Loading...
  • Home
  • Search Results
4295-4296 of 4327 Papers

TEACHING AL-QURAN VIA MULTIMEDIA INSTRUCTIONAL DESIGN: AN EMPIRICAL RESEARCH

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER AND INFORMATION TECHNOLOGY
Author(s): DAW ABDULSALAM ALI DAW , OMAR IBRAHIM MASSOUD HAMMZA , QAIS FARYADI

Abstract: This empirical research will develop an effective multimedia instructional design called Al-Furqan courseware to teach the Holy-Quran to students’ in primary schools. The research scope will involve the teaching of the Holy-Quran to Libyan students’ who are in the 5th grade at primary school in Malaysia. The main objective of this study is to illustrate an effective learning method that could assist Libyan students to learn the Holy-Quran effectively and efficiently, to the extent that they are able to read, write and memorize it. This research will utilize the ADDIE model as a concept in teaching the Holy-Quran to Libyan students. The study will apply instructional design models to teach the Holly-Quran. Even there are many teaching aid exist in Malaysia. However, this research will use them as a support to develop the Multimedia instruction to teach the Holly-Quran.

  • Publication Date: 05-May-2013
  • DOI: 10.15224/978-981-07-6261-2-29
  • Views: 0
  • Downloads: 0

INTRUSION DETECTION SYSTEM IN IPV6 NETWORK BASED ON DATA MINING TECHNIQUES – SURVEY

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER AND INFORMATION TECHNOLOGY
Author(s): REDHWAN M. A. SAAD , SELVAKUMAR MANICKAM , SURESWARAN RAMADASS

Abstract: The new internet protocol IPv6 is designed to replace the old internet protocol IPv4. Having the IPv4 address depleted on February 2011, the future of the computer networks and the internet depended on IPv6.The network security is increasingly becoming an important issue. As with any new technology, the initial stages of IPv6 implementation are obligatory to be exploited by cybercriminals. Now Intruders are considered as one of the most serious threats to the internet security. Data mining techniques have been successfully utilized in many applications. Many research projects have applied data mining techniques to intrusion detection. Furthermore different types of data mining algorithms are very much useful to intrusion detection such as Classification, Link Analysis and Sequence Analysis. Moreover, one of the major challenges in securing fast networks is the online detection of suspicious anomalies in network traffic pattern. Most of the current security solutions failed to perform t

  • Publication Date: 05-May-2013
  • DOI: 10.15224/978-981-07-6261-2-28
  • Views: 0
  • Downloads: 0