Mohammed Salhoub, Abdelsalam M. Maatuk, Monther M. Elaish
{"title":"An Enhanced TAM Model for Measuring the Usability of Electronic Services","authors":"Mohammed Salhoub, Abdelsalam M. Maatuk, Monther M. Elaish","doi":"10.1109/ICEMIS56295.2022.9914098","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914098","url":null,"abstract":"The evaluation of electronic services (e-services) and determining the factors that affect users to adopt these services are needed. This study aims to shed light on the usability of e-services for the General Electricity Company in Libya using the Technology Acceptance Model (TAM). The TAM model was enhanced by adding some external variables that are suitable to the Libyan environment so that they can influence Libyan citizens to adopt e-services. The most common variables are trust, social influence, age, and education level, in addition to computer self-efficacy and web skills. The model has been validated by technology adoption experts. Based on the results of the study, a pilot website for the electronic services of the electricity company and a TAM model can be developed to measure the usability of the technology through its use and training.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"326-328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130890658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey On Privacy And Policy Aspects Of Blockchain Technology","authors":"M. Mahmood, O. Ucan, A. Ibrahim","doi":"10.1109/ICEMIS56295.2022.9914008","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914008","url":null,"abstract":"from financial transactions to digital voting systems, identity management, and asset monitoring, blockchain technology is increasingly being developed for use in a wide range of applications. The problem of security and privacy in the blockchain ecosystem, which is now a hot topic in the blockchain community, is discussed in this study. The survey’s goal was to investigate this issue by considering several sorts of assaults on the blockchain network in relation to the algorithms offered. Following a preliminary literature assessment, it appears that some attention has been paid to the first use case; however the second use case, to the best of my knowledge, deserves more attention when blockchain is used to investigate it. However, due to the subsequent government mandated secrecy around the implementation of DES, and the distrust of the academic community because of this, a movement was spawned that put a premium on individual privacy and decentralized control. This movement brought together the top minds in encryption and spawned the technology we know of as blockchain today. This survey paper also explores the genesis of encryption, its early adoption, and the government meddling which eventually spawned a movement which gave birth to the ideas behind blockchain. It also closes with a demonstration of blockchain technology used in a novel way to refactor the traditional design paradigms of databases.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131083221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malik Qasaimeh, Nancy Abu Halemah, Rana Rawashdeh, Raad S. Al-Qassas, A. Qusef
{"title":"Systematic Review of E-commerce Security Issues and Customer Satisfaction Impact","authors":"Malik Qasaimeh, Nancy Abu Halemah, Rana Rawashdeh, Raad S. Al-Qassas, A. Qusef","doi":"10.1109/ICEMIS56295.2022.9914393","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914393","url":null,"abstract":"Security is fundamentally important to ecommerce; without it, e-commerce is worthless. In the era of cyberattacks, protecting e-commerce transactions and the personal data of customers is crucial. This systematic review analyses 28 papers on various security, threat, and mitigation issues in e-commerce, concluding that customers feel more secure and trusting while browsing applications and ecommerce websites when vulnerabilities and threats are discovered and solved transparently, thus improving customer satisfaction. Furthermore, more awareness of security issues increases the demand for e-commerce applications.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emad Ali Almabsout, Naser Elnaily, M. Majidi, Ahmad Ali Nazeri
{"title":"Optimum Allocation and Sizing of Multi-Distributed Generations: Step-by-Step Injection","authors":"Emad Ali Almabsout, Naser Elnaily, M. Majidi, Ahmad Ali Nazeri","doi":"10.1109/ICEMIS56295.2022.9914272","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914272","url":null,"abstract":"The demand for energy is increased by increasing global population and rapid developments in the current industry and modern lifestyle. It is a necessity to promote and modernize the control systems of the electrical network and move forward to the green and smart energy systems. The integration of the distributed generations (DGs) with the optimum capacity and position is one of the viable keys for reducing the active and reactive power losses, providing standard system power quality, and also injecting more renewable energy sources into the system in order to extend decarbonized and green systems. The Optimal DG (ODG) allocation and sizing have always been challenging for both suppliers and consumers/prosumers. The fundamental objectives of ODG are to enhance system overall efficiency with reduced power losses, maximize system security, voltage stability, and reliability. This paper proposes the implementation of the Grey Wolf (GWO) as state of the art for the nonlinear meta-heuristic optimization algorithm to solve ODG in the radial distribution system. The optimization aims are to reduce the percentage of daily power losses and voltage fluctuation of the radial systems. The GWO is applied to implement multiple DGs, by considering step-by-step injection strategy, to the IEEE 69 bus distribution test system. Two different scenarios are taking into account: the common DG with the fixed capacity to inject both active and reactive power to the system and time-series output for a photovoltaic generation which considered as a DC-battery.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The performance of Faster R-CNN algorithm on a dataset with poor capturing conditions","authors":"Ayad Saadi Ahmed, Mohammed Obaid Mustafa","doi":"10.1109/ICEMIS56295.2022.9914088","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914088","url":null,"abstract":"In the past few years, computer vision algorithms have made a breakthrough in the field of object discovery, taking advantage of the significant development in computing capabilities and the availability of huge amounts of data with the emergence of many methods and techniques that have been used to achieve efficient results. In this research paper, we examine one of the most important object-detection algorithms, the Faster RCNN algorithm, and explore its ability and efficiency using low-quality or low-light image datasets captured in harsh conditions such as darkness or fog. Many research papers do not contain this kind of nature of images in their data, and their percentage is small in research, so this is a gap that we are trying to cover in this paper, at which we got a detection accuracy of mAP(50)=70.7%. The data contained ten capturing conditions (shadow, twilight, etc.) and 12 categories between human, animal, vehicle or furniture.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123959899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Smart Meter Application Framework","authors":"Fatin Aljawarneh","doi":"10.1109/ICEMIS56295.2022.9914289","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914289","url":null,"abstract":"We have proposed a new Smart Meter Application (SMA) Framework. This application registers consumers at utility provider (Electricity), takes the meter reading for electricity and makes billing. The proposed application might offer higher level of flexibility and security, time saving and trustworthiness between consumers and authority offices. It’s expected that the application will be developed by Flutter to support Android and iOS Mobile Operating Systems.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122608515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Esraa Mugdadi, Ismail Hmeidi, Ahmad Al-Aiad, Naser Obeidat
{"title":"Deep learning approach for classifying CT images of COVID-19: A Systematic Review","authors":"Esraa Mugdadi, Ismail Hmeidi, Ahmad Al-Aiad, Naser Obeidat","doi":"10.1109/ICEMIS56295.2022.9914004","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914004","url":null,"abstract":"COVID-19 is the most disease that millions of people around the world suffer from it. This disease appears at the end of the year of 2019 to today. The first case appeared from China. The World Health organization (WHO) called it the pandemic as WHO the total cases infected with COVID-19. This paper on a systematic study of the literature on the study of the model of deep learning to classify the CT images of COVID-19 which was published from the start of this pandemic. We study the 38 research which related to our object. we provided research of classification that summarizes the CT images, the nine deep learning algorithms used. We identified the main gaps in the previous study which not been solved, and suggestions solve for future research.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"2526 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cardiovascular System Pathologies Studying Using Virtual Reality Tools","authors":"D. Tsoy, Y. Daineko, M. Ipalakova","doi":"10.1109/ICEMIS56295.2022.9914209","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914209","url":null,"abstract":"Accelerated growth of the online studying mode tended to the lack of practical skills development. Though many specialties were covered with newly developed courses and educational platforms not all of them provided the necessary level of the hard skills gathering. In some areas such as medicine, engineering, human interaction practice is crucial since it is a basis of the specialists’ knowledge.The article covers the development of the software application to provide medical students with a tool that will show pathologies of the cardiovascular system. The complex consists of two modules. The first contains a scene consisting of a 3D heart model. It shows four different pathologies of the heart. The second scene is dedicated to laparoscopic surgery with stenting of coronary vessels. To simulate interaction during laparoscopic surgery Leap Motion controller was used. The instrumental basis of the project for 3d modeling is Blender, the project’s development environment is Unity 3D game engine. All the scripts describing the application’s logic were written in the C# programming language.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"3 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131089368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fog Computing or Cloud Computing: a Study","authors":"Asma N. Elmoghrapi, Ahmed Bleblo, Y. A. Younis","doi":"10.1109/ICEMIS56295.2022.9914131","DOIUrl":"https://doi.org/10.1109/ICEMIS56295.2022.9914131","url":null,"abstract":"Cloud computing is a new term that refers to the service provisioned over the Internet. It is considered one of the foremost prevailing standards within the Data Innovation (IT) industry these days. It offers capable handling and capacity assets as on-demand administrations at diminished fetched, and progressed productivity. It empowers sharing computing physical assets among cloud computing tents and offers on-demand scaling with taken toll effectiveness. Moreover, cloud computing plays an important role in data centers because they house virtually limitless computational and storage capacities that businesses and end-users can access and use via the Internet. In the context of cloud computing, fog computing refers to bringing services to the network’s edge. Fog computing gives cloud-like usefulness, such as information capacity space, systems, and compute handling control, yet with a more noteworthy scope and nearness since fog nodes are found close to d-user edge gadgets, leveraging assets and diminishing inactivity. The concepts of cloud computing and fog computing will be explored in this paper, and their features will be contrasted to determine the differences between them. Over 25 factors have been used to compare them.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126695379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}