Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Shorman, Samer
- Analytical Study to Review of Arabic Language Learning using Internet Websites
Abstract Views :216 |
PDF Views:129
Authors
Affiliations
1 Department of Computer Science, Applied Science University, BH
2 Department of Mathematical Sciences, Ahlia University, BH
1 Department of Computer Science, Applied Science University, BH
2 Department of Mathematical Sciences, Ahlia University, BH
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 11, No 2 (2019), Pagination: 37-44Abstract
Arabic language is one of the most commonly used language in the world. It plays a very important role in educational operations around the world. It contains various parts such as poetry, poem, novel, and stories, as well as linguistic and grammatical rules and movements of letters, which change the word according to the movements accompanying each letter, for example, there are movements of lifting and breaking and annexation and silence. In this paper, we will review the research papers that studied the Arabic language learning websites, using the content analysis to determine strengths, weaknesses, advantages, disadvantages, and limitations. This research paper concluded that there is still a shortage and scarcity in the number of articles and websites on the internet that teach Arabic language. The suggestion is to assign task of development to Arab world instituties and others by increasing their number of websites on the internet and enriching their scientific content to improve it and increase its spread between the learners.Keywords
Arabic Language, Learning, Teaching, Websites.References
- Achour, H., &Abdesslam, W. B. (2012, July). An evaluation of Arabic language learning websites. In International Conference on Education and E-Learning Innovations (pp. 1-6). IEEE.
- Azrien Mohamed Adnan, M., & Sariah Syed Hassan, S. (2015). PROMOTING INTERACTIONS IN LEARNING ARABIC LANGUAGE VIA LEARNING MANAGEMENT SYSTEM: A THEORETICAL FRAMEWORK. Education Sciences & Psychology, 34(2).
- Jeong-Bae Son (2005). « Exploring and evaluating language learning Web sites ». In J.-B. Son & S. O'Neill (Eds.), Enhancing learning and teaching: Pedagogy, technology and language (pp. 215-227). Flaxton: Post Pressed.
- Sahrir, M. S., Yahaya, M. F., & Nasir, M. S. (2013). EZ-Arabic for children: A virtual learning resource tool for Malaysian primary schools. Procedia-Social and Behavioral Sciences, 90, 396-404.
- Hasan, L. (2014). Evaluating the usability of educational websites based on students' preferences of design characteristics. International Arab Journal of e-Technology, 3(3), 179-193.
- Bolliger, D. U. (2004). Key factors for determining student satisfaction in online courses.International Journal on E-learning, 3(1), 61-67.
- Sahrir, M. S., & Alias, N. A. (2012). A study on Malaysian language learners’ perception towards learning Arabic via online games. GEMA Online® Journal of Language Studies, 11(3).
- Sahrir, M. S., Alias, N. A., Ismail, Z., & Osman, N. (2012). Employing Design and Development Research (DDR): Approaches in the Design and Development of Online Arabic Vocabulary Learning Games Prototype. Turkish Online Journal of Educational Technology-TOJET, 11(2), 108119.
- Kaye, A. S. (2009). Arabic. In The world's major languages(pp. 573-590). Routledge.
- Ditter, E. (2006). Technologies for Arabic language teaching and learning. Handbook for Arabic language teaching professionals in the 21st century, 239-252.
- Chejne, A. G. (1969). The Arabic language: Its role in history. U of Minnesota Press.
- Statista , https://www.statista.com/chart/14900/two-worlds_-languages-irl-and-online/
- Arabic-course, http://www.arabic-course.com/arabic-alphabet.html
- Ritchie, J., Lewis, J., Nicholls, C. M., &Ormston, R. (Eds.). (2013). Qualitative research practice: A guide for social science students and researchers. sage.
- Srivastava, A., & Thomson, S. B. (2009). Framework analysis: a qualitative methodology for applied policy research.
- Answers, http://www.answers.com/topic/urdu.
- Aronoff, M., & Rees-Miller, J. (Eds.). (2017). The handbook of linguistics. John Wiley & Sons.
- Razzak, M. I., Belaïd, A., & Hussain, S. A. (2009, February). Effect of ghost character theory on arabic script based languages character recognition. In WASE Global Conference on Image Processing and Analysis-GCIA09.
- Habash, N. Y. (2010). Introduction to Arabic natural language processing. Synthesis Lectures on Human Language Technologies, 3(1), 1-187.
- Abdelhadi, R., Hameed, L., Khaled, F., & Anderson, J. (2019). Creative interactions with art works: an engaging approach to Arabic language-and-culture learning. Innovation in Language Learning and Teaching, 1-17.
- Authentication and Verification of Social Networking Accounts using Blockchain Technology
Abstract Views :288 |
PDF Views:205
Authors
Affiliations
1 Department of Computer Science, Applied Science University, BH
2 Administrative & Financial Sciences, AMA International University, BH
1 Department of Computer Science, Applied Science University, BH
2 Administrative & Financial Sciences, AMA International University, BH
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 11, No 6 (2019), Pagination: 1-11Abstract
Social networking pages authenticate by blockchain technology, through authenticating personal information and profile pages in the form of block and then distributing them with Blockchain to become a trusted reference point. To identified and verified social network accounts. This research proposed an effective and easy technical mechanism to authenticate the personal pages on social networks. Using this mechanism, anyone can authenticate any account on social networks, as well as increasing the possibility of making sure of the real individual behind social networking accounts. Moreover, this technique will show the fake accounts in order to reach a more confident and secure social network environment. Blockchain technique requires only a simple update to the characteristics of its platforms by developers, which is only a participatory mechanism between Blockchain and personal information. It is then combined with personal pages, to indicate that these pages contain the real personal information of the account holder, which is stored in an encrypted block that is difficult to modify, copy, or steal.References
- Coyle, C., & Vaughn, H. (2008). Social networking: Communication revolution or evolution? Bell Labs.
- Boyd, D.M. & Ellison, N.B. (2008), Social Network Sites:Definition, History and Scholarship. Journal of ComputerMediated Communication, 13(1), p. 201-230.
- F. Benevenut, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. In Proc. of ACM SIGCOMM Internet Measurement Conference. ACM, 2009.
- Brandtzæg Bae Petter and Heim Jan (2009) Why People Use Social Networking Sites. Proceedings of the 3d International Conference on Online Communities and Social Computing: Held as Part of HCI International: 143-152
- Ellison, N. B., Steinfield, C., & Lampe, C. "The benefits of Facebook ‘friends:’ Social capital and college students’ use of online social network sites". Journal of Computer-Mediated Communication, 12, (4),1143-1168, 2007.
- Marcelo Maia, Jussara Almeida, Virgílio Almeida, "Identifying User Behavior in Online Social Networks", Proceedings of the first Workshop on Social Network Systems, 1 April 2008
- Michael Fire,etc,(2014)"Online Social Networks: Threats and Solutions",IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 16, NO. 4, FOURTH QUARTER 2014.
- Mohammad H. Allymoun, Nidal F. Shilbayeh, Sameh T. Khuffash, Reem Al-Saidi (2014). Protecting the Privacy and Trust of VIP Users on Social Network Sites, International Journal of Computer, Information, Systems and Control Engineering, Vol. 8 No.9, 1419-1429.
- Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing,and privacy on the Facebook. In P. Golle& G. Danezis (Eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies (pp. 36-58). Cambridge, UK: Robinson College.
- Devmane, M., & Rana, N. (2013). Security Issues of Online Social Networks. Advances in Computing, Communication, and Control, Springer. pp. 740-746.
- Dustin W. Stout,.(2019). "Social Media Statistics 2019: Top Networks by the Numbers”. (On-Line), available:https://dustinstout.com/social-media-statistics/.
- Conti, M., Poovendran, R., &Secchiero, M. (2012). FakeBook: Detecting Fake Profiles in On-Line Social Networks. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). pp. 1071-1078
- Facebook, accessed OCT. 14, 2019. [Online]. Available: http://www.facebook.com/
- ALEJANDRO RIOJA,.(2019)"Get Verified on Facebook: Page or Profile (Blue + Gray Verification Badge)”, JUNE 24, 2019. (On-Line), available:https://alejandrorioja.com/blog/get-facebook-verified/.
- HaewoonKwak, Changhyun Lee, Hosung Park, and Sue Moon, 2010,What is Twitter, a social network or a news media?.Proceeding WWW '10 Proceedings of the 19th international conference on World wideweb.Pages 591-600.
- Mohammadi E, Thelwall M, KwasnyM,Holmes KL (2018) Academic information on Twitter: A user survey. PLoSONE 13(5):e0197265. https://doi.org/10.1371/journal.pone.0197265
- Twitter,.(2019)." About verified accounts”, (On-Line), available: https://help.twitter.com/en/managing-your-account/about-twitter-verified-accounts.
- S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
- Dylan Yaga,PeterMell,NikRoby,KarenScarfone,(2018).Blockchain Technology Overview.NISTIR 8202.https://doi.org/10.6028/NIST.IR.8202.
- K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things," IEEE Access, vol. 4, pp. 2292-2303, 2016.
- C. Natoli and V. Gramoli, “The blockchain anomaly," in 15th International Symposium on Network Computing and Applications (NCA), 310-317, IEEE, 2016.
- Q. K. Nguyen, “Blockchain-A Financial Technology for Future Sustainable Development,” in Green Technology and Sustainable Development (GTSD), 2016, pp. 51–54.
- Samer Shorman, Mohammad H Allaymoun and Omer Hag Hamid. (2019). DEVELOPING THE E-COMMERCE MODEL A CONSUMER TO CONSUMER USING BLOCKCHAIN NETWORK TECHNIQUE, International Journal of Managing Information Technology (IJMIT) Vol.11, No.2, May 2019, DOI : 10.5121/ijmit.2019.11204 .
- X. Xu, C. Pautasso, L. Zhu, V. Gramoli, A. Ponomarev, A. B. Tran, and S. Chen, “The blockchain as a software connector," in 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), pp. 182-191, IEEE, 2016.International Journal of Managing Information Technology (IJMIT) Vol.11, No.2, May 2019.
- ImarticusLearning."Infographics: What is Blockchain?”.(On-Line), available: https://medium.com/@imarticus/infographics-what-is-blockchain-6a1f93e64e79.