S. AlDakhil, Ebtehal Al Taleb, Munirah Al Ghamlas, Shiroq Al-Megren
{"title":"Assessing the Usability of a Tangible Educational Game for Children","authors":"S. AlDakhil, Ebtehal Al Taleb, Munirah Al Ghamlas, Shiroq Al-Megren","doi":"10.1109/CAIS.2019.8769450","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769450","url":null,"abstract":"This paper presents the experience and results aimed to evaluate the user experience of children when they interact with a tangible educational application. The main goal was to create a usability study on the Osmo Genius Kit, observe children's experience while playing and assess the overall effectiveness of the game. Twelve children (6 girls and 6 boys) between the ages of 10 and 12 were observed on how they interact with three games (Numbers, Words, and Tangram). Two types of questionnaires (pre- and post-test questionnaires), combined with an interview, were designed. Moreover, smiley faces were used as scales to measure the answers for each participant. Overall, all children enjoyed playing the Osmo game. However, the results confirm that 42% of the participants experienced difficulty in playing with tangible pieces. In addition, boys are slightly better than girls, as they commit fewer errors, and they are generally more skillful than girls in most of the games.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129957629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alfonso González-Briones, José A. Castellanos-Garzón, Yeray Mezquita-Martín, Javier Prieto, J. Corchado
{"title":"A multi-agent system framework for autonomous crop irrigation","authors":"Alfonso González-Briones, José A. Castellanos-Garzón, Yeray Mezquita-Martín, Javier Prieto, J. Corchado","doi":"10.1109/CAIS.2019.8769456","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769456","url":null,"abstract":"This article presents the design and development of an innovative multi-agent system (MAS) composed of various subsystems of agents grouped by similarity in their tasks. The proposed MAS will manage the information captured from wireless sensor networks for knowledge discovery and decision making in rural environments on actuator networks. The proposed MAS has been built on the Cloud Computing paradigm to provide greater flexibility and scalability in the management of both small and large projects. The use of these “intelligent” technologies in rural areas can improve the efficiency and effectiveness of agricultural production systems, analyzing the data collected by sensors, extracting patterns to predict events affecting the crop and anticipate such events giving localized responses with automated actuators. The proposed architecture has been tested in an agricultural environment in order to optimize irrigation in a corn crop. Thanks to the wireless sensor network (WSN), information has been obtained about the terrain of the crop and its climatic conditions, extracting information about the needs of cultivated corn and taking efficient irrigation decisions based on those needs, reducing water consumption by 17.16% compared to traditional automotive irrigation.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130121520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Round Robin Scheduling Algorithm in CPU and Cloud Computing: A review","authors":"T. Balharith, F. Alhaidari","doi":"10.1109/CAIS.2019.8769534","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769534","url":null,"abstract":"The Round Robin algorithm is considered as one of the most common scheduling algorithms due to its simplicity and fairness. It is applied in many fields to improve system performance. In this paper, we conducted a review on how the researchers applied the RR algorithm in the CPU scheduling as well as in the cloud computing environment. Many researchers proposed various techniques in order to improve the RR algorithm and selecting the optimal time quantum which plays a vital role to enhance this algorithm. This paper presents a review and new classification on these techniques. Studies have been classified into two categories: RR based on static quantum, and RR based on dynamic quantum. Furthermore, the second category was divided into dynamic quantum for each round and dynamic quantum for each process. Moreover, an analytical comparison has been provided. This review can be a strong starting point for researchers who seek to enhance or optimize RR algorithm or either apply it in other fields.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129375806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Retransmission Scheme Multihop WiMAX Networks","authors":"F. E. Ismael, Sarah Mustafa Eljack Babiker","doi":"10.1109/CAIS.2019.8769485","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769485","url":null,"abstract":"IEEE 802.16j Mobile Multi-hop Relay (MMR) WiMAX network uses Relay Station (RS) to extend the cell coverage area and enhances the link quality and hence the throughput. It allows the number of hops between the SS and the BS to be more than two hops when Non-Transparent RS (NT-RS) is used. Automatic Repeat reQuest (ARQ) protocol is applied to the MAC layer to enhance the wireless link through retransmitting the corrupted packets. The sender realizes that the packet is lost either when it receives negative feedback from the receiver or when the waiting retry timeout is expired. However, when MMR WiMAX is considered, this requires modification to the ARQ retry timeout in order to enhance the link layer and TCP performances. Therefore, this paper presents hop aware ARQ retry timeout adjustment. The proposed scheme aims to decrease the delay of error recovery caused by long retry timeout and avoid un-necessary retransmission due to short retry timeout. The performances of the proposed schemes are simulated using TCP traffic. The results showed that the link layer and TCP performances are improved significantly.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131461253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mona M. Almutairi, Nada Alhamad, Albandari Alyami, Zainab Alshobbar, H. Alfayez, Noor Al-Akkas, Jamal Alhiyafi, S. Olatunji
{"title":"Preemptive Diagnosis of Schizophrenia Disease Using Computational Intelligence Techniques","authors":"Mona M. Almutairi, Nada Alhamad, Albandari Alyami, Zainab Alshobbar, H. Alfayez, Noor Al-Akkas, Jamal Alhiyafi, S. Olatunji","doi":"10.1109/CAIS.2019.8769513","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769513","url":null,"abstract":"Schizophrenia is a severe chronic mental disorder, which affects the behavior, the perception and the thinking of the patient. The purpose of this research is to develop a predictive system to preemptively diagnose Schizophrenia Disease using computational intelligence-based techniques. The system will show the possibilities of getting the disease at an early stage, which will improve the health state of the patients. This will be done using machine learning techniques. The used dataset has 86 records, which was obtained from the Machine Learning for Signal Processing (MLSP) 2014 Schizophrenia Classification Kaggle Challenge. The used techniques in this paper are Support Vector Machine (SVM), Random Forest (RF), Artificial Neural Network (ANN), and Naive Bayesian (NB). The highest accuracy was 90.6977% reached by using SVM, RF, and NB techniques while ANN technique reached 88.3721% accuracy. The obtained accuracies are reached by using 204 features. Therefore, we conclude that using SVM, RF, and NB techniques are better in this particular problem.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121798216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Shalash, Azzah A. Alzahrani, Seham Hamad Al-Nufaii
{"title":"Crowd Detection Management System","authors":"W. Shalash, Azzah A. Alzahrani, Seham Hamad Al-Nufaii","doi":"10.1109/CAIS.2019.8769566","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769566","url":null,"abstract":"Smart cities aim not only to make people's lives more enjoyable but also safer using advanced technology. Being in a crowded community spaces such as schools, colleges, stadiums, subway stations or holy spots on Pilgrimage impacts not only the level of human convenience but above all the threat of human security. An abnormal crowd conduct can lead to push, mass panic, stampede, crowd-crush, and causing an overall control loss. The current work introduced a mobile-based crowd abnormal behavior detection and management system. The system consists of two main parts; firstly, the server-side application connected to IP surveillance camera(s) to detect any abnormal crowd behavior and also crowd level in the entrance gates location(s), while the second main part is a mobile application with different users rights to receive an alarm from the server-side application in case of increasing crowd level or abnormal movement. The suggested framework provides an effective method to connect and alert all the system users immediately, preventing danger resulting from abnormal crowd behavior.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sultan Alanazi, Nibras Abdullah, M. Anbar, O. A. Al-wesabi
{"title":"Evaluation Approaches of Service Oriented Architecture (SOA) - A Survey","authors":"Sultan Alanazi, Nibras Abdullah, M. Anbar, O. A. Al-wesabi","doi":"10.1109/CAIS.2019.8769543","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769543","url":null,"abstract":"In Computer Science field, there are many established tools and methods to evaluate and test the software don't work well with all the systems, especially the systems that are created up for the services. For instance, for the systems integrators and the users, the service is just an interface. This shackle white box method that based on data flow knowledge and code structure. The lack of accessing the source code prevents the approaches that depend seeding the code with errors like classical mutation-testing approaches. Therefore, service-oriented system evaluation has been a challenge. There is many existing evaluation metrics, but none is efficient to perform a complete and effective evaluation. This survey paper discusses different evaluation methods for SOA software's, and then it summarizes their support and limitation in context of SOA's.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126715929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Alshahrani, Mohammed Basheri, Abdulaziz E. Aljohani
{"title":"Personalized Virtual Keyboard for Multi-Touch Tables","authors":"A. Alshahrani, Mohammed Basheri, Abdulaziz E. Aljohani","doi":"10.1109/CAIS.2019.8769528","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769528","url":null,"abstract":"Multi-touch tables provide a high-level collaborative workspace for multiple users around a physical surface. Users sit and work together to perform different tasks. There is no intermediate device between the users and tablet. Users can select and manipulate digital contents using fingers gestures and virtual keyboards. Virtual keyboard still have limitations that can adversely affect the quality and speed of typing on multi-touch table. For multi-touch tablets, small keys and a lack of tactile feedback make text entry with a virtual keyboard difficult, and the zoom and rotation properties exacerbate the problem. Inserting text quickly and accurately is still a challenge on a multi-touch-table. Our paper introduces a new virtual keyboard design, MT-TYPEHEX, which overcomes some of these limitations, increases the efficiency of human interaction with touch screens, and improves performance and productivity in cooperative work. After describing the MT-TYPEHEX, we will make a comparative study between a conventional virtual keyboard (QWERTY) and the MT-TYPEHEX keyboard by conducting experiments to evaluate their performance and error rates. We will also evaluate the user experience by administering questionnaires. From the final results of this comparative study, we will determine which keyboard is the most effective.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124349408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramadan Gad, A. A. Abd El-Latif, S. Elseuofi, H. M. Ibrahim, M. Elmezain, Wael Said
{"title":"IoT Security Based on Iris Verification Using Multi-Algorithm Feature Level Fusion Scheme","authors":"Ramadan Gad, A. A. Abd El-Latif, S. Elseuofi, H. M. Ibrahim, M. Elmezain, Wael Said","doi":"10.1109/CAIS.2019.8769483","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769483","url":null,"abstract":"Internet of Things (IoT) have very big opportunities in businesses and life, especially Internet Banking, Healthcare and Transportation. But developers face challenges in security especially for sensitive data to use IoT safely with Internet Banking. In this paper, a secure IoT connection between clients and broker server based on iris recognition system (Authentication server) will be proposed. The proposed iris recognition system will communicate with MQTT broker server to increase authentication instead of using normal text method (username/password). The proposed authentication server in this paper is to use iris as uni-modal biometric trait, by applying different scenarios of multi-biometrics other than the multimodal, to develop and implement iris-based recognition system. In feature extraction phase, the fusion between vectors of Delta-Mean (DM) and Multi-Algorithm-Mean (MAM) executed in a parallel mode. Then, followed by the proposed reduction method, reduced the feature vector size keeping higher performance. Finally, classification is adopted by using Euclidian Distance (ED) classifier. It is suitable for secure MQTT connection message to authenticate right client in sensitive application like bank transfer operations.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114891011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State-of-the-art review on Twitter Sentiment Analysis","authors":"N. Alshammari, Amal Almansour","doi":"10.1109/CAIS.2019.8769465","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769465","url":null,"abstract":"In the last few years, Twitter becomes the most popular platform for individuals to share their experiences and viewpoints towards different products and services. Therefore, it attracts a lot of researchers to use it as a body for sentiment analysis and opinion mining research studies. Most of the previous research studies in this area have been using the traditional machine learning-based and lexicon-based approaches more compared to the deep learning approach to classify the emotional states of English tweets. Also, there is a shortage of research studies that categorize the opinion orientations of tweets in other languages such as Arabic. Recently, deep learning approach has achieved remarkable results over the traditional machine learning algorithms in analyzing a massive amount of data as the case with social networks data. In this research study, we seek to discuss the state-of-the-art of sentiment analysis methodologies used to classify tweets' sentiment orientation and challenges that need to be addressed. Also, this paper provides an overview of deep learning approach and question if this approach can be adopted to improve the classification accuracy of sentiment analysis for both English and Arabic tweets.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128086207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}