2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

筛选
英文 中文
Secure and Scalable Trust Management Model for IoT P2P Network 安全可扩展的物联网P2P网络信任管理模型
Rzan Tarig Frahat, Muhammed Mostafa Monowar, S. Buhari
{"title":"Secure and Scalable Trust Management Model for IoT P2P Network","authors":"Rzan Tarig Frahat, Muhammed Mostafa Monowar, S. Buhari","doi":"10.1109/CAIS.2019.8769467","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769467","url":null,"abstract":"IoT trust management is a security solution that assures the trust between different IoT entities before establishing any relationship with other anonymous devices. Recent researches presented in the literature tend to use a Blockchain-based trust management model for IoT besides the fog node approach in order to address the constraints of IoT resources. Actually, Blockchain has solved many drawbacks of centralized models. However, it is still not preferable for dealing with massive data produced by IoT because of its drawbacks such as delay, network overhead, and scalability issues. Therefore, in this paper we define some factors that should be considered when designing scalable models, and we propose a fully distributed trust management model for IoT that provide a large-scale trust model and address the limitations of Blockchain. We design our model based on a new approach called Holochain considering some security issues, such as detecting misbehaviors, data integrity and availability.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130191832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Gender Differences in Students' Continuous Adoption of Mobile Learning in Saudi Higher Education 沙特高等教育中学生持续采用移动学习的性别差异
Salma A. Albelali, Abdullah Al-Aulamie
{"title":"Gender Differences in Students' Continuous Adoption of Mobile Learning in Saudi Higher Education","authors":"Salma A. Albelali, Abdullah Al-Aulamie","doi":"10.1109/CAIS.2019.8769554","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769554","url":null,"abstract":"With the rapid advance in the internet, mobile information systems have turned into a promised sector within the universal information and communication technology. Saudi ministry of higher education exerts effort to integrate IS and technology into learning especially with the Saudi vision 2030 toward knowledge investment. However, it has been observed that researches overlook the investigation of gender differences in the continuous adoption of M-learning. This study aims to examine the effect of gender on student's perceptions and evaluations of M-learning systems. A total of 640 subjects participated in the experiment. The data analysis illustrates females and males had significant differences among four hypotheses. Males' continuance intention toward using M-learning was stronger than females. Females' attitude towards extrinsic motivations was stronger than males. This study discussed the implications of the results and provided recommendations to enhance students' continuance intention to use M-learning by considering the moderating effect of gender.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132625724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
HealthSEA: Towards Improving the Search Engine of KAAHE Arabic Health Encyclopedia HealthSEA:对KAAHE阿拉伯语健康百科全书搜索引擎的改进
Nora Madi, Nourah Al-Mutlaq, Hend Suliman Al-Khalifa
{"title":"HealthSEA: Towards Improving the Search Engine of KAAHE Arabic Health Encyclopedia","authors":"Nora Madi, Nourah Al-Mutlaq, Hend Suliman Al-Khalifa","doi":"10.1109/CAIS.2019.8769488","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769488","url":null,"abstract":"KAAHE is an online Arabic Health Encyclopedia that received tremendous efforts in promoting health awareness and, consequently, was awarded with multiple national certifications. However, the website's search engine does not come up to its high standards. Therefore, in this paper, we experiment with combinations of stemming and query expansion on articles collected from KAAHE, in order to create an improved Arabic Health Encyclopedia Search Engine (HealthSEA).","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132293655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IM/DD-OFDM Modem Based on Adaptive Equalization 基于自适应均衡的IM/DD-OFDM调制解调器
S. Mhatli, A. Aldalbahi, M. Jasim
{"title":"IM/DD-OFDM Modem Based on Adaptive Equalization","authors":"S. Mhatli, A. Aldalbahi, M. Jasim","doi":"10.1109/CAIS.2019.8769569","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769569","url":null,"abstract":"In this paper, the performance of different nonlinear electrical compensation techniques is evaluated. The goal is to enhance the transmission quality of intensity modulation (IM) and direct detection (DD) optical orthogonal frequency division multiplexing (OOFDM). The overall performance results are compared versus linear compensator equalizers. Also, studies here include the looking at the capability of Volterra based electrical equalizers for transmitted signal recovery.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An application for Cultural Heritage using a Chatbot 一个使用聊天机器人的文化遗产应用程序
M. Lombardi, F. Pascale, D. Santaniello
{"title":"An application for Cultural Heritage using a Chatbot","authors":"M. Lombardi, F. Pascale, D. Santaniello","doi":"10.1109/CAIS.2019.8769525","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769525","url":null,"abstract":"Italy is one of the nations in the world with the largest number of archaeological sites. Every year millions of tourists visit the Italian peninsula to come and see the wonders that the country offers. Nowadays, many technologies are used to help and simplify the process of finding the information related to a specific archaeological site. Just think of all the applications like the Artificial Vision, the Interactive Information Systems and Context Aware technologies. In this scenario, support and recommendation systems are becoming more and more present. in fact, thanks to the use of automatic assistants, it is possible to help the tourist in the most disparate situations such as getting the right information at the right time or helping him make decisions about what to do. In this context it is possible to introduce a Chatbot systems to support users to provide right information in the right moment. In this paper a Chatbot system able to provide contextual information to users is described through semantic analysis, into an archeological park.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
On the Impact of Product Usability on CT Scan Scheduling: The Case of Saudi Hospitals 产品可用性对CT扫描调度的影响:以沙特医院为例
Saad Aldoihi, Omar Hammami
{"title":"On the Impact of Product Usability on CT Scan Scheduling: The Case of Saudi Hospitals","authors":"Saad Aldoihi, Omar Hammami","doi":"10.1109/CAIS.2019.8769469","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769469","url":null,"abstract":"Product usability has been subjected to many evaluation techniques. Many evaluation techniques use heuristics approach to evaluate the overall usability of the product. Considering heuristics works in some particular examples, In the healthcare sector, heuristics approach is hard to implement due to fundamental constraints (stakeholders, safety, and time requirements). This paper examines a scheduling algorithm that correlates to usability problem. The scheduling algorithm has a definite impact on the product Return of investment and customer satisfaction.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115375490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Energy ECG Processing for Accurate Features' Extraction in Wireless Body Sensor Networks 无线身体传感器网络中低能量心电处理的准确特征提取
Mohammed A AlDammas, ElHedi Tabbabi, A. Soudani
{"title":"Low-Energy ECG Processing for Accurate Features' Extraction in Wireless Body Sensor Networks","authors":"Mohammed A AlDammas, ElHedi Tabbabi, A. Soudani","doi":"10.1109/CAIS.2019.8769544","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769544","url":null,"abstract":"Wireless body sensor networks (WBSNs) represent an attractive low-cost infrastructure for e-health applications. In depth, these wireless tiny devices can be deployed to gather, to process and transmit bio-signals providing remote real-time monitoring of patient health signs. Among applications that can be implemented using these sensors, the ECG signal processing for features' extraction to detect arrhythmia disease is attracting the focus of several recent research activities. In this context, the detection of Atrial Fibrillation episodes in ECG signal requires accurate analysis of RR irregularity and efficient detection of the absence of P-waves. However, the weak processing bandwidth and the limited energy in these sensors strongly limit their adequacy to be deployed for such application. This paper focuses on the design of a low-energy ECG processing scheme, for WBSN implementation, that accurately extracts the relevant ECG features required for atrial fibrillation detection and notify a remote server. The paper presents the performance analysis of this approach and shows the efficiency of the proposed scheme for energy aware ECG processing and its adequacy to be implemented in WBSN.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dental Pager: Interactive Mobile Application to Enhance Supervision of Dental Colleges Students 牙科寻呼机:交互式手机应用程序,以加强对牙科院校学生的监督
F. A. Alqarni, Raghad A. Almulla, Rana Alqahtani, E. A. Almubarak, Yasser A. Bamarouf, Ruba Alsalah, Samiha Brahimi, Gomathi Krishnasamy, A. M. Alghamdi
{"title":"Dental Pager: Interactive Mobile Application to Enhance Supervision of Dental Colleges Students","authors":"F. A. Alqarni, Raghad A. Almulla, Rana Alqahtani, E. A. Almubarak, Yasser A. Bamarouf, Ruba Alsalah, Samiha Brahimi, Gomathi Krishnasamy, A. M. Alghamdi","doi":"10.1109/CAIS.2019.8769593","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769593","url":null,"abstract":"Nowadays, technology and mobile applications have become involved in various areas of life. Therefore, the need for applications in areas such as healthcare is significant. A survey was conducted at the College of Dentistry in Imam Abdulrahman bin Faisal University. Survey results of this academic environment show a need for a system to link dental students with supervisors. Current commercially available off-the-shelf applications do not cater for all requirements. This paper proposes a solution that supports the interaction between the supervisor, and the student at the College. However, such a system can be extended to work in other dental colleges within the Kingdom of Saudi Arabia and beyond.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics 移动取证中Android手机root对用户数据完整性的影响
Tahani Almehmadi, O. Batarfi
{"title":"Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics","authors":"Tahani Almehmadi, O. Batarfi","doi":"10.1109/CAIS.2019.8769520","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769520","url":null,"abstract":"Modern cellular phones are potent computing devices, and their capabilities are constantly progressing. The Android operating system (OS) is widely used, and the number of accessible apps for Android OS phones is unprecedented. The increasing capabilities of these phones imply that they have distinctive software, memory designs, and storage mechanisms. Furthermore, they are increasingly being used to commit crimes at an alarming rate. This aspect has heightened the need for digital mobile forensics. Because of the rich user data they store, they may be relevant in forensic investigations, and the data must be extracted. However, as this study will show, most of the available tools for mobile forensics rely greatly on rooted (Android) devices to extract data. Rooting, as some of the selected papers in this research will show, poses a key challenge for forensic analysts: user data integrity. Rooting per se, as will be seen, is disadvantageous. It is possible for forensic analysts to extract useful data from Android phones via rooting, but the user data integrity during data acquisition from Android devices is a prime concern. In suggesting an alternative rooting technique for data acquisition from an Android handset, this paper determines whether rooting is forensically sound. This is particularly due to the device's modification, which a root often requires, that may violate the data integrity.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125137964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information Security:A Review of Information Security Issues and Techniques 信息安全:信息安全问题与技术综述
Fatimah Alkhudhayr, Shouq Alfarraj, Buthina Aljameeli, Salim Elkhdiri
{"title":"Information Security:A Review of Information Security Issues and Techniques","authors":"Fatimah Alkhudhayr, Shouq Alfarraj, Buthina Aljameeli, Salim Elkhdiri","doi":"10.1109/CAIS.2019.8769504","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769504","url":null,"abstract":"Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured. Therefore, protecting corporations' information becomes more important, and information security is essential to maintain. Information security is defined as protecting the information, the system, and the hardware that use, store and transmit the information, to ensure integrity, confidentiality and availability of data and operation procedures are protected. In this paper, we illustrate the factors that impact information security in different fields; cyber security, Internet of Things and network security from various studies and outline the security requirements to reduce this impact.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信