{"title":"Arabic Automatic Speech Recognition Enhancement","authors":"Basem H. A. Ahmed, A. S. Ghabayen","doi":"10.1109/PICICT.2017.12","DOIUrl":"https://doi.org/10.1109/PICICT.2017.12","url":null,"abstract":"In this paper, we propose three approaches for Arabic automatic speech recognition. For pronunciation modeling, we propose a pronunciation variant generation with decision tree. For acoustic modeling, we propose the Hybrid approach to adapt the native acoustic model using another native acoustic model. Regarding the language model, we improve the language model using processed text. The experimental results show that the proposed pronunciation model approach has reduction in WER around 1%. The acoustic modeling reduce the WER by 1.2% and the adapted language modeling show reduction in WER by 1.9%.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114214298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommender Model for Messaging System at MOODLE","authors":"R. Atallah, T. Barhoom, Omar E. Elejla","doi":"10.1109/PICICT.2017.23","DOIUrl":"https://doi.org/10.1109/PICICT.2017.23","url":null,"abstract":"E-learning systems are powerful way for enriching learning and teaching process. With the spread of this culture, there is a need for Learning management system as MOODLE, aTutor, canvas and Sakai. Modular Object-Oriented Dynamic Learning Environment (MOODLE) allows students and instructors to interact easily and effectively in various ways, especially via private messaging system. In order to make this feature more convenient for both students and instructors, this research proposed a model that integrated within messaging system of MOODLE to filter unwanted messages, recommend a material for students, and to help them finding answers to their questions which are founded on the message. The problem of this research is how to build a model to prevent message which contains taboo words and send recommended material to students according to their questions. This new model will make it easier for students to find information and materials they are looking for, or asking about and at the same time it will keep instructors' mailbox clean of any unwanted irrelevant messages. The research methodology consists of four stages start from stating the theoretical foundation, then designing the model functions, building the model's functions, and finally evaluating the Model. The model was applied at University of Palestine on six courses with various natural of materials, some of these materials are isolated topics. In this type of courses the accuracy of the system was high. On the other hand, there are some courses in which their topics are integrated with each other, and the accuracy was less than the other type of materials, but in general the whole system's accuracy is 96.66% and the reliability of the system is 92.55%. Finally, the model is founded to improve using message in the MOODLE, and the model actually solved the problem of this research.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generated Un-detectability Covert Channel Algorithm for Dynamic Secure Communication Using Encryption and Authentication","authors":"T. Fatayer","doi":"10.1109/PICICT.2017.13","DOIUrl":"https://doi.org/10.1109/PICICT.2017.13","url":null,"abstract":"The keys generated by (symmetric or asymmetric) have been still compromised by attackers. Cryptography algorithms need extra efforts to enhance the security of keys that are transferring between parities. Also, using cryptography algorithms increase time consumption and overhead cost through communication. Encryption is very important issue for protecting information from stealing. Unfortunately encryption can achieve confidentiality not integrity. Covert channel allows two parties to indirectly send information, where the main drawbacks of covert channel are detectability and the security of pre-agreement knowledge. In this paper, i merge between encryption, authentication and convert channel to achieve un-detectability covert channel. This channel guarantee integrity and confidentiality of covert data and sending data dynamically. I propose and implement un-detectability a covert channel using AES (Advanced Encryption Standard) algorithm and HMAC (Hashed Message Authentication Code). Where this channel is un-detectability with integrity and confidentiality agreement process between the sender and the receiver. Instead of sending fake key directly through channel, encryption and HMAC function used to hide fake key. After that investigations techniques for improving un-detectability of channel is proposed.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125552700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Abualigah, A. Khader, M. Al-Betar, Zaid Abdi Alkareem Alyasseri, O. Alomari, Essam Said Hanandeh
{"title":"Feature Selection with β-Hill Climbing Search for Text Clustering Application","authors":"L. Abualigah, A. Khader, M. Al-Betar, Zaid Abdi Alkareem Alyasseri, O. Alomari, Essam Said Hanandeh","doi":"10.1109/PICICT.2017.30","DOIUrl":"https://doi.org/10.1109/PICICT.2017.30","url":null,"abstract":"In the bases of increasing the volume of text information, the dealing with text information has become incredibly complicated. The text clustering is a suitable technique used in dealing with a tremendous amount of text documents by classifying these set of text documents into clusters. Ultimately, text documents hold sparse, non-uniform distribution and uninformative features are difficult to cluster. The text feature selection is a primary unsupervised learning method that is utilized to choose a new subset of informational text features. In this paper, a new algorithm is proposed based on β-hill climbing technique for text feature selection problem to improve the text clustering (B-FSTC). The results of the proposed method for β-hill climbing and original Hill climbing (i.e., H-FSTC) are examined using the k-mean text clustering and compared with each other. Experiments were conducted on four standard text datasets with varying characteristics. Interestingly, the proposed β-hill climbing algorithm obtains superior results in comparison with the other well-regard techniques by producing a new subset of informational text features. Lastly, the β-hill climbing-based feature selection method supports the k-mean clustering algorithm to achieve more precise clusters.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imad A. Shaheen, A. Zekry, F. Newagy, Reem Ibrahim
{"title":"Modified Square Rooting Companding Technique to Reduced PAPR for FBMC/OQAM","authors":"Imad A. Shaheen, A. Zekry, F. Newagy, Reem Ibrahim","doi":"10.1109/PICICT.2017.18","DOIUrl":"https://doi.org/10.1109/PICICT.2017.18","url":null,"abstract":"Multicarrier modulation (MCM) have become a fast developing area in wireless communication system. The filter bank multicarrier with offset quadrature amplitude modulation (FBMC/OQAM) system may be the most popular multicarrier modulation technique used for next generation wireless communication technology 5G. It has several advantages such as supporting high data rate, low impulse noise and eliminating inter symbol interference (ISI), inter-carrier interference. However, the main challenging problems of FBMC/OQAM system is the high peak to average power ratio (PAPR). In this paper, we used Square Rooting Companding Technique (SQRT) to reduce the PAPR in the FBMC system, then we modified the SQRT scheme to new scheme which namely by Rooting Companding Technique (RCT). Moreover, new techniques are analyzed with CCDF characteristics and BER Performances. However, the simulation result shows the proposed RCT schemes given significant improvement in the PAPR reduction and increasing BER performance.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"477 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Betar, M. Awadallah, Asaju La'aro Bolaji, B. Alijla
{"title":"β-Hill Climbing Algorithm for Sudoku Game","authors":"M. Al-Betar, M. Awadallah, Asaju La'aro Bolaji, B. Alijla","doi":"10.1109/PICICT.2017.11","DOIUrl":"https://doi.org/10.1109/PICICT.2017.11","url":null,"abstract":"In this paper, β-Hill Climbing algorithm, the recent local search-based meta-heuristic, are tailored for Sudoku puzzle. β-Hill Climbing algorithm is a new extended version of hill climbing algorithm which has the capability to escape the local optima using a stochastic operator called β-operator. The Sudoku puzzle is a popular game formulated as an optimization problem to come up with exact solution. Some Sudoku puzzle examples have been applied for evaluation process. The parameters of the β-Hill Climbing is also studied to show the best configuration used for this game. β-Hill Climbing in its best parameter configuration is able to find solution for Sudoku puzzle in 19 iterations and 2 seconds.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125354891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Adaptive Control Based on Bacteria Foraging Optimization","authors":"H. Elaydi, Ramzi J. Al Ghamri","doi":"10.1109/PICICT.2017.16","DOIUrl":"https://doi.org/10.1109/PICICT.2017.16","url":null,"abstract":"This paper presents a model reference adaptive control (MRAC) based on bacteria foraging optimization algorithm (BFOA) to control maglev model CE152 which is unstable nonlinear system. An adaptive controller is designed to keep the magnetic ball suspended in the air counteracting the weight of the object. A MRAC based on BFOA to control of this system is designed and simulated using Matlab/Simulink. The results are compared with Fuzzy Logic (FL) control, and Fuzzy Logic based Genetic Algorithm (GA) control. The proposed approach outperformed all other approaches in terms of overshoot, rise and settling time and steady state error.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Khelifi, Rashid Al Hamli, Saeed Al Tamimi, Rashid Al Ali
{"title":"An Automated System for Monitoring Horses Vital Signs Using Heart Beat Sensors","authors":"A. Khelifi, Rashid Al Hamli, Saeed Al Tamimi, Rashid Al Ali","doi":"10.1109/PICICT.2017.14","DOIUrl":"https://doi.org/10.1109/PICICT.2017.14","url":null,"abstract":"A dire need of an affordable and accessible technology in order to maintain horses' health can be seen in the animals' care sector. Technology integration at this level will not only enable users to have access to a reliable tool to measure the heartbeat of the horses but also helps to eliminate the need of costly sensors that are expensive and seldom portable. The main objective of the proposed solution is to monitor vital signs of the horses in the form of maintaining their health by an effective instrument that would help any kind of user with a little knowledge of technology to be able to take care of their horses. The sensors of the proposed system allow transmitting horses' heartbeat to a Mobile App through Bluetooth. Then, the Mobile App generates instantly statistics and required information about the horse's heartbeat rate. In addition, the Mobile App sends the horse's heartbeat to the client's servers for more analysis to give the owner of the horses a genuine competitive advantage. The results show that any kind of training program that needs to be conducted for the horse can be customized according to the horse's heart beat and the vital signs that the heartbeat of the horse denotes.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115772867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kam Chiang Wei, M. Singh, Huzaifa Marina Binti Osman
{"title":"Near Field Communication Interactive Learning System (NILES) for Blended Learning: A Pervasive Social Networking Services","authors":"Kam Chiang Wei, M. Singh, Huzaifa Marina Binti Osman","doi":"10.1109/PICICT.2017.29","DOIUrl":"https://doi.org/10.1109/PICICT.2017.29","url":null,"abstract":"Nowadays, e-learning has emerged as a prospective solution to the learning process. E-learning is known as a learning tool which based on technology to deliver learning material electronically through computer network. The involvement of the students and the lecturers in the existing learning system is not interactive as they use it as a medium to deliver notes and receive notes only. The traditional attendance system which passes the attendance sheet around the class or by calling names is also not productive and time consuming to process the data into attendance statistics. Therefore, an interactive learning system embedded with NFC attendance system using NFC enabled smartphone known as NFC Interactive LEarning System (NILES) is proposed to take attendances and lecturers can conduct their classes in a more interactive way in school, college or university through the usage of social media and blended learning tools. The proposed solution can provide a convenient and portable classroom learning system to the universities and colleges to improve the interaction learning process among students and reduce the workload of lecturers in processing the attendance statistics. This becomes the characteristics of Pervasive Social Networking (PSN).","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"25 38","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Active Contour Model for Building Extraction from Aerial Images","authors":"A. Alattar, M. Oudah","doi":"10.1109/PICICT.2017.22","DOIUrl":"https://doi.org/10.1109/PICICT.2017.22","url":null,"abstract":"Building extraction from aerial images is one of the recent topics of remote sensing used in many applications such as urban planning, disaster management, military planning, and Geographic Information Systems (GIS). One of the commonly used approaches in building extraction is Active Contour Model (ACM), also called snake model, for its ability to extract contours of structured and unstructured shapes of objects. However, using traditional ACM model in building extraction faces the problem of narrowly concave contour regions. In this research, we propose to solve the deep concavities problem with the use of a concavity index which adaptively determines the rigidity coefficient of the snake points located in the deeply narrow segments of the contour. Our adaptive model was tested on different sets of buildings extracted from aerial images. Results were evaluated using two evaluation approaches. One in terms of accuracy, precision and recall, and the other in terms of the Error Distance Ratio (ERd) which is the average ratio of distance between each snake point and the true edge map point (by pixels). Result were compared with the GVF snake model in terms of both accuracy and execution time.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}