M. Khireddine, M. Makhloufi, Y. Abdessemed, A. Boutarfa
{"title":"Tracking power photovoltaic system with a fuzzy logic control strategy","authors":"M. Khireddine, M. Makhloufi, Y. Abdessemed, A. Boutarfa","doi":"10.1109/CSIT.2014.6805977","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805977","url":null,"abstract":"Photovoltaic generation is the technique which uses photovoltaic cell to convert solar energy to electric energy. Nowadays, PV generation is developing increasingly fast as a renewable energy source. However, the disadvantage is that PV generation is intermittent for depending on weather conditions. This paper proposes an intelligent control method for the maximum power point tracking (MPPT) of a photovoltaic system under variable temperature and solar radiation conditions. This method uses a fuzzy logic controller applied to a DC-DC boost converter device. A photovoltaic system including a solar panel, a DC-DC converter, a Fuzzy MPP tracker and a resistive load is modeled and simulated. Finally performance comparison between fuzzy logic controller and Perturb and Observe method has been carried out which has shown the effectiveness of fuzzy logic controller to draw much energy and fast response against change in working conditions.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129000365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offline handwritten signature verification system using a supervised neural network approach","authors":"Mujahed Jarad, Nijad A. Al-Najdawi, Sara Tedmori","doi":"10.1109/CSIT.2014.6805999","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805999","url":null,"abstract":"Signatures are imperative biometric attributes of humans that have long been used for authorization purposes. Most organizations primarily focus on the visual appearance of the signature for verification purposes. Many documents, such as forms, contracts, bank cheques, and credit card transactions require the signing of a signature. Therefore, it is of upmost importance to be able to recognize signatures accurately, effortlessly, and in a timely manner. In this work, an artificial neural network based on the well-known Back-propagation algorithm is used for recognition and verification. To test the performance of the system, the False Reject Rate, the False Accept Rate, and the Equal Error Rate (EER) are calculated. The system was tested with 400 test signature samples, which include genuine and forged signatures of twenty individuals. The aim of this work is to limit the computer singularity in deciding whether the signature is forged or not, and to allow the signature verification personnel to participate in the deciding process through adding a label which indicates the amount of similarity between the signature which we want to recognize and the original signature. This approach allows judging the signature accuracy, and achieving more effective results.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114170135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using weaving models in metamodel and model co-evolution approach","authors":"F. Anguel, A. Amirat, N. Bounour","doi":"10.1109/CSIT.2014.6805992","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805992","url":null,"abstract":"In Model-Driven Engineering, analogously to any software artifact, metamodels are equally prone to evolution. When a metamodel undergoes modifications, all the related artifacts must be accordingly adapted in order to remain valid. Manual co-evolution of models after these metamodel changes is error-prone. In this setting, this paper introduces a semi-automatic process for the co-evolution of models after metamodel evolution. The process is divided in four main stages: at the differencing stage, the changes to the metamodel are detected. After that these changes are linked with the original model elements and represented in a weaving model which serves to generate a transformation used in the last stage in order to obtain the evolved model. Contributions of this paper include the automatic co-evolution of breaking and resolvable changes and the assistance to the model developer in the co-evolution of breaking and un-resolvable changes.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128822923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nour E. Oweis, S. Owais, Mohammad A. Alrababa, MohammadAtiah Alansari, Waseem G. Oweis
{"title":"A survey of Internet security risk over social networks","authors":"Nour E. Oweis, S. Owais, Mohammad A. Alrababa, MohammadAtiah Alansari, Waseem G. Oweis","doi":"10.1109/CSIT.2014.6805970","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805970","url":null,"abstract":"The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on the human elements. We raised the problems of social networks in the transformation of societies to another affected by the global economy. The social networking integration needs to strengthen social ties that lead to the existence of these problems. For this we focused on the Internet security risks over the social networks. And study on Risk Management, and then look at resolving various problems that occur from the use of social networks.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122490743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic registration of user drawn graphical passwords","authors":"S. Jebriel, R. Poet","doi":"10.1109/CSIT.2014.6805997","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805997","url":null,"abstract":"This paper reports on a recognition based graphical authentication system where the users provide their pass images as simple drawings. Previous such systems have relied on a human administrator to register the images with the system, which limits their scale. We have replaced the administrator with software that both guides the user through the registration process and then automatically corrects any errors in the image files submitted to the system. We also investigate two ways of implementing these systems, by drawing on paper and scanning in the images, and using a computer paint program to create the images. We conducted a user study with 40 effective users. Our software was able to correct all the errors made by the users, extracting usable images in all cases. We also found that our users strongly preferred using the paint system to the system that required the use of a scanner. This research has implications for authentication with mobile phones, where the camera can replace the scanner and finger drawing apps replace the paint program..","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the guessability of hand drawn images based on cultural characteristics","authors":"S. Jebriel, R. Poet","doi":"10.1109/CSIT.2014.6805971","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805971","url":null,"abstract":"The aim of this research is to examine whether or not an attacker could guess hand drawn images chosen as graphical password by others, based on knowledge of some cultural information like where they are come from or their religion or even their hopes and aims. Also, the aim was therefore to ascertain at what level the cross-cultural influences might affect our choice and use of drawn images as password. The investigation made a comparison between Western (Scottish), Arab (Libyans) and Africans (Nigerians) as the comparison between regions which had been well investigated by previous researchers had tended to focus on Western and Eastern subjects. To conclude, it can be accepted that culture significantly affected drawings depending on some human factors such as gender, etc. Moreover, one clear result of this work is that it is apparently highly possible to guess other people's pass images if they contain cultural characteristics, especially religious marks, otherwise it is much more difficult to guess them, and also this depends on many factors. Finally, this paper outlines some rules and guidelines of drawing a strong secret graphical password.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127011013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welcome massages","authors":"M. Judeh","doi":"10.1109/csit.2014.6805967","DOIUrl":"https://doi.org/10.1109/csit.2014.6805967","url":null,"abstract":"Welcome Message from the President of Applied Science University - Prof. Mahfuz Judeh","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116170521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}