Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh, M. I. Uddin
{"title":"Review of Weapon Detection Techniques within the Scope of Street-Crimes","authors":"Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh, M. I. Uddin","doi":"10.1109/ICSCEE50312.2021.9498007","DOIUrl":"https://doi.org/10.1109/ICSCEE50312.2021.9498007","url":null,"abstract":"The ratio of street crimes in under developing is very high. Everyday violent incidents are reported, which happen mainly because a person having access to armory. In certain areas, armory is controlled by installing X-rays, or allocating police. In some cases, CCTV cameras are installed to monitor visual armory. But these methods of controlling armory are expensive and require a huge deal of manual efforts. However Deep Learning has revolutionized the weapons detection system using CNN’s architectures. In this review paper we have discussed various weapons detection paper within the scope of street crime.","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shadi M. S. Hilles, A. Liban, Othman A. M. Miaikil, Abdullah Mahmoud Altrad, Yousef A. Baker El-Ebiary, Mohanad M. Hilles, Jennifer O. Contreras
{"title":"Latent Fingerprint Enhancement and Segmentation Technique Based on Hybrid Edge Adaptive DTV Model","authors":"Shadi M. S. Hilles, A. Liban, Othman A. M. Miaikil, Abdullah Mahmoud Altrad, Yousef A. Baker El-Ebiary, Mohanad M. Hilles, Jennifer O. Contreras","doi":"10.1109/ICSCEE50312.2021.9498025","DOIUrl":"https://doi.org/10.1109/ICSCEE50312.2021.9498025","url":null,"abstract":"Image enhancement and segmentation is widely used for fingerprint identification and authorization in biometrics devices, criminal scene is most challenges due to low quality of fingerprint, the most significant efforts is to develop algorithm for latent fingerprint enhancement which become challenging problem due to the complex and existing problem for instance, developing algorithms of latent fingerprint is able to extract features of image blocks and removing overlapping and isolate the poor and noisy background. however, it’s still challenging and interested problem specifically latent fingerprint enhancement and segmentation. The aim study of this paper is to propose latent fingerprint enhancement and segmentation based on hybrid model and Chan-Vese method for segmentation, in order to reduce low image quality and increase the accuracy of fingerprint. The desired characteristics of intended technique are adaptive, effective and accurate, hybrid model of edge adaptive direction achieves accurate latent fingerprint enhancement and segmentation, the target needs to improve feature detection and performance, this research has proposed system architecture of research method in fingerprint enhancement and segmentation where is the method content two stages, the first is normalization and second is reconstruction, using EDTV model is required for adaptive noise, in addition Chan-vase technique contributed for identification of fingerprint image features, the result and testing using RMSE with three categories of fingerprint images good, bad and ugly show better performance for all three categories, as well RMSE shows the average of good latent fingerprint before and after enhancement. Latent Fingerprint Enhancement and Segmentation Technique Based on Hybrid Model Edge Adaptive Directional Total Variation","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132785058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[ICSCEE 2021 Front cover]","authors":"","doi":"10.1109/icscee50312.2021.9497954","DOIUrl":"https://doi.org/10.1109/icscee50312.2021.9497954","url":null,"abstract":"","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohaizi Bin Mohamad, Anas Ghassan Kanaan, Khairi Aseh, N. A. Alawi, Khalid Thaher Amayreh, Yazeed Al Moaiad, Zakarya Mohsen Al-hodiany, P. Pathmanathan, Yousef A. Baker El-Ebiary
{"title":"Enterprise Problems and Proposed Solutions Using the Concept of E-Commerce","authors":"Mohaizi Bin Mohamad, Anas Ghassan Kanaan, Khairi Aseh, N. A. Alawi, Khalid Thaher Amayreh, Yazeed Al Moaiad, Zakarya Mohsen Al-hodiany, P. Pathmanathan, Yousef A. Baker El-Ebiary","doi":"10.1109/ICSCEE50312.2021.9498197","DOIUrl":"https://doi.org/10.1109/ICSCEE50312.2021.9498197","url":null,"abstract":"The noise of e-commerce businesses has seen the extension of number of the online businesses global. Buyers now are opted with online business commerce which is greatly benefit compared to traditional businesses. It is undeniable e-commerce enterprises contribute more profits, comparing to \"bricks-and-mortal\" traditional enterprises, but not to be avoided the problems and challenges faced by the e- commerce marketplace. This study emphasizes the problems and challenges of e-commerce and a set of recommended solutions to those problems and challenges. Those problems are trust, readiness and security. For each of the problems, proposed solutions are presented. Companies have conducted business electronically by applying a range of electronic commerce solutions. In the current situation, a corporation enters the electronic market by building trading partner agreements with sellers or wholesalers of their choice. These deals may include any items that cannot be agree electronically, like terms of transfer, payment devices, or implementation rules. After discovering the right market relationships, a company must choose the elements of their electronic commerce system. In this paper have been formulate current ecommerce problems, challenges and their effective solutions. In future, e-commerce marketplace should concentrate more on securing payment, e-banking and e-government. With that, problems and challenges in e-commerce can be reduce.","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Ameerbakhsh, F. Ghabban, I. Alfadli, A. AbuAli, Arafat Al-dhaqm, M. Al-Khasawneh
{"title":"Digital Forensics Domain and Metamodeling Development Approaches","authors":"O. Ameerbakhsh, F. Ghabban, I. Alfadli, A. AbuAli, Arafat Al-dhaqm, M. Al-Khasawneh","doi":"10.1109/ICSCEE50312.2021.9497935","DOIUrl":"https://doi.org/10.1109/ICSCEE50312.2021.9497935","url":null,"abstract":"Metamodeling is used as a general technique for integrating and defining models from different domains. This technique can be used in diverse application domains, especially for purposes of standardization. Also, this process mainly has a focus on the identification of general concepts that exist in various problem domain and their relations and to solve complexity, interoperability, and heterogeneity aspects of different domains. Several diverse metamodeling development approaches have been proposed in the literature to develop metamodels. Each metamodeling development process has some advantages and disadvantages too. Therefore, the objective of this paper is to provide a comprehensive review of existing metamodeling development approaches and conduct a comparative study among them-eventually selecting the best approach for metamodel development in the perspective of digital forensics.","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115045949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abubakar Abdullahi, A. Al-Masoodi, A. H. Al-Masoodi, S. Harun, Nader Abdulrahman
{"title":"Simple Fabrication of Bismuth Telluride Used as Saturable Absorber for Generating Microsecond Pulse Fiber Laser","authors":"Abubakar Abdullahi, A. Al-Masoodi, A. H. Al-Masoodi, S. Harun, Nader Abdulrahman","doi":"10.1109/ICSCEE50312.2021.9497902","DOIUrl":"https://doi.org/10.1109/ICSCEE50312.2021.9497902","url":null,"abstract":"This paper is the explanation of the development of Q-switched Erbium doped fiber (EDF) laser using Bismuth Telluride Bi2Te3 as SA. The continuous wave (CW) was then demonstrated in the EDF laser, which also shows the output is increased from 0.36 to 6.3 mW by increasing in the pump power from 15 to 147 mW. The center wavelength of 1567.7 nm with a 3dB bandwidth of 0.2 nm at pump power of 112 mW has been reported. The fabrication of Bismuth Telluride Bi2Te3 used a liquid phase exfoliation method. By adding a small piece of qualified Bi2Te3 film was incorporated among two optical fiber ferrules to produce the SA tool after the optical isolator, the generation of Q-switching pulse train in the EDFL cavity with the SA was generated starting from 61 to 112 mW pump power. The highest repetition rate of 46 kHz and the minimum pulse width of 7.8 µs are attained using Bi2Te3 SA with corresponding signal to noise ratios (SNR) of 47 dB. The high SNR values indicate the stability of both Q-switched lasers. The highest pulse energy and output power were achieved at 67 nJ and 4 mW respectively. The result shows a great potential for use in generating Q-switching pulses in the EDFL. The fabrication of both SAs is simple and cheap while the output of both Q-switched lasers is highly stable at room temperature.","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imran Ahmad, Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh
{"title":"Performance Analysis of Intrusion Detection Systems for Smartphone Security Enhancements","authors":"Imran Ahmad, Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh","doi":"10.1109/ICSCEE50312.2021.9497904","DOIUrl":"https://doi.org/10.1109/ICSCEE50312.2021.9497904","url":null,"abstract":"In order to protect user privacy and a smartphone from imminent security breaches, it is necessary to have an intrusion detection system (IDS). According to stock market surveys, Android is the most popular mobile operating system (OS). By 2021, smartphone traffic is expected to exceed that of personal computers. This makes the smartphone most attractive for potential attacks. The risk is due to the creation of malicious applications and gaming, the majority of which are freely available to users. The main problems with the IDS developed for Smartphone Technology are the CPU, memory, and their battery usage, because there are limited energy resources for smartphones and other mobile devices. The other problem is that most other security devices including anti-malware and antiviruses continuously need to upgrade their signatures from servers and upgrading antivirus signatures is more energy consuming. At the same time hackers use innovative types of attacks to hack smartphones while signatures for these do not exist at the server side. In this study the main focus is on the performance analysis of IDS for Smartphone communications and transactions. In addition the implication of this analysis with a view to improving existing intrusion detection systems is discussed. A detailed comparative study of existing method of intrusion detection system for smartphone security improvement and enhancement is presented to point out the pros and cons of the currently in use intrusion detection technique for smartphones.","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126239926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Moderating Effect of Compatibility Factor in The Usage of E-Government Services Among Malaysian Citizens","authors":"M. Alzubi, B. Ismaeel, Al-Harath Ateik","doi":"10.1109/ICSCEE50312.2021.9498076","DOIUrl":"https://doi.org/10.1109/ICSCEE50312.2021.9498076","url":null,"abstract":"The primary aim of the study was to investigate the role of E-government services among citizens of Malaysia. Unified theory of acceptance and use of technology (UTAUT) was used in this descriptive study for testing how the Malaysian citizens perceive technology usage in E-government services utilizing e-applications. The purposive and snowball sampling was applied in choosing the respondents. Self-administered questionnaire was used in gathering primary data and 381 usable responses were obtained. The approach of PLS was applied for the data analysis. The outcomes show support to all UTAUT hypotheses. From the outcomes, Compatibility (C) appears to partially moderate the relationship of Performance Expectancy (PE), Social Influence (SI), Facilitating Condition (FC), Effort Expectancy (EE). Overall, the citizens appear to be well adapted to the utilization of electronic technology for general E-government services. Nonetheless, the impact of electronic technology being a tool appears to be restricted within E-government, similar to the finding of past works. This implies the possible presence of other factors that decrease the mobile apps usage for services, aside from technology. The knowledge regarding citizen’s behaviour within the progressive domain of E-government is expanded in this work. In practice, this study assists E-government practitioners in comprehending the citizen’s needs.","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hassan Awad Sukhni, Mahmoud Ahmad Al-Khasawneh, Fakhrul Hazman Bin Yusoff
{"title":"A Systematic Analysis for Botnet Detection using Genetic Algorithm","authors":"Hassan Awad Sukhni, Mahmoud Ahmad Al-Khasawneh, Fakhrul Hazman Bin Yusoff","doi":"10.1109/ICSCEE50312.2021.9498109","DOIUrl":"https://doi.org/10.1109/ICSCEE50312.2021.9498109","url":null,"abstract":"Internet faces different types of threats from the attackers using malicious software (malwares) such as viruses, worms and botnets. Botnets are considered to be among as one of the biggest threats in the cyber world and rapidly evolving day by day. It has become as one of the most dangerous malicious malware due to the difficulty to detect the botnet. This research paper presents a systematic analysis on how botnet works and how it is being detected and how genetic algorithm can be applied in detecting botnets. Furthermore, it also discusses the future challenges and the ongoing research techniques to detect botnets.","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128126240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Track","authors":"","doi":"10.1109/icscee50312.2021.9498256","DOIUrl":"https://doi.org/10.1109/icscee50312.2021.9498256","url":null,"abstract":"","PeriodicalId":252529,"journal":{"name":"2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128202185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}