2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

筛选
英文 中文
Predicting the Suitability of IT Students' Skills for the Recruitment in Saudi Labor Market 预测IT学生技能在沙特劳动力市场招聘中的适用性
Munirah Alghamlas, Reham Alabduljabbar
{"title":"Predicting the Suitability of IT Students' Skills for the Recruitment in Saudi Labor Market","authors":"Munirah Alghamlas, Reham Alabduljabbar","doi":"10.1109/CAIS.2019.8769577","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769577","url":null,"abstract":"In a technical world, knowledge of information technology (IT) skills is an important aspect, especially in Saudi Arabia, with the development in the technical labor market. This paper proposed a solution to examining the demand for recruitment in the Saudi market, using data extracted from online job portals. By utilizes machine learning algorithms to develop a web-based application that helps in predicting the suitability of IT students' skills for the recruitment in Saudi labor market. In addition, this solution offers general recommendations of the highest needed IT skills in Saudi Arabia in order to overcome the unemployment problem.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Wideband Rotman Lens Beamforming Technique for 5G Wireless Applications 5G无线应用的宽带罗特曼透镜波束形成技术
Mohamed A. M. Hassanien, R. Hahnel, D. Plettemeier
{"title":"Wideband Rotman Lens Beamforming Technique for 5G Wireless Applications","authors":"Mohamed A. M. Hassanien, R. Hahnel, D. Plettemeier","doi":"10.1109/CAIS.2019.8769475","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769475","url":null,"abstract":"This paper presents the design, simulation and measurement results for a beam steerable system, which covers the frequency range from 25 GHz to 30 GHz for 5G wireless applications. A Rotman Lens with five input ports and six output ports is the beamforming network that is connected to six fork-like shaped antennas. This novel system covers a wide scanning angle from −45° to +45° over the mentioned bandwidth. The simulated and measured results agree in a very high extent in terms of the S-parameters and radiation pattern.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"136 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133971137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Modeling of the Quranic Alphabets' Correct Pronunciation for Adults and Children Experts 《古兰经》字母正确读音的成人与儿童专家建模
Salmiah Ahmad, Syarifah N. S. Badruddin, N. Hashim, A. H. Embong, Tareq Altalmas, Surul S. Hasan
{"title":"The Modeling of the Quranic Alphabets' Correct Pronunciation for Adults and Children Experts","authors":"Salmiah Ahmad, Syarifah N. S. Badruddin, N. Hashim, A. H. Embong, Tareq Altalmas, Surul S. Hasan","doi":"10.1109/CAIS.2019.8769590","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769590","url":null,"abstract":"The Quranic alphabets can be characterized from their point of articulation (Makhaarij) and their characteristics (Sifaat). The fact is that there is limited research in the field of Tajweed from the engineering perspective. This research focused on the identification and analysis of the correct pronunciation of the Quranic alphabets on the features obtained from adult and children experts. The combination of four formant frequencies (F1, F2, F3, F4) and three Power Spectral Density values (PSD1, PSD2, PSD3) were used as the features to represent the pronunciation of each alphabets for both categories. The validation was done through a Graphical User Interface (GUI) to record the new audio signal, processes and produces the outcomes of the pronunciation in the form of percentage (%) of accuracy, as compared to the reference model of both experts' categories.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130888603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Neural Network Based Mobile Dermoscopy Application for Triaging Skin Cancer Detection 基于深度神经网络的移动皮肤镜在皮肤癌分诊检测中的应用
A. Ech-Cherif, Mohammed Misbhauddin, M. Ech-Cherif
{"title":"Deep Neural Network Based Mobile Dermoscopy Application for Triaging Skin Cancer Detection","authors":"A. Ech-Cherif, Mohammed Misbhauddin, M. Ech-Cherif","doi":"10.1109/CAIS.2019.8769517","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769517","url":null,"abstract":"Mobile teledermoscopy is an area that enables patients to get an early detection for suspicious lesions using their mobile phones and hence creating a patient-centric health management. Due to the inherent variability in the appearance of skin lesions, detection of skin cancer from dermoscopic images is a difficult task even for medical experts. Recent advancements in image processing using Deep Convolutional Neural Networks (CNN) have led numerous researchers to use them for skin lesion classification which concluded that CNN performed on par with expert dermatologists. In this paper, we used a dataset of 48,373 dermoscopic images collected from three different archives labelled and validated by expert dermatologists. In our work, we manually trained a resource constrained CNN model called MobileNetV2 using transfer learning for binary classification of skin lesions into benign or malignant classes. Using batch size of 32, the trained model resulted in an overall accuracy of 91.33%. The trained model was then used to develop a mobile application for iOS devices using the Core ML library. The mobile application was then tested on a new dataset to assess its performance on an unseen library of images.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130905754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Exploiting UAV as NOMA based Relay for Coverage Extension 利用无人机作为基于NOMA的覆盖扩展中继
Syeda Kanwal Zaidi, S. F. Hasan, X. Gui, Nazmul H. Siddique, Salmiah Ahmad
{"title":"Exploiting UAV as NOMA based Relay for Coverage Extension","authors":"Syeda Kanwal Zaidi, S. F. Hasan, X. Gui, Nazmul H. Siddique, Salmiah Ahmad","doi":"10.1109/CAIS.2019.8769542","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769542","url":null,"abstract":"Unmanned aerial vehicles (UAVs) aided communication has acquired research interest in many civilian and military applications. The use of UAV as base stations and as aerial relays to improve coverage of existing cellular networks is prevalent in current literature. Along with this, a few studies have proposed the use of non-orthogonal multiple access (NOMA) in UAV communications. In this paper, we propose a network where a ground user and an aerial UAV relay is accessed using NOMA, where the UAV acts as decode-and-forward (DF) relay to extend the coverage of source. The performance of the proposed model is shown by evaluating outage behaviour for different transmit power and fading environments with Monte Carlo simulations. System throughput of proposed network appears to be better than orthogonal multiple access (OMA) based equivalent network. The results show that with an adequate height of the UAV NOMA based relay, quality of service (QoS) of cell edge user is satisfactory.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Threats Against the Virtual Machine Environment of NFV NFV虚拟机环境的威胁
A. Alnaim, A. Alwakeel, E. Fernández
{"title":"Threats Against the Virtual Machine Environment of NFV","authors":"A. Alnaim, A. Alwakeel, E. Fernández","doi":"10.1109/CAIS.2019.8769561","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769561","url":null,"abstract":"Network Function Virtualization (NFV) is an implementation of cloud computing that leverages virtualization technology to provide on-demand network functions such as firewalls, domain name servers, etc., as software services. One of the methods that help us understand the design and implementation process of such a new system in an abstract way is architectural modeling. Architectural modeling can be presented through UML diagrams to show the interaction between different components and its stakeholders. Also, it can be used to analyze the security threats and the possible countermeasures to mitigate the threats. In this paper, we show some of the possible threats that may jeopardize the security of NFV. We use misuse patterns to analyze misuses based on privilege escalation and VM escape threats. The misuse patterns are part of an ongoing catalog, which is the first step toward building a security reference architecture for NFV.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"87 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132685452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image Assistant Tools for Extracting, Detecting, Searching Images and Texts 图像辅助工具提取,检测,搜索图像和文本
A. Jamal, Latifa Aljiffry, Noora Alhindi, Raghdah Nahhas, Somayh Al-Amoudi
{"title":"Image Assistant Tools for Extracting, Detecting, Searching Images and Texts","authors":"A. Jamal, Latifa Aljiffry, Noora Alhindi, Raghdah Nahhas, Somayh Al-Amoudi","doi":"10.1109/CAIS.2019.8769582","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769582","url":null,"abstract":"At present, people use smart phones to capture every important moment. In addition, smart phones are widely used for screen capture which is also called screen shot. A screen shot is a still image taken from any digital screen. These images differ in their contents such as objects, faces, charts, and text. Thus, with a large number of images, it is difficult to search for images that contain text and a specific object. Image Assistant is our proposed mobile application for image processing. Will improve how users treat photos stored on their smartphone. The Image Assistant has four main functions: extracting text, reading text, restoring faces, and discovering objects. This application allows users to search for specific images and find a saved image containing an image and text, with the support of Arabic.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124570212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum Cryptography on IBM QX IBM QX上的量子密码学
Dhoha AL-Mubayedh, Mashael Alkhalis, Ghadeer AL-Azman, Manal AL-Abdali, Malak AIFosail, Naya Nagy
{"title":"Quantum Cryptography on IBM QX","authors":"Dhoha AL-Mubayedh, Mashael Alkhalis, Ghadeer AL-Azman, Manal AL-Abdali, Malak AIFosail, Naya Nagy","doi":"10.1109/CAIS.2019.8769567","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769567","url":null,"abstract":"Due to the importance of securing electronic transactions, many cryptographic protocols have been employed, that mainly depend on distributed keys between the intended parties. In classical computers, the security of these protocols depends on the mathematical complexity of the encoding functions and on the length of the key. However, the existing classical algorithms 100% breakable with enough computational power, which can be provided by quantum machines. Moving to quantum computation, the field of security shifts into a new area of cryptographic solutions which is now the field of quantum cryptography. The era of quantum computers is at its beginning. There are few practical implementations and evaluations of quantum protocols. Therefore, the paper defines a well-known quantum key distribution protocol which is BB84 then provides a practical implementation of it on IBM QX software. The practical implementations showed that there were differences between BB84 theoretical expected results and the practical implementation results. Due to this, the paper provides a statistical analysis of the experiments by comparing the standard deviation of the results. Using the BB84 protocol the existence of a third-party eavesdropper can be detected. Thus, calculations of the probability of detecting/not detecting a third-party eavesdropping have been provided. These values are again compared to the theoretical expectation. The calculations showed that with the greater number of qubits, the percentage of detecting eavesdropper will be higher.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117027434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of QoE Model Based on Pixel Density 基于像素密度的QoE模型实现
Abubkr Elmnsi, Fahad Mira, N. Osman, I. Mkwawa
{"title":"Implementation of QoE Model Based on Pixel Density","authors":"Abubkr Elmnsi, Fahad Mira, N. Osman, I. Mkwawa","doi":"10.1109/CAIS.2019.8769444","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769444","url":null,"abstract":"Dynamic Adaptive Streaming over HTTP popular known as DASH is a standard developed by ISO/IEC MPEG. DASH implements the convenient and smooth transmission of video streams over heterogeneous end user devices over the IP network with limited bandwidth. Device screen size, design layout and resolution are some of the device context parameters which impact video quality on mobile devices. This paper presents the implementation and the application of the new proposed model over DASH by using an open source libdash library. The implementation has shown that the proposed model performs better than the default Libdash quality adaptation in terms of average stalling numbers and average stalling time.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121993580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DWT-Band power-SVM Based Architecture for Neurological Brain Disorders Diagnosis Using EEG Signals 基于dwt波段功率支持向量机的脑电信号神经系统疾病诊断
F. Alturki, Khalil Alsharabi, Majid Aljalal, Akram M. Abdurraqeeb
{"title":"A DWT-Band power-SVM Based Architecture for Neurological Brain Disorders Diagnosis Using EEG Signals","authors":"F. Alturki, Khalil Alsharabi, Majid Aljalal, Akram M. Abdurraqeeb","doi":"10.1109/CAIS.2019.8769492","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769492","url":null,"abstract":"Electroencephalogram (EEG)-based signal processing techniques are important clinical tools for diagnosing and monitoring neurological brain disorders such as autism and epilepsy. In this paper, different methods for diagnosing autism and epilepsy by using discrete wavelet transform (DWT) and support vector machines (SVM), are investigated. For features extraction, DWT is combined with standard deviation, kurtosis, and logarithmic band power (LBP). The aim of this investigation is to recommend a combination approach that achieves best results. The proposed methods are tested using two types of datasets. The epilepsy dataset provided by MIT includes 23 subjects while autism dataset provided by King Abdulaziz Hospital includes 19 subjects. The simulation results indicate that the combination of DWT+LBP+SVM provides the best results with average classification accuracies of 98% and 96.5% for epilepsy and autism diagnosis, respectively.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124134370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信