2019 10th International Conference on Information and Communication Systems (ICICS)最新文献

筛选
英文 中文
Evaluating the use of augmented reality in learning portfolios for different team roles 评估增强现实在不同团队角色学习组合中的使用
Georgios A. Dafoulas, Ariadni Tsiakara, C. Maia, David Neilson
{"title":"Evaluating the use of augmented reality in learning portfolios for different team roles","authors":"Georgios A. Dafoulas, Ariadni Tsiakara, C. Maia, David Neilson","doi":"10.1109/IACS.2019.8809172","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809172","url":null,"abstract":"Increasingly augmented reality becomes an integrated component of modern learning environments. This paper builds on previous work to focus on the evaluation of how augmented reality and in particular the use of an Optical Head Mounted Display (OHMD) for the creation of learning portfolios. Emphasis is given on the evaluation of the use of such tools for different learning activities. The paper provides an in depth analysis of how the technology is evaluated by using Belbin’s team role theory for classifying participants’ responses. The paper’s final contribution is in the form of a discussion of a range of issues associated with privacy and security of personal information collected with the use of OHMD in learning environments.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Reconnaissance Investigation: A Memory Forensics Approach 网络侦察调查:一种记忆取证方法
Mohammed I. Al-Saleh, Ziad Al-Sharif, L. Alawneh
{"title":"Network Reconnaissance Investigation: A Memory Forensics Approach","authors":"Mohammed I. Al-Saleh, Ziad Al-Sharif, L. Alawneh","doi":"10.1109/IACS.2019.8809084","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809084","url":null,"abstract":"Perpetrators utilize different network reconnaissance techniques in order to discover vulnerabilities and conduct their attacks. Port scanning can be leveraged to conclude open ports, available services, and even running operating systems along with their versions. Even though these techniques are effective, their aggressiveness for information gain could leave an apparent sign of attack, which can be observed by the variety of security controls deployed at the network perimeter of an organization. However, not all such attacks can be stopped nor the corresponding security controls can defend against insiders. In this paper, we tackle the problem of reconnaissance detection using a different approach. We utilize the rich information that is kept in memory (or RAM). We observe that packets sent or received stay in memory for a while. Our results show that inspecting memory for attack signs is beneficial. Furthermore, correlating contents that are obtained from different memories empowers the investigation process and helps reach to conclusions.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131766081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Secure Collaborative Module on Distributed SDN 分布式SDN上的安全协同模块
G. Saldamli, Harsha Sanjeeva, Karthik Siddalingaapa, Ruthra Vadivel Murugesan, L. Ertaul
{"title":"A Secure Collaborative Module on Distributed SDN","authors":"G. Saldamli, Harsha Sanjeeva, Karthik Siddalingaapa, Ruthra Vadivel Murugesan, L. Ertaul","doi":"10.1109/IACS.2019.8809134","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809134","url":null,"abstract":"Stability and security are the most important two release requirements of a modern application development process. As the number of users of an application increases, the network traffic grows. This results in an increase in the server load as well as the threats. If this traffic is not nicely controlled the user would experience a mitigation in application’s performance. To provide a continuous and secure service, the load on the system must be optimally distributed among multiple servers. In the literature, there are various algorithms that are proposed to balance the load on a system. In this study, we introduce a load balancing module for a generic web application to distribute the load optimally using Software Defined Networking (SDN) controllers. The proposed system employs a round-robin scheme for server allocation and implements an open-source SDN controller that runs inside a docker container. To provide reliability, the web application is developed using the ReactJS and NodeJS. The privacy and data confidentiality is provided by using the NISTs new format preserving encryption standard. The proposed method is suitable for real world applications as shown in the performance profiling that we carried using Openload toolset.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Arabic Word stemming Based on Pattern Affixes Removal 基于模式词缀去除的阿拉伯语词干提取
Sari Awwad
{"title":"Arabic Word stemming Based on Pattern Affixes Removal","authors":"Sari Awwad","doi":"10.1109/IACS.2019.8809169","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809169","url":null,"abstract":"Arabic word term stem became an essential part of any text processing algorithms and information retrieval. The big challenge is how to distinguish between affixes and original characters in Arabic term, where some characters become affixes in Arabic terms and become original in other Arabic terms. The goal of this research is to discover what extent depends on affix stripping to find Arabic term stem. The contribution consists of two parts, starting with removing all kinds of affixes from Arabic term, it has been done by constructing affixes hash tables. The second part is producing 24 possible stems for the same Arabic term by using 24 stripping orders.The experiments proved that there is at least one correct stem out of 24 possible stems. The conclusion is that the most efficient stripping orders are those that begin by removing prefixes followed by removing infixes, and then removing suffixes. The dataset that is used for testing consists of four different subject documents with 2000 Arabic words. The final results after using stripping orders has reached up to 86% of correctness which is the highest percentage comparing to other stripping orders.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing The Lifetime of Wireless Sensor Network using Genetic Algorithm 利用遗传算法提高无线传感器网络的生存期
Hadeel Alazzam, W. Almobaideen
{"title":"Enhancing The Lifetime of Wireless Sensor Network using Genetic Algorithm","authors":"Hadeel Alazzam, W. Almobaideen","doi":"10.1109/IACS.2019.8809109","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809109","url":null,"abstract":"Selecting the localization of sensors in Wireless Sensor Networks (WSNs) is a big challenge, especially in a wide area. In this paper, a new method is proposed to place sensors using hybrid approach where a large portion of sensors is distributed randomly, while a smaller portion of about 10% of the total number of sensors is distributed in a managed way based on the results of a genetic searching algorithm. Two fitness functions are used for comparison purposes, and Omnet++ simulator was used to conduct the experiment designed to evaluate the proposed method effect on the lifetime of the WSN. Results show that the proposed method increases the lifetime and the throughput of WSN significantly.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133861819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Scheduling Different Types of Bag-of-Tasks Jobs in Distributed Systems 分布式系统中不同类型任务袋作业的调度
Georgios L. Stavrinides, H. Karatza
{"title":"Scheduling Different Types of Bag-of-Tasks Jobs in Distributed Systems","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1109/IACS.2019.8809138","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809138","url":null,"abstract":"When distributed processors are shared by bag-of-tasks applications, we are facing the problem of efficient assignment of processors to tasks and of efficient task scheduling in each processor. This paper studies scheduling of different types of bags-of-tasks in a distributed system where two algorithms of task routing are considered in combination with two scheduling techniques. The aim is to study the performance of the scheduling techniques in each task routing algorithm case, taking also into account fairness in task execution order. A simulation model is used to examine the performance of the scheduling strategies in different cases of sporadic job arrivals. The results obtained from the simulation experiments show that the routing policies play a more important role in performance than the scheduling of tasks in their assigned queues. It is also shown that the performance depends on the arrival process and the type of bag-of-tasks applications.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125024873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior 当我们生病时,隐私重要吗?医疗保健技术采用行为的扩展隐私演算模型
Mohammed Sajedur Rahman
{"title":"Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior","authors":"Mohammed Sajedur Rahman","doi":"10.1109/IACS.2019.8809175","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809175","url":null,"abstract":"Patients’ acceptance of healthcare-technology is crucial for better and more affordable healthcare. However, there is evidence that some patients believe using healthcare-technology is a threat to the privacy of their health-related information. Privacy calculus is a widely accepted theory to explain technology adoption behavior when it involves disclosure of personal information. The applicability and effectiveness of privacy calculus model in explaining healthcare technology adoption behavior is still unknown and requires further investigation. In this study, we propose an extended privacy calculus model incorporating health condition emotion as an additional factor that interplays with the two privacy calculus factors. We tested our model with responses from 239 participants. The results revealed that health emotion related to individuals’ on-going health condition interact with the privacy calculus components to influence their health-related technology adoption decisions. The results have important implications for both theory and practice in healthcare domain.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Investigating patterns of emotion and expressions using smart learning spaces 使用智能学习空间研究情感和表达模式
Georgios A. Dafoulas, Ariadni Tsiakara, Jerome Samuels-Clarke, C. Maia, David Neilson, Almaas A. Ali
{"title":"Investigating patterns of emotion and expressions using smart learning spaces","authors":"Georgios A. Dafoulas, Ariadni Tsiakara, Jerome Samuels-Clarke, C. Maia, David Neilson, Almaas A. Ali","doi":"10.1109/IACS.2019.8809119","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809119","url":null,"abstract":"The Internet of Things (IoT) is based on the use of interconnected device for data transfer. This paper describes findings from current work that uses a range of sensors that are connected together in collecting biometric data from learners. The research is focused on assessing learners’ state during different learning activities by using different biometric data. The paper investigates certain patterns of emotion, expressions and Galvanic Skin Response (GSR) (i.e. sweat levels) amongst participants. The findings are discussed under the prism of learner classification against a number of criteria including learning styles, project management preference, team profile and personality type. The paper contributes in understanding how we can monitor individuals’ state and behaviour during different learning activities and identify predominant patterns.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115222024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RecDNNing: a recommender system using deep neural network with user and item embeddings RecDNNing:一个使用深度神经网络的用户和项目嵌入的推荐系统
Hafed Zarzour, Ziad Al-Sharif, Y. Jararweh
{"title":"RecDNNing: a recommender system using deep neural network with user and item embeddings","authors":"Hafed Zarzour, Ziad Al-Sharif, Y. Jararweh","doi":"10.1109/IACS.2019.8809156","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809156","url":null,"abstract":"The success of applying deep learning to many domains has gained strong interest in developing new revolutionary recommender systems. However, there are little works studying these systems that employ deep learning; additionally, there is no study showing how to combine the users and items embedding with deep learning to enhance the effectiveness of the recommender systems. Therefore, this paper proposes a novel approach called RecDNNing with a combination of embedded users and items combined with deep neural network. The proposed recommendation approach consists of two phases. In the first phase, we create a dens numeric representation for each user and item, called user embedding and item embedding, respectively. Following that, the items and users embedding are averaged and then concatenated before being fed into the deep neural network. In the second phase, we use the model of the deep neural network to take the concatenated users and items embedding as the inputs in order to predict the scores of rating by applying the forward propagation algorithm. The experimental results on MovieLens show that the proposed RecDNNing outperforms state-of-the-art algorithms.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124649030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Memory Forensics: Recovering Chat Messages and Encryption Master Key 记忆取证:恢复聊天消息和加密主密钥
A. Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, Khalil Al-Hussaeni
{"title":"Memory Forensics: Recovering Chat Messages and Encryption Master Key","authors":"A. Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, Khalil Al-Hussaeni","doi":"10.1109/IACS.2019.8809179","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809179","url":null,"abstract":"In this pervasive digital world, we are witnessing an era where cybercriminals are improving their abilities in taking advantage of wide-spread digital devices to perform various malicious activities. By utilizing anti-forensic techniques, cybercriminals are able to erase or alter digital evidence that can otherwise be used against them in court. One of the most critical sources of digital evidence that forensic investigators examine is the physical memory of a digital device, i.e., Random Access Memory (RAM). RAM is a volatile memory containing data that might be of significant value to forensic investigation. RAM, which stores data about recent activities, stores data only when the device is powered on. Once the device powers off, all the data stored in the RAM is lost permanently. Forensic investigators find great value in RAM data and thus need to preserve such data without harming the integrity of the collected evidence. Many existing tools provide the ability to acquire and analyze images of the data stored in RAM. This paper tackles the fundamental topic of security, privacy, and digital forensics. Specifically, this paper examines memory dumps of 4GB Windows 7 computers with the objective of identifying an instant messaging tool and recovering its chat messages, and recovering master encryption keys of volumes encrypted by BitLocker and TrueCrypt. Throughout this paper, we utilize two widely-used tools, namely Volatility and WinHex, due to their various functionalities designed specifically for memory forensic investigation.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"570 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信