{"title":"Countering Terrorism Incitement of Twitter Profiles in Arabic-Context","authors":"Haya Alghofaili, Mishari Almishari","doi":"10.1109/NCG.2018.8592985","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592985","url":null,"abstract":"The use of social media tools by individuals and organizations has substantially increased in recent years. The emergence of smartphones and gadgets in particular is boosting their prevalence. Social media leaves space for nearly every Internet user/entity to contribute. On one hand, social media represents an opportunity to reach out to a large audience for many benign applications, such as advertisements, e-commerce, establishing friendships, and knowledge sharing. On the other, social media is an outlet for many miscreants and criminals to spread their messages and commit crimes. Well-known examples of such abuses include the promotion of terrorism and the recruitment of youth into terrorist groups using Twitter and the like. This paper studies the Twitter profiles of extremists and proposes a technique for automatically detecting these profiles. Achieving a high detection accuracy would help raise awareness about potential terrorist profiles, allowing law enforcement agencies to take legal measures against these accounts (such as blocking them or asking Twitter to close them). The focus of this paper is on Arabic-based profiles, as Arabic is the main language used for communication in the Kingdom of Saudi Arabia.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Areej Albishi, Lamia Almoajil, Najla M. Alharbi, Nouf Alkahtani, Nouf Jaafar, Roa Alharbi, Faisal M. Alawwad
{"title":"Odd/Even Differential Image Steganography Approach","authors":"Areej Albishi, Lamia Almoajil, Najla M. Alharbi, Nouf Alkahtani, Nouf Jaafar, Roa Alharbi, Faisal M. Alawwad","doi":"10.1109/NCG.2018.8593199","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593199","url":null,"abstract":"By leveraging the concept of steganography, secret messages between parties can be hidden in such cover medium such as: audio, image, or text. The most common medium to hide the messages is the image. However, one of the required factors when implementing an image steganography technique is how this technique resists image modifications in a way that doesn’t affect the secret message. Therefore, this paper is devoted to create a new image steganography algorithm with an attempt to provide robustness and capacity characteristics. This algorithm is built based on odd/even pixels subtraction algorithm. In this method, cover image pixels which are using to hide information behind, are chosen randomly. For extracting, secret bits are extracted with inverting the embedding algorithm. Least Significant Bits (LSB) algorithm is used as a baseline in implementing and evaluating the performance of the proposed technique.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"66-69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131030545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Event Driven Wireless Sensors Network for Monitoring of Plants Health and Larva Activities","authors":"A. Sabo, S. Qaisar, A. Subasi, K. A. Rambo","doi":"10.1109/NCG.2018.8593123","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593123","url":null,"abstract":"The aim of this project is to develop an efficient event driven wireless sensors network for an effective and power efficient monitoring of plants health and larva population in a remote crop field. In this framework, an event-driven wireless sensors network is proposed to detect larva and measure other system parameters like Acoustic Complexity Index (ACI), temperature, humidity and soil moisture. The sensors' data is collected by the front end sensing node, developed with a STM32F407VG board, via a serial port. The STM32F407VG board is based on the ARM processor. In contrast to the clock driven classical sensing nodes, the devised sensing nodes only acquire and transmits the sensors data in the case of a significant change. It significantly reduces the power consuming data acquisition and transmission activity as compared to the classical solutions. It improves the proposed solution power efficiency and autonomy as compared to the counter classical ones. The data from the node is transmitted to a base station by using a wireless ZigBee interface. The base station collects data from a group of event-driven sensing nodes. This data is transmitted to the Central Processing Unit (CPU) via the USB liaison between the base station and the CPU. On CPU this data is analyzed via the MATLAB based specifically developed application. The findings are displayed and logged on the CPU. It allows the terminal user to access this and to achieve a timely interaction and cure of the intended crop field. The system parameters are adjusted in order to achieve the effective modules integration and performance. The proposed system operation is tested with an experimental setup. Results have confirmed a proper system functionality.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126698686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Automated Software Requirements Classification","authors":"Hala Alrumaih, A. Mirza, Hessah A. Alsalamah","doi":"10.1109/NCG.2018.8593012","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593012","url":null,"abstract":"With the growing awareness of the effects of requirements in software processes, requirements engineering is increasingly becoming an area of focus in software engineering research. A vast number of studies assert that failure in understanding and classifying requirements are the main causes of exceeding costs and allocated time, which in turn results in project failure. Successful software systems development requires consistent and classified requirements. Requirements classification represents an early but critical phase in the requirements analysis stage. While the literature draws a distinction between different types of requirements, in practice it is not always easy to identify such differences. This paper provides an overview of requirements classification, presents some of the existing research studies on requirements classification, and discusses their limitations to yield suggestions for improvement.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126861434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Popularity Prediction in Twitter During Financial Events","authors":"Ghada Amoudi","doi":"10.1109/NCG.2018.8593027","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593027","url":null,"abstract":"Twitter is one of the widely used micro blogging services around the world. During major events people tend to share posts, comments and links creating a tremendous amount of tweets. The retweet feature provided by Twitter can be used as a filtering mechanism and to measure the popularity of a tweet. Popularity prediction in Twitter has been widely approached in the literature. However, not much has been done in the area of finance. This work is a preliminary step toward understanding the characteristics of finance related tweets. A small scale experiment is carried out to investigate the tweet’s features that could influence finance related tweets popularity. Using these features, a prediction model was created using binary logistic regression. The research concludes that not all features are created equal when it comes to popularity in the financial context. The research found that some features highly influence popularity such as the verified feature, while other features such follower count of the tweeter does not directly influence tweet’s popularity.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. S. Alsaleem, Malak Fahad Aldakheel, Deema Abdullah Alotaibi, Sarah Alqahtani, Sara Alharbi, Naya Nagy
{"title":"Policy, Legal, Legislation and Compliance Saudi Personnel Compliance and Adaption to Recent Security Measures","authors":"L. S. Alsaleem, Malak Fahad Aldakheel, Deema Abdullah Alotaibi, Sarah Alqahtani, Sara Alharbi, Naya Nagy","doi":"10.1109/NCG.2018.8593148","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593148","url":null,"abstract":"The rapid advancement of technology and its deep involvement in business, has triggered the need of recent security methods to preserve valuable assets. Experts and well-trained employees play the main role in successfully safekeeping these assets. A Saudi branch of an international corporation was selected to conduct an Information Systems (IS) Audit, to find whether the branch applies the appropriate controls that maintain its security. To do so, the auditors followed ISACA audit process. The results were collected by interviewing the IT manager on intermittent intervals over a period of three months. This IS audit aims to measure the security level in this branch, the results demonstrated that the applied security controls are sufficient and effective to protect from security incidents.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128056745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bayoumi, Munirah Alghamlas, A. Alshehri, Maitha Alruthae
{"title":"A Review on Scientific Visualization. Case study: Breast Cancer","authors":"S. Bayoumi, Munirah Alghamlas, A. Alshehri, Maitha Alruthae","doi":"10.1109/NCG.2018.8593098","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593098","url":null,"abstract":"Scientific and information visualisation all belong to the computer graphics and design. The goal is too precise data, to improve understanding of the data being presented and interested in presenting data to users, by images. In this paper, we reviewed some papers on scientific visualisation, and we took the path to the medical visualisation to visualise medical data especially breast cancer diagnosis data. We evaluated visualisation techniques that enable diagnosis of a tumour whether it is malignant or benign based on parameters. We presented an interactive visualisation based on research studies to help doctors, patients or researchers to diagnosis whether a tumour is malignant or benign by using our visualisation after calculating the parameters (perimeter worst, radius worst, concave points worst etc.)","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
“Mohammed Nour” A. Sabra, Hamza Wridan, Nasser M. Alkhatani, Fahad M. Al-Harby
{"title":"Description of Security Impact of Drones Challenges and Opportunities","authors":"“Mohammed Nour” A. Sabra, Hamza Wridan, Nasser M. Alkhatani, Fahad M. Al-Harby","doi":"10.1109/NCG.2018.8593136","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593136","url":null,"abstract":"This paper describes the most critical aspects of security and the safety of drones, the interruption of privacy, benefits that the drone offers to human environments, as well as the challenges of drones in health and industries. A significant amount of research has stimulated this type of technology. In short, the drone is one of the newest technologies of the last century. It was used mainly for the military and was later shifted to be used in civilian markets for such purposes as news gathering, scientific research, toys, and entertainment. Drones are used directly by humans, so this drone is technology that has a direct impact on people. This impact may be for positive or may do some harm, creating a negative experience for the user or people. Positive effects of drones include support for businesses and improved lifestyle. For example, drones were used to eliminate Malaria in some developing countries; they also transport goods for medical/commercial purposes and are part of traffic management and mapping. Of course, nothing is perfect in life. The drone has many serious impacts on people’s safety. This review fails to cover all drone aspects, particularly the vast potential for private military use.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116108262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering of Human Intestine Microbiomes with K-Means","authors":"Wesam Sami Taie, Yasser Omar, A. Badr","doi":"10.1109/NCG.2018.8593154","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593154","url":null,"abstract":"According to most researches it is stated that 1–3% of the human body mass consist of microbiota. The gut and intestinal part of human has some several types of microorganisms, which is important for human health and diseases. Hence, understanding the behavior of the human gut and intestine microbiomes increase the chance of detecting and predicting the disease earlier to take the precautions for treatment. Time is an important measure for collecting more information about gut and intestine microbiota so, the proposed work used the 16S rRNA metagenomic approach which is a best suited approach that provides a knowledge-based way to understand the human microbiota much faster. The nucleotide database of bacterial 16S rRNA gene sequences isolated from human intestinal and fecal samples used to develop microbiota microarray that's includes Human Intestine Microbiomes, their Protein's Information and the weight of each protein in the dataset that's calculated used two efficient techniques such as KMeans Clustering Algorithm and Needleman-Wunsch Algorithm. This proposed work contribution highlights on avoiding time consumption of Needleman-Wunsch sequence alignment Algorithm on assigning weights to such large scale of proteins that counts 56117 Protein. In this work validation experiments, the microarray correctly identified genomic DNA from all 18bacterial species used. According to the analytical study of this approach on the dataset it proves that calculating the alignment distance for large amount of sequences become more efficient and faster when extracting some features that is considered an important factor in clustering the dataset into 8 clusters which reduce the runtime of full dataset from 2 years to 3 days. This microbiota microarrays will be clustered using Genetic algorithm taking into consideration the protein weight assigned by Needleman-Wunsch Algorithm to grouping the human intestine microbiomes' proteins to k clusters to get identity for proteins that has unknown structure and get the interaction between all proteins using Protein-Protein Interaction Model.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124829052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Tweets to Indicate Hidden/Potential Networks","authors":"Nour Al Oumi, Lilac Al Safadi, H. Chorfi","doi":"10.1109/NCG.2018.8593196","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593196","url":null,"abstract":"Social networks offer platforms that everyone can use freely. It gives the opportunity to share information in different ways very easily with a high level of interaction. Recently, the use of social networks has paved the way for the evolution of hidden groups which may target different aspects of consideration such as political, dogmatic, ideological, or to amplify the public speech for Twitter people through posting tweets in trending hashtags. This study aims to use data mining and text mining techniques to build an authoring classification model that can find out a link between a person and a group through his vocabulary. Our assumption is that people with similar vocabulary most probably belong to the same group. In order to test the methodology of this study, the Arabic Spammers Group is chosen as a case study of hidden groups located in Twitter especially in trending hashtags. A comparison of two classification models; Naive Bayes (NB) and Support Vector Machine (SVM) -with and without stemming- is applied. The overall performance results showed that NB model achieved higher performance than SVM model in both with and without stemming experiments.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}