{"title":"Symmetrical and asymmetrical Microstrip Array Antenna","authors":"R. Yuwono, Oky Prana Wijaya","doi":"10.1109/CAIS.2019.8769502","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769502","url":null,"abstract":"The power efficiency of the antenna is aimed to reducing power loss (losses). Low Losses making optimal antenna performance in transmitting and receiving waves. Range of the antenna can also be optimized because of greater power can be transmitted, thus reducing the need transceiver devices that consume a lot of power. The author uses a microstrip antenna array with a number of patches to different made to find a different gain value. The results of the simulation of antenna gain antenna values obtained successively dBi 2.55, 3.08 dBi, 4.32 dBi, 5.05 dBi and 6.21 dBi. As for the antenna efficiency is obtained 0.98272323, 0.98395813, 0.9851897, 0.98815117 and 0.99053464. The results of the measurements obtain fabricated antenna consecutive obtained gain value −2.44 dBi, −2.05 dBi, −0.77 dBi, −0.63 dBi and 2.00 dBi. From measurements of the radiated power antenna efficiency values obtained third consecutive 0.3937, 0.4908, 0.5529, 0.57, and 0.6262. The results of this research concluded that the greater the value of the gain of the antenna, the higher the efficiency of the power.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Based Attack on Certain Encryption Schemes","authors":"Anna Saif, M. R. Abidi","doi":"10.1109/CAIS.2019.8769527","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769527","url":null,"abstract":"Machine learning provides a very promising approach to attack cryptographic implementations. In this paper, a machine learning based attack on text encrypted with public key encryption schemes like RSA and Elliptic Curve Cryptography (ECC) is shown. Decision Trees, a popular approach to perform classification are utilized as multi-class classifiers to learn the structure of the text from training examples so that an unknown similar text can be decrypted successfully. The attack is performed on a section of the Enron email dataset. Three different feature sets are created and then their individual performance is evaluated. Finally, their results are combined together to find out the total percentage of correct partial decrypted text in the test set.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127163611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote Speaker","authors":"Mohamed-Slim Alouini","doi":"10.1109/cais.2019.8769555","DOIUrl":"https://doi.org/10.1109/cais.2019.8769555","url":null,"abstract":"Dr. Alouini was born in Tunis, Tunisia. He received the Diplome d'Ingenieur from the École Nationale Supérieure des Télécommunications (TELECOM Paris Tech) and the Diplome d'Etudes Approfondies (D.E.A.) in Electronics with Highest Honors from the Université Pierre & Marie Curie in Paris, both in 1993. He received the M.S.E.E. degree from the Geor-gia Institute of Technology (Georgia Tech) in 1995, and a PhD in Electrical Engineering from California Institute of Technology (Caltech) in 1998. He also received the Habilitation degree from the Université Pierre & Marie Curie, Paris, France, in 2003.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"58 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124998425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Massive MIMO for 5G 28 GHZ","authors":"T. Yuwono, M. Ismail, Ibnu Hajar","doi":"10.1109/CAIS.2019.8769515","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769515","url":null,"abstract":"The fifth generation communication (5G) will be run immediately. This generation will use mm-wave with frequency between 24.5 GHz and 86 GHz. The biggest candidate for the frequency used is 28 GHz. The 5G advantages are supporting IoT, M to M, and a high data rate (up to 1 GB/s). So this system requires large bandwidth. This paper will present antenna designs that support these requirements. Antenna type is a Massive MIMO patch antenna with 10x10 array. The performance of this antenna are average of S-parameter is - 14.29 dB, the average of VSWR is 1.43, the bandwidth is 450 MHz and the gain is 27.4 dB. So this antenna is suitable for 5G.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126095283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Classification and Prediction of Job Interview Performance","authors":"Sarah S. Alduayj, Phillip Smith","doi":"10.1109/CAIS.2019.8769559","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769559","url":null,"abstract":"Attracting and hiring talented employees is a challenge for companies. The job interview process is a very critical step for both employer and candidate. Having a smooth hiring process in a company will increase future employees' satisfaction. Candidates tend to share their feedback and experience of interviews and company's hiring process with others. Having a negative experience can affect its brand image and reputation as an employer. This will make it hard to attract talented employees. In this research, machine learning and neural network models, such as support vector machines, logistic regression, Naïve Bayes, and long short–term memory (LSTM), were trained to predict the candidates' sentiments after a job interview. Each model was trained using several data representations and weighting approaches, such as term binary, term frequency, and term frequency–inverse document frequency (TF–IDF). As a result, training logistic regression with TF–IDF and unigram word representation achieved an F1-measure of 0.814.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130600164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Highly Selective Planar Microstrip Lowpass Filter Using Interdigital Hairpin Resonator (IHR)","authors":"T. A. Nisamol, P. Abdulla, V. Hamsakutty","doi":"10.1109/CAIS.2019.8769446","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769446","url":null,"abstract":"Planar microstrip lowpass filter is designed using the inter-digital hairpin resonators (IHR) to achieve high selectivity and suppression is up to 17th order harmonics. The prototype is designed with 3 dB cut-off frequency of 0.82 GHz and obtain rolloff of 185 dB/GHz with 177% relative stopband width. The interdigital effect of cascaded combination of hairpin resonators along with suppressing cells give high end results with normalized cross section of $0.137 boldsymbol{lambda}_{text{g}}times 0.069 boldsymbol{lambda}_{text{g}}$.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123616125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things (IoT): Security and Privacy Threats","authors":"Eman Shaikh, Iman Mohiuddin, Ayisha Manzoor","doi":"10.1109/CAIS.2019.8769539","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769539","url":null,"abstract":"Internet of Things (IoT) is used for providing connectivity amongst numerous devices. It is a system where objects that are embedded with a detector technology acts with another object through a wireless communication medium to exchange and transfer information without human interaction. These devices are prone to vulnerable attacks due to the simple and open nature of their networks. Therefore, privacy and security are the biggest concern in this technology. The focus of the security and privacy threats on IoT is crucial to promote the development of IoT. The goal of the paper is to put forward the different security and privacy concerns that an IoT environment is facing and the existing mechanisms used for its protection. The paper mainly focuses on the IoT privacy and security features such as the IAS-octave security requirements, security and privacy threats and the solutions that need to be maintained to avoid these security and privacy threats.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Real-time Detection of a Panic Behavior in Crowded Scenes","authors":"Bahiya Aldissi, Heyfa Ammar","doi":"10.1109/CAIS.2019.8769487","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769487","url":null,"abstract":"Due to the rapidly increasing number of requests from the surveillance and security industries, detecting a panic behavior in human crowd have become an active research in the field of computer vision in recent years. The automatic and real-time analysis of video sequences in order to detect a panic behavior is one of the most challenging tasks for computer vision experts. This stems from the fact that a panic is mostly defined as a sudden change in the pedestrian movements and that motion estimation is computationally expensive. The aim of this paper is to give an overview of the reported real-time techniques in the literature by focusing on how these techniques overcame the heavy computations of the motion estimation. Moreover, the present work summarizes the accuracy and the execution time of those techniques to highlight the direction to future studies.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124444455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lama Abdulwahab Dajim, Sara Ahmed Al-Farras, Bushra Safar Al-Shahrani, Atheer Abdullah Al-Zuraib, Rincy Merlin Mathew
{"title":"Organ Donation Decentralized Application Using Blockchain Technology","authors":"Lama Abdulwahab Dajim, Sara Ahmed Al-Farras, Bushra Safar Al-Shahrani, Atheer Abdullah Al-Zuraib, Rincy Merlin Mathew","doi":"10.1109/CAIS.2019.8769459","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769459","url":null,"abstract":"The proposed system is an organ donation decentralized app using blockchain technology. It would be a web application for patients to register their information-most importantly medical ID, blood type, organ type and state. The system would work on a first-in, first-out basis unless a patient is in critical condition.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126416403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Misbahuddin, Malik Munjed Ibrahim, Ayman Mahmoud Alnajar, Basheer Qutaibah Alolabi, Abdullah Fahad Ammar
{"title":"Automatic Patients' Vital Sign Monitoring by Single Board Computer (SBC) Based MPI Cluster","authors":"S. Misbahuddin, Malik Munjed Ibrahim, Ayman Mahmoud Alnajar, Basheer Qutaibah Alolabi, Abdullah Fahad Ammar","doi":"10.1109/CAIS.2019.8769551","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769551","url":null,"abstract":"Periodic monitoring of patients' physiological data is important in order to maintain in-ward patients' wellbeing under control. However, such an approach is exhaustive and may not be suitable for patients, because a slight negligence from medicinal services staff may lead to serious ramifications for the patients. This paper proposes a Patients' Monitoring System (PMS) in which multiple patients' vital sign data may be monitored automatically or on demand without human intervention. The suggested system is designed around Single Board Computer (SBC) based Message Passing Interface (MPI) Cluster. Low-cost Raspberry Pis are used as SBC. A prototype of the proposed system has been presented. Development steps have been discussed.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}