{"title":"Hiding Message in Color Image Using Auto Key Generator","authors":"Q. M. Hussein","doi":"10.1109/ACSAT.2014.33","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.33","url":null,"abstract":"This paper suggests a new method for hidden secret message text in a RGB 24-bit color image. The positions of hidden text are selected randomly using auto key generator. The auto key is generated by selected three bytes from image each time, and then deposits these pixels to the main components Red, Green and Blue bytes. The values of least significant bits (LSB) from red color bytes are used to configure a binary number. The binary number determines the hidden position of message text bit in either LSB of green or blue color in the selected bytes, depending on specific criteria. After implementing this method on different images, it was founded easy to implement, high security, and difficulty of detection. The values of some metrics used to measure the efficiency of the proposed method are well. Also, there is no difference between the images before and after the information hiding which detect with human eye perception.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh
{"title":"Software Process Improvement Initiatives in Small and Medium Firms: A Systematic Review","authors":"M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh","doi":"10.1109/ACSAT.2014.35","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.35","url":null,"abstract":"Nowadays, software firms are playing very important roles in economies all over the world, and majority of these firms are Small and Medium Enterprises (SMEs). The SMEs recognize that it is important to improve their development processes and activities in order to produce software with high quality and to be competitive in the software industry. However, several studies have shown that the SMEs used ad-hoc manner in their development processes and they suffer from lack of the knowledge and resources to do Software Process Improvement (SPI). In this paper, a Systematic Literature Review (SLR) is used to identify and discuss the SPI initiatives in SME software firms. The results of the systematic review showed that the majority of software process improvement initiatives in SME firms are carried out in America and Europe. Only in one Asian country, Hong Kong was the SPI initiative considered and CMM Fast-Track was the model developed. The developed model did not cover all the CMM levels, only levels 1 and 2 were considered. In conclusion, many Software Process Improvement initiatives have been proposed for SME software firms but they have shortcomings such as lack of generalizability and take a lot of time to gain the benefits/advantage of the SPI model after implementation.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods","authors":"Issa Qabajeh, F. Thabtah","doi":"10.1109/ACSAT.2014.29","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.29","url":null,"abstract":"Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128760819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arabic-Malay Cognates as a Computer Assisted Language Learning","authors":"R. Shehab, A. Zeki","doi":"10.1109/ACSAT.2014.39","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.39","url":null,"abstract":"This paper aims to build an Arabic WEB-based learning system for Malaysian learners focusing on cognate words in the Arabic language and Malay language. This paper focuses only on the highlighted cognates in the lessons interface in the WEB-based system. The paper starts by the importance of Computer-Assisted Language Learning (CALL), benefits of using cognates in leaning a foreign language, and the bower of highlighting vocabulary strategy in language learning. Finally, the paper concluded by the technical details of building the present WEB-based system.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}