2018 21st Saudi Computer Society National Computer Conference (NCC)最新文献

筛选
英文 中文
A Comparison Study between Tetrahedral Mesh and Hexahedral Mesh 四面体网格与六面体网格的比较研究
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592950
Huda Basloom
{"title":"A Comparison Study between Tetrahedral Mesh and Hexahedral Mesh","authors":"Huda Basloom","doi":"10.1109/NCG.2018.8592950","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592950","url":null,"abstract":"A lot of effort has been dedicated to achieving realism in simulation of deformable objects such as cloth, hair, rubber, sea water, smoke, and human soft tissue in surgical simulation. However, the deformable object in the scene will exhibit physically correct behaviors true to the behaviors of real object when any force applied to it, and some time it requires real-time simulation whatever the complexity of its geometry, as in surgery simulation. It attracted the attention of a wide community of researchers such as, computer scientists, mechanical engineers, biomechanics, and computational geometers. In this paper we have made a comparison between tetrahedral and hexahedral mesh in terms of stretch and applied on the human liver –as case study- and compared to the maximum tensile and accuracy of the two types in simulating the reaction of the organs using the finite element method.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117033627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Sybil Defense Scheme for Peer–to–peer Applications 点对点应用的新型Sybil防御方案
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593177
Fuad Shamieh, Roa Alharbi
{"title":"Novel Sybil Defense Scheme for Peer–to–peer Applications","authors":"Fuad Shamieh, Roa Alharbi","doi":"10.1109/NCG.2018.8593177","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593177","url":null,"abstract":"The importance of peer–to–peer (P2P) network overlays produced enormous interest in the research community due to their robustness, scalability, and increase of data availability. P2P networks are overlays of logically connected hosts and other nodes including servers. P2P networks allow users to share their files without the need for any centralized servers. Since P2P networks are largely constructed of end–hosts, they are susceptible to abuse and malicious activity, such as sybil attacks. Impostors perform sybil attacks by assigning nodes multiple addresses, as opposed to a single address, with the goal of degrading network quality. Sybil nodes will spread malicious data and provide bogus responses to requests. To prevent sybil attacks from occurring, a novel defense mechanism is proposed. In the proposed scheme, the DHT key–space is divided and treated in a similar manner to radio frequency allocation incensing. An overlay of trusted nodes is used to detect and handle sybil nodes with the aid of source–destination pairs reporting on each other. The simulation results show that the proposed scheme detects sybil nodes in large sized networks with thousands of interactions.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116086013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Sign: Signing Document Online 安全签名:在线签署文件
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592954
A. Alzahrani, Malak Alfosail, Maryam M. Aldossary, Muneera M. Almuhaidib, Sarah T. Alqahtani, N. Saqib, K. Alissa, N. A. Almubairik
{"title":"Secure Sign: Signing Document Online","authors":"A. Alzahrani, Malak Alfosail, Maryam M. Aldossary, Muneera M. Almuhaidib, Sarah T. Alqahtani, N. Saqib, K. Alissa, N. A. Almubairik","doi":"10.1109/NCG.2018.8592954","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592954","url":null,"abstract":"The use of technology is increasing nowadays. On the other hand, most governments and legal offices still do not use technology to implement simple things such as signing a document because they still rely on face-to-face to ensure the authenticity of the signatory. Several challenges may come while signing documents online such as, how to authenticate the signing parties and how to ensure that signing parties will not deny their signatures in future? These challenges are addressed by SecureSign system that attach the signatories’ identity with their fingerprints. SecureSign was implemented in C# and Microsoft SQL Server Management Studio, with integrating fingerprint reader and electronic signature tablet. The SecureSign system achieves the main security goals which are confidentiality, authentication, non-repudiation and integrity. It will have an impact on society and business environments positively as it will reduce fraud and forgery, and help in controlling the process of signing either in contracts or confidential papers. SecureSign have Successfully achieved confidentiality by encrypting data using AES algorithm, authentication by using user fingerprint, nonrepudiation by associating the user ID with his fingerprint, and integrity by embedding QR barcode within the document and hashing its content.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114881834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Trivial Approach for Achieving Smart City: A Way Forward towards a Sustainable Society 实现智慧城市的一个微不足道的方法:通往可持续社会的道路
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592999
Bokolo Anthony Jnr., M. Majid, Awanis M. Romli
{"title":"A Trivial Approach for Achieving Smart City: A Way Forward towards a Sustainable Society","authors":"Bokolo Anthony Jnr., M. Majid, Awanis M. Romli","doi":"10.1109/NCG.2018.8592999","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592999","url":null,"abstract":"Research and development related to smart city is evolving as a response to the issues faced by cities mostly in developing countries. However, prior studies are mostly focused on technical perspective which alone cannot lead to a sustainable society. Accordingly, this study develops a trivial approach that identifies crucial dimensions to be considered in achieving and improving city potential in being a smart city. Moreover, a qualitative research method was adopted by carrying out a single case study to confirm the identified dimensions. The data was collected through archival research technique and semi-structured interviews from practitioners based in Malaysia. Findings from this study indicate that cities should incorporates governance, mobility, living, facilities, services, environmental, social, economic, technologies and information to achieve a sustainable, prosperous and inclusive future for its citizens. Significantly, the developed trivial approach can be adopted by sustainable city managers in planning, designing, deploying and monitoring of sustainable city goals towards a sustainable society for future generations to come.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125033980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Analysis of Arabic Bot Behaviors 阿拉伯语机器人行为分析
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592980
Bayan Boreggah, Arwa Alrazooq, Muna S. Al-Razgan, Hana AlShabib
{"title":"Analysis of Arabic Bot Behaviors","authors":"Bayan Boreggah, Arwa Alrazooq, Muna S. Al-Razgan, Hana AlShabib","doi":"10.1109/NCG.2018.8592980","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592980","url":null,"abstract":"Nowadays, online social media became an essential communication platform that affects all our lives. However, it goes unnoticed that there are entities found in social media that affect and manipulate society and pose as a human to do so; these entities are called bots. Over the years, researchers have conducted tremendous work in developing bot detection applications, but unfortunately, most of them focus on analyzing and detecting English bots, whereas there is a noticeable lack in addressing Arabic bots. Therefore, in this paper, we have studied and analyzed Arabic Twitter bots’ behavior, and highlighted the most significant features of these bots. In addition, we addressed the language and cultural effect on these features and whether the bots’ behavior changes based on language and culture. The study started by collecting datasets using crowdturfing campaign and manual labeling. Then we extracted the features that were identified and proven to be useful by other researchers. After that, we built a classifier that tested the probability of an account being human or bot. Finally, the results were analyzed and discussed.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130402261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Impact of Culture & Gender on the Perception of E-commerce Portals for Branded Products 文化与性别对电子商务门户网站品牌产品认知的影响
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593140
A. Turki, Mithileysh Sathiyanarayanan
{"title":"The Impact of Culture & Gender on the Perception of E-commerce Portals for Branded Products","authors":"A. Turki, Mithileysh Sathiyanarayanan","doi":"10.1109/NCG.2018.8593140","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593140","url":null,"abstract":"The research focuses on a new combination of variables, suited to the requirements of the marketing and technologically advanced world of today. The variables of culture have been explored in this research to a limited degree in relation to gender. While studies have pointed out that culture has a deep relation to the sex role socialization of men and women and that men and women of different cultures think, react and behave differently to different situations, the variables are still in need of further research, especially in the wake of the multinational companies of today blurring national boundaries and cross cultural business no longer being a rare phenomenon. Added to this is the fact that marketing styles, methods of approaching consumers in cross cultural settings have undergone tremendous changes keeping in mind the technological advancements that the world has seen. With more and more advertising especially where brand names promise a genuine product and spurious products can largely be ruled out, it is worthwhile to study the differences in the perceptions of men and women across different cultures, of websites for branded products. This research attempted to treat these variables together and presented the findings for these variables in relation to each other. The methodology used for the data collection method for this research consisted of primary and secondary methods which used both qualitative and quantitative data and these were proposed in the form of questionnaire and expert interview questions held in Saudi Arabia and Britain. The results demonstrated significant differences between men and women on all variables tested in both the countries. Furthest analyses of two of the countries in the sample (Saudi Arabia and Britain) are also linked to socio-cultural standards for masculinity-femininity. The findings and analysis was based on the data that was collected which was then interpreted using SPSS and then presented in a graphical format using Microsoft Excel. This research was ended with a conclusion followed by recommendations and scope for future research.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123332594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Suitable LMS Content and Format for Training 适合培训的LMS内容和格式
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593176
Saleh Alghamdi, A. Bayaga
{"title":"Suitable LMS Content and Format for Training","authors":"Saleh Alghamdi, A. Bayaga","doi":"10.1109/NCG.2018.8593176","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593176","url":null,"abstract":"The current paper explored Learning Management Systems (LMS) preferred content and format for training in Saudi Arabian universities. In this study, 222 faculty members from six selected universities responded to the questionnaires. The findings revealed that despite 50% of the respondents made use of LMS in their various universities, only 15, 6% preferred using LMS actively for contents/activities concerning teaching, learning and assessments. It was indicated that LMS be used for distributing only course content specifications, broadcasting announcements, and preparing teaching handouts rather than conducting on-line examinations. Furthermore, training on LMS must be organised based on individual courses, be delivered by familiar expects having university’s teaching programs and practices at heart and be offered in 2-hour sessions over several days or weeks. There was moderately strong association between computer proficiency and preference for tailored LMS delivery $varphi$ = 0.384, p = 0.000. The authors argue that in conducting future LMS training courses, the proposed content and format could be built based on LMS usages and trainees’ preferences. In broad view, addressing the shortage of faculty members’ technical skills could lead to increased LMS adoption in Saudi universities.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133274240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Comparative Study for Quantified Learning Creativity Versus Behavioral Swarm Intelligence (Neural Networks’ Approach) 量化学习创造力与行为群体智能的比较研究(神经网络方法)
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593134
Mustafa M. H. Hassan, F. Tourkia
{"title":"On Comparative Study for Quantified Learning Creativity Versus Behavioral Swarm Intelligence (Neural Networks’ Approach)","authors":"Mustafa M. H. Hassan, F. Tourkia","doi":"10.1109/NCG.2018.8593134","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593134","url":null,"abstract":"This piece of research introduces an investigational systematic study for two diverse interdisciplinary, and challenging issues. More precisely, these issues are observed in natural real world, and concerned with two biological systems: humans' learning creativity, and social insects' behavioral intelligence. By some details this research article presents the conceptual analysis and evaluation of quantified learning creativity, and Swarm Intelligence phenomena via simulation and modeling of the two natural biological systems (human & non-human creatures). At one hand, analytical study that considers the Artificial Neural Networks (ANN$^{underline{s}}$) modeling is adopted during solving of Optical Character Recognition (OCR) problem. However, on the other hand, the presented study deals with the optimal solution of Travelling Sales-man Problem (TSP) based on ecological behavioral learning of Swarm Intelligence (SI) agents (Ant mates), during performing foraging processes. Interestingly, both of the diverse creativity, and intelligence issues are realistically simulated using ANN$^{underline{s}}$ supervised learning modeling (Error correction learning rule). Furthermore, the effect of noisy environmental nature on the learning performance as well as the intelligent, has been studied for both adopted issues respectively. Conclusively, presented results herein, for both swarm intelligence and neural networks models seemed to be well promising for future more elaborate, systematic, and innovative research in evaluation of human learning creativity phenomenon regarding the research in natural computing. That is genuinely interdisciplinary and forms a bridge between the natural sciences and computer science. This bridge connects the two, both at the level of information technology and at the level of fundamental research.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NARMA-L2 Neuro controller for speed regulation of an intelligent vehicle based on image processing techniques 基于图像处理技术的NARMA-L2智能车辆速度调节神经控制器
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8593173
A. Sahbani
{"title":"NARMA-L2 Neuro controller for speed regulation of an intelligent vehicle based on image processing techniques","authors":"A. Sahbani","doi":"10.1109/NCG.2018.8593173","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593173","url":null,"abstract":"In order to be deployed in driving environments, intelligent transport system (ITS) must be able to recognize and respond to exceptional road conditions such as traffic signs, highway work zones and imminent road works automatically. This research presents a new vehicle speed control approach based on image processing technique. It aims to firstly recognize the road sign image and then, send the recognized speed as reference to the control unit. Obviously, recognition of traffic sign is playing a vital role in the intelligent transport system, it enhances traffic safety by providing drivers with safety and precaution information about road hazards. To recognize the traffic sign, an image processing unit ensured 3 steps: traffic board detection, feature extraction and sign classification. The detection phase is based on morphological operations, thresholding and contrast analysis. Steerable filters based technique was adopted to extract features from the segmented sign images. Finally, traffic signs classification is done by an intelligent Bayesian Regularization Neural Network (BRNN). It achieves a classification accuracy up to 97%. Once recognized, the resulting speed is taken as reference of the NARMA-L2 based control unit to regulate the speed of a DC motor. The simulation results show that our speed vehicle is controlled successfully with different speed references","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review of Crime Analysis and Visualization. Case study: Maryland State, USA 犯罪分析与可视化研究综述。案例研究:美国马里兰州
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-01 DOI: 10.1109/NCG.2018.8592982
S. Bayoumi, S. AlDakhil, Eman AlNakhilan, Ebtehal Al Taleb, Hana AlShabib
{"title":"A review of Crime Analysis and Visualization. Case study: Maryland State, USA","authors":"S. Bayoumi, S. AlDakhil, Eman AlNakhilan, Ebtehal Al Taleb, Hana AlShabib","doi":"10.1109/NCG.2018.8592982","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592982","url":null,"abstract":"Geographic or cartographic Visualization is a form of information visualization includes principles of cartography, geographic information systems (GIS) and Exploratory Data Analysis (EDA). Throughout this work, we will introduce related works in the field of crimes which we classified based on either spatial or spatial and temporal aspects. Crimes remain a social problem of grave concern where police departments have to suppress and detect crimes. Our study focuses on the interactive visualization of crimes to provide deep insight. Our study area is Maryland State, the USA as there data available on the internet concerning 2016. The data includes three types of crimes: against a person, against society, and against property. Through our proposed visualization system we were able to present a critical insight into cities who have the most frequent crimes. Also, specify the day and time where each type of crime profoundly happened. Furthermore, the most frequent crime for each type.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133102852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信