Current Issue

Volume 6, Number 4 / December issue 2020

Volume 6, Number 4, December issue 2020


Manuel Alberto M. Ferreira
Geometric Complex Analysis (In Honor of Kang-Tae Kim’s 60th Birthday, Gyeongju, Korea, 2017)

PDF Book Review
Shahad Ahmed Abdulgaffar
Information security challenges in big data: critical reviewing study
Abstract

Big data has revolutionized knowledge production as it represents a very large amount of data that exceeds the ability of traditional computing devices to process it. Indeed, the past few decades have witnessed the emergence of new methods of producing, storing and analyzing data to process their huge amount, culminating in the emergence of the field of data science, which combines computational, algorithmic, statistical and mathematical techniques to extrapolate knowledge from big data [1]. The open data movement has also encouraged the sharing of heterogeneous search data and linking it across large digital infrastructures. The paper aimed at shedding light on the challenges facing big data, especially the information security challenge, to try to identify the challenges and solutions that contribute to reducing challenges.
In fact, the lack of independent and detailed studies of these challenges that focus on practical solutions was the motive for conducting this paper. It aims at identifying and collecting the intellectual production, specifying the deficiencies, and looking out for future studies issues bearing in mind the importance of information security and its impact on the continuity and development of technology and facilitating the preservation, sharing and extraction of knowledge.
In this paper, the critical literary methodology was followed to specify the achieved studies and literature in the same issue and thus generalize the benefits and find solutions. Were analyzed to achieve the goal of identifying the challenges facing big data.
One of the most prominent findings of the paper after reviewing the literature and studies shows that the most prominent challenge of big data is the challenge of information security, especially personal data. A number of studies have suggested heading to encryption as one of the solutions and the principle of defining the purpose, restricting use, multi-layer security, and applying Block chain technology.
This goes hand in hand with the aim of the paper to define the challenges of information security in big data, thus contributing to finding appropriate solutions by programmers and specialists, and taking advantage of the characteristics and advantages of big data in saving intellectual production and making it accessible.
This paper recommended the necessity of completing specialized studies in dealing with big data challenges, especially information security, according to actual applicable systems. Leveraging technology such as Hadoop, machine learning, and Block chain to solve big data problems.
Keywords: Information Security, Big Data, SMB’S, Symantec Protection Suite (SPS), Big and Open Linked Data (BOLD), An advanced persistent threat, Block chain

Cite this article:
Shahad Ahmed Abdulgaffar. Information security challenges in big data: critical reviewing study. Acta Scientiae et Intellectus, 6(4)2020, 8-29.
Josef Prijotomo
Uma Sumba: constructional adaptation to earthquake and morphological relation with Papua and Timor Leste
Abstract

This paper presents the process of erecting a Sumba uma, a Sumba architecture, taking place at the time of reconstruction of the traditional building. The process of reconstruction was meticulously documented, every step taken was documented. On this documentation a study was done, the examination on the types of wood construction was carried out, as well as its adaptability around the location of Sumba island in the ring of fire. This study and examination utilizing a qualitative method is carried out in order to find out whether there is any prior building possessing similar shape as Sumba building in architecture in the Archipelago (Nusantara), especially architecture in eastern part of Nusantara. From this study it was found that the construction of this traditional house utilizes a sway construction which was found to be very adaptive to earthquake, a frequent natural phenomenon on the islands located in the ring of fire. It was also found that the shape of Sumba uma architecture has a morphological correspondence with architecture in southern part of Papua and in Timor Leste.
Keywords: Nusantara Architecture, Sumba Architecture, earthquake resistance, sway construction, morphology

Cite this article:
Josef Prijotomo. Uma Sumba: constructional adaptation to earthquake and morphological relation with Papua and Timor Leste. Acta Scientiae et Intellectus, 6(4)2020, 30-41.
Shahad Ahmed Abdulgaffar
Information security challenges in cloud computing: critical reviewing study
Abstract

The great increase of intellectual production, the diversity of information sources and containers, and the technical revolution, which led in its turn to a large dependence on the Internet, portals and digital information sources, resulted not only in an emerging need to secure websites, computers, software and information in their various forms, but also in the growing importance of what is called the cloud computing service, which is a technical service that has changed the traditional ways of deploying services by organizations or individuals. The paper aimed at shedding light on the challenges facing cloud-computing technology, especially the information security challenge, in order to try to identify the challenges and solutions that contribute in limiting these challenges. In fact, the lack of independent and detailed studies of these challenges that focus on practical solutions was the motive for conducting this paper. It aims at identifying and collecting the intellectual production, specifying the deficiencies, and looking out for future studies issues bearing in mind the importance of information security and its impact on the continuity and development of technology and facilitating the preservation, sharing and extraction of knowledge.
In this paper, the critical literary methodology was followed to specify the achieved studies and literature in the same issue and thus generalize the benefits and find solutions. Fifteen studies were analyzed to achieve the goal of identifying the challenges facing cloud computing. After reviewing the literature and studies, one of the most prominent results of the paper is that the most prominent challenges of cloud computing is information security. A number of studies have suggested heading to encryption as one of the solutions, and some of them have dealt with classification or the use of machine learning and fuzzy logic.
This paper recommended the necessity of conducting specialized studies in finding applicable solutions to tackle the challenges, the perfect use of machine learning techniques and fuzzy logic, the optimal use of encryption, and the adoption of systems that are "safe by default". Indeed, security is not just a technology but should be related to people and operations as well. Internet security should not be absolute, but rather needs planning, design and building security from the birth of the idea.
Keywords: Information Security, Cloud Computing, Hybrid Cryptography, Risk Assessment, Cloud Computing Data Center, 3D Storage, Deffie Hellman Protocol

Cite this article:
Shahad Ahmed Abdulgaffar. Information security challenges in cloud computing: critical reviewing study. Acta Scientiae et Intellectus, 6(4)2020, 42-62.
Maram Saleh Miralem
The role of internet technology in supporting e-educational services marketing
Abstract

This paper aims to spot, examine and analyze the role of the net that it plays within the field of selling e-learning services, and it's thought-about the most goal moreover as sub-goals, that are to spot the newest trendy developments of the net within the field of e-learning selling and also the use of electronic applications and portals to boost its potency and develop education. In addition to knowing the difficulties that hinders the role of the net to hold out its tasks in selling of e-learning in governmental and personal academic establishments.
In order to attain the objectives of the paper, the scientist used the survey study approach to deal with the matter. Therefore, strengths and weaknesses are highlighted in a very variety of previous Arab and foreign studies in order that this study will like. The study processed the importance of the role that net technology plays within the field of selling e-learning services. Among the foremost necessary findings of the study is that the necessity of spreading electronic awareness, and make virtual categories through the net and quarterly tests to activate the employment of electronic portals, and also the would like for academic establishments tries to extend the effectiveness of their advertisements via the net as a primary step to achieving varied selling goals. Also, the requirement to open house for youth energies for the needs of e-learning of all age teams moreover because the proposal to conduct additional studies on the net and counsel trendy ways of developing programs and applications.
Finally, the study conferred a group of recommendations, the foremost necessary of that is that organizations and academic establishments ought to specialize in being perennial in most of their advertising campaigns so as to consolidate this with shoppers and have a decent representation. they will use these impressions as keywords in search engines to extend the effectiveness and unfold of their ads. the fabric challenges are among the foremost necessary challenges facing e-learning, that contribute greatly to the issue of applying e-learning altogether academic sectors and fields. Therefore, incentives or awards ought to be allotted to people United Nations agency use e-learning and work on inventing new easy-to-use applications, not solely financially however virtuously, like asserting the simplest worker monthly.
Keywords: Internet, e-learning, electronic platforms, service selling, e-marketing, electronic services, electronic portals

Cite this article:
Maram Saleh Miralem. The role of internet technology in supporting e-educational services marketing. Acta Scientiae et Intellectus, 6(4)2020, 63-81.
Lina Muhammad Al-Ghamdi
Information security challenges facing cloud computing: critical appraisal study
Abstract

This paper aims at identifying and discussing the most important security challenges of cloud computing with the goal of reaching conclusions about these challenges and some proposed solutions to them. It presented an evaluation critique of a group of literature on this topic. To achieve its goals the paper used the critical evaluation methodology applied to a group of previous studies. The most important results of this paper were that the presented studies agreed that the most prominent challenges facing cloud computing are as follows, ranked from strongest to weakest:
First, Data security; Second, attackers, hackers and malicious insiders; Third, poor infrastructure, government legislation, and Networks problems; Fourth, the financial cost; Fifth, lack of experience and absence of guarantees; And sixth, social engineering, and the existence of solutions that make the use of cloud computing more secure, although it is not 100% guaranteed, but it is 90% feasible. This scientific paper recommended the necessity of conducting more studies that secure information in cloud computing and finding practical solutions to face these challenges. It also recommended the need to study the intellectual security of users of such technologies and increase the spread of cultural and moral awareness when using such applications, especially in our conservative societies in the Islamic and Arab world.
Keywords: information security, cloud computing, encryption, data storage regulations, identity and authentication management

Cite this article:
Lina Muhammad Al-Ghamdi. Information security challenges facing cloud computing: critical appraisal study. Acta Scientiae et Intellectus, 6(4)2020, 82-98.
Maram Saleh Miralam
Information security challenges in cloud computing
Abstract

This paper aims to identify the Information Security Challenges in Cloud Computing. However, the use of Cloud computing in government organizations, private sectors and individuals is rapidly growing and it will grow more in the next few years especially, there are still many challenges, risks and threats to be concerned about. For example: data loss, data breaches and data misuse. To achieve the purposes of this paper, the researcher adopted the critical evaluation method that has been immensely used in many other studies (Arabic and other languages) to show advantages and disadvantages related to the research, solve problems and to compare her results with other research. The results show the ability of making sophisticated services with powerful computing capabilities with low cost computing entities and using advanced models. Furthermore, ability to access data safely any time and from any devices with preventing data leakage especially for the government organizations, private sectors. This paper recommends more massive academic research into these issues and to develop data security programs.
Keywords: Information Security, Cloud Computing, Cloud Computing Types, Cloud Computing Risks

Cite this article:
Maram Saleh Miralam. Information security challenges in cloud computing. Acta Scientiae et Intellectus, 6(4)2020, 99-115.
Manuel Alberto M. Ferreira
Modified peakedness in M|G|∞ queue busy cycle distribution
Abstract

We expose how a parameter, then called θ, analogous to the parameter η proposed in [1] to characterize the M|G|∞ queue busy period distribution, is also worthwhile to characterize the M|G|∞ queue busy cycle distribution. The parameters θ and η are both modifications of the peakedness proposed in [3].
Keywords: M|G|∞, busy cycle, peakedness, modified peakedness

Cite this article:
Manuel Alberto M. Ferreira. Modified peakedness in M|G|∞ queue busy cycle distribution. Acta Scientiae et Intellectus, 6(4)2020, 116-123.
Nabih S. Saaty
Information security in cloud computing reality and expectations
Abstract

The world is no longer what it was after the great development in technology in general and the Internet in particular. This development contributed to the diversity of information sources and the variation in its consciousness and flow in huge quantities. Cloud computing brought about a qualitative shift in technical thought as it helped to bridge the distance and brought time closer. Cloud computing became an essential engine for the economies of countries as it played a ley role in decision-making and formed the basis of knowledge, while recognizing and rejecting borders. Language barriers, and I do not exaggerate when I say fairly that it is a living organism that grows, develops and expands. But on the other hand, they face security challenges that concern its users.
The paper aimed to study the security challenges in cloud computing such that intellectual production is limited to the knowledge of the researcher from 2010 to 2020. A total of 11 studies were analyzed using the descriptive survey method, and then the shortcomings were identified for finding effective solutions, hoping to enrich scientific research, which suffers from shortcomings in this aspect in light of the recent era of cloud computing.
It is worth mentioning that the majority of the findings of the studies referred to the security challenge as a dilemma suffered by users of cloud computing. These studies also proposed solutions through which it is possible to overcome this problem. Some studies suggested practical scientific suggestions and recommended the use of logarithms to provide protection. Some have also suggested multiple steps for computing such as three stages of encryption to ensure that cloud computing is not broken into and that access to private information remains confidential.
This paper found that the biggest challenge facing cloud computing is information security and that a combination of multiple steps of entry and encryptions and the use of algorithms is an important solution to resolving security challenges.
Keywords: Cloud Computing, Information Security, Data Protection, Threat Detection

Cite this article:
Nabih S. Saaty. Information security in cloud computing reality and expectations. Acta Scientiae et Intellectus, 6(4)2020, 124-138.
Adel Al-Zahrany, Abdullah Safhy
Artificial intelligence applications in serving the elderly and people with special needs
Abstract

This study aimed to identify, and then provide critical analysis of the reality of previous studies related to the subject of artificial intelligence applications in serving the elderly and people with special needs, in order to fill the gaps, such as listing recent studies in this field, which are considered few by the researchers' viewpoint. It also aimed to identify the most prominent results and recommendations reached by these studies, which focus on artificial intelligence applications in serving the elderly and people with special needs and identify the applications of artificial intelligence in serving the elderly and people with special needs reached by the previous studies, which can contribute to providing services to the elderly and people with special needs. In order to achieve such objectives, the descriptive, analytical, documentary method. The study concluded that the use of artificial intelligence techniques helps the elderly with cognitive impairment by assuring that the old person is safe and carrying out all necessary daily activities, and if this is not the case, then alerting the caregiver, helping the elderly and people with special needs to compensate for their weakness, helping in performing daily activities, and evaluating the cognitive state of the elderly. Artificial intelligence applications, such as the use of smart visual aids for the blind, animations for the deaf, and other means that help to achieve improved social-psychological integration, can be used to plan and develop life activities that enable individuals with special needs to better interact with others. It also helps provide community contributions from normal people to achieve effective communication between these groups and normal individuals in society. Artificial intelligence applications have a role that cannot be overlooked in the lives of people with special needs, whether on a personal, academic or even social level.
Keywords: Artificial Intelligence Applications, the elderly, People with Special Needs

Cite this article:
Adel Al-Zahrany, Abdullah Safhy. Artificial intelligence applications in serving the elderly and people with special needs. Acta Scientiae et Intellectus, 6(4)2020, 139-152.
Ghaliah Abdulelah Al-Bishri, Dalil Hadi Al-Harbi
AI applications with their vital role in supporting the retail trade marketing mechanisms
Abstract

The purpose of using artificial intelligence in business is to help people in performing their functions and thus the retail trade would be fast moving and becoming more competitive by reducing costs and improving customers ’shopping and experiences. This is one of the most important incentives to conduct this study in addition to filling several gaps such as conducting an inventory of recent studies in this field, which are considered few, according to the two researchers.
In fact, this current study aimed at identifying previous studies related to the subject of the impact of artificial intelligence on the retail sector and deal with them in a critical way due to the lack of studies of this kind in the field to reach the most important results and recommendations revealed by those studies that deal with the extent of the impact of artificial intelligence on the retail sector and knowledge Services and areas covered by this effect.
We will also shed light on how artificial intelligence addresses retail trade problems through the use of techniques, algorithms and models with more accuracy in results to achieve the highest returns and reach consumer satisfaction. To achieve the aim of the research, the two researchers used the descriptive and analytical method. As for the results of the study, it reached several conclusions, the most important of which is to clarify the major role that artificial intelligence plays in the retail field, whether in relation to operations, customer services, or even the form of service provision in addition to the problems that the retail sector suffers from and customer risk fears, as well as identifying the types of algorithms that have been used in this field such as neural networks and the nearest neighbor. On the other hand, the study recommended the need to improve the infrastructure of developing countries due to the necessity of using artificial intelligence techniques, as well as conducting more studies on the application of artificial intelligence in stores both in the real or virtual world, adopting artificial intelligence techniques as a very appropriate option in facing global crises, as well as spreading the culture of artificial intelligence to achieve more prosperity and facilitate life and business.
Keywords: Artificial Intelligence, Retail systems, Neural Networks, Algorithms, Online Retail

Cite this article:
Ghaliah Abdulelah Al-Bishri, Dalil Hadi Al-Harbi. AI applications with their vital role in supporting the retail trade marketing mechanisms. Acta Scientiae et Intellectus, 6(4)2020, 153-169.
Badriah Muteb Al-Otaibi
A survey study on data mining and its various important tools and applications
Abstract

With the presence of large amounts of data stored in databases and data stores, the need to develop powerful tools for analyzing data and extracting information and knowledge from it has increased. Thus, the need emerged for what is called data mining as a technology aiming at extracting knowledge from huge amounts of data. Therefore, this current study aimed at clarifying the role of data mining methods in increasing the efficiency and effectiveness of the quality of the review process since it is an advanced method that can be very beneficial. This paper tries to clarify the nature of the data mining method and the dynamics of its work, as well as explaining the need to apply the data mining method and its importance in increasing the efficiency, effectiveness, and quality of the review process in many important applications. To achieve this goal, the researcher has used the critical evaluation method by reviewing the theoretical literature and previous studies related to the topic of multiple applications of data mining in several fields such as health, education, trade and economics, with the aim of bridging the gap between the previous studies and the practical applications of data mining. The study aims at identifying the objectives that previous studies sought, the results and recommendations that they reached, and their points of agreement and disagreement.
The study reached several conclusions including the fact that the data analysis technique is based on analyzing a huge amount of data and information to create a logical relationship, which makes it easier for decision makers in various institutions to make critical decisions about their institutions. Moreover, data mining technology also increases the efficiency and effectiveness of the quality of the data review process. The classification technology is considered one of the methods of data purification that can be relied upon in the educational field. In addition, the algorithm (C4.5, MLP DT) is one of the most prominent techniques used in the field of communication technology, and finally the data mining technology plays an important role in all fields. This study focused on the fields of education, health, communications and banking as data mining contributes to achieving economic development through the development of the economic field of these areas through providing accurate data for decision-making bodies in various institutions. This study also stresses that the ultimate goal of data mining is to predict human behavior, which is to a great extent the most common business application. Even though, this model can easily be formulated to meet the goal of detecting and deterring criminals. These various and important applications and many more have demonstrated that instead of having humans try to deal with hundreds of descriptive features, data mining allows automatic analysis of databases and recognizes important behavioral trends and patterns.
Keywords: Methods, Tools, Data mining, Healthcare, Big data, Business intelligence, Customer relationship management, Text mining, Web mining, Social networks

Cite this article:
Badriah Muteb Al-Otaibi. A survey study on data mining and its various important tools and applications. Acta Scientiae et Intellectus, 6(4)2020, 170-187.