2018 21st Saudi Computer Society National Computer Conference (NCC)最新文献

筛选
英文 中文
Opinion Reason Mining: Implicit Aspects beyond Implying aspects 观点原因挖掘:隐含方面之外的隐含方面
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593007
S. Khalid, Muhammad Aslam, Muhammad Taimoor Khan
{"title":"Opinion Reason Mining: Implicit Aspects beyond Implying aspects","authors":"S. Khalid, Muhammad Aslam, Muhammad Taimoor Khan","doi":"10.1109/NCG.2018.8593007","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593007","url":null,"abstract":"Aspect-based Sentiment Analysis (ABSA) aggregates the user opinions at the aspects level. Therefore, it offers a detailed analysis of the product by highlighting its strong and weak aspects. Potential customers and manufacturers highly regard such analysis to make profitable future decisions. However, the existing models do not provide reasons for an aspect being praised or criticized. Such information may help users to assess if the reasons mentioned by reviewers in support or against an aspect of a product are aligned with their priorities. We propose an approach that weighs implicit aspect terms beyond implying aspects and suggesting their polarity. The proposed approach makes use of linguistic associations to identify prominent implicit aspect terms for an aspect. They are presented as possible reasons for an aspect to attain a polarity score. The results are evaluated on online twitter data which indicate effective exploration of opinion reasons.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Major Impacts of Key Reinstallation Attack on Internet of Things System 密钥重装攻击对物联网系统的重大影响
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593071
Asma Terkawi, Nisreen Innab
{"title":"Major Impacts of Key Reinstallation Attack on Internet of Things System","authors":"Asma Terkawi, Nisreen Innab","doi":"10.1109/NCG.2018.8593071","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593071","url":null,"abstract":"The Internet of Things (IoT) is one of the emerging technologies that has seized the attention of researchers. The reason behind that was the fact that the IoT was expected to be applied in our daily life in the near future and humans will be wholly dependent on this technology for comfort and an easy life style. The standard Internet protocols raise significant challenges that could stand in the way of realising potential IoT benefits. In this paper, we introduced and discussed the major impacts of existing internet protocols vulnerably on the IoT system especially the venerability of the WPA2 protocol (cryptographic protocol) as one of the most crucial aspects of security and privacy in the IoT. Ways to mitigate the impact of the attack are then proposed.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125388980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Manual Mobile phone forensic approach towards the analysis of WhatsApp Seven-Minute Delete Feature 手动手机取证方法对WhatsApp七分钟删除功能的分析
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593153
S. Adwan, F. Salamah
{"title":"A Manual Mobile phone forensic approach towards the analysis of WhatsApp Seven-Minute Delete Feature","authors":"S. Adwan, F. Salamah","doi":"10.1109/NCG.2018.8593153","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593153","url":null,"abstract":"In this paper, the variance of the seven-minute delete message feature introduced in messaging applications is examined and the possible challenges faced by the forensic investigators has been presented. The aims of this study is to explore the unfavorable of this delete feature introduced by WhatsApp and its consequences on forensic investigation. Furthermore, the study conducts an in-depth exploration regarding technology misuse leading to greater possibilities in cybercrime. For this purpose, the primary data will be analyzed manually. An experiment on a number of WhatsApp artifacts will be conducted to investigate the status of the data after deletion.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Linear Propagator Algorithm for Directions of Arrival Estimation in the Presence of Mutual Coupling 相互耦合下到达方向估计的线性传播器算法
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593026
S. Akkar, F. Harabi, A. Gharsallah
{"title":"Linear Propagator Algorithm for Directions of Arrival Estimation in the Presence of Mutual Coupling","authors":"S. Akkar, F. Harabi, A. Gharsallah","doi":"10.1109/NCG.2018.8593026","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593026","url":null,"abstract":"This paper proposes a new subspace-based autocalibration algorithm for Direction of Arrival (DoA) estimation under unknown mutual coupling. The proposed scheme uses only linear operations to perform DoAs estimation along with the mutual coupling parameters. Linear decomposition technique is used to estimate the propagator operator and a good results on DoAs estimation are shown. The asymptotic behavior (Cramer Rao bound (CRB)) on the variance of the estimated DoAs by the proposed algorithms is also studied. The simulation results prove that high-resolution DoAs estimation can be reached even when full mutual coupling parameters is considered and prove the validity of our approach.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128635085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Live Scanned Fingerprints using Histogram of Gradient Descriptor 基于梯度描述子直方图的实时扫描指纹分类
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592949
Fahman Saeed, M. Hussain, Hatim Aboalsamh
{"title":"Classification of Live Scanned Fingerprints using Histogram of Gradient Descriptor","authors":"Fahman Saeed, M. Hussain, Hatim Aboalsamh","doi":"10.1109/NCG.2018.8592949","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592949","url":null,"abstract":"The processing time during fingerprint recognition is a main problem when the fingerprint database is huge. Classifying fingerprints into subcategories is an effective way to restrict the search space into a sub-database. We propose a new fingerprint classification method based on modified Histograms of Oriented Gradients (HOG) descriptor. The way orientation field is computed in HOG descriptor is not adapted to the ridge patterns. We compute the orientation field, which is adapted to the ridge patterns and incorporate in HOG descriptor, enhancing its potential to represent a fingerprint in a robust way. Extreme Learning Machine (ELM) with RBF kernel is used as a classifier. We performed experiments on the noisy fingerprint database FVC-2004, a benchmark database; the proposed method achieved the average accuracy of 98.70, which is better than those of the state-of-the-art fingerprint classification methods.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121996058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Scrum Software Maintenance Model: Efficient Software Maintenance in Agile Methodology Scrum软件维护模型:敏捷方法中的高效软件维护
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593152
Fateh ur Rehman, B. Maqbool, Muhammad Qasim Riaz, Usman Qamar, M. Abbas
{"title":"Scrum Software Maintenance Model: Efficient Software Maintenance in Agile Methodology","authors":"Fateh ur Rehman, B. Maqbool, Muhammad Qasim Riaz, Usman Qamar, M. Abbas","doi":"10.1109/NCG.2018.8593152","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593152","url":null,"abstract":"Agile methodologies gained fame due to the fact of producing high-quality software systems. Maintenance effort is almost more than half of the total effort invested in any software system during its lifespan. A well-discussed issue within the community of researchers and engineers is how to use agile methodologies for maintaining the developed software because agile software development life cycle doesn’t have the specifically planned mechanism for maintenance. To bridge this gap, we used the theoretical and empirical technique to formulate factors that should be followed during the agile maintenance including planning for the maintenance; the on-site customer should be present, iterative maintenance, documentation update after each phase and maintenance should be testable.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
An Instrument to Measure Human Behavior Toward Cyber Security Policies 衡量人类对网络安全政策行为的工具
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592978
Dr. Khalid Adnan Alissa, H. A. Alshehri, S. A. Dahdouh, B. M. Alsubaie, Afnan M. Alghamdi, Dr. Abdulrahman Alharby, N. A. Almubairik
{"title":"An Instrument to Measure Human Behavior Toward Cyber Security Policies","authors":"Dr. Khalid Adnan Alissa, H. A. Alshehri, S. A. Dahdouh, B. M. Alsubaie, Afnan M. Alghamdi, Dr. Abdulrahman Alharby, N. A. Almubairik","doi":"10.1109/NCG.2018.8592978","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592978","url":null,"abstract":"Human is the weakest link in information security. Even with strong cyber security policies an organization can still be hacked because of a human error. Even if people are aware of the policies and their importance they might not behave accordingly. This shows to the importance of studying and measuring human behavior toward cyber security policies. This paper introduces a new instrument that can be used to measure human behavior toward cybersecurity policies through creative measures. The goal is to gather data about human behaviors toward cybersecurity policies in natural environment. This method of gathering information allows people to behave normally and don’t feel the need to answer perfectly. The paper illustrates all the previous work related to the subject, summarizing previous work in order to improve what have been previously done. The methodology seeks on measuring behavior based on specific measures. These measures are the password, email, identity, sensitive data, and physical/resource security. Each measure has a number of policies used to measure behavior. These policies were selected among several policies based on literature from the same field and the opinion of experts in the field. These question that went through several rounds of check were used to build the proposedinstrument. This instrument then shall be used by researchers to collect data and perform the required analysis. This paper discusses the behavior pattern in a detail and concise manner. The paper demonstrates that it is posable to measure behavior if the right we questions were asked in the right way.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127146845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Edge Detection for a Children’s Coloring Application 儿童着色应用的边缘检测
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592960
Hessah Alsaaran, Ahad Almohanna, Reem Al-Otaibi, Leena Al-hosan
{"title":"Edge Detection for a Children’s Coloring Application","authors":"Hessah Alsaaran, Ahad Almohanna, Reem Al-Otaibi, Leena Al-hosan","doi":"10.1109/NCG.2018.8592960","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592960","url":null,"abstract":"Children need entertainment that at the same time helps develop their mental skills and creative thinking. Coloring applications often attract them as they contain coloring and drawing. However, the majority of them are difficult to use for children and can have a fixed set of available coloring pages, which can make it uninteresting after the child have tried them all. This paper presents a new coloring mobile application that allows children to be creative and make their own coloring pages on-the-go by taking pictures of what they want to color. In this application, a child snaps a photo using the mobile device’s camera, which is then transformed into a coloring page and provided with tools to color and save the new creation in the mobile device. The transformation is done using image processing techniques: image smoothing and edge detection. The application provides three difficulty levels for the children: easy, medium, and advanced. It uses automatic parameter selection for each level that is adaptive to the input image. Evaluation of the parameter selection method proved its suitability for the application. User acceptance test was performed for the application which showed high successful completion rates and user satisfaction.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127795580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Service Oriented Architecture based Comprehensive Smart Calendar for scheduling and managing real-time events 基于面向服务架构的综合智能日历,用于安排和管理实时事件
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593036
A. Khan, Omar Hamad Alatiyyah, Khalid Abdulaziz Aljadaan
{"title":"A Service Oriented Architecture based Comprehensive Smart Calendar for scheduling and managing real-time events","authors":"A. Khan, Omar Hamad Alatiyyah, Khalid Abdulaziz Aljadaan","doi":"10.1109/NCG.2018.8593036","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593036","url":null,"abstract":"Time is money. \"Until we manage time, we can manage nothing else\"- Peter F. Drucker. Time management is an essential skill for the success of any student or any project. It is a skill which most of the students don't have or at least strive to have. From our experience, we did find it difficult to keep track of the homework, quizzes, exams and even simple reminder. Using a traditional hand-written note won't do it, even a specific application for note taking won't also be as effective. The problem with a to-do list or note app is that they are random, they for anything in your life. And most of the thing won't make it to the list, whether they are too simple or too small to make it to the list. Not to mention that using an ordinary calendar to keep up with all the student need will require them to register everything manually. It's a hassle. Through the use of new technology, we are trying to develop a web application that has the capability to satisfy most of the need for the students. Combining that with clean and elegant User Interface. With that, we hope the project will have a higher chance of reaching more students because it provides fast delivery between students, and it's provided with more effectiveness and lower cost. The project core goal is to give students the ability to manage their daily tasks by offering a web application that will help them substantially improve their grades and personal life allowing them to organize their schedules, homework, and exams.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the Effective Anti-Phishing Awareness and Training in Governmental and Private Organizations in Riyadh 利雅得政府和私人组织有效反网络钓鱼意识和培训的评估
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593144
Nisreen Innab, Haifa Al-Rashoud, R. AlMahawes, Wauood Al-Shehri
{"title":"Evaluation of the Effective Anti-Phishing Awareness and Training in Governmental and Private Organizations in Riyadh","authors":"Nisreen Innab, Haifa Al-Rashoud, R. AlMahawes, Wauood Al-Shehri","doi":"10.1109/NCG.2018.8593144","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593144","url":null,"abstract":"Phishing is a form of attacks that conduct by tricking the users to be as legitimate entity user. With a huge usage of electronic mail, email phishing attacks become the common type of electronic phishing. As a result, the organizations become an attractive target to the attackers in order to steal the organization’s sensitive information or to do malicious actions. From this point, the anti-phishing awareness and training is considered as a persistent need. In this paper, the researchers focus on the electronic mail phishing that target governmental and private organizations in Riyadh. The researchers evaluate the current security training and awareness of employees in Riyadh through a survey. This paper discusses the result of measuring the electronic mail phishing awareness of the governmental and private organization in Riyadh. Besides that, it also measures the awareness of the governmental and private organizations about the importance of training and awareness against electronic mail phishing. However, there does appear to the effective awareness training in the governmental organizations more than the private one.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信