{"title":"Predicting Collaborative Performance at Assessment Level using Machine Learning","authors":"S. A. Raza","doi":"10.1109/CAIS.2019.8769578","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769578","url":null,"abstract":"Most of the machine learning-based educational data mining (EDM) studies in university education merely focus on the predication of individual students' performance at institutional/program and course levels. To predict collaborative performance, this study demonstrates the application of a rough set theory-based machine learning technique at the assessment level of a university course. It unveils if-then rules comprising key factors affecting assessment scores and categorizes them into performance classes of ‘Low’, ‘Medium’ and ‘High’. The results are applicable in chalking out strategies related to teaching and student advising to improve academic performance.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving of Current CAPTCHA Systems","authors":"Yara Saud Aljarbou","doi":"10.1109/CAIS.2019.8769466","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769466","url":null,"abstract":"The internet these days plays an important role in our daily lives, as the number of web services are increasing such as search engines and email, they are threatened by different types of attacks from computer programs such as robots. In order to solve this problem, CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) was implemented to be used as a base to distinguish between human users and computer bots. Although this technique limits the automatic registration to web services to provide security but, still some CAPTCHAs have several weaknesses which allow the computer bots to infiltrate the mechanism of the CAPTCHA. The aim of this paper is to search for the problems in the existing types of CAPTCHA systems and to provide solutions or alternative approaches to solve these problem.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Security Risks Associated With IMEIs And Security Solutions","authors":"Shikah J. Alsunaidi, A. Almuhaideb","doi":"10.1109/CAIS.2019.8769521","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769521","url":null,"abstract":"Technological advances in the mobile devices industry have made living more flexible and prosperous. Anything can be done through smartphones that have become part of human life. However, the security risks associated with these devices, such as theft and counterfeit, are increasing, and their detection remains challenging for many reasons. For example, the International Mobile Equipment Identity (IMEI) is often manipulating after the crime to conceal and prevent the traceability of the device. In this paper, we present a comprehensive study of the proposed solutions to detect the fake IMEI number. Also, we describe the IMEI structure and clarify the areas from which it is used. In addition, we discuss the crimes associated with the IMEI change for the stolen devices.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating Healthcare Innovation in Time-Bound Multidisciplinary Hackathons","authors":"Nourah Alamari, A. Alabdulkarim, A. Al-Wabil","doi":"10.1109/CAIS.2019.8769574","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769574","url":null,"abstract":"In this paper, we describe a time-bound health hackathon that brought together multidisciplinary teams to collaborate intensely over a short period of time to define a problem, devise a solution, and design a working prototype. Insights from a case study of diverse teams working together to rapidly validate clinical needs and develop solutions are highlighted. Reflections on how the hackathon contributed towards energizing and connecting the best minds across the health ecosystem to solve healthcare's most significant challenges and develop healthcare entrepreneurship and digital strategies to scale medicine are discussed.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124125269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disaster Management System Over Wifi Direct","authors":"Rabiah Alnashwan, H. Mokhtar","doi":"10.1109/CAIS.2019.8769460","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769460","url":null,"abstract":"Disaster management is a complex and interesting domain which deals with abnormal, extremely critical and challenging situations. It has always been a worldwide concern and considered one of the leading causes of death and injuries around the world. During disasters, continuous connectivity plays a vital role in rescue operations. However, maintaining stable and continuous connectivity in disasters is unguaranteed because of the possible failure of infrastructure network caused by disasters. Hence depending on disaster management systems that are built on infrastructure networks is impractical and unfeasible. Utilizing alternative solutions like mobile Ad-hoc networks may substitute the infrastructure network. In this paper, we utilize WiFi direct technology which is known for its superiority over other similar ad-hoc network technologies to develop a disaster management system. The System is specifically developed to provide a stable communication channel between victims and rescuers. Additionally, we propose an optimization to WiFi direct network to enable the inter-group communication between different WiFi direct groups using WiFi legacy. Using this hybrid solution of the two technologies (WiFi legacy and WiFi Direct), we developed an android disaster management system that is more robust and resilient to damage. Experimental results demonstrate that the system achieves improvement in terms of energy consumption, delay and reliability comparing to existing works.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130352763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving TCP Performance in Multi-Hop Coded Wireless Networks","authors":"Khaled D. Alferaidi, R. Piechocki, F. Alfordy","doi":"10.1109/CAIS.2019.8769518","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769518","url":null,"abstract":"Wireless Multi-Hop networks often rely on the use of the Transport Control Protocol (TCP) which provides high reliability and throughput performance at Transport Layer. Xor network coding does not benefit greatly from TCP's attributes. TCP takes into consideration the nature of networks; however, TCP does not acknowledge the network coding which can ease congestion by performing coding at intermediates nodes as in COPE. Meanwhile, the perspective of network coding has a more rigid approach that depends on relay nodes to perform coding rather than depending on the sender and the receiver exchange messages. In this paper, we investigate the different perspective to bridge the gap, as our understating is moved from throughput to Ratio of Loss Packet (RLP), delay and jitters. So we propose WeNC-TCP to appreciate the network coding nature functionality and incorporate better interaction between TCP at Transport layer, and network coding functionality which relies on between network and Data link layer, as a result, the average ratio of loss packets has improved up to 72%, and end-to-end Delays have reduced to up to 48%.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an Adaptive Multi-Channel Algorithm in WLANs","authors":"Azhar A. Alsufyani, K. Almotairi","doi":"10.1109/CAIS.2019.8769471","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769471","url":null,"abstract":"The IEEE 802.11 specification for Wireless Local Area Networks (WLANs) supports multichannel transmissions up to the 160 MHz band. However, inefficiencies arise when the entire bandwidth is allocated for a single user and when the size of the transmitted data is very small. In this paper, we propose a novel medium access control method, which is called the Adaptive Multi-Channel Access (AMCA) protocol, for an ad hoc wireless network. The AMCA enables simultaneous transmissions to multiple stations on different channels. We implement and evaluate the AMCA using the MATLAB platform. In addition, we compare the AMCA with the IEEE 802.11 multichannel and the IEEE 802.11 single channel. The simulation results show that the adaptive common channel method for the coordination of the channel use allocation between the STAs offers a similar performance to the IEEE 802.11.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127116849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Emotionally Adaptive Framework for E-Learning Systems","authors":"Osamah M. Al-Omair, Shihong Huang","doi":"10.1109/CAIS.2019.8769547","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769547","url":null,"abstract":"The evolution of human-computer interaction has come to new and groundbreaking lengths. Computers are now gaining the ability to perceive human emotions, making this relationship even more revolutionary. Affective computing is a relatively new research area focusing on the integration of human emotions into computer systems. This paper focuses on affective computing in the area of e-learning. The main contribution of this paper is a proposed framework that incorporates human emotions into an adaptive e-learning system in which the system adapts to the users' emotions in order. Our hypothesis is that incorporating user's emotions creates a more personalized learning experience resulting in a higher quality of learning outcomes.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Methods Against Potential Physical Attacks on Smartphones","authors":"Shikah J. Alsunaidi, A. Almuhaideb","doi":"10.1109/CAIS.2019.8769458","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769458","url":null,"abstract":"The rapid growth in communications development has made devices intelligent, efficient and convenient to accomplish many of our daily tasks, where they became an integral part of our lives. On the other hand, this growth has led to an expansion in the percentage of security risks and threats to the network devices and their data. Therefore, in this paper, we present a comprehensive study of the proposed solutions to protect smartphones from two of the physical security attacks which are commercial fraud and lost or theft. In addition, we discuss these two physical security attacks and provides several statistics related to them.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Rules and Statistical Method for Arabic to English Machine Translation","authors":"Arwa Alqudsi, N. Omar, Khalid Shaker","doi":"10.1109/CAIS.2019.8769545","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769545","url":null,"abstract":"Arabic is one of the six major world languages. It originated in the area currently known as the Arabian Peninsula. Arabic is the joint official language in Middle Eastern and African states. Large communities of Arabic speakers have existed outside of the Middle East since the end of the last century, particularly in the United States and Europe. So finding a quick and efficient Arabic machine translator has become an urgent necessity, due to the differences between the languages spoken in the world's communities and the vast development that has occurred worldwide. Arabic combines many of the significant challenges of other languages like word order and ambiguity. The word ordering problem because of Arabic has four sentence structures which allow different word orders. Ambiguity in the Arabic language is a notorious problem because of the richness and complexity of Arabic morphology. The core problems in machine translation are reordering the words and estimating the right word translation among many options in the lexicon. The Rule-Based Machine translation (RBMT) approach is the way to reorder words, and the statistical approach, such as Expectation Maximisation (EM), is the way to select right word translations and count word frequencies. Combining RBMT with EM plays an impotent role in generating a good-quality MT. This paper presents a combination of the rule-based machine translation (RBMT) approach with the Expectation Maximisation (EM) algorithm. These two techniques have been applied successfully to word ordering and ambiguity problems in Arabic-to-English machine translation.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"98 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}