Rzan Tarig Frahat, Muhammed Mostafa Monowar, S. Buhari
{"title":"Secure and Scalable Trust Management Model for IoT P2P Network","authors":"Rzan Tarig Frahat, Muhammed Mostafa Monowar, S. Buhari","doi":"10.1109/CAIS.2019.8769467","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769467","url":null,"abstract":"IoT trust management is a security solution that assures the trust between different IoT entities before establishing any relationship with other anonymous devices. Recent researches presented in the literature tend to use a Blockchain-based trust management model for IoT besides the fog node approach in order to address the constraints of IoT resources. Actually, Blockchain has solved many drawbacks of centralized models. However, it is still not preferable for dealing with massive data produced by IoT because of its drawbacks such as delay, network overhead, and scalability issues. Therefore, in this paper we define some factors that should be considered when designing scalable models, and we propose a fully distributed trust management model for IoT that provide a large-scale trust model and address the limitations of Blockchain. We design our model based on a new approach called Holochain considering some security issues, such as detecting misbehaviors, data integrity and availability.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130191832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gender Differences in Students' Continuous Adoption of Mobile Learning in Saudi Higher Education","authors":"Salma A. Albelali, Abdullah Al-Aulamie","doi":"10.1109/CAIS.2019.8769554","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769554","url":null,"abstract":"With the rapid advance in the internet, mobile information systems have turned into a promised sector within the universal information and communication technology. Saudi ministry of higher education exerts effort to integrate IS and technology into learning especially with the Saudi vision 2030 toward knowledge investment. However, it has been observed that researches overlook the investigation of gender differences in the continuous adoption of M-learning. This study aims to examine the effect of gender on student's perceptions and evaluations of M-learning systems. A total of 640 subjects participated in the experiment. The data analysis illustrates females and males had significant differences among four hypotheses. Males' continuance intention toward using M-learning was stronger than females. Females' attitude towards extrinsic motivations was stronger than males. This study discussed the implications of the results and provided recommendations to enhance students' continuance intention to use M-learning by considering the moderating effect of gender.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132625724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HealthSEA: Towards Improving the Search Engine of KAAHE Arabic Health Encyclopedia","authors":"Nora Madi, Nourah Al-Mutlaq, Hend Suliman Al-Khalifa","doi":"10.1109/CAIS.2019.8769488","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769488","url":null,"abstract":"KAAHE is an online Arabic Health Encyclopedia that received tremendous efforts in promoting health awareness and, consequently, was awarded with multiple national certifications. However, the website's search engine does not come up to its high standards. Therefore, in this paper, we experiment with combinations of stemming and query expansion on articles collected from KAAHE, in order to create an improved Arabic Health Encyclopedia Search Engine (HealthSEA).","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132293655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IM/DD-OFDM Modem Based on Adaptive Equalization","authors":"S. Mhatli, A. Aldalbahi, M. Jasim","doi":"10.1109/CAIS.2019.8769569","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769569","url":null,"abstract":"In this paper, the performance of different nonlinear electrical compensation techniques is evaluated. The goal is to enhance the transmission quality of intensity modulation (IM) and direct detection (DD) optical orthogonal frequency division multiplexing (OOFDM). The overall performance results are compared versus linear compensator equalizers. Also, studies here include the looking at the capability of Volterra based electrical equalizers for transmitted signal recovery.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An application for Cultural Heritage using a Chatbot","authors":"M. Lombardi, F. Pascale, D. Santaniello","doi":"10.1109/CAIS.2019.8769525","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769525","url":null,"abstract":"Italy is one of the nations in the world with the largest number of archaeological sites. Every year millions of tourists visit the Italian peninsula to come and see the wonders that the country offers. Nowadays, many technologies are used to help and simplify the process of finding the information related to a specific archaeological site. Just think of all the applications like the Artificial Vision, the Interactive Information Systems and Context Aware technologies. In this scenario, support and recommendation systems are becoming more and more present. in fact, thanks to the use of automatic assistants, it is possible to help the tourist in the most disparate situations such as getting the right information at the right time or helping him make decisions about what to do. In this context it is possible to introduce a Chatbot systems to support users to provide right information in the right moment. In this paper a Chatbot system able to provide contextual information to users is described through semantic analysis, into an archeological park.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Impact of Product Usability on CT Scan Scheduling: The Case of Saudi Hospitals","authors":"Saad Aldoihi, Omar Hammami","doi":"10.1109/CAIS.2019.8769469","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769469","url":null,"abstract":"Product usability has been subjected to many evaluation techniques. Many evaluation techniques use heuristics approach to evaluate the overall usability of the product. Considering heuristics works in some particular examples, In the healthcare sector, heuristics approach is hard to implement due to fundamental constraints (stakeholders, safety, and time requirements). This paper examines a scheduling algorithm that correlates to usability problem. The scheduling algorithm has a definite impact on the product Return of investment and customer satisfaction.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115375490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-Energy ECG Processing for Accurate Features' Extraction in Wireless Body Sensor Networks","authors":"Mohammed A AlDammas, ElHedi Tabbabi, A. Soudani","doi":"10.1109/CAIS.2019.8769544","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769544","url":null,"abstract":"Wireless body sensor networks (WBSNs) represent an attractive low-cost infrastructure for e-health applications. In depth, these wireless tiny devices can be deployed to gather, to process and transmit bio-signals providing remote real-time monitoring of patient health signs. Among applications that can be implemented using these sensors, the ECG signal processing for features' extraction to detect arrhythmia disease is attracting the focus of several recent research activities. In this context, the detection of Atrial Fibrillation episodes in ECG signal requires accurate analysis of RR irregularity and efficient detection of the absence of P-waves. However, the weak processing bandwidth and the limited energy in these sensors strongly limit their adequacy to be deployed for such application. This paper focuses on the design of a low-energy ECG processing scheme, for WBSN implementation, that accurately extracts the relevant ECG features required for atrial fibrillation detection and notify a remote server. The paper presents the performance analysis of this approach and shows the efficiency of the proposed scheme for energy aware ECG processing and its adequacy to be implemented in WBSN.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. A. Alqarni, Raghad A. Almulla, Rana Alqahtani, E. A. Almubarak, Yasser A. Bamarouf, Ruba Alsalah, Samiha Brahimi, Gomathi Krishnasamy, A. M. Alghamdi
{"title":"Dental Pager: Interactive Mobile Application to Enhance Supervision of Dental Colleges Students","authors":"F. A. Alqarni, Raghad A. Almulla, Rana Alqahtani, E. A. Almubarak, Yasser A. Bamarouf, Ruba Alsalah, Samiha Brahimi, Gomathi Krishnasamy, A. M. Alghamdi","doi":"10.1109/CAIS.2019.8769593","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769593","url":null,"abstract":"Nowadays, technology and mobile applications have become involved in various areas of life. Therefore, the need for applications in areas such as healthcare is significant. A survey was conducted at the College of Dentistry in Imam Abdulrahman bin Faisal University. Survey results of this academic environment show a need for a system to link dental students with supervisors. Current commercially available off-the-shelf applications do not cater for all requirements. This paper proposes a solution that supports the interaction between the supervisor, and the student at the College. However, such a system can be extended to work in other dental colleges within the Kingdom of Saudi Arabia and beyond.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics","authors":"Tahani Almehmadi, O. Batarfi","doi":"10.1109/CAIS.2019.8769520","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769520","url":null,"abstract":"Modern cellular phones are potent computing devices, and their capabilities are constantly progressing. The Android operating system (OS) is widely used, and the number of accessible apps for Android OS phones is unprecedented. The increasing capabilities of these phones imply that they have distinctive software, memory designs, and storage mechanisms. Furthermore, they are increasingly being used to commit crimes at an alarming rate. This aspect has heightened the need for digital mobile forensics. Because of the rich user data they store, they may be relevant in forensic investigations, and the data must be extracted. However, as this study will show, most of the available tools for mobile forensics rely greatly on rooted (Android) devices to extract data. Rooting, as some of the selected papers in this research will show, poses a key challenge for forensic analysts: user data integrity. Rooting per se, as will be seen, is disadvantageous. It is possible for forensic analysts to extract useful data from Android phones via rooting, but the user data integrity during data acquisition from Android devices is a prime concern. In suggesting an alternative rooting technique for data acquisition from an Android handset, this paper determines whether rooting is forensically sound. This is particularly due to the device's modification, which a root often requires, that may violate the data integrity.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125137964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security:A Review of Information Security Issues and Techniques","authors":"Fatimah Alkhudhayr, Shouq Alfarraj, Buthina Aljameeli, Salim Elkhdiri","doi":"10.1109/CAIS.2019.8769504","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769504","url":null,"abstract":"Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured. Therefore, protecting corporations' information becomes more important, and information security is essential to maintain. Information security is defined as protecting the information, the system, and the hardware that use, store and transmit the information, to ensure integrity, confidentiality and availability of data and operation procedures are protected. In this paper, we illustrate the factors that impact information security in different fields; cyber security, Internet of Things and network security from various studies and outline the security requirements to reduce this impact.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}