Skip to main content
Although e-learning is in its infancy in Saudi Arabia, most of the public universities in the country show a great interest in the adoption of learning and teaching tools. Determining the significance of a particular tool and predicting... more
    • by 
    •   7  
      Information SystemsInformation TechnologyEducational TechnologyE-learning
Mobile technologies have changed the shape of learning for learners, society, and education providers. Consequently, mobile learning has become a core component in modern education. Nevertheless, introducing mobile learning systems... more
    • by 
    •   3  
      Information TechnologyMobile LearningMobile learning and eLearning
Mobile technologies have changed the shape of learning for learners, society, and education providers. Consequently, mobile learning has become a core component in modern education. Nevertheless, introducing mobile learning systems does... more
    • by 
    •   3  
      Information SystemsE-learningMobile Learning
Preprocessing is done on the CT image of lung for removal of noise. A fuzzy filter is presented for the noise reduction of medical images corrupted with additive noise. The filter operation involves two stages. The first stage computes a... more
    • by 
    •   2  
      Biomedical EngineeringImage Processing
The performance of assessment in medical image segmentation is highly correlated with the extraction of anatomic structures from them, and the major task is how to separate the regions of interests from the background and soft tissues... more
    • by 
    •   2  
      Biomedical EngineeringImage Processing
We all know that most of the dynamic web applications are developed using three tier architecture by dividing it into three layers, but among all security threats, SQLIA is foremost security threat for any dynamic web applications. Using... more
    • by  and +1
— As the use of network resources are increasing, the attacks on network are spreading which causes loss of confidential information, loss of confidential data, spreading of virus in networks and computers. To avoid the attacks on... more
    • by 
    • Computer Networking and Telecommunication
With the rapid expansion in the usage of information and communication technologies (ICT) in social, economic and allied activities, cybersecurity has become a major nuisance for states, organizations, institutions, and individuals. As... more
    • by 
    • Cryptography
As the use of network resources are increasing, the attacks on network are spreading which causes loss of confidential information, loss of confidential data, spreading of virus in networks and computers. To avoid the attacks on networks... more
    • by 
    • Computer Networking and Telecommunication
A new evaluation of seismic hazard in the northwestern part of Saudi Arabia area has been carried out, for the minimization and mitigation of earthquake losses. The study area controlled by a number of major regional tectonic features... more
    • by 
    • Geology
Graphical representation of groundwater major dissolved constituents greatly help researchers in understanding the hydro-chemical evolution, grouping and areal distribution. Durov diagram is one of the most widely used technique but it... more
    • by 
    • Geology
    • by 
Abstract—Understanding the evolution of natural groundwater chemistry requires graphical representation of major dissolved constituents. Expanded Durov diagram was used since 1958. DurovPlot program was widely used, since 1997, to... more
    • by 
The object of this paper is to use a design centering technique to improve the realization accuracy of digital filters. That should maximize the number of digital filter which meet specifications. For a certain fs and in a certain... more
    • by 
A new computer application is created to use graphical representation of seismological data sets namely focal mechanism data to help seismologist to minimize complexities, recognize trends, discover data patterns and finally to develop... more
    • by 
    •   2  
      Artificial IntelligenceFocal Mechanism
The object of this paper is to use a design centering technique to improve the realization accuracy of digital filters. That should maximize the number of digital filter which meet specifications. For a certain fs and in a certain... more
    • by 
    •   2  
      Digital CircuitsDigital Filters
The preliminary seismic hazard assessment of western Saudi Arabia is primarily embodied in two single element maps which are the estimated maximum intensity and expected intensity in 50 years at 10% probability of exceedance. The maps... more
    • by 
    • Seismic Hazard Assessment
Graphical representation of groundwater major dissolved constituents greatly help researchers in understanding the hydro-chemical evolution, grouping and areal distribution. Durov diagram is one of the most widely used technique but it... more
    • by 
Understanding the evolution of natural groundwater chemistry requires graphical representation of major dissolved constituents. Expanded Durov diagram was used since 1958. DurovPlot program was widely used, since 1997, to calculate and... more
    • by 
Abstract A new computer application is created to use graphical representation of seismological data sets namely focal mechanism data to help seismologist to minimize complexities, recognize trends, discover data patterns and finally to... more
    • by 
    • Software Development Tools