Khaled A. Althelaya, El-Sayed M. El-Alfy, S. Mohammed
{"title":"Stock Market Forecast Using Multivariate Analysis with Bidirectional and Stacked (LSTM, GRU)","authors":"Khaled A. Althelaya, El-Sayed M. El-Alfy, S. Mohammed","doi":"10.1109/NCG.2018.8593076","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593076","url":null,"abstract":"Deep learning has recently received growing interest and attention. It has been successfully applied to many fields. Stock market time-series forecasting is one the most challenging problems for a variety of learning methodologies. In this paper, we studied the integration of deep learning methodologies into stock market forecasting. We evaluated and compared a number of variants of Deep Recurrent Neural Network based on LSTM and GRU. Both bidirectional and unidirectional stacked architectures with multivariate inputs were employed to perform short- and long-term forecasting. The deep learning architectures were also compared to shallow neural networks using S &P500 index historical data. It has been noticed that a stacked LSTM architecture has demonstrated the highest forecasting performance for both short- and long-term.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116958456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jabeen Sultana, N. Sultana, Kusum Yadav, F. Alfayez
{"title":"Prediction of Sentiment Analysis on Educational Data based on Deep Learning Approach","authors":"Jabeen Sultana, N. Sultana, Kusum Yadav, F. Alfayez","doi":"10.1109/NCG.2018.8593108","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593108","url":null,"abstract":"Recognizing and categorizing user’s sentiments from a part of text into different sentiments is known as sentiment analysis. For instance, emotions such as happy, sad, angry or positive, negative or neutral to determine the users attitude concerning a certain subject or object. Sentiment analysis is one of the utmost active research areas in natural language processing, web mining and text mining. It plays an important role in many fields like management sciences and social sciences including education, where student feedback is essential to assess the effectiveness of learning technologies. With increase in educational organizations, online learning portals have fascinated by many students by offering free courses with no fee. Heaps of learners enroll in these massive online courses every year and further review their sentiments about the course content and quality of education. Also, provide suggestions in blogs in order to improve the quality of teaching by giving positive or negative sentiments. This paper proposes a model based on Deep Learning approach to perform sentiment analysis on Educational data. In this paper we focused on the accuracy and performance of the training data set to predict the best model. MLP and SVM are recognized as the outperforming models.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129250002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asma Terkawi, Nisreen Innab, S. Al-amri, Aziza Al-Amri
{"title":"Internet of Things (IoT) Increasing the Necessity to Adopt Specific Type of Access Control Technique","authors":"Asma Terkawi, Nisreen Innab, S. Al-amri, Aziza Al-Amri","doi":"10.1109/NCG.2018.8593084","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593084","url":null,"abstract":"The Internet of Things (IoT) is one of the emerging technologies that has seized the attention of researchers, the reason behind that was the IoT expected to be applied in our daily life in the near future and human will be wholly dependent on this technology for comfort and easy life style. Internet of things is the interconnection of internet enabled things or devices to connect with each other and to humans in order to achieve some goals or the ability of everyday objects to connect to the Internet and to send and receive data. However, the Internet of Things (IoT) raises significant challenges that could stand in the way of realizing its potential benefits. This paper discusses access control area as one of the most crucial aspect of security and privacy in IoT and proposing a new way of access control that would decide who is allowed to access what and who is not to the IoT subjects and sensors.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122578457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Zero-day Polymorphic Worm: A Review","authors":"S. M. Sulieman, Yahia A. Fadlalla","doi":"10.1109/NCG.2018.8593085","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593085","url":null,"abstract":"a computer worm is malicious software that has the capability to spread and replicate itself into a computer network. A polymorphic worm is a specific type of worm that changed its structure in every appearance or new instance. A polymorphic worm is considered as one of the most dangerous threats over the Internet because it is hard to detect. It also has the ability to change its payload in every new infection of every new victim to avoid detection by security systems. This survey paper reviews and discusses the recent methods that are used to detect and generate automatic signature for zero day polymorphic worm.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116746003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ebtesam J. Alqahtani, F. Alshamrani, H. F. Syed, F. Alhaidari
{"title":"Survey on Algorithms and Techniques for Indoor Navigation Systems.","authors":"Ebtesam J. Alqahtani, F. Alshamrani, H. F. Syed, F. Alhaidari","doi":"10.1109/NCG.2018.8593096","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593096","url":null,"abstract":"Indoor navigation systems are increasingly needed for smart cities, robots, and visually impaired people. Although Global Positioning System (GPS) is widely used for navigation in numerous applications, it cannot be used for indoor navigation systems as the signals cannot be absorbed by the walls of buildings. As a result, other methods including Wi-Fi, Bluetooth and sensors must be used for navigation. This paper analyses the various algorithms used to find the location of objects and algorithms to navigate using the shortest path in an indoor environment. The first section introduces indoor navigation systems, the problem statement of this paper, and the background of such systems. Then, a comprehensive literature review is included that reviews previous research studies conducted in this area. After that, a discussion and analysis of the literature review has been done to classify and compare between the algorithms and techniques studied. Finally, the paper provides directions for future work in the field of indoor navigation.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sharefah A. Al-Ghamdi, M. Al-Duwais, Hend Suliman Al-Khalifa, A. Al-Salman
{"title":"Named Entity Recognition Using Word-Embedding Techniques for ArabicWeb16: An Empirical Study","authors":"Sharefah A. Al-Ghamdi, M. Al-Duwais, Hend Suliman Al-Khalifa, A. Al-Salman","doi":"10.1109/NCG.2018.8593020","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593020","url":null,"abstract":"The 3rd Workshop on Open-Source Arabic Corpora and Processing Tools introduces ArabicWeb16 Data Challenge track. The challenge is about experimenting with ArabicWeb16 dataset, the largest Arabic Web dataset publicly available with about 150M Arabic Web pages. In this paper, we explore the ArabicWeb16 dataset and experiment with it to build word-embedding models for Named Entity Recognition (NER) task. Word-embedding models are powerful for building many Natural Language Processing (NLP) tasks including NER. We tried two word-embedding models: Google Word2Vec model and Stanford GloVe model. The two models were used to recognize similar words for each named entity type. The ArabicWeb16 dataset was somehow hard to pre-process, however, the final results showed promising outputs.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128650098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Design Thinking in Information System Development: A Survey","authors":"F. Alahmari, M. Anandhavalli","doi":"10.1109/NCG.2018.8593149","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593149","url":null,"abstract":"Due to the advent of information technologies in the current era, there has emerged a multiplicity of applications for information system. The increasing evolution and complexity nature of information system development demand the harnessing of technology and user experience to create systems that meet their expected purpose. Design thinking is a user-centered design approach in which designers ideate and validate notion for solving the user's problem under a specified set of constraints. The key aim of this work is to present a pertinent literature survey of the application of design thinking approach in the development of information system. The original contribution of this survey is three-fold: (1) Present a brief spectrum of conventional SDLC methodologies applied for the development of information system; (2) Portray how design thinking methodology can be combined with existing popular SDLC models for developing information system; (3) Provide useful references of design thinking method and tools that aids and cognizant the design thinkers for selecting an appropriate design thinking tools for designing and developing their information system prototypes. In a nutshell, a significant application of design thinking approach for information system development has been detailed in this survey that stimulates further investigation into this topic.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129440382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tarek Abudawood, Fares S. Al-Qunaieer, Saud R. Alrshoud
{"title":"An Efficient Abnormality Classification for Mammogram Images","authors":"Tarek Abudawood, Fares S. Al-Qunaieer, Saud R. Alrshoud","doi":"10.1109/NCG.2018.8593208","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593208","url":null,"abstract":"In this work we focus on developing an accurate and lightweight automated diagnostic system for classifying abnormalities in breast cancer mammogram images using the Local Binary Patterns (LBP) feature extraction method at the heart of a machine learning model. We empirically show the success of the approach in recognising the presence or absence of abnormality(ies) with high predictive performance in terms of accuracy, precision, recall, and F1-score, and against other features extraction methods employed within different a number of classifiers. The reported results show a minimum of 13% performance gap in favour of our selected approach to the closest model. Our approach exceeds 90% in most of the models when applied over DDSM, the breast cancer mammography benchmark dataset.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123644321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Website security analysis: variation of detection methods and decisions","authors":"I. Alsmadi, Fahad Mira","doi":"10.1109/NCG.2018.8592962","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592962","url":null,"abstract":"Websites and web applications continue to evolve in terms of how they are developed and used. Different types of components in those websites and applications communicate with users through inputs taken from the users and outputs displayed to those users. Users, intentionally or unintentionally, may provide improper inputs. We proposed a model to investigate the behavior of websites when dealing with invalid inputs. From security perspectives, invalid inputs should be detected and rejected as early as possible. An invalid input is considered as a form of successful attack if it is processed by the website code or back-end database. Based on this assumption, we proposed a list of indicators that test invalid inputs are processed. A tool is developed to implement this model. We tested the model through evaluating several websites selected randomly. Our tool has no special credentials or access to any of the tested websites. We found many SQL injection vulnerabilities based on our proposed model. Upon the manual investigation of the web pages that showed such vulnerabilities, we found few instances of false positives. We believe that this can provide a systematic and automated approach to test websites for vulnerabilities related to improper input validation.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a Flexible Architecture based on mobile agents for Executing Query in Cloud Databases","authors":"Salah T. Alshammari, F. Eassa","doi":"10.1109/NCG.2018.8593011","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593011","url":null,"abstract":"The current paper enlightens the architecture that accounts for the mobile agent based on cloud computing. The prevalence of cloud computing supports the storage of extensive data and addresses the workload of computers in an effective manner. Which allows the user to execute queries on the Cloud Database The deployment of cloud computing supports intensive data storage and handles the workload on computers in an efficient way. However, the basic cloud computing mechanism accounts for the client-server model that has several drawbacks. In this instance, the current paper enlightens the new method of cloud computing by means of using mobile agents and hence, proposes an architecture that is highly responsive to the need of users.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126233124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}