10 research outputs found

    An Analytical Study on the Implementation of a Healthcare App to Assist People with Disabilities Using Cloud Computing and IoT

    Get PDF
    This study targets a group of people who require care, that is, people with special needs. The significance of this study lies in addressing the main problem that this group suffers from, which is the lack of awareness and information that leads to the acceptance of that group in society. This work aims to create a mobile application that contributes to spreading knowledge among people with special needs and enhancing their skills to help them become accepted by community members. This application supports people with special needs with training resources, education, suitable jobs, and other services helping them in developing their experiences and knowledge to be active in society. In addition, an evaluation questionnaire has been developed to collect data from both the private and public sectors to classify the building blocks necessary for KSA to incorporate the Internet of Things (IoT) and cloud computing into the healthcare sector. As a result, most respondents acknowledge the importance of a streamlined data-gathering process, the IoT, and cloud-based computing to meet their healthcare needs. Lastly, six main blocks for checking suppliers and the public to accept IoT and cloud healthcare applications are then acknowledged in this paper

    Performance Analysis of an Effective Approach to Protect Cloud Systems against Application Layer Based Attacks

    No full text
    Cloud computing is a new paradigm for hosting hardware and software resources and provides a web-based services to organizations and consumers. It also provides an easy to use and on-demand access to cloud based computing resources that can be published by easy, minimal administration and with a great efficiency. Services of cloud computing are accessing and sharing through internet connection thus it is open for attacker to attack on its security. Application layer based attacks is one of Distributed Denial of Service attacks (DDoS) that can cause a big problem in cloud security. The main objective of DDoS attacks is to infect computer resources (e.g., software applications, network, CPU, etc.) and make them not working properly for the authorized users. In DDoS, the attacker tries to overload the web-based service with traffic. HTTP and XML-based DDoS attacks are founded under the application layer based category of DoS attacks. This category of attack is focused on particular web applications. The main objective of this research paper is to introduce an effective approach to protect cloud-based systems against application layer based attacks. Complexity analysis, effectiveness and performance evaluations of the presented approach are presented.  The feedbacks of the experimental results were highly promising, for protecting cloud computing systems against both DoS and DDoS attacks. Correlation analysis model is also used to validate the efficiency of the proposed approach

    The Implementation of Career and Educational Guidance System (CEGS) as a Cloud Service

    No full text
    The present tools of career and educational guidance provided by educational organizations do not seem to address the problems faced by students, and graduates for applying to their promised job. The growing benefits of cloud software as services increase the requirements of implementing novel applications for career and educational guidance as a cloud service provided by the universities' portal. In this research, the authors present the benefits of using career guidance apps and introduce the implementation of career and educational guidance system (CEGS) in Higher Education. The system is designed specifically for school-level, university students, and graduates. Fuzzy logic operations were used to represent the system inputs, outputs, and rules. The paper aims to present a career and educational guidance application as a digital transformation application in the area of career counseling. The proposed system provides a student with interactive tools to select suitable colleges that match their educational skills and help graduates to select suitable careers for their practical experiences as well as provide them with essential training programs that are needed for particular jobs. The authors used the 2*3 factorial design method for the initial evaluation of the proposed system and to evaluate both students' and graduates' feedbacks. The researcher also uses the one-way ANOVA to find out if there is a remarkable difference between the users' perceptions scores

    The Impact of XML Databases Normalization on Design and Usability of Internet Applications

    No full text
    Database normalization is a process which eliminates redundancy, organizes data efficiently and improves data consistency. Functional, multivalued, and join dependencies (FDs, MVDs, and JDs) play fundamental roles in relational databases where they provide semantics for the data and at the same time are the foundations for database design. In this study we investigate the issue of defining functional, multivalued and join dependencies and their normal forms in XML database model. We show that, like relational databases, XML documents may contain redundant information, and this redundancy may cause update anomalies. Furthermore, such problems are caused by certain dependencies among paths in the document. Our goal is to find a way for converting an arbitrary XML Schema to a well-designed one that avoids these problems. We extend the notion of tuple for relational databases to the XML model. We show that an XML tree can be represented as a set of tree tuples. We introduce the definitions of FD, MVD, and JD and new Normal Forms of XML Schema that based on these dependencies (X-1NF, X-2NF, X-3NF, X-BCNF, X-4NF, and X-5NF). We show that our proposed normal forms are necessary and sufficient to ensure all conforming XML documents have no redundancies

    Big Data and Cloud Computing: Trends and Challenges

    No full text
    Big data is currently one of the most critical emerging technologies. Big Data are used as a concept that refers to the inability of traditional data architectures to efficiently handle the new data sets. The 4V’s of big data – volume, velocity, variety and veracity makes the data management and analytics challenging for the traditional data warehouses. It is important to think of big data and analytics together. Big data is the term used to describe the recent explosion of different types of data from disparate sources. Analytics is about examining data to derive interesting and relevant trends and patterns, which can be used to inform decisions, optimize processes, and even drive new business models. Cloud computing seems to be a perfect vehicle for hosting big data workloads. However, working on big data in the cloud brings its own challenge of reconciling two contradictory design principles. Cloud computing is based on the concepts of consolidation and resource pooling, but big data systems (such as Hadoop) are built on the shared nothing principle, where each node is independent and selfsufficient. The integrating big data with cloud computing technologies, businesses and education institutes can have a better direction to the future. The capability to store large amounts of data in different forms and process it all at very large speeds will result in data that can guide businesses and education institutes in developing fast. Nevertheless, there is a large concern regarding privacy and security issues when moving to the cloud which is the main causes as to why businesses and educational institutes will not move to the cloud. This paper introduces the characteristics, trends and challenges of big data. In addition to that, it investigates the benefits and the risks that may rise out of the integration between big data and cloud computing

    Questions-Bank System to Enhance E-Learning in School Education

    Get PDF
    The assessment process in an educational system is an important and essential part of its success to assure the correct way of knowledge transmission and to ensure that students are working correctly and succeed to acquire the needed knowledge. This paper describes the analysis, design, and implementation of the Questions-Bank system, that allows the students of primary, preparatory, and secondary schools to take web-based quizzes and exams, to download course reviews, and previous exams. "Questions-Bank", means that each question has a weight and area of knowledge deals with it. The system facilitates generation of automatic, balanced, and different exam sheets, that containing different types of questions, covering the entire curriculum, and displaying gradually from easiness to difficulty. The exam sheet produced by the system, takes into account the different levels of the students from excellent, good, to fair, and avoids any mistakes of language and non-clear terminologies. The system allows the schools to create a Questions-Bank database, that stores the previous exams, the model answers, the reviews, and useful exercises for each course. Our system is used successfully in distance learning as well as in self-training. We have tested the system with different type of courses taught in Qatari schools, ranged from primary to secondary levels. The feedbacks of both teachers and students were highly promising
    corecore