Ayesha Mukthar | King Saud Bin Abdulaziz University for Health Sciences (original) (raw)
Uploads
Papers by Ayesha Mukthar
International Journal of Advance Research and Innovative Ideas in Education, 2021
Nowadays storage of data is big problem because the huge generation of multimedia data likes imag... more Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote storage such as cloud which is resilient infrastructure, reliable and high quality performance for the cloud users. In the cloud there is no direct physical control over the records because the cloud uses its resource pool for storing. Consequently data reliability fortification and auditing is not a modest task. The user prerequisites to depend on a Third Party Auditor (TPA) who is working as a public auditor for authenticating the data integrity and privacy. This paper presents the various auditing techniques of cloud computing for improving security and then future research challenges which need to be adopt by researchers to make system obvious.
International Journal of Advance Research and Innovative Ideas in Education, 2021
With the rapid growth in cloud users and they store number of data in cloud, security of cloud be... more With the rapid growth in cloud users and they store number of data in cloud, security of cloud becomes most essential. Whereas cloud offers the facility to users that they can access the data from anywhere and anytime. Cloud computing provides consistent and irrepressible infrastructure for users to remotely store data and use on-demand applications and services. Conversely, the outsourced data is not every time reliable because of the loss of physical control and possession over the data. Internet of things is one of the most emerging and popular technology, which has changed our life, by impacting different areas such as shopping, enterprise production, storage, monitoring physical devices, etc. An enterprise has to store data generated from the Internet of Things and this data grows exponentially, it forces to think about cloud storage for storing IoT data. Here the proposed system uses the secure hash algorithm for enhancing the security of Cloud based IoT system.
IJARIIE, 2021
With the rapid growth in cloud users and they store number of data in cloud, security of cloud be... more With the rapid growth in cloud users and they store number of data in cloud, security of cloud becomes most essential. Whereas cloud offers the facility to users that they can access the data from anywhere and anytime. Cloud computing provides consistent and irrepressible infrastructure for users to remotely store data and use on-demand applications and services. Conversely, the outsourced data is not every time reliable because of the loss of physical control and possession over the data. Internet of things is one of the most emerging and popular technology, which has changed our life, by impacting different areas such as shopping, enterprise production, storage, monitoring physical devices, etc. An enterprise has to store data generated from the Internet of Things and this data grows exponentially, it forces to think about cloud storage for storing IoT data. Here the proposed system uses the secure hash algorithm for enhancing the security of Cloud based IoT system.
IJARIIE, 2021
Nowadays storage of data is big problem because the huge generation of multimedia data likes imag... more Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote storage such as cloud which is resilient infrastructure, reliable and high quality performance for the cloud users. In the cloud there is no direct physical control over the records because the cloud uses its resource pool for storing. Consequently data reliability fortification and auditing is not a modest task. The user prerequisites to depend on a Third Party Auditor (TPA) who is working as a public auditor for authenticating the data integrity and privacy. This paper presents the various auditing techniques of cloud computing for improving security and then future research challenges which need to be adopt by researchers to make system obvious.
International Research Journal of Computer Science (IRJCS), 2019
Learning analytics can improve teaching and learning practice by transforming the ways we support... more Learning analytics can improve teaching and learning practice by transforming the ways we support education process. This study is based on the analysis of 256 students studying under Pre-Professional Programs of King Saud bin Abdulaziz University for Health Sciences in Saudi Arabia during the period Fall Semester 2018-19. The main research question is: What is the application of learning analytics in Pre Professional Programs in Health Sciences University? The focus is on research approaches, methods and the evidence for learning analytics. The evidence was examined in relation to three validated propositions: i) the relationship between students Learning objectives and their academic achievements. ii) The relationship between students' performance and learning activity. iii). identify students at risk in order to provide positive intervention. Analysis of LMS variables extracted from these analytic features established a statistically significant weakly positive correlation between hit activity, login activity and student examination results. These findings suggest that activity within LMS measured by logins; hit activity and results provide indicators of student academic performance. Lecturers involved in the study felt the analytic features provided them with a sense of student engagement with course modules and better understanding of their student cohorts.
International Journal of Computer Science and Information Security (IJCSIS),, 2017
The current trends of data analytics has led to larger amounts of data collection and process res... more The current trends of data analytics has led to larger amounts of data collection and process resulting to Big Data. As data is being captured everywhere for each and every action done online or offline, an Analytics study has been resulted. All systems start generating data, which can be combined to create a better picture and to observe the prospects of an individual. With the potential of Big Data to ascertain deeper insights for
scientific decision-making process, Big Data Analytics can become part of the solutions to achieve the Saudi Higher Education goals to be aligned with the Saudi 2030 Vision. This paper reviews the state of Big Data Analytics, consider possible applications in Saudi Higher Education, and finally yet importantly, identify challenges and concerns about Big
Data Analytics. This article found that Big Data Analytics presence in Saudi Higher Education still in its very early stages and there is much yet to be done to have the promised value of Big Data Analytics.
256
Conference Presentations by Ayesha Mukthar
International Journal of Advances in Electronics and Computer Science, 2021
Higher Education Institutions (HEIs), at a global level, are growing rapidly in advancing educati... more Higher Education Institutions (HEIs), at a global level, are growing rapidly in advancing education while exploiting eLearning technologies and promoting research. Cloud computing brings a wide range of benefits, with new capabilities, that can be incorporated in the educational process. This study was conducted at a Health Sciences University in Saudi Arabia to uncover the perspectives of teaching and learning by faculty, students and staff, on how cloud computing is assimilated as Educational Technology in their activities. An online self-administered survey was used to collect the quantitative data. A total of 250 survey responses were collected; however, after validation and cleaning the data, only 150 surveys were used for analysis. Majority of participants have shown good interest with a high acceptance rate of 45%, while 36% expressed concerns for security, particularly of critical data, with 18% being concerned about connectivity issues.
International Journal of Advance Research and Innovative Ideas in Education, 2021
Nowadays storage of data is big problem because the huge generation of multimedia data likes imag... more Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote storage such as cloud which is resilient infrastructure, reliable and high quality performance for the cloud users. In the cloud there is no direct physical control over the records because the cloud uses its resource pool for storing. Consequently data reliability fortification and auditing is not a modest task. The user prerequisites to depend on a Third Party Auditor (TPA) who is working as a public auditor for authenticating the data integrity and privacy. This paper presents the various auditing techniques of cloud computing for improving security and then future research challenges which need to be adopt by researchers to make system obvious.
International Journal of Advance Research and Innovative Ideas in Education, 2021
With the rapid growth in cloud users and they store number of data in cloud, security of cloud be... more With the rapid growth in cloud users and they store number of data in cloud, security of cloud becomes most essential. Whereas cloud offers the facility to users that they can access the data from anywhere and anytime. Cloud computing provides consistent and irrepressible infrastructure for users to remotely store data and use on-demand applications and services. Conversely, the outsourced data is not every time reliable because of the loss of physical control and possession over the data. Internet of things is one of the most emerging and popular technology, which has changed our life, by impacting different areas such as shopping, enterprise production, storage, monitoring physical devices, etc. An enterprise has to store data generated from the Internet of Things and this data grows exponentially, it forces to think about cloud storage for storing IoT data. Here the proposed system uses the secure hash algorithm for enhancing the security of Cloud based IoT system.
IJARIIE, 2021
With the rapid growth in cloud users and they store number of data in cloud, security of cloud be... more With the rapid growth in cloud users and they store number of data in cloud, security of cloud becomes most essential. Whereas cloud offers the facility to users that they can access the data from anywhere and anytime. Cloud computing provides consistent and irrepressible infrastructure for users to remotely store data and use on-demand applications and services. Conversely, the outsourced data is not every time reliable because of the loss of physical control and possession over the data. Internet of things is one of the most emerging and popular technology, which has changed our life, by impacting different areas such as shopping, enterprise production, storage, monitoring physical devices, etc. An enterprise has to store data generated from the Internet of Things and this data grows exponentially, it forces to think about cloud storage for storing IoT data. Here the proposed system uses the secure hash algorithm for enhancing the security of Cloud based IoT system.
IJARIIE, 2021
Nowadays storage of data is big problem because the huge generation of multimedia data likes imag... more Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote storage such as cloud which is resilient infrastructure, reliable and high quality performance for the cloud users. In the cloud there is no direct physical control over the records because the cloud uses its resource pool for storing. Consequently data reliability fortification and auditing is not a modest task. The user prerequisites to depend on a Third Party Auditor (TPA) who is working as a public auditor for authenticating the data integrity and privacy. This paper presents the various auditing techniques of cloud computing for improving security and then future research challenges which need to be adopt by researchers to make system obvious.
International Research Journal of Computer Science (IRJCS), 2019
Learning analytics can improve teaching and learning practice by transforming the ways we support... more Learning analytics can improve teaching and learning practice by transforming the ways we support education process. This study is based on the analysis of 256 students studying under Pre-Professional Programs of King Saud bin Abdulaziz University for Health Sciences in Saudi Arabia during the period Fall Semester 2018-19. The main research question is: What is the application of learning analytics in Pre Professional Programs in Health Sciences University? The focus is on research approaches, methods and the evidence for learning analytics. The evidence was examined in relation to three validated propositions: i) the relationship between students Learning objectives and their academic achievements. ii) The relationship between students' performance and learning activity. iii). identify students at risk in order to provide positive intervention. Analysis of LMS variables extracted from these analytic features established a statistically significant weakly positive correlation between hit activity, login activity and student examination results. These findings suggest that activity within LMS measured by logins; hit activity and results provide indicators of student academic performance. Lecturers involved in the study felt the analytic features provided them with a sense of student engagement with course modules and better understanding of their student cohorts.
International Journal of Computer Science and Information Security (IJCSIS),, 2017
The current trends of data analytics has led to larger amounts of data collection and process res... more The current trends of data analytics has led to larger amounts of data collection and process resulting to Big Data. As data is being captured everywhere for each and every action done online or offline, an Analytics study has been resulted. All systems start generating data, which can be combined to create a better picture and to observe the prospects of an individual. With the potential of Big Data to ascertain deeper insights for
scientific decision-making process, Big Data Analytics can become part of the solutions to achieve the Saudi Higher Education goals to be aligned with the Saudi 2030 Vision. This paper reviews the state of Big Data Analytics, consider possible applications in Saudi Higher Education, and finally yet importantly, identify challenges and concerns about Big
Data Analytics. This article found that Big Data Analytics presence in Saudi Higher Education still in its very early stages and there is much yet to be done to have the promised value of Big Data Analytics.
256
International Journal of Advances in Electronics and Computer Science, 2021
Higher Education Institutions (HEIs), at a global level, are growing rapidly in advancing educati... more Higher Education Institutions (HEIs), at a global level, are growing rapidly in advancing education while exploiting eLearning technologies and promoting research. Cloud computing brings a wide range of benefits, with new capabilities, that can be incorporated in the educational process. This study was conducted at a Health Sciences University in Saudi Arabia to uncover the perspectives of teaching and learning by faculty, students and staff, on how cloud computing is assimilated as Educational Technology in their activities. An online self-administered survey was used to collect the quantitative data. A total of 250 survey responses were collected; however, after validation and cleaning the data, only 150 surveys were used for analysis. Majority of participants have shown good interest with a high acceptance rate of 45%, while 36% expressed concerns for security, particularly of critical data, with 18% being concerned about connectivity issues.