Implementing smart community engagement should consider careful planning and collaboration with numerous stakeholders, including the community. The technology and program must be designed to frame its purpose and should link back to specific goals of implementing smart community engagement. Digital services do not guarantee a smart engagement between the community and the local government. This is the case for the Kubang Pasu local government where several online services have been provided in their attempt to implement the smart community concept. However, understanding on the preferences of features and requirements of existing web-based systems and the impact of these systems is lacking. Therefore, a perception study needs to be conducted to obtain information regarding smart community engagement implementation. This study aimed to discover the community’s perceptions on smart community engagement, specifically for Kubang Pasu in terms of its local context. To achieve this, a combination of interview and online survey was employed involving stakeholders of several organizations and 309 respondents among the community in Kubang Pasu. Result of the interview and survey revealed moderate engagement between the community and organizations due to low awareness, moderate engagement between the community and local authorities, low exposure to online services, as well as the weaknesses of the current online systems. It can be concluded that the satisfaction level of the respondents with officers at the organizations was only moderate. The implementation of e-services could reduce face-to-face interactions, which could help to improve the satisfaction level. This could also help in moving toward the smart community engagement concept. Therefore, the smart communication method via social media, email, and website could be employed to increase the low rating of public engagement with the authorities. This move will foster the prompt implementation of smart community engagement.
Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreResearch title: Ruling on abortion in Sharia and law.
The importance of research: Projection is of great importance because it touches the life of a living being who enjoys human qualities. However, this organism often wastes its rights and does not protect its human beings. These souls are lost in millions by the sake of casual desire or hidden desire.
The research plan: The research dealt with an introductory topic, four topics, and in each topic there are demands, branches, and a conclusion.
The most important findings of the study: The ruling on aborting the fetus in the Sharia is only permissible (and the necessity is valued at its va
... Show MoreFor the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show More