Zahrah A. Almusaylim, Noor Zaman Jhanjhi, L. T. Jung
{"title":"Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment","authors":"Zahrah A. Almusaylim, Noor Zaman Jhanjhi, L. T. Jung","doi":"10.1109/ICCOINS.2018.8510588","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510588","url":null,"abstract":"The bandwidth hungry applications are growing drastically and soon exceeding the bandwidth limits of existing wireless communication network systems. The current increasing demand for higher capacity and data rates are therefore leading to the 5G technology thus changing the norm of communications in providing the high-speed data rate and lower latency. One of the promising technologies that avail from the 5G would be the vehicular cloud networks (VCN). A prominent service out of this 5G VCN is the roadside accident video reporting by using 5G over the cloud. This service may contain private data/information that can be compromised at any channel (from vehicles to 5G and cloud storage) due to many reasons. This service is vulnerable to security attacks due to its availability for a long time at different channels. Moreover, multiple video reporting can cause huge storage and computation issues leading to inefficient computation and storage management. Consequently, data privacy, security, data management and computing efficiency of data storage become the main challenges in roadside accident vehicular cloud network video reporting services. This research is proposing a solution based on a new protocol to address the stated issues by extending the recent research presented by Lewis protocol et al. The proposed protocol is aimed to provide good data privacy, reduces the data security attacks, improving data management and the computation efficiency at all channels.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Learning and Software as a Service: The Effect on Knowledge Sharing","authors":"Deemah Al-Arabiat, W. Ahmad, A. Sarlan","doi":"10.1109/ICCOINS.2018.8510616","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510616","url":null,"abstract":"Higher education institutions (HEIs) are knowledge intensive environments where students play a vital and critical role in leveraging knowledge resources. Recently, HEIs have made significant investments in information technology for example Mobile learning and Cloud Computing to establish effective knowledge-sharing (KS) practices and to support knowledge sharing among students. Yet little is known about how cloud computing affects the development of M-learning and how M-learning affect knowledge sharing. This study aims to explore the impact of M-learning and cloud computing on knowledge sharing among students in HEIs. In this study, self-administered questionnaire which involved 418 students from seven public and private universities in Malaysia were gathered. The analysis results revealed that the technical barriers of M-learning have a negative impact on M-learning. While, cloud computing will increase the opportunities to meet the technical problems of M-learning. It is also found that M-learning has a positive impact on knowledge sharing.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact Of Cultural Familiarity On Choosing Images For Recognition-Based Graphical Passwords","authors":"Abdullah Ibrahim Shaban, Nur Haryani Zakaria","doi":"10.1109/ICCOINS.2018.8510598","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510598","url":null,"abstract":"The current movement to graphical passwords for securing users’ personal information has led to the needs for more efforts to advance the security characteristics of such passwords. In this paper, we described the process for constructing graphical password based on the users’ cultural familiarity with images within the Malaysian context. A control-laboratory experiment was conducted involving 30 participants whom were requested to identify the familiarity aspect with regards to cultural-background. The obtained results showed that slightly more than half of the participants include at least one familiar images in their graphical password choices. The results could suggest that cultural background is highly considered as one of the factor that influences password choices among users.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128809943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chaos Based Spatial Domain Robust Image Watermarking Scheme","authors":"M. A. Khan, U. Khan, Asim Ali","doi":"10.1109/ICCOINS.2018.8510572","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510572","url":null,"abstract":"The choice of watermark and embedding scheme can produce highly imperceptible and robust watermarking scheme for copyright protection. Therefore, a symmetric image-watermarking scheme is presented in this paper. The nonlinear watermark is generated using chaos that further improved under proposed optimization assumptions. The two least significant bits (LSBs) of host image are chosen for watermark embedding. Multiple copies of chaotic watermark is scattered into different blocks of the plain image. The proposed work is compared with recently published related work. The results show that proposed method achieves near optimal values of watermarked image analysis. Further, good imperceptibility and strong robustness against various image processing attacks.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133548798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Iylia Roslan, Norahana Salimin, Nur Sharifah Idayu Mat Roh, Noraziah Anini Mohd Rashid
{"title":"Possible Conditions of FTE and FTA in Fingerprint Recognition System and Countermeasures","authors":"Nur Iylia Roslan, Norahana Salimin, Nur Sharifah Idayu Mat Roh, Noraziah Anini Mohd Rashid","doi":"10.1109/ICCOINS.2018.8510582","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510582","url":null,"abstract":"Biometric fingerprint recognition has been used since the 18th century to identify and verify a person’s identity. One of the most important factors in the success of a biometric system implementation is its capabilities of performing identification and verification process with accuracy (biometric accuracy) and meeting user expectation. Over the years, it still remains as a focal point of discussion in several research papers. Measurements of biometric accuracy validations such as Failure to Enroll (FTE) and Failure to Acquire (FTA) play a vital role in determining the final success of the system. It is impossible to achieve hundred percent accuracy or zero percent error rate due to the nature of the uniqueness of biometric template. Although the percentage is small, it might cause a huge impact on the relevant biometric deployment parties. Therefore, this paper aims to provide a collection of the possible reasons for high FTE and FTA. Ongoing countermeasures used to mitigate the effects are also described in this paper. The focus is on the touch-based fingerprint-based system as it is widely used in a large-scale identification system. At the end of this paper, the data collection gathered from journals, standards and best practices will be useful as a guide for relevant parties.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116610276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Object Detection in Forest with Deep Learning based on Drone’s Vision","authors":"S. Yong, Y. Yeong","doi":"10.1109/ICCOINS.2018.8510564","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510564","url":null,"abstract":"In the past decade, various new and impressive applications have been developed and implemented on drones, for instance search and rescue, surveillance, traffic monitoring, weather monitoring and so on. The current advances in drone technology provoked significant changes in enabling drones to perform a wide range of missions with increasing level of complexity. Missions such as search and rescue or forest surveillance require a large camera coverage and thus making drone a suitable tool to perform advanced tasks. Meanwhile, the increasing trend of deep learning applications in computer vision provides a remarkable insight into the initiative of this project. This paper presents a technique which allows detecting the existence of human in forestry environment with human object detection algorithm using deep learning framework. The purpose of detecting human existence in forestry area is to reduce illegal forestry activities such as illegal entry into prohibited area and illegal logging activities. Also, the outcome of this project is expected to aggrandize the usage of drone for forest surveillance purpose to save time and cost.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Traffic Load Aware Approach for Optimum Throughput in 5G Heterogeneous Cellular Networks","authors":"A. Shabbir, H. Khan, Syed Abbas Ali","doi":"10.1109/ICCOINS.2018.8510566","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510566","url":null,"abstract":"The ever-increasing demands of current wireless devices for high data throughput and frequent mobility forces network operators to provide seamless connectivity with guaranteed QoS to all wireless users. This situation creates a big concern in design and development of cost-effective and energy efficient solution for 5G cellular networks. small cells (Femtocells) deployment provides low cost and energy efficient solution if equipped with smart and efficient power saving techniques. In this paper, we have proposed a data traffic demands aware approach for optimum throughput and maximum energy utilization while maintaining the desired QoS required by users. The results and analysis confirm that the proposed approach will not only provide better energy utilization and optimum data throughput but will also contribute towards energy efficient aspect of 5G cellular networks.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adoption of E-Commerce Online to Offline with Technology Acceptance Model (TAM) Approach","authors":"Regina Eka Riantini, Vional, Aries","doi":"10.1109/ICCOINS.2018.8510613","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510613","url":null,"abstract":"One application of technology in business activities is E-Commerce and the number of E-Commerce users led to the emergence of various types of E-Commerce. One type of E-Commerce that is currently a concern is E-Commerce Online to Offline (O2O). O2O services can be an alternative solution in the distribution of goods for retail companies in Indonesia that implement e-commerce services. Research in the field of E-Commerce adoption has done a lot of previous researchers with model Technology Acceptance Model (TAM). This research will discuss how the adoption of Jakarta Retailer Customer in using E-Commerce Online to Offline service. The purpose of this research is to know the characteristics of customers of shopping online retail sites in Jakarta and to know what variables of Technology Acceptance Model (TAM) affect the adoption of O2O E-Commerce customers in Jakarta. Hypothesis testing proposed in the study using SEM or Stuctural Equation Modeling analysis operated through AMOS program to 111 Respondents.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Better Knowledge Management in Global Software Engineering","authors":"Maham Noor, Z. Rana","doi":"10.1109/ICCOINS.2018.8510567","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510567","url":null,"abstract":"Many organizations employ distributed teams for development of enterprise information systems. The trend of distributed teams or Global Software Engineering (GSE) has been on the rise for the last decade or so. Improved resource allocation, cost savings and learning of best practices are some of the benefits that cause this increase. When dealing with distributed teams these organizations face several project management challenges such as communication and coordination issues, cultural differences, knowledge management. Lack of knowledge sharing is one of the most critical issue that needs to be addressed. It is difficult to ensure availability of right knowledge at the right time to the right person. The knowledge needs to be shared across the organization but limitations of knowledge sharing tools or dispersed knowledge sharing media makes it more challenging to share knowledge. In addition, lack of tool support for knowledge sharing further aggravates the problem. This paper presents a unified knowledge sharing framework to facilitate knowledge management in global software engineering environment. The framework aims to mitigate the shortcomings of knowledge sharing tools and dispersed availability of knowledge sharing media by providing communication, collaboration, organizational memory and project management aspects on one platform. The proposed framework is based on the existing knowledge sharing frameworks and will be validated using the criteria formulated on the set of activities which are required or beneficial for knowledge sharing.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICCOINS 2018 Committees","authors":"","doi":"10.1109/iccoins.2018.8510573","DOIUrl":"https://doi.org/10.1109/iccoins.2018.8510573","url":null,"abstract":"","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115427623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}