Investments in training and education are one of the most important things that can help people a... more Investments in training and education are one of the most important things that can help people acquire the required skills and knowledge for employment. However, in this changing environment, with a lot of emerging technologies, the major challenges facing many people is keeping up with the needed market skills and investing in upskills. This paper presents a comprehensive literature review using a content analysis approach to investigate the reasons for the unemployment problem across many countries and identifies proposed solutions and suggestions to handle this problem and particularly the problem of skills mismatch. The results indicated that the previous solutions were inadequate as they used reactive strategies, thus, people cannot respond quickly to change in the market and acquire the required skills immediately.
Many countries of our planet have different modes of education for male and female sections of so... more Many countries of our planet have different modes of education for male and female sections of society. Often we find that a many educational institutions are open for both sexes. But there also are many intuitions which only educate either male or female students. Segregation of male and female students is not confined to any specific region or countries but it's a global phenomenon. The Kingdom of Saudi Arabia (KSA) provides a unique face to face way of joint classes for both sexes. The kingdom takes the advantage of networking technology to create an environment to provide a physical classroom for females in their campus and male students in their campus. The male teacher teaches the male section face to face in their classroom while the female section is linked with a live video of the instructor and the screen. The female students can ask questions and teacher can also interact with them. While female section can see the teacher via video link but the male teacher cannot see the female students. This way of teaching exist for many UG and PG classes across Saudi Arabia, as well as some other countries of the world. In this paper we shall analyse the benefits and drawback of this way of teaching for the female counterpart. To conclude our findings, we have conducted thirty interviews of female students in different departments of the faculties of Economics and Administration, and Computing and Information Technology of the King Abdulaziz University of Saudi Arabia.
Due to the considerable competition and fast growth in the software industry, software developmen... more Due to the considerable competition and fast growth in the software industry, software development has become essential. Thus, software quality is a vital instrument in software development field as well as in the determination of the most important Critical Success Factors (CSFs) in software development. The theory of Total Quality Management (TQM) adopted by organizations to achieve quality and improved organizations' performance while meeting and exceeding customers' expectations. This paper discusses the CSFs that can be applied to software development to implement the TQM for the software development field. The result presented the impact of the progress in time and technology on the rank of the essential CSFs while discovering the new CSFs that did not exist before.
Every day, big data analytics is gaining more popularity as a tool for analyzing significant amou... more Every day, big data analytics is gaining more popularity as a tool for analyzing significant amounts of data on demand. Four of the most common big data processing frameworks include Apache Hadoop, Apache Spark, Apache Storm, and Apache Flink. While all four support big data processing, these frameworks differ in their usage and the underlying architecture that supports this usage. A number of studies have devoted time and effort to compare these big data frameworks by evaluating them for a defined key performance indicator (KPI). This paper summarizes these earlier efforts by identifying a common set of key performance indicators, which are Processing Time, CPU Consumption, Latency, Throughput, Execution Time, Sustainable Input Rate, Task Performance, Scalability, and Fault Tolerance, and comparing the four big data frameworks along these KPIs through a literature review. Our work identified Spark as a winner across multiple KPIs, which are processing time, CPU consumption, Latency, Execution time, task performance, and Scalability, for non real-time data, when compared with Apache Hadoop and Apache Storm frameworks. while Flink was best for stream processing in
THE INTERNATIONAL JOURNAL OF HUMANITIES & SOCIAL STUDIES, 2019
Enterprise resource planning System (ERPS) is a standout amongst the most complicated frame-works... more Enterprise resource planning System (ERPS) is a standout amongst the most complicated frame-works in data framework field. Its usage is exorbitant and more confounded. Also, vast numbers of ERPS usage have been unsuccessful. Hence, the critical success factors (CSFs) of ERPS execution still are among the most critical research zone throughout the years with a specific end goal to conquer the issue of fizzled ERPS usage. Consequently, this paper summarizes the earlier efforts to collect these CSFs and evaluating them through a literature review. Our work proposed to move back to the first meaning of CSFs of ERPS execution with a specific end goal to locate the common factors that have similar importance and after that, maintaining a strategic distance from the issue of making a perplex of them. What is more is that this paper proposes an examination zone to explain those CSFs profoundly by considering numerous factors like tracking CSFs of ERPS execution over the time, technology evolution, and qualities of the nations.
—A Worm is a standalone malware that replicates itself and does not need a host to propagate. The... more —A Worm is a standalone malware that replicates itself and does not need a host to propagate. The prevailing detection approach uses fixed size sequence of characters extracted from the worm as a signature. Although very fast, the signature detection approach is ineffective for zero day attacks. Building upon our previous work to use data mining techniques for malware detection, we present a comparison of variable length instruction sequence to fixed size n-grams to detect worms. We define a sequence as a series of instructions till a branch is ennountered. Our results indicated that using the variable length sequences as features to a machine learning classifier provided better results than using fixed length n-grams. We built and compared several tree based classifiers and were able to achieve 95.6% detection rate on novel worms using the variable length instruction sequences.
Investments in training and education are one of the most important things that can help people a... more Investments in training and education are one of the most important things that can help people acquire the required skills and knowledge for employment. However, in this changing environment, with a lot of emerging technologies, the major challenges facing many people is keeping up with the needed market skills and investing in upskills. This paper presents a comprehensive literature review using a content analysis approach to investigate the reasons for the unemployment problem across many countries and identifies proposed solutions and suggestions to handle this problem and particularly the problem of skills mismatch. The results indicated that the previous solutions were inadequate as they used reactive strategies, thus, people cannot respond quickly to change in the market and acquire the required skills immediately.
Many countries of our planet have different modes of education for male and female sections of so... more Many countries of our planet have different modes of education for male and female sections of society. Often we find that a many educational institutions are open for both sexes. But there also are many intuitions which only educate either male or female students. Segregation of male and female students is not confined to any specific region or countries but it's a global phenomenon. The Kingdom of Saudi Arabia (KSA) provides a unique face to face way of joint classes for both sexes. The kingdom takes the advantage of networking technology to create an environment to provide a physical classroom for females in their campus and male students in their campus. The male teacher teaches the male section face to face in their classroom while the female section is linked with a live video of the instructor and the screen. The female students can ask questions and teacher can also interact with them. While female section can see the teacher via video link but the male teacher cannot see the female students. This way of teaching exist for many UG and PG classes across Saudi Arabia, as well as some other countries of the world. In this paper we shall analyse the benefits and drawback of this way of teaching for the female counterpart. To conclude our findings, we have conducted thirty interviews of female students in different departments of the faculties of Economics and Administration, and Computing and Information Technology of the King Abdulaziz University of Saudi Arabia.
Due to the considerable competition and fast growth in the software industry, software developmen... more Due to the considerable competition and fast growth in the software industry, software development has become essential. Thus, software quality is a vital instrument in software development field as well as in the determination of the most important Critical Success Factors (CSFs) in software development. The theory of Total Quality Management (TQM) adopted by organizations to achieve quality and improved organizations' performance while meeting and exceeding customers' expectations. This paper discusses the CSFs that can be applied to software development to implement the TQM for the software development field. The result presented the impact of the progress in time and technology on the rank of the essential CSFs while discovering the new CSFs that did not exist before.
Every day, big data analytics is gaining more popularity as a tool for analyzing significant amou... more Every day, big data analytics is gaining more popularity as a tool for analyzing significant amounts of data on demand. Four of the most common big data processing frameworks include Apache Hadoop, Apache Spark, Apache Storm, and Apache Flink. While all four support big data processing, these frameworks differ in their usage and the underlying architecture that supports this usage. A number of studies have devoted time and effort to compare these big data frameworks by evaluating them for a defined key performance indicator (KPI). This paper summarizes these earlier efforts by identifying a common set of key performance indicators, which are Processing Time, CPU Consumption, Latency, Throughput, Execution Time, Sustainable Input Rate, Task Performance, Scalability, and Fault Tolerance, and comparing the four big data frameworks along these KPIs through a literature review. Our work identified Spark as a winner across multiple KPIs, which are processing time, CPU consumption, Latency, Execution time, task performance, and Scalability, for non real-time data, when compared with Apache Hadoop and Apache Storm frameworks. while Flink was best for stream processing in
THE INTERNATIONAL JOURNAL OF HUMANITIES & SOCIAL STUDIES, 2019
Enterprise resource planning System (ERPS) is a standout amongst the most complicated frame-works... more Enterprise resource planning System (ERPS) is a standout amongst the most complicated frame-works in data framework field. Its usage is exorbitant and more confounded. Also, vast numbers of ERPS usage have been unsuccessful. Hence, the critical success factors (CSFs) of ERPS execution still are among the most critical research zone throughout the years with a specific end goal to conquer the issue of fizzled ERPS usage. Consequently, this paper summarizes the earlier efforts to collect these CSFs and evaluating them through a literature review. Our work proposed to move back to the first meaning of CSFs of ERPS execution with a specific end goal to locate the common factors that have similar importance and after that, maintaining a strategic distance from the issue of making a perplex of them. What is more is that this paper proposes an examination zone to explain those CSFs profoundly by considering numerous factors like tracking CSFs of ERPS execution over the time, technology evolution, and qualities of the nations.
—A Worm is a standalone malware that replicates itself and does not need a host to propagate. The... more —A Worm is a standalone malware that replicates itself and does not need a host to propagate. The prevailing detection approach uses fixed size sequence of characters extracted from the worm as a signature. Although very fast, the signature detection approach is ineffective for zero day attacks. Building upon our previous work to use data mining techniques for malware detection, we present a comparison of variable length instruction sequence to fixed size n-grams to detect worms. We define a sequence as a series of instructions till a branch is ennountered. Our results indicated that using the variable length sequences as features to a machine learning classifier provided better results than using fixed length n-grams. We built and compared several tree based classifiers and were able to achieve 95.6% detection rate on novel worms using the variable length instruction sequences.
Uploads
Papers