2019 10th International Conference on Information and Communication Systems (ICICS)最新文献

筛选
英文 中文
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iacs.2019.8809141","DOIUrl":"https://doi.org/10.1109/iacs.2019.8809141","url":null,"abstract":"","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"1993 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZigBee Security Vulnerabilities: Exploration and Evaluating ZigBee安全漏洞:探索与评估
S. Khanji, Farkhund Iqbal, P. Hung
{"title":"ZigBee Security Vulnerabilities: Exploration and Evaluating","authors":"S. Khanji, Farkhund Iqbal, P. Hung","doi":"10.1109/IACS.2019.8809115","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809115","url":null,"abstract":"Secure communication is a necessity that must be considered in any smart application to guarantee the confidentiality of information. Recently, ZigBee has been utilized in different smart applications such as automatic metering, power fraud detection, industrial automation and many more. In this research paper, we evaluate the performance of ZigBee from a security perspective. We explore the ZigBee built-in security services, encryption techniques, security keys, and the trust center. The research findings serve as guidelines to focus on wireless communication security in general and on the ZigBee security issues in specific. There is a crucial need to fill in the gap where ZigBee has low-complexity processing capabilities and the need to integrate more robust enhancements and security controls.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"30 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
The Influence of Organizational Enforcement on the Attitudes of Employees towards Information Security Compliance 组织执法对员工信息安全合规态度的影响
A. AlKalbani, Hepu Deng, B. Kam
{"title":"The Influence of Organizational Enforcement on the Attitudes of Employees towards Information Security Compliance","authors":"A. AlKalbani, Hepu Deng, B. Kam","doi":"10.1109/IACS.2019.8809166","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809166","url":null,"abstract":"The increasing importance of combating information security crimes has prompted individual organizations to enforce information security compliance. How such enforcement affects the attitude of individual employees towards information security compliance, however, is unclear. With the insights from the organizational theory literature, this study tests and validates a conceptual model that explores the impact of organizational enforcement on the attitude of employees using structural equation modelling based on the data collected from a survey of 294 employees in organizations. The study shows that both organizational security culture and enforcement processes have a positive impact on the attitude of employees. The study further reveals that there is a positive relationship between organizational security culture, security technologies, and enforcement processes in enforcing security compliance. Such relationships form a mutual force for continually fostering a positive attitude of employees toward information security compliance in organizations.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127587431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Crime Analysis in Chicago City 芝加哥的犯罪分析
Ayidh Alqahtani, A. Garima, Ahmad Alaiad
{"title":"Crime Analysis in Chicago City","authors":"Ayidh Alqahtani, A. Garima, Ahmad Alaiad","doi":"10.1109/IACS.2019.8809142","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809142","url":null,"abstract":"Security has always been one of the most significant concerns. Government and security agencies are working hard to prevent crimes and protect their people. However, challenge of dealing with large amount of data has become a major issue for all organizations. Therefore, a crime information system that is able to process large amount of data in a short period of time is needed for investigators to know crimes hotspots, crime patterns and to predict future ones. This paper provides design of Crime Data Information System. Data preprocessing is done in Crime Database and two approaches for crime analysis is performed. These two approaches are compared, and results are confirmed with ground truth.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123906628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Internet of Things Technology based on LoRaWAN Revolution 基于LoRaWAN革命的物联网技术
Dina M. Ibrahim
{"title":"Internet of Things Technology based on LoRaWAN Revolution","authors":"Dina M. Ibrahim","doi":"10.1109/IACS.2019.8809176","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809176","url":null,"abstract":"With the rapid growth of the internet of Things (IoT) paradigm, another important technology appears on the research field that helps in earning a high performance wireless communication between devices, it is called low power wide area network (LPWAN). In the LPWAN technology, there are two categories: Long Rang (LoRa) and narrowband (NB-IoT). LoRa is not only a long-range network; it is also enables the transfer of information with a low transfer rate and low power consumption. Additionally, LoRa wireless area network (LoRaWAN) is a promising technology developed to overcome the IoT applications challenges. In this paper, the main contribution is focus on the revolution of LoRaWAN network technology considering the IoT requirements. Moreover, we show how this revolution is a powerful candidate in addressing and fixing the IoT challenges and obstacles. Finally, we present how LoRaWAN can handle these problems supporting our discussion with the details of the LoRaWAN characteristics.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122671756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Alias Table Memory Circuit For Register Renaming Unit 用于寄存器重命名单元的别名表存储电路
S. Abdel-Hafeez, Sanabel Otoom, Muhannad Quwaider
{"title":"Alias Table Memory Circuit For Register Renaming Unit","authors":"S. Abdel-Hafeez, Sanabel Otoom, Muhannad Quwaider","doi":"10.1109/IACS.2019.8809152","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809152","url":null,"abstract":"Register renaming unit is commonly used in most of the microprocessor designs in order to increase the average number of Instructions Per Cycle (IPC). The register renaming unit constitutes several tables, wherein Register Alias Table (RAT) streamlines the operations of register renaming principle. The RAT substitutes the logical instruction operands from the physical table or the architecture table. Thus, it provides a larger set of registers than the scope seen by the software logical set. Despite the limited attention on circuit design of register renaming, we detail the principle of register renaming operational architecture within one clock cycle without pipelining, wherein the absolute delay is considered essential in register renaming unit. Additionally, we propose in this scope a circuit architecture realization for RAT that efficiently provides high performance in reading, writing, and matching content. Mathematical circuit analysis gives detail on complete register renaming principle within one cycle and complete circuit architecture for RAT. The proposed RAT constitutes four read ports along with two ports for match content addressable check, and two write ports along with priority encoder. The RAT table cells are based on SRAM 8T-Cell pre-charge structure.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131426369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Reduction using Similarity Class and Enhanced Tolerance Relation for Complete and Incomplete Information Systems 基于相似类和增强容差关系的完全和不完全信息系统数据约简
M. M. Deris, M. A. Hamid, N. Ibrahim, R. Efendi, Iwan Tri Riyadi Yanto
{"title":"Data Reduction using Similarity Class and Enhanced Tolerance Relation for Complete and Incomplete Information Systems","authors":"M. M. Deris, M. A. Hamid, N. Ibrahim, R. Efendi, Iwan Tri Riyadi Yanto","doi":"10.1109/IACS.2019.8809135","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809135","url":null,"abstract":"Research on data analytics is entering a new challenge where huge data need to be processed in a timely manner. However, there are issues to computational resources when some data are redundant, inconsistent, noisy, and incomplete. It is imperative to reduce data size in order to overcome some issues specifically redundant and incomplete data. Thus, some redundant data or incomplete data need to be removed. In this paper, we would like to present the data reduction approaches using Rough set theory based on similarity class between the two objects and an enhanced tolerance relation when the data is incomplete/imprecise. The data structured with complete and incomplete information systems are discussed. Comparative analysis and experiment result between the proposed approaches to based-line approaches in terms of reduction rate and accuracy are presented. We found that, the proposed approaches are more favorable with high reduction rate for complete information systems and high accuracy for incomplete information systems.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130550397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Predicting in Hiring Process and Performance Appraisals Using Machine Learning 使用机器学习进行招聘过程中的绩效预测和绩效评估
Ali A. Mahmoud, Tahani AL Shawabkeh, W. Salameh, Ibrahim I. Al Amro
{"title":"Performance Predicting in Hiring Process and Performance Appraisals Using Machine Learning","authors":"Ali A. Mahmoud, Tahani AL Shawabkeh, W. Salameh, Ibrahim I. Al Amro","doi":"10.1109/IACS.2019.8809154","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809154","url":null,"abstract":"In the nowadays-competitive race of finding a suitable talented, qualified, bright and potential personnel to fulfill the needed spot of a vacancy in an industry, and with the beginning of the fourth industrial revolution, employers are taking the hiring process to the digital world. As Artificial Intelligent (AI) has a high-speed computation and adaptively to big data, it used to analyses and represents the data to employers in an easy way so they can make their decisions effectively.An upcoming challenge is raised where if the new candidates for a vacancy will give the expected performance based on the hiring criteria's or not, and how to hire a candidate that will while dealing with the hiring process? Employers are concerned with the performance evaluation of their current employees, but it is a challenge knowing the performance of new candidates before hiring.This study is proposing a follow-up conceptual model of using Artificial Intelligent (AI) in the hiring process with the using of performance management and social screening to predict the new candidate expected performance by analyzing historical performances and conditions of employees. This method will give an additional parameter that assists the decision makers in the hiring process.Although this method is a step forward to eliminate bad hiring, but it is requiring a huge historical data including the tracking of the performance, personal information collected from several sources like surveys and social Media and employees conditions related to the time of old and current employees, to give results that are more efficient and accurate.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Implementation of an Intelligent Caravan Monitoring System Using a Simple Serial Communication Protocol for Microcontrollers (SSCPM) 基于简单串行通信协议的智能大篷车监控系统的实现
Tobias Glocker, Timo Mantere
{"title":"Implementation of an Intelligent Caravan Monitoring System Using a Simple Serial Communication Protocol for Microcontrollers (SSCPM)","authors":"Tobias Glocker, Timo Mantere","doi":"10.1109/IACS.2019.8809149","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809149","url":null,"abstract":"Safety applications play an essential role in our daily life. Without them many accidents would have happened. Especially nowadays, where the amount of traffic increases year by year, safety applications have become an important factor for the vehicle industry. Statistics have shown that the amount of accidents could be remarkably reduced for vehicles with safety systems. However, most of the safety systems are implemented on vehicles but not on trailers.This paper describes the implementation of an Intelligent Trailer Monitoring System which uses a Simple Serial Communication Protocol (SSCPM) for the communication between the vehicle’s board computer and the trailer’s monitoring system.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131984421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Patient Assistance System: A Proposed Structure 病人援助系统:一个拟议的结构
Mai A. Alharbi, Nouf T. Alharbi, H. M. Alharbi, Dina M. Ibrahim
{"title":"Patient Assistance System: A Proposed Structure","authors":"Mai A. Alharbi, Nouf T. Alharbi, H. M. Alharbi, Dina M. Ibrahim","doi":"10.1109/IACS.2019.8809136","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809136","url":null,"abstract":"Patient Assistance is a priority for all health care providers with the overall objective of achieving a high degree of patient satisfaction. Patient Assistance system (PAS) is an electronic device contracting of a Two-way radio or video transmitter with a phone application to simplify the process of monitoring the patient by helps patient to monitor and organize his treatment and reassure millions of families that their patient is in safe. In this paper, we propose a structure for a patient assistance system that we called PAS, will provide some important features like Easy to use, low cost, organizing the process of patient treat-time remotely, including alarm, and send or receive notifications among assistants, and patients. In comparison with the earlier systems in patient monitoring systems by using the most common features, we found limitations in the current systems; our proposed system will dissolve these disadvantages.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信