{"title":"Russian Freight Flights Time Prediction","authors":"I. Makarov","doi":"10.1109/CAIS.2019.8769522","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769522","url":null,"abstract":"We present a model for freight train time prediction based on station network analysis and specific feature engineering. We discuss the first pipeline to improve the freight flight duration prediction in Russia. While every freight company use only reference book made by RZD (Russian Railways) based on railroad distances with accuracy measured in days, we argue that one could predict the flight duration with error less than twenty hours while decreasing error to twelve hours for certain type of freight trains.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lubna AlHenaki, Alaa Alwatban, Bashaer Alamri, N. Alarifi
{"title":"A Survey on the Security of Cloud Computing","authors":"Lubna AlHenaki, Alaa Alwatban, Bashaer Alamri, N. Alarifi","doi":"10.1109/CAIS.2019.8769497","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769497","url":null,"abstract":"Within the recent decade, major innovations in technology have emerged, that potentially add more convenience to daily life practices not only on an enterprise level but on an individual level as well. Cloud Computing technology has witnessed significant advances in its implementation and become widely adopted by either private or public sectors. It was obvious recently that a lot of organizations and enterprises are transferring their workloads to the cloud. However, security is a major concern for the cloud computing services which is based on Internet connection that makes it vulnerable to multiple types of attacks. Even though that the security measures implemented over cloud computing are developing every passing year, Security still a challenge. In this paper, we conducted a survey study on cloud computing and addressed different types of attacks and possible threats to this emerging technology, as well as protection methods and existing solutions to such attacks.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115002416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Alotaibi, Arwa Alotaibi, Amjad Hassan Alshaiban
{"title":"Usability Testing and Cognitive Walkthrough for Evaluate USB Cable (SMART Universal Serial Bus (USB))","authors":"N. Alotaibi, Arwa Alotaibi, Amjad Hassan Alshaiban","doi":"10.1109/CAIS.2019.8769501","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769501","url":null,"abstract":"The interaction between the end user and projectors is a difficult task when ordinary users need to do it. Increasing the popularity of powerful personal electronics with wireless communication capabilities has made the problem more urgent than ever before. In this research, we aim to enhance the interaction connecting the devices with the ability of human through the usability study to solve the problems in the projectors devices. The idea is an application shows the status of the USB cable so that if green means the case of the wire If there is a red connection problem, this application shows the location of the error and shows the user how to resolve it. Over the past few years, several solutions have appeared in the research literature. Many standardization bodies have also improved the preparation process. All of these protocols provide a certain level of security, but many new questions arise, such as “How to implement this protocol so that it is easy to use?” And “Is it still safe when used by someone other than a technician?” In this paper, we try to answer these questions by conducting a comparative usability assessment of selected methods to draw some ideas about their employability and security as well as strategies for their implementation.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134334390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayoub Bahnasse, Fatima Ezzahraa Louhab, Azzedine Khiat, A. Badri, M. Talea, A. Sahel
{"title":"Dynamic Multipoint Virtual Private Network influence on Video Conferencing Quality of Service","authors":"Ayoub Bahnasse, Fatima Ezzahraa Louhab, Azzedine Khiat, A. Badri, M. Talea, A. Sahel","doi":"10.1109/CAIS.2019.8769447","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769447","url":null,"abstract":"Videoconferencing is increasingly required by a variety of clients and organizations. This technology saves travel time and increases the number of participants with negligible costs. However, the quality of service (QoS) of this technology depends primarily on the network to which participants are connected. Dynamic Multipoint Virtual Private Network (DMVPN) technology is the most requested to interconnect a set of sites in a secure, automatic and on demand manner. In this paper, we will evaluate the performance of videoconferencing in a DMVPN network. The evaluation will focus on the impact of the number of sites, the number of participants per site, and the routing protocols. The evaluation is done under the Riverbed Modeler simulator, the evaluation criteria are: the variation of the delays, the end-to-end delay, the quantity of the received and sent traffic, the rate of the losses, and the duration of convergence of the routing protocols.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133345962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generative Models for Fashion Industry using Deep Neural Networks","authors":"Ildar Lomov, Ilya Makarov","doi":"10.1109/CAIS.2019.8769486","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769486","url":null,"abstract":"The progress of deep learning models in image and video processing leads to new artificial intelligence applications in Fashion industry. We consider the application of Generative Adversarial Networks and Neural Style Transfer for Digital Fashion presented as Virtual fashion for trying new clothes. Our model generate humans in clothes with respect to different fashion preferences, color layouts and fashion style. We propose that the virtual fashion industry will be highly impacted by accuracy of generating personalized human model taking into account different aspects of product and human preferences. We compare our model with state-of-art VITON model and show that using new perceptual loss in deep neural network architecture lead to better qualitative results in generating humans in clothes.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133269392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Protection of Distribution Networks Integrated With DG Units","authors":"Mohammed A. Alghassab","doi":"10.1109/CAIS.2019.8769536","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769536","url":null,"abstract":"The integration of Renewable Energy Sources (RESs) with the classic electrical distribution network leads to many protection and operation issues. So, it is important to define the best location in the electrical network to connect the RESs. In addition, the best size of the RESs that will be connected to the grid should also be defined in such a way to reduce the number of the disturbances and contingency cases that may bring many protection or operation failures in the distribution networks. This paper presents a modified adaptive protection technique to re-coordinate the Automatic Recloser (AR) and fuses in the distribution networks. The protection devices will adapt its characteristics to the new cases and be able to adjust its parameters to eliminate the fault as fast as possible. The new adaptive algorithm is tested and verified using the MATLAB/Simulink software. An adaptive code is embedded into the technique in such a way that will guarantee not only the least fail cases in the protection and operation contingencies but also in the critical cases. It is applied and tested using the standard IEEE 13 nodes test feeder as a distribution system. The system is modeled and simulated using the ETAP software.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Arabic Self-Learning Braille Application for Visually Impaired People","authors":"Alaa Al-Watban, A. Al-Salman","doi":"10.1109/CAIS.2019.8769570","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769570","url":null,"abstract":"Braille system is the main method for the blind and visually impaired people for acquiring the reading and writing skills. Considering their disability, efforts were dedicated to facilitating the learning with Braille. Studying Braille system at the specialized centers and schools is not easy for all the involved blind and visually impaired people. Moreover, making the learning process independent of others is very useful. This paper presents the design and implementation of an Arabic, Self-learning Braille application for the blind and visually impaired people on the smart devices. The proposed system teaches the Braille codes, provides exercises and tests that assign the levels of the users. This work is under progress, yet at its last stages.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hussain, Hatim Aboalsamh, Saeed Bamatraf, Emad-ul-Haq Qazi
{"title":"Color Histogram Features for the Classification of Brain Signals using 2D and 3D Educational Content","authors":"M. Hussain, Hatim Aboalsamh, Saeed Bamatraf, Emad-ul-Haq Qazi","doi":"10.1109/CAIS.2019.8769537","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769537","url":null,"abstract":"In this paper, a novel classification method has been proposed for brain signals by extracting features using RGB color histogram to classify images (topomaps) created from the electroencephalogram (EEG) signals. The signals are recorded during the answering of 2D and 3D questions. The system is used to classify the correct and incorrect answers for both 2D and 3D questions. Using the classification, we compared the impact of 3D and 2D educational contents on recall, learning and memory retention. Same 3D and 2D contents are presented to subjects for learning purpose. After learning, twenty multiple-choice questions (MCQs) are asked from the subjects related to the learned contents after two stages: two months (Long-Term Memory (LTM)) and 30 minutes (Short-Term Memory (STM)). Next, discriminative features from color histogram are extracted from topomap images. Support Vector Machine (SVM) is used as a classifier to predict brain states related to incorrect / correct answers. Results show the superiority of the proposed system.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Personal Health Care Office Chair","authors":"S. Sheikh, I. Ngebani","doi":"10.1109/CAIS.2019.8769548","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769548","url":null,"abstract":"Over the years, Medical Doctors and Researchers have reported that prolonged sitting as well as bad sitting postures can be a danger to human health such as chronic diseases attributed to rheumatic disorders as well as pains in muscle and connective tissues of tendons, joint capsules and ligaments. To address these issues, in this work, we propose a personal health care office chair which is developed using Internet of Things (IoT) Technology. The chair detects and monitors how long a person sits on the chair, as well as detects the sitting posture of the person. Warnings are signaled on the Liquid Crystal Display (LCD) as well as signed through sound from a buzzer. A Wi-Fi module is used to transmit the data to the internet for recording.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116690083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data Mining Approach for Analysing Road Traffic Accidents","authors":"Tariq Abdullah, Symon Nyalugwe","doi":"10.1109/CAIS.2019.8769587","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769587","url":null,"abstract":"With increasing use of technologies, the amount of accident data has been growing at an ever-increasing rate in the last few years. Government entities and private sectors have been busy and involved in collecting accident data on daily bases. Data for accidents is often among the most valuable assets since it helps in budgeting and implementation of policies and also helps policymakers to make decisions pertaining to infrastructure planning and development. But, as the mount of this data is growing, there is high demand and a need of finding methods, technique and tools to analyse such large volumes of data and find a solution to understand t he cause of increasing accidents in different regions of the world. In this research, we propose and implement a data mining framework to identify, analyse and determine attributes contributing to road accidents. The main aim of this research project is to implement a data mining framework for analysing the relationship between accident attributes and make recommendations for preventing the high occurrence of these accidents. This framework is evaluated with road accidents data from Khomas region, Namibia. The results demonstrate that the use of such an analytical tool can help in creating a knowledge base. The results find out that male drivers have massively contributed to the higher risk of accidents, especially, at intersections and during daylight. It also observed that young drivers are often involved in road traffic accidents happening in clear areas. Proportionally, old aged drivers are most likely to be involved in fatal accidents than in non-fatal accidents.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114691917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}