Papers by Mohanaad Shakir

Factors Effecting Online Shopping Intention through Verified Webpages: A Case Study from the Gulf Region
Recent Advances in Intelligent Systems and Smart Applications, 2021
Increasing sales is the main objective of any business. In the past, the sellers displayed their ... more Increasing sales is the main objective of any business. In the past, the sellers displayed their products and the customer came to try and buy it. But after the new invention (the Internet), there is a new shopping platform called (online shopping) created. Each society has its culture and specificities that change or influence their intentions. This research examined the Gulf States to find out the basic factors that affect their intentions to buy from the Internet. Several factors chosen in this study, these factors were adopted through the results obtained through the initial questionnaire published in the study community. The study population was specific to the GCC (Gulf Cooperation Council) countries (citizens and residents) to determine their priorities for online shopping. The data collected for this research was carried out through the publication of the questionnaire in some universities in the targeted countries of the study society in addition to real customers who already shopped through online stores. To analyze these data, different methods of analysis (descriptive analysis, multiple regression analysis, dummy variables, and ANOVA test for hypothesis testing) were used. The result of this study found that customers in the study community do care about some factors such as payment methods, discounts, ease to use, ordering method, and verified page more than another factor chosen through this study like security, product quality, shipping, warranty and order status. İn this study there is one of the factors was studied carefully because it has a unique characteristic, and it is the verified pages because it entered the market in recent years and there is not a lot of research written on this topic. Thus, in this research we will find its value on customer’s intention to make new purchasing through new websites.

IEEE EXPLORE, 2020
The shape is essential to image formats where the textual image is the best example of the binary... more The shape is essential to image formats where the textual image is the best example of the binary image representation. Feature extraction is a fundamental process in pattern recognition. the shape and texture recognition system consists of five major tasks which are involved pre-processing,segmentation, feature extraction, classification and recognition.Generally, less discriminative features in global and local feature approach leads to reduce in recognition rate. By proposing a global and local approach that produces more discriminative features and less dimensionality of data, these problems are overcome. Two feature extraction methods are studied namely Gabor filter and edge direction matrix (EDMS) and combination of two popular feature extraction methods is proposed The proposed method is a combination of Gabor filter and EDMS method which applied to reduce the dimensionality of data. this collaboration aims to make use of the major advantages each one presents, by simultaneously complementing each other, in order to elevate their weak points. By using classifier approaches such as random forest,the proposed combinative descriptor is compared with the state of the art combinative methods based on Gray-Level Co-occurrence matrix and moment invariant on two benchmark dataset MPEG-7 CE-Shape-1, Enghlishfnt. The experiments have shown the superiority of the introduced descriptor over the GLCM moment invariants from the literature.
Background: Computer Aided Learning (CAL) or Computer Assisted Learning can be defined a process ... more Background: Computer Aided Learning (CAL) or Computer Assisted Learning can be defined a process of using the computer for the purposes of teaching and learning. Generally CAL employs multimedia technologies for the purpose of making the subject more effective, speeding up the learning process, understanding and enhancing perception of the learners Objective: To develop a user friendly software for education purposes using multimedia technology. Results: student's acceptance level of teaching has been increased using multimedia approach than traditional methods in subject shock tunnel. Conclusion: improve the students' score in Mechanical Engineering Design by using this model into 38% when compared with result of quiz using traditional methods.

International Journal of Emerging Technologies in Learning (iJET), 2018
Computer Supported Collaborative Learning (CSCL) promotes learners to be more confident and self-... more Computer Supported Collaborative Learning (CSCL) promotes learners to be more confident and self-directed in addition to enhancing their knowledge and general information throughout the peers' and teacher's electronic feedback (E-feedback). This study was carried out with 28 Master EFL/ESL students who registered in the elective course of Computer Application in ESOL. To examine the influence of peers' and teacher's electronic feedback on ESL writing anxiety level as well as their writing performance, Second Language Writing Anxiety Inventory (SLWAI) and semi-structured Interviews were employed. The major finding from the Paired T-Test which was performed on the pre-post of (SLWAI) revealed a significant difference between them (p<.009) that reflected respondents' tendency to decrease their writing anxiety level after using peers' and teacher's e-feedback. Moreover, data collected from the interviews reported that the respondents perceived the e-feedback from peers and teacher as an important way to improve their writing performance.

Journal of Engineering and Applied Sciences, 2018
Recent affordances and advances of information technology have optimized the pedagogical implicat... more Recent affordances and advances of information technology have optimized the pedagogical implications in most of the developed countries. This encouraged other countries particularly the Republic of Sudan to use technology tools to enhance their educational institutions. This study aims at exploring to what extent Sudanese government universities are using the information communication technology tools in education. About 6011 teachers in 8 selected universities responded to the distributed questionnaire. Additionally, the data were analyzed using a statistical analysis to get frequencies and mean scores. The results of this study indicated that Sudanese government universities vary in the level of using the technology tools as well as the variance in the types of technological implications. These results reflected that Sudanese government universities still need to pay a great attention towards the use of information communication technology tools. Moreover, the government should make more efforts about providing training course for teachers to improve computer literacy.

ARPN Journal of Engineering and Applied Sciences, 2019
Cloud computing is a8rapidly growing technology due to its8highly flexible uses and applications.... more Cloud computing is a8rapidly growing technology due to its8highly flexible uses and applications. It also has other features such as8simplicity, quick data access and reduced8data storage costs. Consequently, it has been widely used8by many organizations. This widespread use of cloud computing among8organizations causes many security issues. Moreover, cloud computing layers8are likely to be jeopardized8by many security risks such as privileged8user access, data location, data segregation, and data8recovery. This paper aims to prepare8an ample debate of a literature review-based studies that provided important insights to researchers in the scope of security cloud computing. The researcher applied a relevant8set of keywords. These keywords are limited8to the title, abstract and keywords search archives published between 2010 and June 2018. The database search returned a total of 308 publications. In addition, we conducted backward-forward searches from the reference lists of relevant, quality previous works on the security framework in public cloud computing studies. Then, the researcher filtered the publications to only full text access articles that were written in English only. Finally, this study obtained a many publication. The findings of this paper address many important points such as in this study is recommended to apply behavior recognition with password for improving authentication layer performance in cloud computing. This study finds most of current studies neglected the present of human factor in password-based authentication, and learnability in password-based authentication is highly weak. Despite this, very few studies have adopted the behavior recognition with password in public cloud.

International Journal of Emerging Technologies in Learning (iJET), 2019
Computer programming is considered as a difficult area of study for novices. One of the reasons i... more Computer programming is considered as a difficult area of study for novices. One of the reasons is the main focus of the curriculum presented in an introductory programming (IP) course which emphasizes more on the programming knowledge (syntax and semantic) of the programming language. This study introduced a new teaching curriculum in the IP course, which focuses on different skills required by the novices. We compared the IP course materials based on the traditional and new approaches against five categories. The result shows that the new approach encourages both the programming knowledge and problem solving strategies, and promotes deep learning. Furthermore, it discourages programming shortcut (Problem statement → Code), and support three-step approach (Problem statement → Solution Plans → Code) in solving a problem statement. The new approach also promotes algorithmic thinking in the IP course by paying equal attention on the problem solving strategies.

International Journal of Recent Research in Commerce Economics and Management (IJRRCEM), 2019
The purpose of this paper is to find the important and clever ways to build the trust between cus... more The purpose of this paper is to find the important and clever ways to build the trust between customers and suppliers especially in online shopping and I want to focus on Arab countries-Iraq as a simple of my studying. I have chosen Iraq because there is no trust at all with this kind of service, so you cannot find any online apps or websites in this country. Because of the fact that I will take this topic, and everything belongs to it by consideration in order to enter this part (Iraq market-online service). The trust is a key point of any business so that new way of shopping which will take it as a study community for many reasons. First of all, Iraq community does not have this kind of service or it is very limited. secondly, because I'm working in this part as a (customer service-in online shopping website which took Gulf countries as a target) in a website which has a target Arab country, when I'm talking to the customers first question is (who to approve that your products are original?) Last but not least, I'm working on this part in my life and I'm almost done with this kind of service to enter to Iraq market depending on my huge experience with Iraq community and find a good channel to build a perfect level of trust. To sum up, online shopping is a good way to increase the sales also find a new communication channels with customers depending on the large amount of experience in the world, I want to take all these points by consideration in order to create a new online method in this part of the word.

International Journal of Emerging Technologies in Learning (iJET), 2019
There is a need for several applications and technologies in the higher education institutions in... more There is a need for several applications and technologies in the higher education institutions in Oman to enhance the educational process. This systematical study investigates the simultaneous influence of technology implementation with e-learning and traditional coursework program instruction on the enhancement and development of assessment method for undergraduates in different programs. This paper aims to analyze the current articles that handle with the learning process and compare between the understanding and acceptance of E-Learning mechanism and traditional coursework method of teaching for improving assessment method and evaluation of academic performance. The method works on the benefits of increasing E-Learning process for educational skills as an assistance tool with faculty material and class discussion. In this study, surveys were distributed to two different universities and college in Oman to assess their satisfaction of learning model. The findings of this paper assisted the model that may help to improve both the teaching method and academic performance of student learning outcomes.

Evaluate Information Security Governance Frameworks in Cloud Computing Environment Using Main and Sub Criteria
Journal of Computational and Theoretical Nanoscience, 2019
In spite of the benefits of cloud computing, it is associated with high risks that need an effect... more In spite of the benefits of cloud computing, it is associated with high risks that need an effective security program. Framework of information security governance ensures successful management of information security risk and oversight, and helps to protect an organization's information. However , no standard or common criteria have been specified to help organizations in evaluating and selecting the proper cloud computing information security governance framework. Hence, this paper aims to identified the main and sub criteria to help organizations for evaluating the target frameworks. To achieve this aim, a critical review has been conducted to identify the current frameworks. The related frameworks are analyzed to indicate and identify the main and sub criteria that can be used to evaluate the current frameworks and facilitate the frameworks selection process. All criteria will be subjected to an evaluation process via interviews with specialists to define the criteria significance and capability in evaluating and differentiating the existing frameworks. The interview data is analyzed using content analysis method. The analysis of interviews data has found that all the experts agreed that main and sub criteria are very important, 20% of them indicated that these criteria are essential but lack to other sub-criteria such as awareness, valuation of assets and documents control. Furthermore, 70% of the experts indicated that it is difficult to rank the criteria because they have the same importance. Following that, it is recommended that a considerable work is still needed to specify a proper selection method of a suitable cloud computing information security governance framework based on standard or common criteria.

Storing and archiving information plays a crucial role in any government's strategy of serving it... more Storing and archiving information plays a crucial role in any government's strategy of serving its parties. One early step in achieving this goal is to implement a correct electronic document system for e-government agencies, which plays a crucial and important role in storing, processing, and managing data flow in an effective manner. However, this system in Iraq did not see the light so far even it is a strategic objective of e-government. This paper attempts to investigate the technological and human challenges that hinder the implementation of such system to support Iraqi e-government in overriding those challenges and speeding up its initiatives. The paper has utilized a quantitative approach via survey questionnaire from various public and private sectors at Tikrit city in Provence Salah al din to achieve its goal. The results indicate several challenges such as economic, computer illiteracy, technology acceptance, training and lack of series implementation steps by government.

Cloud computing is a rapidly growing technology due to its highly flexible uses and applications.... more Cloud computing is a rapidly growing technology due to its highly flexible uses and applications. It also has other features such as simplicity , quick data access and reduced data storage costs. Consequently, it has been widely used by many organizations. This widespread use of cloud computing among organizations causes many security issues. Moreover, cloud computing layers are likely to be jeopardized by many security risks such as privileged user access, data location, data segregation, and data recovery. This paper aims to prepare an ample debate of a literature review-based studies that provided important insights to researchers in the scope of security cloud computing. The researcher applied a relevant set of keywords. These keywords are limited to the title, abstract and keywords search archives published between 2010 and June 2017. The database search returned a total of 308 publications. In addition, we conducted backward-forward searches from the reference lists of relevant, quality previous works on the security framework in public cloud computing studies. Then, the researcher filtered the publications to only full text access articles that were written in English only. Finally, this study obtained a total of 53 publications. The findings of this paper address many important points such as authentication, data segregation, and encryp-tion which are considered as the top concerns in security cloud computing. In addition, most of authentication layer is considered password as a prime criterion in determining authorizes user.

Within the security scope, Authentication is considered as a core model to control accessing any ... more Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker "who don't have a password" is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of "Confidence Range ". The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB, " Electronic Personal Synthesis Behavior " , has been generated to the authorized user by the application of confidence range algorithm.
Computer Aided Learning (CAL) or Computer Assisted Learning can be defined a process of using the... more Computer Aided Learning (CAL) or Computer Assisted Learning can be defined a process of using the computer for the purposes of teaching and learning. Generally CAL employs multimedia technologies for the purpose of making the subject more effective, speeding up the learning process, understanding and enhancing perception of the learners Objective: To develop a user friendly software for education purposes using multimedia technology. Results: student's acceptance level of teaching has been increased using multimedia approach than traditional methods in subject shock tunnel. Conclusion: improve the students' score in Mechanical Engineering Design by using this model into 38% when compared with result of quiz using traditional methods.
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of ... more Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Objectives: of this paper are to investigate the role of the Enterprise System and Cloud Computing Services to assist and guide him to ensure the initiative become successful. Result: The cloud computing technology offers great potential for Enterprise such as the speed of dealing with data and product introductions, innovations and speed of response. Conclusion: The use of cloud computing technology leads to the rapid development and competitiveness of enterprises in various fields

Abstract— Cloud computing is considered as one of the rapid growing technologies for it has hig... more Abstract— Cloud computing is considered as one of the rapid growing technologies for it has high flexibility in both usage and application; therefore, it has been used widely by many organizations. Cloud computing features ease, fast accessibilty of the data and cost reduction for data storage. Consequently, a number of organizations are using this technology. Since the cloud computing has been used widely in various parts of the world by many originations, several security problems in cloud computing exist. This paper aims to examine the security problems and to identify the characteristics of such security problems. This study was carried out by distributing questionnaires to different organizations in selected twelve (12) countries. Nevertheless, this study will examine the important issues in security cloud computing and will determine the frames to improve security systems for cloud computing. The findings of this study is seen to be helpful to enhance the use of cloud computing in different organizations and institutions.

Cloud computing is considered as one of the rapid growing technologies for it has high flexibilit... more Cloud computing is considered as one of the rapid growing technologies for it has high flexibility in both usage and application; therefore, it has been used widely by many organizations. Cloud computing features ease, fast accessibility of the data and cost reduction for data storage. Consequently, a number of organizations are using this technology. Since the cloud computing has been used widely in various parts of the world by many originations, several security problems in cloud computing exist. This study was carried out by distributing questionnaires to different organizations in selected twelve (12) countries. This paper aims to examine the security problems and to identify the characteristics of such security problems, in addition this study will examine the important issues in security cloud computing and will determine the frames to improve security systems for cloud computing. The findings of this study, firstly the organizations or institutions are very concerned in improving the security of cloud computing through the application of the authority model and dynamic classification of data model based on the multi-level security. Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security .
Background: Computer Aided Learning (CAL) or Computer Assisted Learning can be defined a process ... more Background: Computer Aided Learning (CAL) or Computer Assisted Learning can be defined a process of using the computer for the purposes of teaching and learning. Generally CAL employs multimedia technologies for the purpose of making the subject more effective, speeding up the learning process, understanding and enhancing perception of the learners Objective: To develop a user friendly software for education purposes using multimedia technology. Results: student's acceptance level of teaching has been increased using multimedia approach than traditional methods in subject shock tunnel. Conclusion: improve the students' score in Mechanical Engineering Design by using this model into 38% when compared with result of quiz using traditional methods.
This paper tries to propose educational design by using multimedia technology for Mechanical Engi... more This paper tries to propose educational design by using multimedia technology for Mechanical Engineering Design (shockwave, shock tunnel) students in COE,at UNITEN(University Tenaga National(Malaysia. And evaluate the acceptable, Cognition, and interactive of student to the propose model by using statistical relationship to determine the stage of Appropriate model for student. Objectives of propose education design, to develop a user friendly software for education purposes using multimedia technology, to develop animation for 3D model to simulate assembling and disassembling process of High speed flow shock tunnel.
Uploads
Papers by Mohanaad Shakir