2014 3rd International Conference on Advanced Computer Science Applications and Technologies最新文献

筛选
英文 中文
Hiding Message in Color Image Using Auto Key Generator 隐藏信息在彩色图像使用自动密钥生成器
Q. M. Hussein
{"title":"Hiding Message in Color Image Using Auto Key Generator","authors":"Q. M. Hussein","doi":"10.1109/ACSAT.2014.33","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.33","url":null,"abstract":"This paper suggests a new method for hidden secret message text in a RGB 24-bit color image. The positions of hidden text are selected randomly using auto key generator. The auto key is generated by selected three bytes from image each time, and then deposits these pixels to the main components Red, Green and Blue bytes. The values of least significant bits (LSB) from red color bytes are used to configure a binary number. The binary number determines the hidden position of message text bit in either LSB of green or blue color in the selected bytes, depending on specific criteria. After implementing this method on different images, it was founded easy to implement, high security, and difficulty of detection. The values of some metrics used to measure the efficiency of the proposed method are well. Also, there is no difference between the images before and after the information hiding which detect with human eye perception.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software Process Improvement Initiatives in Small and Medium Firms: A Systematic Review 中小企业的软件过程改进计划:系统回顾
M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh
{"title":"Software Process Improvement Initiatives in Small and Medium Firms: A Systematic Review","authors":"M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh","doi":"10.1109/ACSAT.2014.35","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.35","url":null,"abstract":"Nowadays, software firms are playing very important roles in economies all over the world, and majority of these firms are Small and Medium Enterprises (SMEs). The SMEs recognize that it is important to improve their development processes and activities in order to produce software with high quality and to be competitive in the software industry. However, several studies have shown that the SMEs used ad-hoc manner in their development processes and they suffer from lack of the knowledge and resources to do Software Process Improvement (SPI). In this paper, a Systematic Literature Review (SLR) is used to identify and discuss the SPI initiatives in SME software firms. The results of the systematic review showed that the majority of software process improvement initiatives in SME firms are carried out in America and Europe. Only in one Asian country, Hong Kong was the SPI initiative considered and CMM Fast-Track was the model developed. The developed model did not cover all the CMM levels, only levels 1 and 2 were considered. In conclusion, many Software Process Improvement initiatives have been proposed for SME software firms but they have shortcomings such as lack of generalizability and take a lot of time to gain the benefits/advantage of the SPI model after implementation.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods 基于特征选择方法的电子邮件分类属性评估实验研究
Issa Qabajeh, F. Thabtah
{"title":"An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods","authors":"Issa Qabajeh, F. Thabtah","doi":"10.1109/ACSAT.2014.29","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.29","url":null,"abstract":"Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128760819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Arabic-Malay Cognates as a Computer Assisted Language Learning 计算机辅助语言学习的阿拉伯-马来语同源词
R. Shehab, A. Zeki
{"title":"Arabic-Malay Cognates as a Computer Assisted Language Learning","authors":"R. Shehab, A. Zeki","doi":"10.1109/ACSAT.2014.39","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.39","url":null,"abstract":"This paper aims to build an Arabic WEB-based learning system for Malaysian learners focusing on cognate words in the Arabic language and Malay language. This paper focuses only on the highlighted cognates in the lessons interface in the WEB-based system. The paper starts by the importance of Computer-Assisted Language Learning (CALL), benefits of using cognates in leaning a foreign language, and the bower of highlighting vocabulary strategy in language learning. Finally, the paper concluded by the technical details of building the present WEB-based system.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信