Get In Touch

Address Location on map

Publications

Home // Publications
Understanding and Exploring the Role of AI in Shaping Ethical issue of Data Privacy
Journal Article

Abstract

In this paper, I discuss how artificial intelligence has become central to the formulation of ethical policies concerning data privacy. With the advancement of technology, customers’ privacy and information security concerns have come into focus and require stringent measures for the usage of data. This paper aims to analyze how AI improves data protection mechanisms for security risks pertaining to personally identifiable information while advocating for the transparency of handling personal information. Drawing evidence from the current global issues involving data privacy, the practical use of AI in cyber defense, and the social issues arising from AI technologies, this paper establishes that while developing ethical frameworks, there exists the need to continuously assess and update the ethical standards. Finally, the study confirms how AI should be incorporated within the context of data privacy to build confidence and ensure better accountability in the growing data era.

Nabiel Almbrook Algshat, (10-2024), African Journal of Advanced Pure and Applied Sciences (AJAPAS): ISSN (online): 2957-644X: African Academy of Advanced Studies, 3

Evaluating Students' Academic Progress in the Role of Fuzzy Logic
Journal Article

This paper explores the role of fuzzy logic in the assessment of student performance in local high school, Badr, Libya, positing that it offers a more flexible and accurate alternative to traditional categorization methods of academic achievement. Conventional assessment tools, such as standardized test scores and GPAs, often yield a distorted and overly simplistic view of student performance. Utilizing a mixed-methods research design, this study compares the performance, attendance, and self-reported satisfaction of students assessed through fuzzy logic with those evaluated by traditional methods. The results demonstrate that students assessed using fuzzy logic achieved higher average scores and expressed greater satisfaction with the assessment process. Additionally, educators employing fuzzy logic provided more detailed and constructive feedback, enriching the learning experience. Thus, this research indicates that fuzzy logic can effectively mitigate the shortcomings of traditional assessment methods, enhancing the recognition of diverse student abilities. The findings advocate for the integration of fuzzy logic in educational assessment practices to promote inclusivity and improved learning outcomes.



Nabiel Algshat, (10-2024), University of Tripoli Alahlia -Libya: AlQalam Journal of Medical and Applied Sciences (AJMAS), 7

UDC 2020 Challenge on Image Restoration of Under-Display Camera: Methods and Results
Chapter

Abstract


This paper is the report of the first Under-Display Camera (UDC) image restoration challenge in conjunction with the RLQ workshop at ECCV 2020. The challenge is based on a newly-collected database of Under-Display Camera. The challenge tracks correspond to two types of display: a 4k Transparent OLED (T-OLED) and a phone Pentile OLED (P-OLED). Along with about 150 teams registered the challenge, eight and nine teams submitted the results during the testing phase for each track. The results in the paper are state-of-the-art restoration performance of Under-Display Camera Restoration. Datasets and paper are available at https://yzhouas.github.io/projects/UDC/udc.html.


Keywords

Under-display camera Image restoration Denoising Debluring 

Nagat Adballa Esiad Rahel, (01-2021), ECCV 2020: Computer Vision – ECCV 2020 Workshops pp 337-351: international conference,

التشفير المتناظر و طرق مهاجمته
مشروع تخرج بكالوريوس

Encryption provides privacy and security in all its concepts of data transmitted over open networks. There is a need for strong encryption methods because with the rapid development of the computer, it reduces the strength of encryption, because increasing the speed of the computer means shortening the time needed for the computer to break or detect a certain encryption key.The longer the key length increases the probability ratio,and the longer the time required to install all of these possibilities, which in some powerful cryptographic keys reaches hundreds of years, Taking into account the capacity and speed of existing computers.

Therefore, it is not possible to rely on these computers that use transistors in the CPUs, but must move to more°modern techniques where the length of processing and decryption less than hundreds, but thousands of times, and within this framework there are recent studies are making efforts to reach the so-called (Photons are used in the information transfer process) that can perform calculations much faster than the arithmetic of conventional devices,allowing them to break the most common online protection systems.

These computers will radically change the encryption methods currently adopted to move to quantum encryption.


عفاف صالح امحمد سعيد، أشرف عبد المجيد حواص، سراج نصر الزلعوطي، يوسف الرويقد، (06-2019)، جامعة الزنتان: كلية الآداب و العلوم بدر،

Applying NIMSAD framework to evaluate the performance of ETHICS and SSADM methodologies
Journal Article

Abstract

Nowadays, the information system methodology is lifeblood of any successful project. The success is based on the quality of information and its technology over the globe. This could rely on the development and operation of computer based systems. To assure that you achieved the goal, there should be a perfect and ideal selection of the methodology, and quite simply it matches your needs. However, there should be some researchers have been written about NIMSAD, SSADM and ETHICS and with no doubt much will be written in the future. The purpose of this paper is to conducting a comparison between two methodologies effectively. Besides, the implementation of NIMSAD framework will take an integral part in this paper. Consequently, the implementation will illustrate the strength and weakness points of both methodologies. Eight principals' steps of NIMSAD will be examined to demonstrate various aspects of EHTICS and SSADM methodologies. This, however, will help to ensure the efficient performance which is the main goal of this work.

Nabiel Almbrook Saied Algshat, (10-2016), كلية الآداب والعلوم بالمرج - جامعة بنغازي: مجلة العلوم والدراسات الانسانية, 17

A USABILITY ANALYSIS OF MUNICIPAL GOVERNMENT WEBSITES IN TURKEY
Master Thesis


As an evaluation method for e-Government world wide web portal in Turkey cities, I have applied and proposed an evaluation method to measure the accuracy for the usability satisfaction. By calculating the population for each city, I have selected the government website and try to apply the error checking by depending on the Measure 1. Measure 1 which has 10 dichotomous web usability standard, I valuate and coded each site based on the 10 dichotomous usability standards. Those dichotomous are categories and based on Web design errors, Standard web design

conventions, and the Presence of features designed. Then I suggest a method to easure the usability satisfaction by computing the total average for each site after I compute the individual average by counting the number of ones during our usability checking using Measure 1. Then I have found that the total number of websites that have satisfied the usability majority is (39 webpage) which is an approximate equal to

48%, and the sites that does not satisfy the usability majority is (42 webpage), which about 51%. Moreover, I tried to study the relation between the final usability accuracy that related to each dichotomous usability standards.

In my Experimental results and by plotting each usability satisfaction, I tried to find the dichotomous that effect on the final usability accuracy for each Turkey cities sites such as splash page which is named V1 in my experimental result and V2 which

is the need for horizontal scrolling at 1024×768 resolution or below those dichotomoushave achieved (100%) for the usability success. In contrast, Turkey website usability succeed has been affected by some Measure 1 dichotomous, which have achieved (0%) such as V4 which is the underlined text links which effect on the have achieved (0%) such as V4 which is the underlined text links which effect on the

user ability accuracy as a final measurement result.


Keywords: human computer, e-governement,website, usability,measure

Afaf Saleh Emhemed Saad, (06-2016), Atilim university: international conference,