Salem O. Baarimah, Naziha Al-Aidroos, K. Ba-Jaalah
{"title":"Using Chemical Composition of Crude Oil and Artificial Intelligence Techniques to Predict the Reservoir Fluid Properties","authors":"Salem O. Baarimah, Naziha Al-Aidroos, K. Ba-Jaalah","doi":"10.1109/ICOICE48418.2019.9035135","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035135","url":null,"abstract":"This study presents Artificial Neural Network (ANN) and Fuzzy Logic (FL) techniques to predict of some important reservoir fluid properties, like, bubble point pressure (Pb), oil formation volume factor at bubble point pressure (βo at Pb), and solution gas oil ratio at bubble point pressure (Rs at Pb) using chemical composition of crude oil. The presented models here were established using 1500 data points, collected from mainly unpublished sources. Statistical analysis was conducted to see which of the Artificial Intelligence techniques (AI) were more reliable and accurate for predicting the reservoir fluid properties. The new (FL) models outperformed most of the (ANN) models. The presented models provide good estimation for (Pb), βo at Pb, and Rs at Pb with correlation coefficient (R2) of 0.995, 0.991, and 0.998, respectively.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128651479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Al-Dhaibani, Mohammed A. Bamatraf, Khalid.Q. Sha'Afal
{"title":"Data Benchmark Collection of Patients with Malaria for Machine Learning: a study in Hadhramout- Yemen","authors":"R. Al-Dhaibani, Mohammed A. Bamatraf, Khalid.Q. Sha'Afal","doi":"10.1109/ICOICE48418.2019.9035166","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035166","url":null,"abstract":"Studies on data collection of health and medicine are lacking; especially in endemic diseases. This study aimed to create and publish a data benchmark and make it available for researchers. Malaria is one of the endemic and infectious diseases consistently in many countries. must attention. Such diseases need high attention to diagnose, predict, and control by physicians and stakeholders. The initial step of data mining and data analysis is data collection to draw knowledge of this data and speed in the elicitation information. Using data mining techniques can enable one to build predictive models. About a thousand cases of finally diagnosed malaria patients have been collected under the direct supervision of specialized doctors and preprocessed for future use. We reported the percentage of patients with data recorded for 40 attributes and selected 27 signs and symptoms. Data quality was assessed based on statistical scores. Later, Basic analysis is presented in this paper too, employing common statistics metrics and data mining as well. This study uses the SPSS tool for statistical analysis and WEKA as a tool for data mining.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121261398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed H. BinShamlan, Mohammed A. Bamatraf, Adnan A. Zain
{"title":"The Impact of Control Flow Obfuscation Technique on Software Protection Against Human Attacks","authors":"Mohammed H. BinShamlan, Mohammed A. Bamatraf, Adnan A. Zain","doi":"10.1109/ICOICE48418.2019.9035187","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035187","url":null,"abstract":"Software developers rely on obfuscation techniques for protecting their source code against reverse engineering attacks. Most of the obfuscation techniques are not based on well-defined measurements to clarify their effectiveness in protecting the source code from both dynamic and static analysis by human subjects. This paper presents an experimental technique towards the aim to provide an assessment tool that investigates the impact of control flow obfuscation on software protection against human attacks. The main objective is to estimate how the obfuscation prevents or limits the ability of the attacker to understand or comprehend and to alter or perform any modification on the source code. An experiment was designed to assess the capabilities of the control flow obfuscation technique with the opaque predicates in preventing or limiting the attacks on source code. As a result of the statistical analysis used in this paper, it is shown that the presence of obfuscation on source code increases seven times the difficulties for the attacker to successfully complete the understanding task. Also, the control flow obfuscation significantly reduces the capability of subjects to correctly perform the understanding tasks while there is no significant difference for modification tasks. Also, it is shown that the presence of obfuscation on source code increases the amount of time needed for subjects to alter or perform modification and understand the source code.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-column Deep Neural Network Based On Particle Swarm Optimization","authors":"A. Al-furas, M. El-Dosuky, T. Hamza","doi":"10.1109/ICOICE48418.2019.9035162","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035162","url":null,"abstract":"Many architectures for computer vision use of Convolutional Neural Networks (CNN) are biologically inspired by the receptive fields in the visual cortex. A modified deep architecture Thresholding Convolution Neural Network (ThCNN) progresses in this paper. This method is simple and effective to; regularize features map in the early layers of Convolution Neural Network; Compute the optimal global threshold to determine the features that are passed to the next layers; improve the speed performance of the suggested structure. The present paper proposed that each feature map in the convolution layer is connected to half feature maps in the previous layer. Another tendency in current applications is to combine the results of multiple networks, the particle swarm optimization method (PSO) is used to determine the influence of each network in the combining model. The proposed method was evaluated using the MNIST datasets. The experimental results showed that the error rate has decreased (up to 26.98 percent). Furthermore, combining model has decreased the number of the networks with the percent of 20%, and decreased error rate to 78.26 % of error rate of the best single model and to 88.89% of error of the averaging model.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Resource Planning Quality Model ERPQM","authors":"Sultan Alanazi, M. Akour, M. Anbar, A. Alsadoun","doi":"10.1109/ICOICE48418.2019.9035168","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035168","url":null,"abstract":"This paper proposes the enterprise resource planning (ERP) quality model depending on the ISO standard (9126). This quality model is used to ensure that whether the ERP implementation will fail or succeed. Six quality attributes are proposed to be as minimum requirements for building and developing the ERP quality model, including functionality, maintainability, reliability, efficiency, usability, and portability. The quality attributes could not directly be measured. In this paper authors divided the addressed attributes into twenty three sub-attributes. After that a comparison has been conducted with the other software quality common models. The result shows how the proposed model is more comprehensive than the addressed model, as it covers 10 attributes. On the other hand, the MCCALL model covers 9 attributes but it ignored one of the main evaluation attribute which is functionality.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125932975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamzah Alaidaros, Mazni Omar, R. Romli, A. Hussein
{"title":"The Development and Evaluation of A Progress Monitoring Prototype Tool for Software Project Management","authors":"Hamzah Alaidaros, Mazni Omar, R. Romli, A. Hussein","doi":"10.1109/ICOICE48418.2019.9035146","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035146","url":null,"abstract":"Progress monitoring is an essential task of the Software Project Management (SPM), which is executed during the development process of software projects. In the market today, several tools are available for monitoring the progress of a project. However, most of these tools lack sufficient progress monitoring mechanisms, making them unattractive for many organizations. Moreover, some of the tools do not report and/or visualize useful information regarding the project status. To address these limitations, this study investigates some of the common tools used by Software Development Organizations (SDOs), which leverage on project management approaches and the concept of Agile methods. The SPM tools' pros and cons were identified through a literature survey. The key limitations were highlighted to show the gap in this area that led to the inception of this study. Resultantly, a Progress Monitoring Prototype Tool (PM-PT) was developed to overcome the limitations of the existing tools used in SPM. Subsequently, PM-PT was tested and evaluated by interviewing seven software practitioners. The initial results indicate that PM-PT is a useful and effective tool for software project monitoring task. Future work will focus on improving PM-PT based on the constructive suggestions and recommendations provided by the software practitioners.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ibrahim Alharthy, Fiza Abdul Rahim, Nor'ashikin Ali, Amando Jr. Pimentel Singun
{"title":"Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring - Your-Own-Device (BYOD) Protection Behaviors","authors":"Ibrahim Alharthy, Fiza Abdul Rahim, Nor'ashikin Ali, Amando Jr. Pimentel Singun","doi":"10.1109/ICOICE48418.2019.9035139","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035139","url":null,"abstract":"Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raising concerns on privacy and security. Most BYOD risks are related to unauthorized access to policy changes and information, leaking sensitive information to people, breach of organization data and privacy, access control, misuse, and even stolen devices. Privacy violations are of widely security breaches in business organizations when users are using their own personal devices. In this paper, it presents the appropriate theories and models to derive a set of validated determinants of protection intentions towards the protection behaviors of BYOD. The introduction of BYOD calls for a thorough investigation of whether or not such a practice poses vulnerabilities and threats to organizations.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Redwan Q. Shaddad, Faisal S. Al-Kmali, M. Noman, Nizar K. Ahmed, Essa M. Marish, Abdulwahab M. Al-Duais, Akram Ali Al-Yafrsi, Fahed A. Al-Sabri
{"title":"Planning of 5G Millimeterwave Wireless Access Network for Dense Urban Area","authors":"Redwan Q. Shaddad, Faisal S. Al-Kmali, M. Noman, Nizar K. Ahmed, Essa M. Marish, Abdulwahab M. Al-Duais, Akram Ali Al-Yafrsi, Fahed A. Al-Sabri","doi":"10.1109/ICOICE48418.2019.9035183","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035183","url":null,"abstract":"Network planning is an important step in the design of wireless networks, especially for 5 generation (5G). 5G networks must provide good service quality, high data rate and capacity. Therefore, 5G networks must be plan efficiently to deal with the increase of the data traffic. So, 5G wireless networks requires high grade of heterogeneity of small cell base stations, micro-cell base stations and macro cell base stations. In this paper, 5G wireless access network is planned for urban area in Ibb city, Yemen. The band 28 GHz of millimeter wave (mm-Wave) is used in this paper. Simulation results show that we need 223 micro cells to provide an acceptable services to 186532 subscribers in the covered urban area of Ibb city to satisfy densification network. The results also show that, the maximum achievable downlink and uplink throughput are 6.5 Gbps and 3.2 Gbps, respectively.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"61 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113970168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microstrip Antennas for Next Genertion Wireless Devices","authors":"A. Gaid, Osaid A. S. Qaid, Amjad M. H. Alhakimi","doi":"10.1109/ICOICE48418.2019.9035130","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035130","url":null,"abstract":"Due to great demands for higher data rates and better bandwidth utilization in wireless communication systems, it's necessary to move forward a further step to a new generation, i.e. the fifth generation of wireless networks, 5G. This paper proposes two compact, bandwidth efficient, rectangular microstrip patch antennas, implemented on RT/Duroid 5880 substrate with a dielectric constant of $varepsilon_{mathrm{r}}=2.2$ and resonate at millimeter-wave frequency bands for targeting 5G broadband communications. The first proposed antenna is a tri-band antenna. This antenna has a small size of $8times 8times 0.6 mathrm{mm}^{3}$. Three impedance bandwidths of 2.2175GHz (7.17%), 3.4542 GHz (7%) and 3.1557 GHz (5.52%) at resonant frequencies of 30.9 GHz, 49.2 GHz and 57.3 GHz respectively are achieved. Moreover, a maximum achievable gain is 7.09 dBi, 7.6 dBi and 8.5 dBi at the previous resonant frequencies. The second antenna is also very compact with an overall size of $2.9times 3times 0.381 mathrm{mm}^{3}$, which operates at 60.9 GHz frequency band. A maximum gain of 7.6 dBi and a total bandwidth of 4.5269 GHz (7.43 % from center frequency) below -10dB are obtained. The compactness of these two proposed antennas enables them to be integrated into handheld mobile units. The design process of the proposed antennas is achieved by HFSS simulator.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125273690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yousef Mohammad Iriqat, A. R. Ahlan, Nurul Nuha Abdul Molok, Noor Hayani Abd Rahim
{"title":"Exploring Staff Perception of InfoSec Policy Compliance: Palestine Universities Empirical Study","authors":"Yousef Mohammad Iriqat, A. R. Ahlan, Nurul Nuha Abdul Molok, Noor Hayani Abd Rahim","doi":"10.1109/ICOICE48418.2019.9035133","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035133","url":null,"abstract":"There is worldwide recognition of the problems associated with insider threats, intentional and unintentional; One of the significant issues in mitigating InfoSec risks is Staff compliance intention of InfoSec policies (ISP‘s). The study purpose seeks to understand and explore Staff compliance intention of ISP's based on how Staff perceive several factors adopted from multi-theories from ISP's research. Such as Sanction from General Deterrence Theory, Rewards as extrinsic motivation, Coping Appraisal from Protection Motivation Theory, and, Information Reinforcement that constitute the theoretical model. In the context of Palestine universities, the research Model first part constitutes the understanding of Staff awareness of ISP's based on four selected Policy-Focused Areas (PFA) from SANS 2014. Moreover, to assess this knowledge to reflect on the multi-theory perception factors effects on Staff compliance intention. Furthermore, to investigated Staff SETA to assess how universities value their Staff knowledge on ISP's. The research Methodology explores the problem empirically using descriptive analysis research design such as summaries and regression analysis. The study has 600 datasets collected from six universities by the developed research quantitative instrument. The findings show that Staff value the importance of the model factors in promoting Staff compliance intention. Staff have some awareness of PFA's and SETA needs extra attention. The Practical implications for creating ISP compliance among university Staff by drawing on their perception of factors adopted from multi-theories. Consequently, as for the organisation, effective SETA programs to sustain the effort of Staff compliance intention of ISP's. Meanwhile, this study seeks to assert that ISP's compliance is the responsibility of all academic and administrative Staff from all department and as a paradigm for other employees. The research covers ISP perception among Palestine Staff, and the expected outcome includes - a novel theoretical contribution model with six significantly contributing factors. Also, PFA in the context of Palestine contributes as a methodological contribution and Staff SETA as practical research contribution.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}