{"title":"Product Recommendation in Case-based Reasoning","authors":"Mashael Aldayel, Hafida Benhidour","doi":"10.1109/CAIS.2019.8769523","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769523","url":null,"abstract":"Recommender systems aim to deliver users with intelligent methods for navigation and identification of complex information spaces, especially in the e-commerce realm. However, these systems need to overcome certain limitations that adversely impact their performances, such as overspecialization of recommendations and cold-start problem. To address these concerns, we propose a case-based recommendation approach, which is a form of content-based recommendation, in this paper. This approach is well-suited to many product recommendation domains owing to its clear organization of users' needs and preferences. Additionally, it employs a feature weighting technique to improve the performance of the recommender by enhancing its accuracy and precision. We herein present the results for different case structures, different numbers of similar cases retrieved, and various feature-weighting approaches, which indicate that better results are obtained with the proposed recommender when compared to the KNN retrieval algorithm.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Phishing Websites Using Machine Learning","authors":"Amani Alswailem, Bashayr Alabdullah, Norah Alrumayh, Aram Al-Sedrani","doi":"10.1109/CAIS.2019.8769571","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769571","url":null,"abstract":"Phishing website is one of the internet security problems that target the human vulnerabilities rather than software vulnerabilities. It can be described as the process of attracting online users to obtain their sensitive information such as usernames and passwords. In this paper, we offer an intelligent system for detecting phishing websites. The system acts as an additional functionality to an internet browser as an extension that automatically notifies the user when it detects a phishing website. The system is based on a machine learning method, particularly supervised learning. We have selected the Random Forest technique due to its good performance in classification. Our focus is to pursue a higher performance classifier by studying the features of phishing website and choose the better combination of them to train the classifier. As a result, we conclude our paper with accuracy of 98.8% and combination of 26 features.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128683046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faleh Alfaleh, Haitham Alfehaid, M. Alanzy, Salim Elkhediri
{"title":"Wireless Sensor Networks Security: Case study","authors":"Faleh Alfaleh, Haitham Alfehaid, M. Alanzy, Salim Elkhediri","doi":"10.1109/CAIS.2019.8769510","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769510","url":null,"abstract":"Wireless Sensor Networks (WSNs) are important and becoming more important as we integrate wireless sensor networks and the internet with different things, which has changed our life, and it is affected everywhere in our life like shopping, storage, live monitoring, smart home etc., called Internet of Things (IoT), as any use of the network physical devices that included in electronics, software, sensors, actuators, and connectivity which makes available these things to connect, collect and exchange data, and the most importantly thing is the accuracy of the data that has been collected in the Internet of Things, detecting sensor data with faulty readings is an important issue of secure communication and power consumption. So, requirement of energy-efficiency and integrity of information is mandatory.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132164133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Omar Baeissa, Amin Y. Noaman, A. H. Ragab, Asmaa Hagag
{"title":"Minimizing Prediction Time for Catheter-Associated Urinary Tract Infection Using Big Data Mining Model","authors":"Omar Baeissa, Amin Y. Noaman, A. H. Ragab, Asmaa Hagag","doi":"10.1109/CAIS.2019.8769451","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769451","url":null,"abstract":"This paper focuses on minimizing prediction time for Catheter-Associated Urinary Tract Infection (CAUTI) as one of the main types of Healthcare Associated Infections (HAIs) through a big data analytics model. Big data raises the bar as a result of additional features. It is mainly characterized by tremendous amount of data that is composed of different forms. It also deals with the rapid data flow rate that is generated from multiple sources, and to top it off the quality of the data is questionable. Data mining (DM) approach consumes significantly less time, provides higher accuracy, and prevents personal subjective decisions. The paper evaluates seven data mining algorithms with real patients dataset. It includes more than 28,000 cases for a period of five years. The modeling process considers the latest definition of the Centers for Disease Control and Prevention (CDC), published in January 2019. The model is evaluated through calculations of different assessment factors such as accuracy, computation speed, and precision (true positive and true negative). The research results show the best suitable algorithm is Naïve Bayes. It overcomes the other data mining techniques utilized in similar works.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131300680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving QoS in Wireless Mesh Networks Using Heterogeneous and Hybrid Scheduling Design Approaches","authors":"S. Sheikh, R. Wolhuter, H. Engelbrecht","doi":"10.1109/CAIS.2019.8769568","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769568","url":null,"abstract":"Wireless mesh networks (WMNs) offer low deployment costs and the potential to be implemented in smart rural applications where cost is a major concern. These applications generate heterogeneous data with different priorities. Carrier sense multiple access with collision avoidance (CSMA/CA) is widely used in WMNs due to the lack of a central controller for scheduling. In multi-domain networks, gateway devices are subjected to higher load levels. Since data is carried in a multi-hop fashion in WMNs, an increase in contention is observed, which results in an increase in collisions compared to single-hop networks. Enhanced distributed channel access (EDCA) was developed to provide quality of service (QoS) for multimedia traffic in single-hop networks. EDCA is known to starve lower-priority data in high-load scenarios. We propose to address these performance degradation issues through a proposed queue load control priority (QLCP) scheduling strategy, as well as through hybrid design networks, by configuring different scheduling strategies to edge and core nodes. Our results show that QLCP works best in edge nodes in hybrid networks with distributed coordination function (DCF) in the core nodes and that choice of an appropriate scheduling strategy can have a significant impact on the QoS achievable in WMNs.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"183 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131653781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hemyan Abdullah AlBuainain, Sarah Nawaf AlMelihi, Sarah Ali AlKhaidi, Rahaf AlZahrani, Amani Ali AlQahtani
{"title":"Human Computer Interaction Study on Fujifilm Instax Mini 8 Camera Using Evaluation Techniques","authors":"Hemyan Abdullah AlBuainain, Sarah Nawaf AlMelihi, Sarah Ali AlKhaidi, Rahaf AlZahrani, Amani Ali AlQahtani","doi":"10.1109/CAIS.2019.8769461","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769461","url":null,"abstract":"Usability are essential factors to consider when evaluating and improving the operation and interface of a system in order to enhance the interaction between users and system. Based on considering the perspective of both users and evaluators. The aim of this paper is to improve the interaction between the user and the Fujifilm instax mini 8 camera and make it more usable by making the process of dealing with the camera, taking pictures and printing them simpler and easier, by modifying the user interface and evaluating the interaction between the user and the camera interface. So, we used two methods one of them by user based on Laboratory Study and Questionnaire and the other was from expert based on cognitive walkthrough where the expert evaluates the ability of users to accomplish the right effect by asking four questions. The usability problems were specified by the evaluators and they have given some recommendations that might improve the user interface and make the process simpler and easier.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Feature Selection Methods for Classifying Arabic Texts","authors":"R. Elhassan, Mahmoud Ali","doi":"10.1109/CAIS.2019.8769526","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769526","url":null,"abstract":"Text classification becomes the most important research issues and common technique in data mining and its main challenge is the high dimensionality problem where the feature space of the documents is very huge with redundancy and noisy data. Feature selection aims to enhance the accuracy of the classifier by reduce the dimensionality in that space. Due to its richness, Arabic text classification consider as the most language with high dimensionality. This paper aims to study the effectiveness of using feature selection techniques to enhance the Arabic text classifiers performance. Two feature selection techniques: InfoGain and Chi-square statistic (CHI) and two machines supervised machine learning models were investigated. The results showed that the feature selection enhances the performance of the modes. InfoGain feature selection technique outperforms the Chi-Square Statistic (CHI) feature selection technique when implemented the NB classifier and worked equally when implemented SMO classifier.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125607529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Claudio Ratke, Helcio Hoffmann, T. Gaspar, Pedro Edmundo Floriani
{"title":"Effort Estimation using Bayesian Networks for Agile Development","authors":"Claudio Ratke, Helcio Hoffmann, T. Gaspar, Pedro Edmundo Floriani","doi":"10.1109/CAIS.2019.8769455","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769455","url":null,"abstract":"This article proposes an automatic method to estimate the effort of development based on narrative texts. Narrative used the agile method. We propose techniques of symbolic analysis of natural language were used for extraction of verbs and nouns, and verbal reduction (verbs in infinitive), and the standardization of keywords through synonyms. For the machine learning was used if the naive Bayesian classifier model. Apply and test the model in real environment that used the narratives in the Portuguese language in the form of BDD (Behavior Driven Development). In these tests, obtaining an accuracy of 83% in the estimates of the story points.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122199893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Subhi Abdalkafor, Emad Tariq Allawi, Khalid W. Al-Ani, Aiman Majid Nassar
{"title":"A Novel Database for Arabic Handwritten Recognition (NDAHR) System","authors":"Ahmed Subhi Abdalkafor, Emad Tariq Allawi, Khalid W. Al-Ani, Aiman Majid Nassar","doi":"10.1109/CAIS.2019.8769580","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769580","url":null,"abstract":"Any proposed system for Arabic handwriting recognition systems requires a real and substantial database. In this paper, A Novel Database for Arabic Handwritten Recognition (NDAHR) is designed as it contains all sets of Arabic language. The original form of the proposed database consists of 6 pages, 24, 23, and 14 shapes in each page and 123 in overall of pages written by 100 writers divided into two groups. The first group consisted of faculty members and students in two universities in Iraq. The second group included employees in some government departments and some primary and secondary school students. After scanning all the forms by a high-quality scanner, we applied the cropping process using the Adobe Photoshop program to cut all images and classify them into different sets and then apply some methods of preprocessing to enhance the images. The collected database contains 61500 images divided into two groups: 80% training and 20% testing.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126814471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Skin Cancer Monitoring Project","authors":"Wafa Matar A Alharbi","doi":"10.1109/CAIS.2019.8769479","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769479","url":null,"abstract":"Skin Cancer (SC) is a major health problem in Australia. It is a syndrome which infects the Cells of our skin that is affected principally to Ultraviolet Radiation (UVR) rays. The SC that happens in Australia has three foremost arrangements which are termed permitting to the cells that are affected: Basal Cell Carcinoma (BCC), Squamous Cell Carcinoma (SCC) and Melanoma are also renowned as the poisonous form of SC. Normally, BCC and SCC are also known as non-melanoma SC.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113997688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}