A. Al-Sahly, Majed Al–Rubaian, Muhammad Al-Qurishi
{"title":"Developing Soft-Beacon as a Service Based on Online-Offline Positioning","authors":"A. Al-Sahly, Majed Al–Rubaian, Muhammad Al-Qurishi","doi":"10.1109/CAIS.2019.8769496","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769496","url":null,"abstract":"The evolution of technology in recent times has been directed towards greater integration of functions related to a wide range of user needs. In this complex environment, access to accurate and up-to-date data is of paramount importance for successful completion of various tasks. As the networks evolve to the Internet of Things (IoT) level, data is being collected directly by various sensors from a wide variety of locations. This triggers additional complexity in terms of initializing, managing and maintaining a large number of sensors, necessitating a large and coordinated effort that could be costly for some organizations. In this work, we present an alternative method for implementation of sensing technology that can be described as Soft-Beacon-as-a-Service, which eliminates the need to use physical devices for this purpose. Instead, this method relies on the analysis of online and offline maps to monitor open spaces, while IMU units and angular movement and distance calculations are used to gather accurate location data about indoor environments. The development of this technique was primarily intended to benefit the scientific and business organizations by providing a simple and inexpensive way to acquire and analyze data based on the activity of this beacon.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127055847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of Moodle learning Management System Regarding Quizzes Security and Stability Problems","authors":"Azza Yousif Elmaghrabi, S. Eljack","doi":"10.1109/CAIS.2019.8769530","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769530","url":null,"abstract":"This study aims to enhance the security of Moodle system environment during the Execution of online exams, Taking into consideration the most common problems facing online exams and working to solve them. This was handled by improving the security performance of Moodle Quiz tool, which is one of the most important tools in the learning Management system as general and in Moodle system as well. In this paper we include two enhancement aspects: The first aspect is solving the problem of losing the answers during sudden short disconnection of the network because of the server crash or any other reasons, the second aspect is Increasing the level of confidentiality of e-Quiz by preventing accessing the Quiz from more than one computer or browser at the same time. In order to verify the efficiency of the new quiz tool features, the upgraded tool have been tested using an experimental test Moodle site.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134263288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Monitoring Enhancement based on Mathematical Modeling","authors":"L. K. B. Melhim, M. Jemmali, Mafawez T. Alharbi","doi":"10.1109/CAIS.2019.8769583","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769583","url":null,"abstract":"Information about the network status can be obtained by analyzing the monitored network traffic. Because the network traffic is huge in size and is continuously varying in time, the process of analyzing the monitored traffic is extremely difficult and time and space consuming. To keep the monitoring system running, the administrator has to manage a trade-off between the amount of derived significant information vs. monitoring process complexity vs. time and space availability. This paper proposes a method that can simplify the administrator's work as well as the monitoring process of, without sacrificing significant information about the network. The proposed method presents a mathematical model that decomposes the monitored network traffic into two main parts: significant traffic and non-significant traffic. The decomposition rules are implemented based on experimental observations of the monitored network. Basic experiments show that the proposed mathematical model decomposes the network traffic based on the selected rules, and the model achieves a traffic reduction of approximately 80%.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132714246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IDSS: An Intelligent Decision Support System for Breast Cancer Diagnosis","authors":"Hussain Alsalman, Najiah Almutairi","doi":"10.1109/CAIS.2019.8769579","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769579","url":null,"abstract":"Breast cancer is a critical disease that affects a large number of females around the world. Early detection of breast cancer is an effective step for increasing the rate of survival. There are several computerized systems used for breast cancer classification and diagnosis. However, these systems are still required a considerable improvement to be more effective and accurate tools. In this paper, we develop an intelligent decision support system (IDSS) for breast cancer diagnosis. The developed IDSS consists of four main stages are preprocessing, segmentation, feature extraction, and classification. In the preprocessing stage, we processed the breast images to eliminate the noise and artefacts. In the segmentation stage, the region of interests (ROIs) are segmented from the mammogram images using K-means algorithm. After that, the discriminative features are extracted from the ROIs through the feature extraction stage using the discrete wavelet transform (DWT) and gray level co-occurrence matrix (GLCM) method. In the classification stage, the extracted features of breast tumor are classified into three classes, which are normal, malignant, or benign, by using the artificial neural network (ANN). The public dataset collected by the Mammographic Image Analysis Society (MIAS) is used for evaluation. The experimental results demonstrated that the IDSS is able to achieve 96.563% of average accuracy using to-folds cross-validation technique.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haifa Al-Omar, Rouqaiah Al-Refai, Cady Alnafea, M. Al-ghuwainim, N. Saqib, Malak Alfosail
{"title":"A Review On Live Remote Face Recognition and Access Provision Schemes","authors":"Haifa Al-Omar, Rouqaiah Al-Refai, Cady Alnafea, M. Al-ghuwainim, N. Saqib, Malak Alfosail","doi":"10.1109/CAIS.2019.8769480","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769480","url":null,"abstract":"The continuously increasing number of attacks on authentication systems occur due to the dependency on weak security mechanisms and approaches, so live biometric systems should be utilized. Especially since they are an approved base of trustworthy authentication. Password based authentication systems offer numerous benefits and they are common in application. However, they need to be memorized and are a prey to dictionary, password guessing, and password resetting attacks by the attackers. Biometric based authentication mechanisms prove an alternative; as they do not need a user to memorize and are difficult to duplicate since they need physical presence of the end users. But due to the constant increase of number of attacks, an attacker has the capability to deceive the system by proving fake or previously recorded biometric features. Liveness detection while acquiring biometric authentication enables setting a limit to the attacks occurring. It is an innovative method that will be constantly authenticating and monitoring the subject user after a specific duration of time to validate the user identity. The performance of this mechanism is intended to be a trustworthy solution for this issue. In this paper, various facial recognition schemes that are used to improve effectiveness of resulting authentication systems will be reviewed.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backstepping Terminal Sliding Mode Control of Chaotic Duffing Oscillators","authors":"Mohammed A. Alghassab","doi":"10.1109/CAIS.2019.8769484","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769484","url":null,"abstract":"This paper has introduced to control of the chaotic behavior for Duffing oscillator system based on the backstepping terminal sliding mode, and the performance of the closed loop control system has been investigated and improved. The proposed method has been compared with two other methods via simulating in Simulink/Matlab. The results are showed the proposed method has the best performance.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Equivalent Resonance Model of Frequency Agile Quasi-Lumped Antenna","authors":"Y. Qasaymeh, A. Almuhaisen, Khaled Issa","doi":"10.1109/CAIS.2019.8769591","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769591","url":null,"abstract":"In this paper, an approximate resonance model of frequency agile quasi-lumped resonator antenna operates in the band 802.11ac is presented. The proposed quasi-lumped antenna formed of straight-line inductor parallel with the interdigital capacitor. The radiating quasi-lumped dimensions were calculated at 5.8 GHz frequency. Then, the antenna prototype simulated the by CST Microwave Studio. The antenna equivalent resonance model lumped elements were extracted based on antenna calculated dimensions. The Agilent ADS used to simulate the antenna equivalent resonance model. Once the resonance frequency is adjusted, two varactor diodes equivalent circuit connected to the quasi-lumped resonator for tuning the resonance frequency. The CST prototyped antenna shows a significant size reduction of 5.6 × 5.8 with operating frequency of 5.8 GHz. The antenna ADS equivalent model resonance frequency is 5.8 GHz. Whilst, the operating frequency of antenna model employing the loading varactor diodes ranges from 5.18 GHz to 5.825 GHz which is the operation band of 802.11ac.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Irfan Mohiuddin, Ahmad S. Almogren, Majed Alrubaian, Muhammad Al-Qurishi
{"title":"Analysis of network issues and their impact on Cloud Storage","authors":"Irfan Mohiuddin, Ahmad S. Almogren, Majed Alrubaian, Muhammad Al-Qurishi","doi":"10.1109/CAIS.2019.8769585","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769585","url":null,"abstract":"Cloud computing renders highly scalable and flexible computing and storage resources on pay-per-use policy. Cloud Computing's services for computation and storage are getting increasingly popular and many organizations are now moving their data from in-house data centers to the Cloud Storage Providers (CSPs). Virtualization and distributed storage allocation are one of the many storage methodologies in the cloud paradigm. However, increasing user base and remote storage of data introduces several network issues and impact the storage methodologies. In this paper, we provide a review of state-of-the-art solutions to tackle the current issues in the cloud computing paradigm.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128267473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation and Review of Lightweight Cryptography in an Internet-of-Things Environment","authors":"Abdurrahman Beg, Talal Al-Kharobi, A. Al-Nasser","doi":"10.1109/CAIS.2019.8769509","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769509","url":null,"abstract":"Internet-of-Things is used in numerous applications including industrial, military systems and the platform like any other on the internet is vulnerable to security threats. However, due to the nature of the devices used, conventional security methods can incur an overhead and may obstruct the mission of the application due to resource constraints of the devices involved. To alleviate this problem, lightweight cryptographic algorithms have been proposed. Development and implementation of such algorithms continue to move forward; however, it remains a challenge to find suitable algorithms that match the specific needs of the IoT application implementer. In this paper, lightweight cryptography algorithms are categorized, and a few are chosen to be simulated and compared using metrics relevant to an Internet-of-Things environment.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128280932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Areej Almazroa, Felwah Alsalman, Jory Alsehaibani, Nada Alkhateeb, Sarah AlSugeir
{"title":"Easy Clinic: Smart Sensing Application in Healthcare","authors":"Areej Almazroa, Felwah Alsalman, Jory Alsehaibani, Nada Alkhateeb, Sarah AlSugeir","doi":"10.1109/CAIS.2019.8769535","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769535","url":null,"abstract":"In the recent few years there was an enormous advancement in the field of sensors and body area network (BAN) technologies. Those technologies led to many beneficial applications in different areas. For instance, in healthcare there was a recognizable evolution of using body sensors to collect and evaluate body parameters. Those sensors can be used to monitor and analyse vital signs like body temperature, blood pressure, sugar level, heart rate and much more which are currently used in a large scale throughout the world hospitals. In this paper, a healthcare smart sensing mobile application is proposed. This application is able to collect data coming from the body temperature sensor through the network then process it based on some scientific analysis to give the mobile user the needed information and the decision to take in if any sudden emergency situation happened.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"64 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127924291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}