Papers by shubair Abdullah

Arab Gulf journal of scientific research, Apr 15, 2024
Purpose -This study investigates a novel educational strategy in science, technology, engineering... more Purpose -This study investigates a novel educational strategy in science, technology, engineering and mathematics (STEM) teaching that integrates the engineering design process (EDP) as a framework. The strategy aims to help teachers explain STEM concepts in a simplified way. We employed the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) methodology to enable a systematic review that evaluated the effectiveness of this approach in improving both teaching and learning in STEM subjects. Design/methodology/approach -In order to fulfill the objectives of the review, key data were extracted from each of the 400 articles that were reviewed from three databases: Scopus, ProQuest Central and EBSCO. Two types of analysis were conducted, namely descriptive analysis and literature classification. Findings -This systematic review analyzed 44 articles on the EDP, focusing on 18 detailed studies mainly from ProQuest, SCOPUS and EBSCO. It revealed a limited focus on gender's impact on EDP and a trend toward interdisciplinary use and integrated research approaches. The study underscores the need for further exploration of demographic influences and preparation programs in EDP across various disciplines, aiming to inform future research and educational policies. Originality/value -The study's value lies in its comprehensive assessment of engineering design (ED) research over the past decade, serving as a key reference point. It highlights progress in the field, consolidates findings and provides insights into the field's evolution, guiding future research directions in ED.

Asian Journal of Social Sciences and Management Studies
The appraisal of academic staff at Sultan Qaboos University (SQU) has been in place for many year... more The appraisal of academic staff at Sultan Qaboos University (SQU) has been in place for many years as a quality assurance measure. Its primary objective is to enhance staff performance by identifying commendable areas and those requiring improvement in daily activities. Over the years, this appraisal has contributed in faculty development and quality assurance as well as in the continuous improvement. This study explores the perceptions of faculty members at the College of Education concerning the procedures for applying the academic appraisal form at SQU. Utilizing a mixed-method approach (quantitative and qualitative), including questionnaire and semi-structured interview, the research examines the faculty members' views on the effectiveness of the appraisal procedures. The sample participating in this study was 54 faculty members. Out of the 54 participants, 48 completed the questionnaire, while 6 were chosen for in-depth semi-structured interviews. The sample included a wide...

International Journal of Membrane Science and Technology
It is a serious problem that universities worldwide, especially in the middle east, have a high r... more It is a serious problem that universities worldwide, especially in the middle east, have a high rate of failure in programming courses. To overcome this issue which could probably be due to students’ lack of engagement, motivation and problem-solving skills, the Intelligent Tutoring System (ITS) can be an effective tool for enhancing student learning. Despite its effectiveness, no prior research has been conducted on the impact of using ITS in higher education institutions in Oman. This study therefore investigates the perceptions of Omani University instructors to determine the levels of awareness, readiness and challenges among Omani higher institutions concerning their integration of ITS. Also, to investigate the reasons for the poor achievement of students in programming courses. We adopted two approaches in this study. First, quantitative research was conducted via a 5-point Likert scale questionnaire distributed to 59 programming instructors from different higher education ins...

International Journal of Computing and Digital Systems, Aug 6, 2022
The task of literature review is an important for all research areas. The volume of academic lite... more The task of literature review is an important for all research areas. The volume of academic literature published in the scientific journals, books and conference proceedings is increasing rapidly. It has become very difficult for researchers to analyze huge amount of published research papers and draw conclusions. Therefore, an automatic system able to extract the research objectives that recap the meaning and the definition of research from the article published is needed. The main challenge is to deal with the highly multiplicity of authors' writing style used in forming the objective sentences. A semi-extractive approach for precisely extracting research objective from the research abstract is proposed. The extraction process is performed in two tasks, search for pre-collected Key Expressions and verify the findings using pre-built General Key Phrases. An extensive evaluation has been conducted to find out how well it is performing using special dataset that includes diversified writing styles. The results showed that the method is a promising and able to extract objective sentence accurately.

Baghdad Science Journal
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevit... more Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing incr...

International Journal of Information and Education Technology, 2022
Assessment has always been fundamental to teaching as it aims to gauge the impact of the teaching... more Assessment has always been fundamental to teaching as it aims to gauge the impact of the teaching on students learning. The current assessment in teaching computer literacy is objective assessment that focuses on making it intentional, informative, and formalized. Although this assessment is the best way when assessing large groups of students at one limited time, it has a drawback of being limited to check the knowledge of understanding terminology and recalling steps of a particular process. This study introduces a screen-capture technology based approach to performative and authentic assessment. It involved design and implementation of screen-capture assignments to assess computer maintenance skills. The sample consisted of 28 students enrolled in computer hardware and software maintenance classes. Data from students was collected through a multi-modal student survey and a semi-structured interview. The results analysis has indicated that screen-capture performative assessment pr...

International Journal of Current Engineering and Technology, 2018
This paper describes the first stage of an internal grant provided by the Sultan Qaboos Universit... more This paper describes the first stage of an internal grant provided by the Sultan Qaboos University to conduct a research project exploring the actual readiness of Higher Education Institutions (HEIs) to adopt a national migration plan to IPv6. Document analysis was used to derive necessary data on steps taken by the Omani concerned authorities to pave the way for the migration process. It was found that the Telecommunication Regulatory Authority (TRA) established IPv6 project 10 years ago. It has issued a circular on ‘The National Migration Plan for Government Sector’ informing all administrative units of the Sultanate about the preparation of the national plan to prepare detailed transition plans to migrate to IPv6 by the end of year 2020. Data on these agencies’ (specifically higher education institutions) response is scarce and unclear. From the literature review, it was found that there is no research dedicated for the Omani HEIs IPv6 readiness. Therefore, next stage of the rese...

International Journal of Advanced Computer Science and Applications, 2020
Classifying network packets is crucial in intrusion detection. As intrusion detection systems are... more Classifying network packets is crucial in intrusion detection. As intrusion detection systems are the primary defense of the infrastructure of networks, they need to adapt to the exponential increase in threats. Despite the fact that many machine learning techniques have been devised by researchers, this research area is still far from finding perfect systems with high malicious packet detection accuracy. Deep learning is a subset of machine learning and aims to mimic the workings of the human brain in processing data for use in decision-making. It has already shown excellent capabilities in dealing with many real-world problems such as facial recognition and intelligent transportation systems. This paper develops an artificial deep neural network to detect malicious packets in network traffic. The artificial deep neural network is built carefully and gradually to confirm the optimum number of input and output neurons and the learning mechanism inside hidden layers. The performance is analyzed by carrying out several experiments on real-world open source traffic datasets using well-known classification metrics. The experiments have shown promising results for real-world application in the binary classification of network traffic.

International Journal of Computing
The educational data mining research attempts have contributed in developing policies to improve ... more The educational data mining research attempts have contributed in developing policies to improve student learning in different levels of educational institutions. One of the common challenges to building accurate classification and prediction systems is the imbalanced distribution of classes in the data collected. This study investigates data-level techniques and algorithm-level techniques. Six classifiers from each technique are used to explore their effectiveness to handle the imbalanced data problem while predicting students’ graduation grade based on their performance at the first stage. The classifiers are tested using the k-fold cross-validation approach before and after applying the data-level and algorithm-level techniques. For the purpose of evaluation, various evaluation metrics have been used such as accuracy, precision, recall, and f1-score. The results showed that the classifiers do not perform well with imbalanced dataset, and the performance could be improved by using...
Tema utama bagi kajian ini ialah pensegmenan aksara tulisan Arab luar talian. Suatu sistem pengec... more Tema utama bagi kajian ini ialah pensegmenan aksara tulisan Arab luar talian. Suatu sistem pengecaman aksara tulisan Arab yang baik mampu meningkatkan kesalingtindakan antara manusia dengan komputer. The main theme of this research is the off-line handwritten Arabic characters segmentatio
This study is conducted to investigate experts’ views to determine the Omani higher education ins... more This study is conducted to investigate experts’ views to determine the Omani higher education institutions readiness and deployment of IPv6. In particular, the study aims to assess the institutional awareness, current environment, policy, planning, and resources. Descriptive method was followed and two study instruments were designed and implemented, namely questionnaire and semi structured interviews. Both instruments were validated and implemented on a sample of (12) experts for the questionnaire and (5) for the interviews. The results revealed that IPv6 was not sufficiently attended to by the Omani HEIs and it is partially planned for, implemented, and/or deployed. Efforts should be made to help establishing strategies, research and teaching content. Based on the findings of the research, conclusions and recommendations are suggested.

The main theme of this research is the off-line handwritten Arabic characters segmentation. A suc... more The main theme of this research is the off-line handwritten Arabic characters segmentation. A successful handwritten Arabic character recognition system improves interactivity between the human and the computers. Building successful Arabic character recognition system cannot be fulfilled without solving the segmentation problem. One of the major problems is the slant of the words and the dissimilarity in length and slope of the junction line between the handwritten characters. The challenge is to extract the morphological features and to find the junction line. The foremost contribution of this research is the new segmentation algorithm for handwritten Arabic characters using the Slant-Tolerant Segments Feature (STSF). STSF is a string of '+' or '-' signs and represents the strokes of the word characters. The testing of the STSF algorithm was conducted using a newly created database. The new database is called Arabic Handwritten Database/Universiti Sains Malaysia (AH...

Applied computing Journal
IPv6 is the next Internet Protocol version designed to eventually replace IPv4 as the amount of p... more IPv6 is the next Internet Protocol version designed to eventually replace IPv4 as the amount of potentially allocated IPv4 addresses is insufficient. The vulnerabilities of IPv6 protocols and the attacks against them demand more attention to be paid. The multicast mechanism is one of the crucial mechanisms that are related to the nature of IPv6 protocol. Despite its usefulness in performing basic tasks in IPv6 environments, the multicast mechanism is considered as a security hole that calls to be understood by the security specialists and IPv6 network administrators. To address the multicast security aspects, this paper presents the attacks that utilize the multicast vulnerability along with the identification of countermeasures for each attack. In particular, this paper analyzes the state-of-the-art attacks and ranks them based on a new severity ranking method to provide significant security guidance for deploying IPv6 networks.

International Journal of Advanced Computer Science and Applications
Classifying network packets is crucial in intrusion detection. As intrusion detection systems are... more Classifying network packets is crucial in intrusion detection. As intrusion detection systems are the primary defense of the infrastructure of networks, they need to adapt to the exponential increase in threats. Despite the fact that many machine learning techniques have been devised by researchers, this research area is still far from finding perfect systems with high malicious packet detection accuracy. Deep learning is a subset of machine learning and aims to mimic the workings of the human brain in processing data for use in decision-making. It has already shown excellent capabilities in dealing with many real-world problems such as facial recognition and intelligent transportation systems. This paper develops an artificial deep neural network to detect malicious packets in network traffic. The artificial deep neural network is built carefully and gradually to confirm the optimum number of input and output neurons and the learning mechanism inside hidden layers. The performance is analyzed by carrying out several experiments on real-world open source traffic datasets using well-known classification metrics. The experiments have shown promising results for real-world application in the binary classification of network traffic.

The International Arab Journal of Information Technology, 2019
Detecting the denial of service attacks that solely target the router is a maximum security imper... more Detecting the denial of service attacks that solely target the router is a maximum security imperative in deploying IPv6 networks. The state-of-the-art Denial of Service detection methods aim at leveraging the advantages of flow statistical features and machine learning techniques. However, the detection performance is highly affected by the quality of the feature selector and the reliability of datasets of IPv6 flow information. This paper proposes a new neuro-fuzzy inference system to tackle the problem of classifying the packets in IPv6 networks in crucial situation of small-supervised training dataset. The proposed system is capable of classifying the IPv6 router alert option packets into denial of service and normal by utilizing the neuro-fuzzy strengths to boost the classification accuracy. A mathematical analysis from the fuzzy sets theory perspective is provided to express performance benefit of the proposed system. An empirical performance test is conducted on comprehensive dataset of IPv6 packets produced in a supervised environment. The result shows that the proposed system overcomes robustly some state-of-the-art systems.
SEUI-64, bits an IPv6 addressing strategy to mitigate reconnaissance attacks
Engineering Science and Technology, an International Journal

Analytical Review on the Stakeholders Perceptions about IPv6 Readiness and their Implications to the Omani Higher Education Institutions
This paper describes the first stage of an internal grant provided by the Sultan Qaboos Universit... more This paper describes the first stage of an internal grant provided by the Sultan Qaboos University to conduct a research project exploring the actual readiness of Higher Education Institutions (HEIs) to adopt a national migration plan to IPv6. Document analysis was used to derive necessary data on steps taken by the Omani concerned authorities to pave the way for the migration process. It was found that the Telecommunication Regulatory Authority (TRA) established IPv6 project 10 years ago. It has issued a circular on 'The National Migration Plan for Government Sector' informing all administrative units of the Sultanate about the preparation of the national plan to prepare detailed transition plans to migrate to IPv6 by the end of year 2020. Data on these agencies' (specifically higher education institutions) response is scarce and unclear. From the literature review, it was found that there is no research dedicated for the Omani HEIs IPv6 readiness. Therefore, next stage...
Computer and Information Science, Oct 16, 2014
Advising is a vital component of student academic success in college. This paper describes the de... more Advising is a vital component of student academic success in college. This paper describes the design and creation of an electronic Student Academic Advising System (SAAS) to support conventional advising procedures. Use of this SAAS is intended to better guide students through educational process via the use of technology applications. In addition to evaluating the impact of academic e-advising on the student experience in higher education, this study also explores the two different types of advising (e-advising and traditional/in-person academic advising). The satisfaction levels of the students with both types of advising were also assessed. The findings offer some awareness into how effective academic e-advising might be used as an alternative/support to traditional, face-to-face advising methods.
Uploads
Papers by shubair Abdullah