Int. Arab J. Inf. Technol.最新文献

筛选
英文 中文
User-centric adaptive password policies to combat password fatigue 以用户为中心的自适应密码策略,以对抗密码疲劳
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/7
Y. Al-Slais, W. El-Medany
{"title":"User-centric adaptive password policies to combat password fatigue","authors":"Y. Al-Slais, W. El-Medany","doi":"10.34028/iajit/19/1/7","DOIUrl":"https://doi.org/10.34028/iajit/19/1/7","url":null,"abstract":"Today, online users will have an average of 25 password-protected accounts online, yet use, on average, 6.5 passwords. The excessive cognitive burden of remembering large amounts of passwords causes Password Fatigue. Therefore users tend to reuse passwords or recycle password patterns whenever prompted to change their passwords regularly. Researchers have created Adaptive Password Policies to prevent users from creating new passwords similar to previously created ones. However, this approach creates user frustration as it neglects users’ cognitive burden. This paper proposes a novel User-Centric Adaptive Password Policy (UCAPP) Framework for password creation and management that assigns users system-generated passwords based on a cognitive-behavioural agent-based model. The framework comprises a Password Policy Assignment Test (PassPAST), a Cognitive Burden Scale (CBS), a User Profiling Algorithm, and a Password Generator (PassGEN). The framework creates tailor-made password policies that maintain password memorability for users of different cognitive thresholds without sacrificing password strength and entropy. The framework successfully created 30-40% stronger passwords for Critical users and random (non-mnemonic) passwords for Typical users based on each individual’s cognitive password thresholds in a preliminary test.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83426018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Learning Based Hand Wrist Segmentation using Mask R-CNN 基于深度学习的手部腕部分割,使用掩模R-CNN
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/5/10
GokulaKrishnan Elumalai, M. Ganesan
{"title":"Deep Learning Based Hand Wrist Segmentation using Mask R-CNN","authors":"GokulaKrishnan Elumalai, M. Ganesan","doi":"10.34028/iajit/19/5/10","DOIUrl":"https://doi.org/10.34028/iajit/19/5/10","url":null,"abstract":"Deep learning is one of the trending technologies in computer vision to identify and classify objects. Deep learning is a subset of Machine Learning and Artificial Intelligence. Detecting and classifying the object was a challenging task in traditional computer vision techniques, and now there are numerous deep learning Techniques scaled up to achieve this. The primary purpose of the research is to detect and segment the human hand wrist region using deep learning methods. This research is widespread to deep learning enthusiasts who needs to segment custom objects using instance segmentation. We demonstrated a segmented hand wrist using the Mask Regional Convolutional Neural Network (R-CNN) technique with an average accuracy of 99.73%. This work also compares the performance evaluation of baseline and custom Hand Wrist Mask R-CNN. The achieved validation class loss is 0.00866 training and 0.02736 validation; both the values are comparatively deficient compared with baseline Mask R-CNN.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80896812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A transaction security accountability protocol for electronic health systems 电子健康系统的交易安全责任协议
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3/1
Chian Techapanupreeda, Ekarat Rattagan, W. Kurutach
{"title":"A transaction security accountability protocol for electronic health systems","authors":"Chian Techapanupreeda, Ekarat Rattagan, W. Kurutach","doi":"10.34028/iajit/19/3/1","DOIUrl":"https://doi.org/10.34028/iajit/19/3/1","url":null,"abstract":"In the last two decades, the term “electronic health (e-health) systems” were extensively mentioned in the healthcare industry with the aim of replacing paper usage and increasing productivity. Unfortunately, these systems are not still widely used by healthcare professionals and patients due to the concerns on security and accountability issues. In this article, we propose an accountability transaction protocol to overcome all security issues for implementing electronic health systems. To validate our proposed protocol, we used both Automated Validation of Internet Security Protocols and Applications (AVISPA) and Scyther as the tools to prove its soundness.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82742561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoxCeleb1: speaker age-group classification using probabilistic neural network VoxCeleb1:基于概率神经网络的说话人年龄组分类
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/6/2
A. A. Badr, A. Abdul-Hassan
{"title":"VoxCeleb1: speaker age-group classification using probabilistic neural network","authors":"A. A. Badr, A. Abdul-Hassan","doi":"10.34028/iajit/19/6/2","DOIUrl":"https://doi.org/10.34028/iajit/19/6/2","url":null,"abstract":"The human voice speech includes essentially paralinguistic information used in many applications for voice ‎recognition. Classifying speakers according to their age-group has been considered as a valuable tool in ‎various applications, as issuing different levels of permission for different age-groups. In the presented ‎research, an automatic system to classify speaker age-group without depending on the text is proposed. The ‎Fundamental Frequency (F0), Jitter, Shimmer, and Spectral Sub-Band Centroids (SSCs) are used as a ‎feature, while the Probabilistic Neural Network (PNN) is utilized as a classifier for the purpose of ‎classifying the speaker utterances into eight age-groups. Experiments are carried out on VoxCeleb1 dataset ‎to demonstrate the proposed system's performance, which is considered as the first effort of its kind. The ‎suggested system has an overall accuracy of roughly 90.25%, and the findings reveal that it is clearly ‎superior to a variety of base-classifiers in terms of overall accuracy.‎","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90483511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ensemble based on accuracy and diversity weighting for evolving data streams 基于精度和多样性加权的演化数据流集成
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/11
Yange Sun, Han Shao, Bencai Zhang
{"title":"Ensemble based on accuracy and diversity weighting for evolving data streams","authors":"Yange Sun, Han Shao, Bencai Zhang","doi":"10.34028/iajit/19/1/11","DOIUrl":"https://doi.org/10.34028/iajit/19/1/11","url":null,"abstract":"Ensemble classification is an actively researched paradigm that has received much attention due to increasing real-world applications. The crucial issue of ensemble learning is to construct a pool of base classifiers with accuracy and diversity. In this paper, unlike conventional data-streams oriented ensemble methods, we propose a novel Measure via both Accuracy and Diversity (MAD) instead of one of them to supervise ensemble learning. Based on MAD, a novel online ensemble method called Accuracy and Diversity weighted Ensemble (ADE) effectively handles concept drift in data streams. ADE mainly uses the following three steps to construct a concept-drift oriented ensemble: for the current data window, 1) a new base classifier is constructed based on the current concept when drift detect, 2) MAD is used to measure the performance of ensemble members, and 3) a newly built classifier replaces the worst base classifier. If the newly constructed classifier is the worst one, the replacement has not occurred. Comparing with the state-of-art algorithms, ADE exceeds the current best-related algorithm by 2.38% in average classification accuracy. Experimental results show that the proposed method can effectively adapt to different types of drifts.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87814783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voice versus keyboard and mouse for text creation on arabic user interfaces 语音与键盘和鼠标在阿拉伯语用户界面上的文本创建
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/15
K. Majrashi
{"title":"Voice versus keyboard and mouse for text creation on arabic user interfaces","authors":"K. Majrashi","doi":"10.34028/iajit/19/1/15","DOIUrl":"https://doi.org/10.34028/iajit/19/1/15","url":null,"abstract":"Voice User Interfaces (VUIs) are increasingly popular owing to improvements in automatic speech recognition. However, the understanding of user interaction with VUIs, particularly Arabic VUIs, remains limited. Hence, this research compared user performance, learnability, and satisfaction when using voice and keyboard-and-mouse input modalities for text creation on Arabic user interfaces. A Voice-enabled Email Interface (VEI) and a Traditional Email Interface (TEI) were developed. Forty participants attempted pre-prepared and self-generated message creation tasks using voice on the VEI, and the keyboard-and-mouse modal on the TEI. The results showed that participants were faster (by 1.76 to 2.67 minutes) in pre-prepared message creation using voice than using the keyboard and mouse. Participants were also faster (by 1.72 to 2.49 minutes) in self-generated message creation using voice than using the keyboard and mouse. Although the learning curves were more efficient with the VEI, more participants were satisfied with the TEI. With the VEI, participants reported problems, such as misrecognitions and misspellings, but were satisfied about the visibility of possible executable commands and about the overall accuracy of voice recognition.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86878805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Binary Search Tree Method to Find an Item Using Scaling 一种基于缩放的二叉搜索树查找方法
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/5/2
Praveen Pappula
{"title":"A Novel Binary Search Tree Method to Find an Item Using Scaling","authors":"Praveen Pappula","doi":"10.34028/iajit/19/5/2","DOIUrl":"https://doi.org/10.34028/iajit/19/5/2","url":null,"abstract":"This Approach comprises of methods to produce novel and efficient methods to implement search of data objects in various applications. It is based on the best match search to implement proximity or best match search over complex or more than one data source. In particular with the availability of very large numeric data set in the present day scenario. The proposed approach which is based on the Arithmetic measures or distance measures called as the predominant Mean based algorithm. It is implemented on the longest common prefix of data object that shows how it can be used to generate various clusters through combining or grouping of data, as it takes O(log n) computational time. And further the approach is based on the process of measuring the distance which is suitable for a hierarchy tree property for proving the classification is needed one for storing or accessing or retrieving the information as required. The results obtained illustrates overall error detection rates in generating the clusters and searching the key value for Denial of Service (DOS) attack 5.15%, Probe attack 3.87%, U2R attack 8.11% and R2L attack 11.14%. as these error detection rates denotes that our proposed algorithm generates less error rates than existing linkage methods.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83921861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic 用于评估使用移动云计算行为意图的多组结构方程模型——以2019冠状病毒病大流行期间约旦大学为例
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/2/7
N. Matar, Tirad AlMalahmeh, Bilal I. Sowan, Saheer Al-Jaghoub, Wasef Mater
{"title":"A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic","authors":"N. Matar, Tirad AlMalahmeh, Bilal I. Sowan, Saheer Al-Jaghoub, Wasef Mater","doi":"10.34028/iajit/19/2/7","DOIUrl":"https://doi.org/10.34028/iajit/19/2/7","url":null,"abstract":"The adoption of new technologies in Jordanian Universities related to cloud services, shows differences in practices between faculty and staff members. Resistance to adoption may accrue by faculty and staff members who are accustomed and favoring old practices. A questionnaire was developed based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model to identify factors that affect behavioral intentions that lead to the use of mobile cloud computing during the covid-19 pandemic, taking into consideration Work-type as the mediating factor. Five Jordanian Universities participated in this study, with a total response of 153 faculty and staff members. The conceptual proposed model was tested to ensure the fitness of the structural model for providing correct estimations. The collected sample was subjected to confirmatory factor analysis to ensure construct, convergent and discriminant validity. The results came positive in terms of composite reliability as they were above 0.70, for Average Variance Extracted (AVE) it came more than 0.05and Cronbach alpha exceeded 0.70. The results revealed the fitness of the proposed model to measure differences in behavioral intentions towards adopting mobile cloud services between faculty members and employees. Moreover, the results showed that work type had some interesting moderating impact on the tested relationships. Moreover, the results showed that there is a high Behavioral Intention (BI) between faculty and staff to use mobile cloud services and solutions within their workplace. In addition, the results showed some inequalities of the behavioral intention toward the adoption of mobile cloud services in Jordanian Universities between the two groups. These results call the university administration to clarify these factors for user groups to obtain a better judgment on investment and future practices for using new technologies.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85608523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved quantile-point-based evolutionary segmentation representation method of financial time series 一种改进的基于分位数点的金融时间序列进化分割表示方法
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/6/4
Lei Liu, Zheng Pei, Peng Chen, Zhisheng Gao, Zhihao Gan
{"title":"An improved quantile-point-based evolutionary segmentation representation method of financial time series","authors":"Lei Liu, Zheng Pei, Peng Chen, Zhisheng Gao, Zhihao Gan","doi":"10.34028/iajit/19/6/4","DOIUrl":"https://doi.org/10.34028/iajit/19/6/4","url":null,"abstract":"Abstract: Effective and concise feature representation is crucial for time series mining. However, traditional time series feature representation approaches are inadequate for Financial Time Series (FTS) due to FTS' complex, highly noisy, dynamic and non-linear characteristics. Thus, we proposed an improved linear segmentation method named MS-BU-GA in this work. The critical data points that can represent financial time series are added to the feature representation result. Specifically, firstly, we propose a division criterion based on the quantile segmentation points. On the basis of this criterion, we perform segmentation of the time series under the constraint of the maximum segment fitting error. Then, a bottom-up mechanism is adopted to merge the above segmentation results under the maximum segment fitting error. Next, we apply Genetic Algorithm (GA) to the merged results for further optimization, which reduced the overall segment representation fitting error and the integrated factor of segment representation error and number of segments. The experimental result shows that the MS-BU-GA has outperformed existing methods in segment number and representation error. The overall average representation error is decreased by 21.73% and the integrated factor of the number of segments and the segment representation error is reduced by 23.14%.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86026309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secrecy capacity analysis of reconfigurable intelligent surface based vehicular networks 可重构智能地面车辆网络保密能力分析
Int. Arab J. Inf. Technol. Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3/7
A. Murugesan, Ananthi Govindasamay
{"title":"Secrecy capacity analysis of reconfigurable intelligent surface based vehicular networks","authors":"A. Murugesan, Ananthi Govindasamay","doi":"10.34028/iajit/19/3/7","DOIUrl":"https://doi.org/10.34028/iajit/19/3/7","url":null,"abstract":"As Vehicular Networks based technologies are in the close proximity of deployment for various wireless applications under proposal worldwide, this research paper proposes secrecy capacity analysis for Reconfigurable Intelligent Surface (RIS) based Vehicular Network. The proposed network model has a fixed infrastructure comprising of source node, destination node incorporated with single antenna and passive eavesdropper forming the scenario. RIS based Vehicular communication links are modelled by Rayleigh fading for source-to RIS link and RIS to destination Vehicle, whereas Eavesdropper channel links are Double-Rayleigh amplitude distribution, induced by double scattering in the channel. For this scenario, we derive the closed-form expressions for the average Secrecy Capacity and Secrecy Outage Probability (SOP) of the considered system. Though, Secrecy Capacity analysis is an excellent performance metric for assessing eavesdropper based system, it has been reported by various research works, this research paper differentiates from other research papers by considering different secrecy rates and different distances of eavesdropper as presented in simulation. Further, to validate the obtained simulation results, theoretical results are also derived for assessing performance of SOP for various secrecy rates which is the highlight of this research paper and it can be used as benchmark for various research works to proceed further.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90665391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信