Papers by Saeed Q . Al-Khalidi Al-Maliki
IntechOpen eBooks, Mar 11, 2024
This study identifies the importance and ability of geographic information systems and remote sen... more This study identifies the importance and ability of geographic information systems and remote sensing technologies to manage and monitor surface water in the Jazan region of Saudi Arabia. This study uses several methods to establish a geographical database for the study area: hydrologic and water quality data, a digital Geographical Information System (GIS) elevation model, the spatial distribution and investigation of water samples in Jazan and watershed delineation and flowing tracing tools. The proposed spatial data architecture attempts to implement flood prevention tools and practical land-use proposals, as well as the design of a computerised GIS database for flood risk assessment and mapping.
IntechOpen eBooks, Mar 28, 2024
Information and communication technologies (ICTs) have improved the quality of people's lives dur... more Information and communication technologies (ICTs) have improved the quality of people's lives during the past few decades by performing urban services to build "super cities," sometimes referred to as smart cities. The expansion of smart city programs across the globe is a strategic response by governments to deal with current issues. The goal of the smart city is to use ICTs and knowledge to enhance infrastructure management and city administration. Smart cities have been the subject of several studies, but Saudi Arabia has seen very few of these studies. Due to the region's religious background and pilgrimage activities, this researcher has examined the requirement for ICT framework and made a proposal. In order to meet all requirements for smart cities in the near future, this research suggests a workable ICT model framework and aims to examine smart cities in terms of potential advantages and obstacles to their development in the Kingdom. It also offers a model for creating smart cities in the Kingdom. The study on Saudi Arabia's smart city projects is intended to boost the advantages of beginning to develop smart cities throughout the Kingdom.
Journal of organizational knowledge management, 2013
The adoption of Information and Communication Technology (ICT) is one of the key factors explaini... more The adoption of Information and Communication Technology (ICT) is one of the key factors explaining growth discrepancies across countries in general and in the Kingdom of Saudi Arabia in particular. ICT has been the most dynamic component of investment in recent years, and until recently the explosive growth of investment in ICT has been at the center of the 'new economy' paradigm, shifting the Kingdom's reliance on growth away from oil. ICT investment contributes to capital deepening in all industrial and commercial sectors, thereby assisting in generating economic growth that is more sustainable in the long term. The main objective of this research study is to identify the impact of ICT investment in Saudi Arabia and the role that the government has played through its series of 'five year plans'. The current circumstances in Saudi Arabia relating to IT usage and development as well as the factors affecting economic growth are examined and analyzed. This research also assesses the strategies and policies relating to ICT and its investment in Saudi Arabia, and discusses the role of public and private organizations as well as educational institutions at all levels. The findings reveal that, despite the considerable strides made by the government, certain factors need addressing, in particular, the current state of the Kingdom's ICT infrastructure, the need for adequate numbers of skilled personnel to meet the anticipated growth in ICT, the need for educational establishments to incorporate ICT more fully into their programs, the need to develop the financial markets to facilitate further investment in ICT, and the need to raise the public's awareness of the importance of ICT to the county's prosperity. Accordingly, a number of recommendations are made.
Bulletin of Electrical Engineering and Informatics
Today's digital data transmission over unsecured wired and wireless communication channels is... more Today's digital data transmission over unsecured wired and wireless communication channels is making encryption algorithms an increasingly important tool for securing data and information. Hybrid encryption techniques combine encryption schemes of either two symmetric keys or both symmetric and asymmetric encryption methods, and that provides more security than public or private key single encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The recommended algorithm scheme is a combination of the well-known Rivest Shamir Adleman (RSA) algorithm and a simple symmetric key (SSK) algorithm. The aim of this st...
Indian Journal of Computer Science and Engineering
Indian Journal of Science and Technology
Objectives: This research article aims to identify the level of further mutations of COVID-19 and... more Objectives: This research article aims to identify the level of further mutations of COVID-19 and its vulnerability. Healthcare workers are urged to take precautionary measures to prevent further damage to their community and to avoid further human deaths. At this stage, it is crucial to study, analyze, and understand the COVID-19 variant mutation. Methods: The mutation of COVID-19, however, has not yet been validated for the way in which it affects the risk of underlying comorbidities. It may be possible to tackle this challenge by using artificial intelligence, machine learning, and deep learning algorithms. We have used the J48 algorithm and the Linear Regression algorithm. These algorithms were then analyzed based on the accuracy they provided after running them in the output window of WEKA data mining. Findings: In this paper, machine learning is used to help clinicians and medical researchers understand COVID-19 variant mutations at various stages. Artificial intelligence-based algorithms provide a better understanding of COVID-19 stages and vulnerability levels. Novelty: Artificial intelligence can be a valuable tool for healthcare operations in this pandemic situation. Moreover, healthcare professionals and a data analysis algorithm will probably arrive at the same conclusion based on the data set. However, the use of machine learning-based techniques described in this article will allow for quicker and earlier diagnosis of any type of pandemic situation in the future.
Data encryption technique is the art of cryptology protecting valuable information or data by tra... more Data encryption technique is the art of cryptology protecting valuable information or data by transforming it into an unreadable scrambled text. Cryptography algorithm is a mathematical technique used to preventing or safeguard messages from unsolicited access. In the current digital environment, public, private financial institution’s data transactions conducts through open network channel only. Therefore, it is significant to implement cryptography techniques on those financial data to secure valuable things. In many sectors exploiting private algorithms such as DES, AES and public algorithms such as RSA, Diffie-hellman been using in various applications. Public key or Asymmetric key encryption technique has connection with many performance issues such as energy consumption, memory wastage and computational problems etc., Correspondingly, symmetric key algorithm also has a problem of non-repudiation, false modification etc., to overcome the above issues and enhance the confidentia...
In recent years, cloud computing has received a lot of attention in academic and industrial secto... more In recent years, cloud computing has received a lot of attention in academic and industrial sectors. Cloud technology facilitates data sharing and enables cost efficiency, playing a vital role in the present as well as for the foreseeable future. In this paper, we briefly elaborate on the structure of cloud-based digital resource sharing suitable for academic and digital libraries by implementing multi-tenant and load-balancing techniques. We then suggest improving the current user service model with private cloud storage as a new paradigm for digital resource sharing for other sectors, including medical and financial. This paper shows a summary of cloud computing and its possible applications, combined with digital data optimisation for web-based services. This study could aid in the identification and generation of cloud-based services that use multi-tenant and load-balancing methodologies for the best quality of service.
EThOS - Electronic Theses Online ServiceGBUnited Kingdo
The adoption of Information and Communication Technology (ICT) is one of the key factors explaini... more The adoption of Information and Communication Technology (ICT) is one of the key factors explaining growth discrepancies across countries in general and in the Kingdom of Saudi Arabia in particular. ICT has been the most dynamic component of investment in recent years, and until recently the explosive growth of investment in ICT has been at the center of the 'new economy' paradigm, shifting the Kingdom's reliance on growth away from oil. ICT investment contributes to capital deepening in all industrial and commercial sectors, thereby assisting in generating economic growth that is more sustainable in the long term. The main objective of this research study is to identify the impact of ICT investment in Saudi Arabia and the role that the government has played through its series of 'five year plans'. The current circumstances in Saudi Arabia relating to IT usage and development as well as the factors affecting economic growth are examined and analyzed. This researc...
Expert Systems in Finance, 2019
Journal of Information Studies & Technology (JIS&T)
Information and communication technology (ICT) has become one of the most important components fo... more Information and communication technology (ICT) has become one of the most important components for improving the performance of educational institutions and provide various learning sources in academia. Unlike conventional hard copy sources of information, electronic (e-) sources use modern technologies to store, process and disseminate information effectively. However, there is still a lack of awareness about the importance of digitisation and informatics in the academic community, especially in the Arab world. Therefore, this study explores the importance of ICT and its role in providing e-sources to improve the educational system at King Khalid University (KKU). Moreover, information awareness is evaluated among the students of the College of Business at KKU. The issues of e-sources and their impact on the use of ICT to access data are further investigated. Finally, the factors that limit access to e-sources at KKU are highlighted.
Journal of Money and Business, 2021
PurposeThis study mainly focuses on the potentiality of the e-commerce industry's opportuniti... more PurposeThis study mainly focuses on the potentiality of the e-commerce industry's opportunities and limitations in the Kingdom of Saudi Arabia (KSA) specifically toward non-oil revenue sectors.Design/methodology/approachE-commerce contribution to the retail market industry becomes more global and more flexible with the rapid growth of the Internet and information technology revolution. A new way of conducting business is rendered by e-commerce, which helps to make a profit electronically.FindingsThe main contributions of e-commerce are management of company operations, easy and cheaper ways of extending their markets and coordinating with the value chain across different borders. In addition, the Internet and e-commerce are responsible for removing language barriers, cultural diversification and extending the market to the national boundaries. The countries would have many innovative and dynamic aspects by the beginning of the global market that increases national revenue, marke...
International Journal of Strategic Information Technology and Applications, 2014
For the last five years, the Kingdom of Saudi Arabia has taken a leading role in the Middle East ... more For the last five years, the Kingdom of Saudi Arabia has taken a leading role in the Middle East in providing effective electronic government (e-government) services and encouraging their use. The global average for government website usage by citizens is about 30%. The vast majority of Saudi citizens visit government offices to obtain information rather than making transactions through government portals. However, it is apparent that the rate of global e-government adoption has fallen below expectations, although some countries are doing better than others. Clearly, a better understanding of why and how citizens use government websites, as well as their general disposition towards e-governance, is an important research issue. This paper advances the discussion on this issue by proposing a conceptual model of e-government adoption that places users at the focal point of e-government adoption strategies.
Cloud computing is similar to any new technology and can cause major challenges and opportunities... more Cloud computing is similar to any new technology and can cause major challenges and opportunities for faculty in institutions of Higher Education. This study was undertaken to determine how Computer and Information Systems (CIS) faculty at two universities view the acceptance and use of cloud computing technology within their respective departments. One university is located in the United States and the other is located in Saudi Arabia. Specifically, this study sought to examine the commonalities and differences between these diverse universities as related to the advantages and disadvantages of using cloud computing, identify the key factors that influence adopting/using cloud computing, and determine each university’s overall perception of cloud computing. This study also sought to determine if there are differences between CIS faculty in a U.S.-based university and in a Saudi Arabian-based university regarding perceived knowledge of Cloud Computing and the status of adoption of C...
International Journal of Computer Applications, 2013
Cryptography and Network Security is one of the most important and emerging research in academic ... more Cryptography and Network Security is one of the most important and emerging research in academic and industry circles. Cryptography usage is a detailed design issue that is largely beyond the scope of the high-level algorithm description earlier. One obvious issue is key size. With many cryptography algorithms, the time it takes to crack a message varies directly with the size of the encryption key. This Research deals with a new cryptographic blinding signature protocol algorithm. The requirements for securing blind signature are privacy, authentication, integrity maintenance and non-repudiation. These are crucial and significant issues in recent times for E-voting which is transacted over the internet through e-commerce channels. A new method of security is suggested which is a based on block cipher algorithm.
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
The demand for adequate security to electronic data system grows high over the decades. Security ... more The demand for adequate security to electronic data system grows high over the decades. Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching became a common issue in different form of networks. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. Encryption and key generation became a vital tool for preventing the threats to data sharing and tool to preserve the data integrity so we are focusing on security enhancing by enhancing the level of encryption in network. This study’s main goal is to reflect the importance of security in network and provide the better encryption technique for currently implemented encryption techniques in simple and powerful method. In our research we have proposed a modular 37 and select any number and calculate inverse of the selected integer using modular 37. The symmetric key distribution should be done in the secure...
International Journal of Measurement Technologies and Instrumentation Engineering
Many studies have been carried out on information technology/information systems (IT/IS) in the W... more Many studies have been carried out on information technology/information systems (IT/IS) in the Western world, but little research has been conducted in the Saudi private sector. This study has been conducted to identify and examine the IT/IS evaluation processes employed in the Saudi private sector and any factors that hinder such organisations from evaluating their systems effectively. This article concentrates on the results of those interviews. Numerous studies have been conducted on the mechanisms of IT/IS evaluation techniques and the factors affecting their implementation, but there are very few studies in this field in Saudi Arabia, and they are generally sections of other main studies about IT implementation, use, and investment. This article aims to identify means of evaluating IT/IS in the private sector. 30 IT managers in private-sector companies were randomly selected from the list of top companies issued by the Council of Saudi Chambers of Commerce in the Kingdom of Sa...
International Journal of Information and Computer Security, 2014
This research study proposes Hybrid Encryption System using new public key algorithm and private ... more This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetrickey cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user's privacy, authentication and accuracy. This system has two different encryption algorithms have been used both in the Encryption and decryption sequence. One is public key cryptography based on linear block cipher another one is private key cryptography based on simple symmetric algorithm. This cryptography algorithm provides more security as well as authentication comparing to other existing hybrid algorithm.
Uploads
Papers by Saeed Q . Al-Khalidi Al-Maliki