Li Li, Bassem Abd-El-Atty, S. Elseuofi, Basma Abd El-Rahiem, A. A. Abd El-Latif
{"title":"Quaternion and multiple chaotic systems based pseudo-random number generator","authors":"Li Li, Bassem Abd-El-Atty, S. Elseuofi, Basma Abd El-Rahiem, A. A. Abd El-Latif","doi":"10.1109/CAIS.2019.8769495","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769495","url":null,"abstract":"Quaternions are widely used in physics, geometry and image processing, which are hyper-complex numbers applied in three-dimensional space. In this paper, we utilize the benefits of quaternions to present a new PRNG (pseudo-random number generator) algorithm using quaternions and three chaotic systems. The generated sequences yield to a long period and remedy the periodicity problem for cryptographic purposes. The performance of the proposed PRNG method is estimated through several NIST suit statistical analyses. The results demonstrate that the proposed PRNG algorithm has significant qualities for viable applications in security purposes.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a Reference Architecture for NFV","authors":"A. Alwakeel, A. Alnaim, E. Fernández","doi":"10.1109/CAIS.2019.8769449","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769449","url":null,"abstract":"Network Function Virtualization (NFV) is an emerging technology that has drawn the attention of the industry. NFV aims to transform legacy network infrastructure into virtualized networks. Instead of using dedicated hardware and network equipment NFV relies on virtualized components to deliver service to its users. In order to have a better understanding of how NFV works and how can we enhance its performance and security we must have a good understanding of the underlying architecture of NFV. In this paper, we present a UML class diagram for the NFV architecture, which describes the main entities of NFV. Representing the architecture in a class diagram is the first step toward building a Reference Architecture (RA) for NFV, which is our final objective. A Reference Architecture (RA) is a high-level abstraction of a system that can be useful in the implementation of complex systems. Moreover, we also represented some of the main internal components as a class diagram to understand the communication between these components and other system components that together provide the full system. Finally, we describe in detail some of their use cases.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"11 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of Service Performance Evaluation of Next-Generation Network","authors":"F. Bensalah, Ayoub Bahnasse, Mustapha El Hamzaoui","doi":"10.1109/CAIS.2019.8769576","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769576","url":null,"abstract":"Traditional networks have no longer a place among Internet service providers. The telecommunications industry is currently moving towards the trade of Internet services. Next Generation Networks (NGN) are a perfect match for clients' needs in terms of access to new services with better quality of service (QoS). However, with the diversity of QoS mechanisms and transport protocols and unparalleled openness of clients to the new multimedia services, the service provider must evaluate the performance of its architecture with each parameter cited to ensure that the QoS provided meets the clients' requirements. In this paper, we will measure and evaluate the impact various QoS mechanisms on the performances of transported applications under the Riverbed Modeler simulator. The traffic used for the simulations is Voice over IP (VoIP), File Transfer Protocol (FTP) and HTTP applications were used to stress the network. The evaluation criteria are on the jitter, the end-to-end delay, and the VoIP loss rate.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Comparison of WBAN Routing Protocols","authors":"A. S. Alzahrani, K. Almotairi","doi":"10.1109/CAIS.2019.8769594","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769594","url":null,"abstract":"Wireless Body Area Networks (WBANs) are a small network of sensor nodes that are deployed either inside or outside the human body. Due to the limited transmission range and battery constraint in WBAN, the routing protocols will play a very important role in making the communication between the nodes more effective and also prolonging the lifetime of a WBAN. In the last few years, development and evaluation of the routing protocols in WBAN have been an important and attractive research topic, especially for applications in medical monitoring. The selection of WBAN routing algorithms aims to provide a way of communication that has energy efficiency and is consistent and dependable in real-time applications that involve the heterogeneous type of sensor nodes. A diverse range of new routing protocols that are specifically targeted at this environment have been developed, but the information available on the performance of each protocol and the comparisons between their performances is very little. This paper will provide a quantitative analysis comparing the performance of WBAN routing protocols. In this paper, we will out forth the results of detailed simulations that depict the relative performance of the three most recent routing protocols from the five existing routing categories for WBSN (M-ATTEMPT, CICADA, and PRPLC). Those protocols were chosen since they utilize different routing strategies to improve energy efficiency and other requirements. We briefly mention and explain the design of these protocols to help explain their effects on a network. The protocols were carefully implemented according to their specifications published and based on the IEEE 802.15.6 standard. The comparison is done in an OMNeT++ environment and the results of the simulations show that the M-ATTEMPT protocol provides the network stability period as well as good throughput.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116892381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effectiveness of Mixed Reality Environment-Based Hand Gestures in Distributed Collaboration","authors":"Somaya Asiri, Ahmad A. Alzahrani","doi":"10.1109/CAIS.2019.8769588","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769588","url":null,"abstract":"Mixed reality (MR) technologies are widely used in distributed collaborative learning scenarios and have made learning and training more flexible and intuitive. However, there are many challenges in the use of MR due to the difficulty in creating a physical presence, particularly when a physical task is being performed collaboratively. We therefore developed a novel MR system to overcomes these limitations and enhance the distributed collaboration user experience. The primary objective of this paper is to explore the potential of a MR-based hand gestures system to enhance the conceptual architecture of MR in terms of both visualization and interaction in distributed collaboration. We propose a synchronous prototype named MRCollab as an immersive collaborative approach that allows two or more users to communicate with a peer based on the integration of several technologies such as video, audio, and hand gestures.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Safia Nahhas, O. Bamasag, Maher Khemakhem, Nada Bajnaid
{"title":"Leveraging Linked Data to Propel Competency-Based Education Based on Labour Skills","authors":"Safia Nahhas, O. Bamasag, Maher Khemakhem, Nada Bajnaid","doi":"10.1109/CAIS.2019.8769503","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769503","url":null,"abstract":"Recently, there is a debate on the credentials that is more important for the individuals; their education and certificates or their competences and skills. Competency-based education (CBE) is a paradigm that can combine the both benefits. Linked data technology has potentials that help education to be more oriented towards CBE by linking the education with competences fields such as labour. However, that needs the education courses to be updated according to labours' demands which require lifelong learning to make individuals kept up with the emerging competences and technologies. CBE and lifelong learning are related to open education such as OCWs, MOOCs and OERs; since MOOCs for example give the chance to learn from the industry leaders which is very effective for CBE and can be acquired anytime. Also, open education is more responsive to the emerging demands of labour. Based on that, traditional universities have a possibility to update their courses based on the CBE rather than starting from scratch. Therefore, making mutual integration between traditional and open education courses based on labours' competences can offer an opportunity to go towards CBE. In this paper we propose a novel approach to refine education courses to be more oriented towards CBE by this mutuality integration. Input to this approach is the course information and the output is lists of candidate competences concepts that a course designer can use to refine current courses' topics and learning outcomes based on labour skills. Also developing a new metrics is suggested based on conducting some statistics to measure the importance of the concept regarding the CBE and measure how much the whole course is related to the labour needs. Lastly, developing a bridged model based on the competences concepts to be as anchors is suggested to provide links to the related OERs and related courses from MOOCS/OCWs.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127220078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Inkjet-Printed UWB-MIMO Antenna with Band Rejection Capability for Wireless Network Applications","authors":"W. T. Sethi, Khaled Issa, S. Alshebeili","doi":"10.1109/CAIS.2019.8769565","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769565","url":null,"abstract":"In this paper, a Coplanar Waveguide (CPW) fed monopole antenna for Ultra-wideband Multiple-Input-Multiple-Output (UWB-MIMO) having band rejection capability at Wimax/WLAN is presented. Band rejection characteristic is achieved by introducing an inverted U-slot in the bevel shaped monopole radiating patch. The proposed design is printed on a low cost and flexible PET plastic substrate using silver nanoparticle ink. The unit cell design has a compact size of 18 × 18 × 0.145 mm3. It offers −10 dB return loss bandwidth from (3.8 GHz–12 GHz) with band rejection at the IEEE WLAN and Wimax standard bands. Similarly, the 4x4 MIMO differentially fed antenna with orthogonal dual polarized feed maintains the compact size and band rejection capability with dimensions of 40 × 40 × 0.145 mm3. The MIMO antenna demonstrates reflection coefficient less than −10 dB from (3.7 GHz–11.1 GHz). High isolation below −15 dB is observed among the ports. Other important MIMO parameters such as envelop correlation and diversity gain are analyzed and compared. The results achieved make the proposed antenna configurations viable candidates for integration among wireless network devices and applications that utilize the UWB spectrum.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126948169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Fog-Cloud Based Architecture for MIoT","authors":"Tahani Almehmadi, Suhair Alshehri, S. Tahir","doi":"10.1109/CAIS.2019.8769524","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769524","url":null,"abstract":"Medical Internet of Things (MIoT) offers innovative solutions to a healthier life, making radical changes in people's lives. Healthcare providers are enabled to continuously and remotely monitor their patients for many medial issues outside hospitals and healthcare providers' offices. MIoT systems and applications lead to increase availability, accessibility, quality and cost-effectiveness of healthcare services. On the other hand, MIoT devices generate a large amount of diverse real-time data, which is highly sensitive. Thus, securing medical data is an essential requirement when developing MIoT architectures. However, the MIoT architectures being developed in the literature have many security issues. To address the challenge of data security in MIoT, the integration of fog computing and MIoT is studied as an emerging and appropriate solution. By data security, it means that medial data is stored in fog nodes and transferred to the cloud in a secure manner to prevent any unauthorized access. In this paper, we propose a design for a secure fog-cloud based architecture for MIoT.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126207407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Techniques to Detect DDoS Attacks on VANET System: A Survey","authors":"Alia Mohammed Alrehan, F. Alhaidari","doi":"10.1109/CAIS.2019.8769454","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769454","url":null,"abstract":"Road traffic accidents and their sequences increase dramatically worldwide and thus raising a demand for solutions to providing safety and control of vehicles on road when driving. This is one of the top priorities for modern countries focusing on enhancing citizens' quality of life by developing an Intelligent Transport System (ITS). Vehicular Ad hoc NETworks (VANETs) are recognized to be effective in realizing such a concept. VANET is potential in improving road safety and in providing travelers comfort. However, such technology is still exposed to many vulnerabilities led to numerous of security threats that must be solved before VANET technology is practically and safely adopted. One of the main threats that affects the availability of VANET is Distributed Denial of Service (DDoS) attack. In this paper, we focus on studying the main attacks along with DDoS attack on VANET system as well as exploring potential solutions with a focus on machine learning based solutions to detect such attacks in this field.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126589249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance dashboard for productive families","authors":"Salwa Tanko, Hawra Al-Saeed, Ruqaya Alali, Sara Alawami, Samiha Brahimi, Gomathi Kirishina","doi":"10.1109/CAIS.2019.8769481","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769481","url":null,"abstract":"Productive families suffer from attracting customers to buy their products, since their lack of knowledge in marketing and modern technologies. The proposed online application “Made with Passion Mobile Application” embedded with a mobile-based dashboard to support productive families visually track, analyze and display key performance indicators (KPI) that measures how the business doing. Furthermore, it eases extracting important information from the data and to know its behavior at a sooner time. The proposed application supports both Android and iOS operating systems and developed using React Native framework. And Tableau software used to provide the dashboard for the application.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}