G. Alfarsi, Azmi Bin Mohd Yusof, Mohd Ezanee Bin Rusli, R. M. Tawafak, S. I. Malik, R. Mathew
{"title":"The student's Behavior Intention using Virtual Reality in Learning Environments","authors":"G. Alfarsi, Azmi Bin Mohd Yusof, Mohd Ezanee Bin Rusli, R. M. Tawafak, S. I. Malik, R. Mathew","doi":"10.1109/acit53391.2021.9677447","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677447","url":null,"abstract":"Virtual reality technology centres around the learner's actively interactive studying procedures and try to lessen the space among the learner's information and a real-life experience. Technology development continues, modern technologies and diverse applications continue to evolve. Virtual and augmented reality is one of these developments and could be a vital addition to the educational process. Many experts are aware of its potential educational benefits, and any change may be met with opposition and resistance to keeping students committed to classroom topics and unwillingness to change, but with shedding light on the benefits of integrating this technology into education, which is represented in increasing the interaction of students and helping them to better understand the material, especially with the generations of digital technology. Recently, Virtual reality technology had been evolved for a huge variety of packages in education, however, in addition, studies are wanted to set up suitable and powerful studying strategies and practices to encourage significant studying. Results confirmed that 3 essential elements affect learner purpose to apply the Virtual reality studying environment.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125237960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Data Protection Laws: Global and MENA Perspectives","authors":"Moufid El-Khoury","doi":"10.1109/acit53391.2021.9677394","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677394","url":null,"abstract":"Data protection regulations affect technology development and innovation. Policymakers around the world are promulgating and implementing regulations that would regulate the collection, the processing, the transfer, and the use of personal data. MENA countries are also setting forth a compliance legal framework for organizations dealing with personal data. With the commodification of personal data, the regulation of data protection is becoming a focal point in global policy-making.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126454756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Refai, ALmajali Haya, Hamed Fawareh, Hayel Khafajeh
{"title":"Database as a Service (DBaaS) Challenges and Solutions","authors":"M. Al-Refai, ALmajali Haya, Hamed Fawareh, Hayel Khafajeh","doi":"10.1109/acit53391.2021.9677127","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677127","url":null,"abstract":"Cloud services have become one of the trends in the IT industry. The real idea of Cloud computing is to satisfy the client without increasing infrastructure operations and costs. It is easy to use, cost-effective, less infrastructure and configuration costs. It has almost zero maintenance, low operational cost and less effort. Using cloud service to deploy Database is known as Database as a service (DBaaS) which become one of the most used cloud services with time. The DBaaS and cloud databases market is one of the fastest-growing Software-as-a-Service (SaaS), expected to grow more and more by next decade. Data warehouse and database vendors have joined established cloud providers in offering hosted versions of their software, enabling customers to leverage the many benefits of cloud computing for their applications’ data storage, search, and access needs. Like any new trend in IT, DBaaS faces many challenges at the forefront, like security, availability, and interoperability. To overcome these challenges, this work discusses them and provides solutions to use DBaaS in an efficient way.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128556181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the Role of Technologically Enabled Trading System in the Stability of Small and Medium Enterprises: The Case of Jordan","authors":"M. Ali, Abdel-Rahman Ismail, Issa Ahmad Swiety","doi":"10.1109/acit53391.2021.9677263","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677263","url":null,"abstract":"The current paper attempts to determine the role of technologically enabled trading system as captured by digital trading activities in the financial stability of small and medium enterprises, which are listed at Amman stock exchange. For this aim, the study analyzed a time series data set covers the period Jan/2010-Dec/2020. Where, the data set is primarily drawn from the semi-annual published reports for a sample of thirty small and medium listed companies. Consequently, through implementing the ADF and the multiple regression tests the study revealed that the volatility of stock capital gains is significantly related to the change in the number of transactions. Additionally, the liquidity of small and medium enterprises is found to be significantly impacted by the change in the number of transactions and the digital trading volume. Furthermore, results from the one-way Anova test approved that the volume of digital trading system in the Amman stock exchange is significantly and similarly impacting the stability of small and medium enterprises. Moreover, the study concluded that the stability of small and medium enterprises is highly related to the change in the measures of trading activity.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121185889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Essam Said Hanandeh, Aref Abu Awwad, Yazan Khassawneh
{"title":"Classify Arabic Text using Vector Space Models","authors":"Essam Said Hanandeh, Aref Abu Awwad, Yazan Khassawneh","doi":"10.1109/acit53391.2021.9677134","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677134","url":null,"abstract":"The researchers of this study chose 242 Arabic abstract doucments. Computer science and information systems are mentioned in all of these abstracts. The researchers created an Arabic-specific autonomous information retrieval system, the system was written in the C# NET programming language and its compatible with IBM/PCs and other microcomputers. For this corpus, The researchers used an automatic indexing strategy. The system was created using the Vector Space Model (VSM). In this model, the researcher take all measurements and utilize the Cosine, Dice, Jaccard, and Inner Product Similarity measures. Using the Vector Space Model, the researchers compared the retrieval results. In Arabic documents, the researchers discovered that the retrieval result for cosine is better than the retrieval result for other measures.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126777874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. S. Abdullah, A. Manoj, G. T. T. Kishore, S. Selvakumar
{"title":"A New Approach to Remote Health Monitoring using Augmented Reality with WebRTC and WebXR","authors":"A. S. Abdullah, A. Manoj, G. T. T. Kishore, S. Selvakumar","doi":"10.1109/acit53391.2021.9677324","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677324","url":null,"abstract":"The domain of Augmented Reality (AR) focus with the realm of conveying interactive experience of the objects in the real-world environment with the enhancement towards system generated information. It also conveys different forms of modality, visual perception, auditory and haptic information about the object which is considered for analysis. The system is used to formulate significant collaborative experiences with superimposed experiences among the users. This research work focus on the remote assistance for diagnosis and collaboration among the people who are involved as workers in product confirmation and analysis. The mechanism also decreases the communication issues with the intention of making the users to have a good enough environment to have a complete set of interaction. Therefore, to give a remote diagnostic of the work and guidance for the site workers from an expert we propose WebRTC (AppRTC) for Real-Time Video Communication and Google ARCore/ WebAR/ WebXR for augmenting the Video call, will be used and integrated to enhance the proposed system. Thereby the assembly process in improved for service quality with timely communication among the workers of a specified group..","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward the Use of Telecommunications Technology in Litigation with Technical Guarantees","authors":"M. Kandeel","doi":"10.1109/acit53391.2021.9677333","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677333","url":null,"abstract":"The world is witnessing an increasing development towards the use of telecommunications technology in the judicial system. This use has increased by the resort to the remote litigation system in light of (Covid-19) pandemic. However, a major question remains about the guarantees offered to litigants while using this system, and whether these guarantees are similar to traditional (i.e. non-electronic) litigation. This paper highlights the UAE model in providing sufficient technical guarantees to protect the rights of litigants while using technology in litigation, such as: Recording, safekeeping and confidentiality of the records of remote litigation; applying information security policies; the transcription of remote litigation procedures into electronic or hardcopy minutes or document; Acknowledging the validity of e-documents and e-signature ; and Technical Guarantees accompany the attendance and pleading of the parties shall be provided.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retention Contracts under Hidden Information","authors":"B. Athamena, Z. Houhamdi, Ghaleb A. El Refae","doi":"10.1109/acit53391.2021.9677284","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677284","url":null,"abstract":"This paper focuses on the utilization of retention contracts to screen and discipline managers in a context in which the council, board of directors, possesses incomplete information about the consequences of managers’ decisions. The analysis enlightens us on empire building, on the slight connection between achievement and firing, and describes concerns about the belief that low achievements result from bad managers. This paper analyzes a basic model to show the resulting dilemmas. The desire to screen managers to enhance the organization's future wellbeing motivates managers to show their credentials by becoming excessively active. The council can address this bias by firing a manager whose project is proven to ruin value. Moreover, the council can replace the manager if he has implemented a project, but its outcomes remain unobservable. Both decisions decrease the attraction to develop loss-generating projects. However, the dismissing decision on either ground will affect the council deduction that the expected competence of the incoming manager is lower than that of the dismissed manager. This study shows in which situation the selection option is preferred over the disciplining option using a pessimistic contract.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133357551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Products Scheduling in Reconfigurable Manufacturing System Considering the Responsiveness Index","authors":"Fatima Zohra Torki, L. Kahloul, Nadia Hammani, Leila Belaiche, Saber Benharzallah","doi":"10.1109/acit53391.2021.9677184","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677184","url":null,"abstract":"Reconfigurable manufacturing system (RMS) is a recent manufacturing paradigm, which can easily adjust its capacity and functionality for rapid responsiveness to sudden changes in the market. The core component of RMS is called reconfigurable machine tool (RMT), which has a modular structure. The RMTs can be reconfigured into many configurations. This ability allows RMS to manufacture many types of products with high quantities. In this paper, the scheduling of products in a multi-product line is fulfilled based on three criteria: profit over cost, due date, and reconfiguration responsiveness index. The latter is the combination of reconfiguration time and reconfiguration reliability of machines. An integrated approach of maximum deviation method (MDM) and multi-criteria decision-making (MCDM) approach called technique for order preference by similarity to ideal solution (TOPSIS) is proposed as a solution approach for getting the optimal scheduling of the products to be manufactured in RMS. Weights of criteria have been calculated using MDM and ranking of products is obtained using TOPSIS. A numerical example is presented to illustrate the scheduling of products in RMS.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133412840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ola M. Surakhi, A. García, Mohammed Jamoos, Mohammad Y. Alkhanafseh
{"title":"A Comprehensive Survey for Machine Learning and Deep Learning Applications for Detecting Intrusion Detection","authors":"Ola M. Surakhi, A. García, Mohammed Jamoos, Mohammad Y. Alkhanafseh","doi":"10.1109/acit53391.2021.9677375","DOIUrl":"https://doi.org/10.1109/acit53391.2021.9677375","url":null,"abstract":"The rapid development in computer network and internet have resulted in increased corresponding data and network attacks. Many novels and improvement technologies have been developed in the literature to handle security issues in the network and accurately detect intrusions. Intrusion Detection System (IDS) is one of the technological tools that aim to ensure confidentiality, integrity and availability of the system by preventing possible intrusions. Despite its effectiveness in reducing network intrusion, the IDS still face some challenges in improving detection accuracy and False Error Rate (FER). Recently, researchers have shifted toward the use of Machine Learning (ML) and Deep Learning (DL) methods to enhance the performance of IDS by increasing accuracy rate and reducing (FER). The improvement in the performance of IDS system depends on the detection method used, benchmark dataset and IDS environment. This paper aims to provide a comprehensive survey for the most recent articles that have been published between 2018 and 2021 which used ML and DL methods to improve IDS accuracy. The selected papers are analysed to cover an overview about the following aspects: (1) IDS concepts and taxonomy. (2) ML and DL methods along with strengths and weaknesses for each one. (3) Benchmark datasets of IDS. (4) Comprehensive review about the most recent articles in this domain with the advancement provided by each work in terms of methodology and dataset used with highlighting the strengths and weaknesses of each work. Finally, the challenges and the future scope for the research in IDS based ML and DL are provided.","PeriodicalId":302120,"journal":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129339631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}