Fahad Omar Alomary’s research while affiliated with Imam Mohammad ibn Saud Islamic University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (6)


Fig. 1. System Development Life Cycle SDLC phases are discussed as follows:
TABLE 1 . AGENT'S RESPONSIBILITY
TABLE 2 . OVERALL SATISFACTION OF USING THE SYSTEM
TABLE 3 . COMPARISONS AMONG SIMILAR SYSTEMS
Fig 5. Illustrated the comfort of participants regarding system task accomplishment, (80%) agree with the system is able to accomplish the tasks more quickly, (11%) neither agree nor disagree while (9%) was disagreed.

+1

An Interactive Distance Education and E-Learning System Based on Multi Agent System Architecture
  • Conference Paper
  • Full-text available

April 2018

·

534 Reads

·

7 Citations

·

Fahad Omar Alomary
Download

satisfaction.
Wright map.
Item statistics.
Guttman scalogram.
Item category for question C12_1.
Assessment of Student Performance for Course Examination Using Rasch Measurement Model: A Case Study of Information Technology Fundamentals Course

February 2018

·

543 Reads

·

20 Citations

Education Research International

This paper describes a measurement model that is used to measure the student performance in the final examination of Information Technology (IT) Fundamentals (IT280) course in the Information Technology (IT) Department, College of Computer & Information Sciences (CCIS), Al-Imam Mohammad Ibn Saud Islamic University (IMSIU). The assessment model is developed based on students’ mark entries of final exam results for the second year IT students, which are compiled and tabulated for evaluation using Rasch Measurement Model, and it can be used to measure the students’ performance towards the final examination of the course. A study on 150 second year students (male = 52; female = 98) was conducted to measure students’ knowledge and understanding for IT280 course according to the three level of Bloom’s Taxonomy. The results concluded that students can be categorized as poor (10%), moderate (42%), good (18%), and successful (24%) to achieve Level 3 of Bloom’s Taxonomy. This study shows that the students’ performance for the set of IT280 final exam questions was comparatively good. The result generated from this study can be used to guide us to determine the appropriate improvement of teaching method and the quality of question prepared.



Hybrid Cloud System and Software Agent: Towards Hybrid Cloud Intelligent Agent System

January 2017

·

273 Reads

WSEAS TRANSACTIONS ON COMPUTERS

Clouds are used through a service-oriented interface that implements the "as-a-service" paradigm to offer cloud services on demand. The adaptation of cloud users and clouds services and application needs required large-scale infrastructures for high-performance computing, since this could be provided only by cloud computing. This paper discusses the cloud computing models, services and architectures. Specifically, discusses the differences and potential synergies between hybrid cloud computing models and Multi Agent Systems (MASs). The main contribution of this paper is to highlight the challenges of using intelligent software agent in high performance complex hybrid cloud computing models. The convergence of interests between MASs that need reliable distributed infrastructures and cloud computing systems that need intelligent software with flexible, dynamic and autonomous behavior can result in new systems and applications.


Cloud Computing Based E-Commerce as a Service Model: Impacts and Recommendations

March 2016

·

188 Reads

·

14 Citations

In the past few years, the great transmission of theoretical concept of different industries such as E-commerce into real application has been used by cloud computing. Based on cloud features and characteristics those are encouraging small companies that providing their E-commerce products to adopt their development into cloud computing. In order to assist the E-commerce small companies with the right way to start with the basic requirements and upgrading their computing resources as their cloud user base grows with time, herewith the E-commerce as the services model for cloud computing is proposed. The main goal of the proposed model is to integrate the E-commerce as a service enterprise and cloud computing. Cloud computing provide a number of internal services such as software as a service (SaaS), hardware as a service (HaaS), platform as a service (PaaS), infrastructure as a service (IaaS), data as a service (DaaS) and communication as a service (CaaS) beside an external services such as the internet service provider, IT service provider, software developer, system integration provider and hardware suppliers. The paper concluded that integrations of the internal and external services could sustain E-commerce development in cloud environment.


Fig. 1. Main class of digital forensics ontology 
Towards a Comprehensive Ontology Based-Investigation for Digital Forensics Cybercrime

October 2015

·

1,041 Reads

·

11 Citations

International Journal on Communications Antenna and Propagation (IRECAP)

Cyber physical attacks against information and computer systems are a tangible and dangerous threat that requires an effective response. In this paper, digital forensics cybercrime ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of computer crimes of digital forensics in cyberspace. The power of the proposed ontology is to determine the difficulties of association of the digital crime types and their collection evidences in digital forensics cases. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Digital forensics and ontology are two normally unrelated topics. Ontology congruent to this paper is method that will help to better understanding and defining terms of digital forensics. Our proposed digital forensics cybercrime ontology resulting from the Protégé has a total of 180 classes, 179 subclasses and 84 instances regarding digital forensics crime cases.

Citations (5)


... The proposed system evolved from the ML-GAI mixed system to present critical concerns associated with cloud computing [7]. ...

Reference:

Harnessing Artificial Intelligence and Machine Learning to Transform Cloud Computing with Enhanced Efficiency and Personalization
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia

Journal of Information Security

... Chandra Reka et al. [25] employed virtual display technology to simulate teaching environments and study student emotions. Talib et al. [26] developed a MAS system to facilitate coordination and communication between teachers and students during examination scheduling and assignment. Sowmiya et al. [27] utilized a novel ant colony optimization model to predict and recommend teachers' teaching styles. ...

An Interactive Distance Education and E-Learning System Based on Multi Agent System Architecture

... Penerapan model ras model menjadikan sebuah hasil penilaian yang dilakukan memiliki nilai yang sangat baik. (Talib et al., 2018). Pemodelan rasch juga memiliki pemilihan bentuk butir soal dalam membuat tes yang menjadikan sebuah tes lebih bermakna juga mempunyai sebuah kualitas dalam keperluan pada sebuah tujuan pengujiannya (Sumintono & Widhiarso, 2015). ...

Assessment of Student Performance for Course Examination Using Rasch Measurement Model: A Case Study of Information Technology Fundamentals Course

Education Research International

... In recent times Ontologies are created in the crime domain that reflects the information needed for the police and other intelligence departments to understand the kind of facts and logical interpretations they need to take as references to solve the cases. Although these ontologies are built in assisting various departments, These ontologies should not be restricted to deal with a certain domain [1,3,7]. Moreover the ontologies were having digital evidence as data Since they lack the appeal to generate enough evidence related to organized crime they are specifically restricted to a certain part of crime investigation process. ...

Towards a Comprehensive Ontology Based-Investigation for Digital Forensics Cybercrime

International Journal on Communications Antenna and Propagation (IRECAP)