Ebad S.A.,Northern Borders University
Malaysian Journal of Computer Science | Year: 2017
Alenezi A.,Northern Borders University
International Journal of Emerging Technologies in Learning | Year: 2017
The development of new E-learning technologies and the arrival of mobile learning systems have brought greater impact on the education sector especially towards higher education learning system. There is no doubt that it is extremely useful for all those individuals lacking sufficient time for their studies. They can use such electronic forms of learning to enjoy the anytime & anywhere learning environment. It has attracted the attention of big software industry owners as well as mobile technology based companies over the period. M-learning is able to provide the learners with learning opportunities with greater capabilities through the use of mobile phones or smart-phones. Northern Border University (NBU) in Saudi Arabia is already using several online and offline automated software's & Blackboard LMSs in its various Deanships, Colleges and Departments for student's self-learning purposes. This case study aims to assess the behavioral differences of students/faculty members using Elearning (Mobile Apps/Web applications) to learn/teach the respective subjects. It discusses about the perceptions of students/faculty members about Mlearning & E-learning including the modes and their maximum uses of certain mobile App/Web Application whether offline or online. There are five criteria and for each criterion questionnaires are designed to take the opinions from different groups. Likert scale method is used here. Statistical testing method TTest is used here to calculate the results among the groups.
Ebad S.A.,Northern Borders University
Computer Systems Science and Engineering | Year: 2017
Inspection is a static verification and validation process in which a software system is reviewed to find defects. Though it concentrates on source code, inspection can be applied to any readable representations of the software. Using systematic review, we identify studies for inspection reading techniques in (2004 - 2015). A total of 978 articles were discovered from well-known e-databases; and 45 of these were the primary studies. We found that the current research on inspection still has more focus on coding artifacts than requirements and design artifacts. The study also found the most widely-used technique is tool-assisted, followed by checklist-base reading (CBR) and improved manual inspection (improved Ml). An improved Ml is a manual inspection (Ml) supported with some additional formal approaches. Furthermore, the perspective-based reading (PBR), usage-based reading (UBR), and tool-assisted techniques are found to be the most effective techniques to inspect the requirements, design, and coding artifacts respectively. A little research has been done on inspection of design artifacts. Also, a little research on software inspection has been conducted on industry context compared with academia. The paper also suggests topics for further research. © 2017 CRL Publishing Ltd.
Khan A.D.,Sarhad University of Science and Information Technology |
Khan S.D.,University of Milan Bicocca |
Khan R.U.,Sarhad University of Science and Information Technology |
Ahmad N.,Northern Borders University
Plasmonics | Year: 2014
The presence of plasmonic Fano-like resonances in the optical response of isolated and dimer metal-dielectric-metal nanostructures are investigated theoretically. The nanostructures are engineered in such a way to support multiple Fano-like resonances that are induced by the interference of bright and dark plasmon modes. It is found that the dimer resonators exhibit different types of Fano resonances for both the transverse and longitudinal polarizations unlike conventional nanodimers. Several configurations of the dimer Fano resonator are analyzed with special emphasis on the Fano spectral line shape. Breaking the symmetry of the dimer nanostructure in various directions control the asymmetric line shape and provides different kinds of unique Fano resonances. In certain cases, the Fano resonators exhibit multiple Fano resonances that are particularly significant for plasmon line shaping and can serve as platforms for multi-wavelength sensing applications. © Springer Science+Business Media New York 2013.
Aljahdali M.,Northern Borders University |
Aljahdali M.,King Abdulaziz University
Spectrochimica Acta - Part A: Molecular and Biomolecular Spectroscopy | Year: 2013
The ternary complexes of Cu(II), Zn(II), Ni(II) and Cd(II) with 2-aminomethylbenzimidazole (AMBI) and glycine as a representative example of amino acids have been isolated and characterized by elemental analyses, IR, ESR, UV-vis, magnetic moment, molar conductance and 1H NMR spectra. AMBI behaves as neutral bidentate ligands with coordination through imidazole and amino group nitrogens while the glycine amino acid behaves as a monodenate anion with coordination involving the amino group and carboxylate oxygen after deprotonation. The magnetic and spectral data indicates a square planar geometry for both Cu2+ and Ni2+ complexes and a tetrahedral geometry for both Zn2+ and Cd2+ complexes. The isolated chelates have been screened for their antifungal and antibacterial activities using the disc diffusion method. A cytotoxicity of the compounds against colon (HCT116) and larynx (HEP2) cancer cells have been studied. The stability constants of ternary M-AMBI-Gly complexes were determined potentiometrically in aqueous solution at I = 0.1 mol dm-3 NaCl. © 2013 Elsevier B.V. All rights reserved.
Aljahdali M.,King Abdulaziz University |
El-Sherif A.A.,Cairo University |
El-Sherif A.A.,Northern Borders University
Inorganica Chimica Acta | Year: 2013
A combined experimental and computational study of novel mixed ligand Cu(II), Ni(II) and Co(II) complexes of 2-(1-(2-phenyl-hydrazono)-propan-2- ylidene)hydrazine-carbothioamide (TPHP) and 1,10-phenanthroline (1,10-Phen) have been synthesized. The complexes have been characterized by elemental analyses, IR, solid reflectance, magnetic moment, 1HNMR and molar conductance. Spectral data showed that the 1,10-phenanthroline acts as neutral bidentate ligand coordinating to the metal ion through two nitrogen donor atoms and thiosemicarbazone acts as monobasic tridentate coordinating through two imine-N and thiolate sulphur groups. The geometry of the studied M(II) complexes has been fully optimized using parameterized PM3 semiempirical method. It was observed that the M-S bond length is longer than that of M-Cl in the isolated complexes and the M-N bond length is shorter than that of M-Cl. Also, valuable information is obtained from calculations of molecular parameters for all complexes including net dipole moment of the metal complexes, values of binding energy, which proved that the complexes are more stable than the free ligand. The metal chelates have been screened for their antimicrobial activities using the disc diffusion method against different selected types of bacteria (G +: Bacillus subtillis RCMB 010067, Staphylococcus aureus RCMB 010028); G-: Pseudomonas aeuroginosa RCMB 010043, Escherichia coli RCMB 010052)) and fungi (Aspergillus flavus RCMB 02568, Pencicillium italicum RCMB 03924, Candida albicans RCMB 05031, Geotricum candidum RCMB 05097). Finally, structure-activity relationship studies were investigated with the aim to correlate physico-chemical properties that may be related to the antimicrobial action of the studied compounds. Protonation constant of (TPHP) ligand and stability constants of its M(II) complexes were determined by potentiometric titration method in 70%:30% DMSO-water mixture at 0.1 mol dm -3 NaCl. © 2013 The Authors. Published by Elsevier B.V. All rights reserved.
El-Mallawany R.,Northern Borders University
Journal of Non-Crystalline Solids | Year: 2013
Binary tellurite glasses in the form (100 - x)TeO2-xA nOm and AnOm = Nb2O 5 and WO3 oxides have been prepared by the melt quenching technique and x = 4, 10 mol% for Nb2O5 and 20 mol% WO 3. Density and molar volume have been measured and calculated. Differential scanning calorimetric curves of these glasses have been investigated to measure thermal properties of these glasses. The thermal properties were the glass transition temperature Tg (C), the onset of crystallization temperature Tx (C) and the glass stability S = (Tx - Tg) (C). The glass transition temperature has been analyzed according to the average crosslink density that is present in the glass. © 2013 Elsevier B.V.
Kotb A.,Fayoum University |
Kotb A.,Northern Borders University
Optoelectronics Letters | Year: 2013
The NAND operation at 250 Gbit/s based on quantum dot-semiconductor optical amplifiers (QD-SOAs) is modeled. By solving the rate equations of SOAs in the form of a Mach-Zehnder interferometer (MZI), the performance of NAND gate is numerically investigated. The model takes the effects of amplified spontaneous emission (ASE) and the input pulse energy on the system's quality factor into account. Results show that NAND gate in QD-SOA-MZI based structure is feasible at 250 Gbit/s with a proper quality factor. The decrease in quality factor is predicted for high spontaneous emission factor (NSP). For an ideal amplifier (NSP = 2), the Q-factor is 17. 8 for 30 dB gain. © 2013 Tianjin University of Technology and Springer-Verlag Berlin Heidelberg.
Kotb A.,Fayoum University |
Kotb A.,Northern Borders University
Optical and Quantum Electronics | Year: 2013
The performance of all-optical logic NOR gate based on quantum-dot- semiconductor optical amplifier (QD-SOA) is simulated. By solving the rate equations of QD-SOAs when incorporated in the arms of a Mach-Zehnder interferometer the performance of NOR gate is numerically investigated. The model takes into account the impact of the amplified spontaneous emission, the input pulse energy and the injection current density on the system's quality factor. Results show that NOR gate using QD-SOA is capable of operating at speeds of 250 Gbit/s with proper quality-factor. © 2013 Springer Science+Business Media New York.
Northern Borders University | Date: 2015-12-15
Improved buffer overflow protection for a computer function call stack is provided by placing a predetermined ShadowKEY value on a functions call stack frame and copying the ShadowKEY, a caller EBP, and a return pointer are pushed onto a duplicate stack. The prologue of the function may be modified for this purpose. The function epilogue is modified to compare the current values of the ShadowKEY, caller EBP, and the return pointer on the function stack to the copies stored on the duplicate stack. If they are not identical, an overflow is detected. The preserved copies of these values may be copied back to the function stack frame thereby enabling execution of the process to continue. A function prologue and epilogue may be modified during compilation of the program.