14 research outputs found

    Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing

    Get PDF
    Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker "who don't have a password" is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of "Confidence Range ". The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,” Electronic Personal Synthesis Behavior”, has been generated to the authorized user by the application of confidence range algorithm

    Model of security level classification for data in hybrid cloud computing

    Get PDF
    Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data usually be complicated, and it had a direct and indirect influence on the usability level. This study aims to establish a model which has an ability to classify data dynamically according to the security form low till high levels. The security level classified it into five levels based on the policies and classification method. The purpose of classification is to apply a complex security procedure on data which has a high security level larger than data which has a low security level. It also has a potential to segregation an illegal data from the legal to support usability in system. Finally, several experiments have been conducted to evaluate the proposed approaches. Several experiments have been performed to empirically evaluate two feature selection methods (Chi-square (χ2), information gain (IG)) and five classification methods (decision tree classifier, Support Vector Machine (SVM), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) and meta-classifier combination) for Legal Documents Filtering The results show that all classifiers perform better with the information gain feature selection methods than their results with Chi-Square feature selection method. Results also show that Support Vector Machine (SVM) outperforms achieve the best results among all individual classifiers. However, the proposed meta-classifiers method achieves the best results among all classification approaches

    Technology enhancement learning reflection on improving students’ satisfaction in Omani Universities

    Get PDF
    The excellence of Omani Universities in technology enhancement learning (TEL) has become essential in supporting the rapid growth and sustainability of the education sector for usage and application. Technology enhancement learning is depending on use of different application tools like Microsoft office files and video blog programs to facilitate the academic performance. The real problem faced education is a need for several applications and technologies in the higher education institutions in Oman to improve their outputs and improve on teacher-student satisfaction. This paper aims to determine the common type of (TEL) of video and attached assignments and data analysis used in the Universities. In addition to facilitate (TEL) used is used in colleges and Universities in conjunction with improving lab equipment and administrative systems. In the first phase of this study, a systematic review of the existing literature was carried out to determine and define the suitable quantitative and qualitative criteria of existence applications; and then, design and exploit pair-wise comparison and online evaluation forms to get experts opinions/preference on the evaluation criteria used to measure the satisfaction of these technologies. In this study, survey questionnaires were distributed to 3 different Universities in Oman to assess their technology enhancement learning performances which served as a link between the Universities and higher education (HEI). The findings of this paper aid in establishing the need to improve teaching material by using attached assignment with material description by video programs in the Universities, higher educational institutions (HEI); and new techniques that add value in teacher assessment method for student satisfaction in higher education. Further studies could be carried out in the future with more technological developments

    The Effect of Peers’ and Teacher’s E-Feedback on Writing Anxiety Level Through CMC Applications

    Get PDF
    Abstract—Computer Supported Collaborative Learning (CSCL) promotes learners to be more confident and self-directed in addition to enhancing their knowledge and general information throughout the peers’ and teacher’s electronic feedback (E-feedback). This study was carried out with 28 Master EFL/ESL students who registered in the elective course of Computer Application in ESOL. To examine the influence of peers’ and teacher’s electronic feedback on ESL writing anxiety level as well as their writing performance, Second Language Writing Anxiety Inventory (SLWAI) and semi-structured Interviews were employed. The major finding from the Paired T-Test which were performed on the pre-post of (SLWAI) revealed that a significant difference between them (p<.009) that reflected respondents’ tendency to decrease their writing anxiety level after using peers’ and teacher’s e-feedback. Moreover, data collected from the interviews reported that the respondents perceived the e-feedback from peers and teacher as an important way to improve their writing performance

    IT Governance Impact on Academic Performance Development

    No full text
    This paper produces a comprehensive literature review to evaluate the impact of technology development with IT governance mechanism for enhancing academic performance. This paper includes structure, process, and direct actions of reviewed papers related to IT governance. The aim is to analysis and review the type of Technology Enhanced Learning mostly used in educational field to enhance the academic performance connected to IT Governance of e-learning use. The method proposed here should explains the ideas and the quality assurance standards to enhance the academic performance with approval of IT governance. These studies include any special identifications or criteria for e-learning method and student academic performance. The results of this literature review reveal the side has led to new documentation ways, that include written learning outcomes, assessment plans, reports on results and improvement plans

    Using Information Communication Technology as a Teaching tool in Sudanese Governmental Universities of Khartoum State

    No full text
    The revolution of Information Technology (IT) and the rapid development in the communications inevitably the Sudanese educational institutions to use the new technology tools in their programs and strategies. Especially there are some private Sudanese universities take the implementations of (ICT) in their account. The main aim of this study is to explore the reasons behind the useless or the effective use of the (ICT) in (SGU) in teaching. The study selected (10%) from the teachers in (SGU) as a sample, such that the sample of teachers after selection is (600) teacher. The questionnaire method was adopted for collection of data in this study, with benefit from (Likert) method. The study founded that (SGU) used some (ICT) hardware, software and tools properly such as: computers, projectors and internet in teaching and in their other academic activities. In addition, there is a middle and rarely usage for other (ICT) such as video conferencing system, virtual meeting system, planning student’s courses, preparing students courses, preparing lectures in presentation software and giving students assignments to be presented by computers. Some of (ICT) tools are not used in (SGU) such as (digital cameras, interactive whiteboards). In addition, the study founded that there is no teacher training in (SGU), in spite of including this activity in the universities plans. The study recommends (SGU) to concern with teacher’s training and other (ICT) tools such as (interactive whiteboards) and (internet speed)

    Promoting Algorithmic Thinking in an Introductory Programming Course

    No full text
    Computer programming is considered as a difficult area of study for novices. One of the reasons is the main focus of the curriculum presented in an introductory programming (IP) course which emphasizes more on the programming knowledge (syntax and semantic) of the programming language. This study introduced a new teaching curriculum in the IP course which focuses on different skills required by the novices. We compared the IP course materials based on the traditional and new approaches against five categories. The result shows that the new approach encourages both the programming knowledge and problem solving strategies, and promotes deep learning. Furthermore, it discourages programming shortcut (Problem statement → Code), and support three-step approach (Problem statement → Solution Plans → Code) in solving a problem statement. The new approach also promotes algorithmic thinking in the IP course by paying equal attention on the problem solving strategies

    Promoting Algorithmic Thinking in an Introductory Programming Course

    No full text

    Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis

    Get PDF
    Cloud computing is a rapidly growing technology due to its highly flexible uses and applications. It also has other features such as simplicity, quick data access and reduced data storage costs. Consequently, it has been widely used by many organizations. This widespread use of cloud computing among organizations causes many security issues. Moreover, cloud computing layers are likely to be jeopardized by many security risks such as privileged user access, data location, data segregation, and data recovery. This paper aims to prepare an ample debate of a literature review-based studies that provided important insights to researchers in the scope of security cloud computing. The researcher applied a relevant set of keywords. These keywords are limited to the title, abstract and keywords search archives published between 2010 and June 2018. The database search returned a total of 308 publications. In addition, we conducted backward-forward searches from the reference lists of relevant, quality previous works on the security framework in public cloud computing studies. Then, the researcher filtered the publications to only full text access articles that were written in English only. Finally, this study obtained a many publication. The findings of this paper address many important points such as in this study is recommended to apply behavior recognition with password for improving authentication layer performance in cloud computing. This study finds most of current studies neglected the present of human factor in password-based authentication, and learnability in password-based authentication is highly weak. Despite this, very few studies have adopted the behavior recognition with password in public cloud
    corecore