{"title":"An Overview on Detecting Digital Image Splicing","authors":"Mohammed S. Khazaal, M. Kherallah, F. Charfi","doi":"10.1109/ACIT57182.2022.9994194","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994194","url":null,"abstract":"In today's society, digital images increasingly predominate as a source of information. However, they are easily modifiable with accessible image editing software. An image forgery technique that is frequently used is splicing. It involves combining two or more separate images to produce a merged image that differs greatly from the source image. Image splicing detection is crucial to digital forensics; hence it has recently drawn more attention. We present a comprehensive analysis of the research on several image splicing detection technologies. In the literature, a variety of methods utilizing machine and deep learning to detect image splicing have been suggested. The investigation carried out in this paper may assist the researcher in better comprehending the benefits and uses of the image splicing detection technologies already in use and in the development of more effective algorithms for detection.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116267994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feras Al-Hawari, Khaled Tayem, S. Alouneh, Anass Al-Ksasbeh
{"title":"Methodology to Evaluate the Performance of Hadoop MapReduce on a Hyper-V Cluster using SAN Storage","authors":"Feras Al-Hawari, Khaled Tayem, S. Alouneh, Anass Al-Ksasbeh","doi":"10.1109/ACIT57182.2022.9994200","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994200","url":null,"abstract":"Deploying Hadoop MapReduce applications in a virtualized environment is adopted by some cloud computing providers for better resource utilization. However, the virtualization overhead can negatively affect the performance of applications when executed on virtual machines rather than physical servers. In that regard, this paper introduces a methodology to match the software and hardware specifications of virtual and physical Hadoop clusters to allow accurate measurement of virtualization overhead as well as enable the efficient execution of MapReduce applications on both clusters. The methodology considers configuring non uniform memory access in the utilized powerful servers. It also factors in multipath aggregation that facilitates load balancing and failover protection when the servers access SAN storage over a local Ethernet network. The WordCount application with workloads that reached 750 GB was executed on both clusters to evaluate the effects of virtualization on application performance. The results showed that the average elapsed time of a MapReduce application on a specific virtual cluster can be 19.2% higher than that on a physical cluster, mainly due to I/O throughput degradation over the virtual cluster in that case.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reda S.M. Al-Mawadieh, S. Shdaifat, Majdi Adheisat, M. A. Al-Zu’bi, Ala Eddin Sadeq Jrab, Khaled Al-Sarairah
{"title":"The Degree of Practicing Electronic Management by Kindergarten Principals in Karak Governorate in Light of Corona Pandemic","authors":"Reda S.M. Al-Mawadieh, S. Shdaifat, Majdi Adheisat, M. A. Al-Zu’bi, Ala Eddin Sadeq Jrab, Khaled Al-Sarairah","doi":"10.1109/ACIT57182.2022.9994107","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994107","url":null,"abstract":"This study aimed to reveal the degree of electronic management practice for kindergarten principals in Karak governorate in light of Corona pandemic. The descriptive - survey methodology was used. The study sample consisted of (84) kindergarten teachers. They were selected by using stratified random method. The questionnaire was used as a tool to collect data of the study. Its validity and reliability were assured. The findings of the study indicated that the degree of practicing electronic management by kindergarten principals in Karak governorate in light of Corona pandemic was medium. There were no statistically significant differences in the degree of practicing electronic management by kindergarten principals attributed to kindergarten type, academic qualification and experience variables. In light of the findings, several recommendations were made, including: Organizing training courses for kindergarten principals dealing with the electronic management of the kindergarten and how to use it to achieve organizational goals.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"112-113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124000715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Analysis of Pediatric Pes Planus Gait","authors":"N. Mirza, Adnan Ali, Rawad Bader, Nurashidah Musa, Mohamad Ishaq Khairi","doi":"10.1109/ACIT57182.2022.9994123","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994123","url":null,"abstract":"Flat foot is another name given to the pes planus. It is present in several patients. It can be categorized by absence or very low arch. Whereas, an arch is considered a vital supportive frame of the foot. Patients suffering from pes planus complain about a higher number of discomfort and pain in their lower extremities. The current research study is implemented to generate the simulated effects of pes planus in young kids. To study the characteristics of this specific human gait, a musculoskeletal model was designed in OpenSim. Later on, the data was imported to develop the graphs and complete the analysis of the modeling process. From the observed data, and results it was concluded that a slight change in tib_ant muscle induced a series of impacts on the child. Moreover, the methodical monitoring and screening of children exhibiting early signs and symptoms can prevent late complications and help children perform better in physical sports.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129528914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumer Protection from Misleading Online Advertisements “An Analytical Study in UAE Law”","authors":"T. Kameel, M. Kandeel, M. Alkrisheh","doi":"10.1109/ACIT57182.2022.9994108","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994108","url":null,"abstract":"This paper tackles false advertisement on the internet in the United Arab Emirates, due to the significance of advertisement that involves deception, lies, that may effect goods, services and consumers and fair competition. As such online contracting based on deception may undermine the free will of the related parties, the consumer would most possibly fall victim to such false advertisements. The issue of sufficient legislative protection of consumers form deceptive online trading false advertisements. The research adopts a descriptive analytical methodology, through handling the issues that may face the consumers from deceptive false advertisements. Analysing the provisions of related laws and jurists' jurisprudence, to identify the possible legal, judicial gaps that may appear within the provisions and jurisdiction. In order to provide real and enough protection for consumers from false online advertisements. The UAE legislator provided certain protective scattered provisions within various related legislations such as the Federal Consumer Protection Act No. 15 of 2020 and Federal Commercial Deception No. 19 of 2016 which is such a progressive step forward towards futuristic legislative solutions to protect consumers during online trading from false deceptive advertisements and that may take into consideration the various online means of advertisement through social media or otherwise (Facebook, Instagram, Twitter, Snapchat, etc …) which, influencers celebrities preform without licence while taking into hand the international rules that governs online borderless virtual web.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133573253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani
{"title":"A Proposed Framework for Early Detection IoT Botnet","authors":"Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani","doi":"10.1109/ACIT57182.2022.9994166","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994166","url":null,"abstract":"The Internet of Things (IoT) is an overgrowing technology in both consumer and business use. This technology can significantly affect people's daily lives by changing how people drink coffee and how smart things interact with different industries. IoT could be useful in a lot of different ways. It can give businesses more information about their business, which can help them become more efficient and save money. The sheer amount of data that is created, the size and variety of networks, and the security and privacy issues that come up all slow down development and implementation. In the past few decades, distributed denial-of-service (DDoS) attacks on Internet of Things (IoT) networks have been seen as one of the most critical and urgent problems. DDoS attacks use the limited resources of IoT devices, like storage space and network bandwidth, to cause problems in IoT applications. This study looks at the different attacks that can lead to DDoS, hurting systems already in place. In this paper, we examine the potential countermeasures to these types of attacks from the perspective of a restricted device.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130451242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Tarawneh, Faisal Alzyoud, Y. Sharrab, Hassan Kanaker
{"title":"Secure E-health Framework in Cloud-Based Environment","authors":"M. Tarawneh, Faisal Alzyoud, Y. Sharrab, Hassan Kanaker","doi":"10.1109/ACIT57182.2022.9994164","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994164","url":null,"abstract":"Since December 2019, the world still fighting to beat coronavirus (COVID-19). However, coronavirus is continuing its spread in many countries and claimed the lives people. It is not easy to differentiate between COVID-19 symptoms and simple flu symptoms, especially at the first stage of the infection. This is the main challenge where we have to run many tests as possible and isolate any suspicious people 14 days at least to make sure that they are not carrying the virus. This will increase the cost and people may lose their jobs. Therefore, the economy has to continue. Companies and organization start running their business using online tools, this will draw different future and employee need to gain special task to continue their work. In order go back to the normal life, we have track the virus and stay away from infected area or people. In this paper, we propose a secure cloud-based health framework to record patients' readings, give initial diagnose to identify infected areas and control the spread of the virus. The proposed framework will be running in a secure environment to protect patient's records.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117019035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enriched e-Learning Model to Teach Kids in Arab Countries How to Write Code","authors":"Hamzeh Aljawawdeh","doi":"10.1109/ACIT57182.2022.9994110","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994110","url":null,"abstract":"Even for children, e-learning is essential today. Future generations will need to learn how to code. Because codes are complex, teaching them can be difficult. In this research, we present a model for teaching children programming. This study is an attempt to prove that teaching students to write code in Arab schools is feasible. The paper offers several insights and suggestions that would improve the mechanism of teaching young children to create code segments. Additionally, it highlights the significance of utilizing HCI to promote online education for children.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Aissani, Mohamed Chettah, Haneen Kanaan, M. Wehbe
{"title":"Information Technology Courses and their Adequacy for Graduates of Digital Media Programs in Arab Universities","authors":"R. Aissani, Mohamed Chettah, Haneen Kanaan, M. Wehbe","doi":"10.1109/ACIT57182.2022.9994202","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994202","url":null,"abstract":"This paper focuses on studying the structure of the study plans for digital media programs and specializations in Arab universities and their learning outcomes, as well as the contents of IT courses and their adequacy for the graduate It poses its problematic question in two main points: Do the plans of digital media programs in Arab universities contain a sufficient number of IT and multimedia courses? And do these courses contain the skills required for the graduate in the use of IT and multimedia in his specialization? The study adopted a quantitative and qualitative content analysis approach with two categories of analysis the shape category; It focused on studying the structure of study plans for digital media programs and specializations, the ratio of IT courses to the rest of the courses, and the content category; It focused on analyzing the structure of the learning outcomes of the programs, the contents of IT courses, and their adequacy for the graduate of digital media programs. The study concluded: The study plans of digital media programs in Arab universities incorporated a large number of information technology and multimedia courses in their study plans. These focused on teaching students computer skills, multimedia, graphic design, and software skills for designing, directing and publishing media materials. A review of the literature pertaining to course descriptions, learning outcomes, course content, and weekly topics show that the courses have a strong focus on training students in the digital literacy skills necessary for the labor market in the digital environment, such as word processing, file management software, privacy settings in phones, creating text files and professional presentations, internet search, desktop publishing and digital graphic design, Digital photo editing and production, processing of audio and video, multimedia applications in the field of advertising and media marketing.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ranking of Bug Reports into Findbug Categories using the BM25 Function","authors":"R. Shatnawi","doi":"10.1109/ACIT57182.2022.9994147","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994147","url":null,"abstract":"Bug reporting is a mechanism that is used by software companies to audit and track product quality. The developers and the users can log bug reports via a dedicated system. The quality of the bug reports affects the developers' endeavors to fix and close the bug. The reports include important information for the developers such as severity and priority. However, previous research found that most bugs are left without changing the severity level. Therefore, the developers need to know more information about the reported bug. In this research, we propose to improve the bug report by adding linking bug reports with a pre-specified bug description that was prepared by experts in bug types. i.e. the Findbug tool. The Findbug adds more information to the bug such as the bug type and bug category. The bugs are reclassified using a similarity function, BM25, to match it with more necessary information about the type of reported bugs. Text preprocessing was applied to remove unnecessary terms and to improve the search query in BM25. The proposed methodology could assign extra information to bug reports that help categorize them into different types such as correctness, security, performance, and others.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115849808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}