمكتبات عالمية طبقت هذا المفهوم، وفي نهاية الدراسة تم استعراض أهم التحديات التي تواجه سلاسل الإمداد في المكتبات.

Research paper thumbnail of Challenges of Wireless Sensor Networks and their Solutions

IJCI, Vol (3), No (10), October 2024, Oct 3, 2024

Wireless Sensor Networks (WSNs) have emerged as a critical technology with uses in the fields of ... more Wireless Sensor Networks (WSNs) have emerged as a critical technology with uses in the fields of smart cities, industrial automation, healthcare, and environmental monitoring. This research paper provides a thorough review of the challenges inherent in WSNs, with the intention of providing light on the challenges that practitioners and researchers have while setting up and maintaining these networks. The challenges involve several aspects, comprising data management, security, scalability, energy efficiency, and dependability. Security concerns: given that these networks' communication is open and wireless, maintaining data integrity and secrecy presents substantial issues. Furthermore, it is essential to guarantee data transmission dependability in dynamic, frequently severe situations. This research analyzes these challenges, looks at the methods and solutions that are currently being offered in the literature, and also points out areas that need more research and development in the area of wireless sensor networks. Comprehending and resolving these obstacles is essential to realizing WSNs' complete potential and promoting their extensive integration in various fields.

Research paper thumbnail of درجة استخدام مصادر التعلم الرقمية في تحسين التعلم الذاتي لدى طلبة قسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا

IJCI, Vol (3), No (10), October 2024, Oct 4, 2024

هدفت الدراسة إلى تعرف درجة استخدام مصادر التعلم الرقمية في تحسين التعلم الذاتي لدى طلبة قسم وسائل... more هدفت الدراسة إلى تعرف درجة استخدام مصادر التعلم الرقمية في تحسين التعلم الذاتي لدى طلبة قسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا، وطبقت الدراسة المنهج الوصفي المسحي، من خلال تطبيق الاستبانة على عينة عشوائية بسيطة مكونة من (43) طالب وطالبة من طلبة قسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا، وتمحورت أهداف الدراسة في الإجابة عن الأسئلة التالية: ما درجة استخدام مصادر التعلم الرقمية في المقررات بقسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا؟ ما مستوى التعلم الذاتي لدى طلبة قسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا؟ ما درجة استخدام مصادر التعلم الرقمية في تحسين التعلم الذاتي لدى طلبة قسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا؟ وأظهرت نتائج الدراسة أن درجة استخدام مصادر التعلم الرقمية في المقررات بقسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا جاءت بدرجة مرتفعة، وأن مستوى التعلم الذاتي لدى طلبة قسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا جاءت بدرجة مرتفعة، كما أن درجة استخدام مصادر التعلم الرقمية في تحسين التعلم الذاتي لدى طلبة قسم وسائل وتكنولوجيا التعليم بكلية الشرق العربي للدراسات العليا جاءت بدرجة مرتفعة جدًا. وخلص المشروع البحثي بمجموعة من التوصيات والمقترحات البحثية التي كانت لها الأثر في تعزيز النتائج التي توصل إليها المشروع البحثي والتي من المؤمل أن تكون مصدر فائدة على مجال التخصص وفقًا للموضوعات التي يعالجها المشروع البحثي والمرتبطة بمصادر التعلم الرقمية، التعلم الذاتي، البحث العلمي.

Research paper thumbnail of Investigating Use of 5G and AR in School Education

IJCI, Vol (3), No (10), October 2024, Oct 5, 2024

Augmented Reality (AR) is a transformative technology, that seamlessly blending the virtual and p... more Augmented Reality (AR) is a transformative technology, that seamlessly blending the virtual and physical worlds to enhance user experiences across various domains. This research paper provides a comprehensive review of the current landscape of AR with its different types, namely, marker-based and marker-less AR, exploring its diverse applications and delving into existing studies that highlight its impact on education. The paper further investigates the symbiotic relationship between AR and Fifth Generation (5G) technology, analyzing how the unprecedented speed, low latency, and increased connectivity offered by 5G networks can amplify the capabilities of AR applications.

Research paper thumbnail of Securing Endpoint API Integration in Cloud-Based Healthcare Systems: Challenges, Solutions, and Future Directions

IJCI, Vol (3), No (10), October 2024, Oct 6, 2024

This paper presents an in-depth analysis of the challenges, solutions, and prospects of endpoint ... more This paper presents an in-depth analysis of the challenges, solutions, and prospects of endpoint API integration in modern software development, with a specific focus on securing cloud-based healthcare systems. Endpoint API integration plays a crucial role in enabling seamless communication and data exchange between different systems. However, it also presents several challenges that need to be addressed to ensure successful integration and optimal system performance, especially in healthcare. This paper explores the challenges encountered in endpoint API integration, such as security concerns, data inconsistency, lack of standardization, and managing multiple APIs in healthcare environments. It proposes potential solutions, including implementing robust security measures, employing data mapping techniques, adopting API standards, and utilizing API management tools. Additionally, the paper discusses the prospects of endpoint API integration, such as the integration of emerging technologies and continuous improvement in performance, scalability, and security. By addressing these challenges and embracing prospects, healthcare organizations can fully harness the potential of endpoint API integration and drive innovation in their systems.