2019 International Arab Conference on Information Technology (ACIT)最新文献

筛选
英文 中文
Diversifying The Teaching Methods : Student’s Perceptions of Smart Learning 教学方法多元化:学生对智能学习的认知
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991089
E. Abulibdeh, A. A. Libdeh, Fuad A. Trayek, G. Murshidi
{"title":"Diversifying The Teaching Methods : Student’s Perceptions of Smart Learning","authors":"E. Abulibdeh, A. A. Libdeh, Fuad A. Trayek, G. Murshidi","doi":"10.1109/ACIT47987.2019.8991089","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991089","url":null,"abstract":"There is an increasing need for improving the e-learning systems and so integrating smart Applications into education is a useful communication tool in interactive educational environment for both learners and teachers. The introduction of smart Applications has revolutionized education by providing a smart learning environment creating a new style in learning known as smart learning. The main purpose of this study is to shed light on this new concept of learning and highlighting the attributes and features of smart classroom. It aims to investigate the student’s perception of smart learning and their extent of using different smart learning tools. The study was conducted at several Universities in the United Arab Emirates sampling 411 students enrolled in different programs.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does Social Media Affects Users’ Well-Being 社交媒体会影响用户的幸福感吗
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991006
Walaa S. Mahmoud, Ajayeb S. Abu Daabes
{"title":"Does Social Media Affects Users’ Well-Being","authors":"Walaa S. Mahmoud, Ajayeb S. Abu Daabes","doi":"10.1109/ACIT47987.2019.8991006","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991006","url":null,"abstract":"Social media platforms are now considered as the most used tools that people used daily. The relationship between social media and well-being is driven by many implicit and explicit factors that are difficult to configure. There is a substantial agreement that using social media platforms have positive effects and dark sides on well-being along with many contradictions. This study is an attempt to understand social media effects on users’ well-being by a novel perception that avoids the linear perspectives of the digital world. This research proposes a digital chaos model to better understanding the full picture of the new chaotic life. This model presents the interplay of dynamic actions and factors between social media platforms and users’ well-being, which are complex, nonlinear and interactive factors.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ischemic Stroke Identification by Using Watershed Segmentation and Textural and Statistical Features 基于分水岭分割和纹理统计特征的缺血性脑卒中识别
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991060
Mohammed Ajam, H. Kanaan, Lina el Khansa, M. Ayache
{"title":"Ischemic Stroke Identification by Using Watershed Segmentation and Textural and Statistical Features","authors":"Mohammed Ajam, H. Kanaan, Lina el Khansa, M. Ayache","doi":"10.1109/ACIT47987.2019.8991060","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991060","url":null,"abstract":"The algorithm presented in this paper identifies the ischemic stroke from CT brain images by extracting the textural and statistical features. Our algorithm starts by preprocessing of our CT images, and then image enhancement is performed. The brain CT images are segmented by Marker Controlled watershed. We obtained the Grey Level Co-occurrence matrix (GLCM) to extract the textural and statistical features. The experimental results showed that the over-segmentation due to noise is resolved by Marker controlled watershed. The textural and statistical features showed that the values of contrast, correlation, standard deviation and variance of normal CT images are less than those of abnormal CT images (contains ischemic stroke), where the values of homogeneity, energy and mean are bigger in normal CT images than those of abnormal CT images.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127289536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Zero-Day Attack Detection and Prevention in Software-Defined Networks 软件定义网络中的零日攻击检测与防御
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991124
Huthifh Al-Rushdan, M. Shurman, Sharhabeel H. Alnabelsi, Q. Althebyan
{"title":"Zero-Day Attack Detection and Prevention in Software-Defined Networks","authors":"Huthifh Al-Rushdan, M. Shurman, Sharhabeel H. Alnabelsi, Q. Althebyan","doi":"10.1109/ACIT47987.2019.8991124","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991124","url":null,"abstract":"The zero-day attack in networks exploits an undiscovered vulnerability, in order to affect/damage networks or programs. The term “zero-day” refers to the number of days available to the software or the hardware vendor to issue a patch for this new vulnerability. Currently, the best-known defense mechanism against the zero-day attacks focuses on detection and response, as a prevention effort, which typically fails against unknown or new vulnerabilities. To the best of our knowledge, this attack has not been widely investigated for Software-Defined Networks (SDNs). Therefore, in this work we are motivated to develop anew zero-day attack detection and prevention mechanism, which is designed and implemented for SDN using a modified sandbox tool, named Cuckoo. Our experiments results, under UNIX system, show that our proposed design successfully stops zero-day malwares by isolating the infected client, and thus, prevents these malwares from infesting other clients.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrating the use of iPad in the Teaching-Learning Process: A Pilot Study from UAE iPad在教学过程中的整合使用:阿联酋的试点研究
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991125
Z. Shanaa, E. Abulibdeh
{"title":"Integrating the use of iPad in the Teaching-Learning Process: A Pilot Study from UAE","authors":"Z. Shanaa, E. Abulibdeh","doi":"10.1109/ACIT47987.2019.8991125","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991125","url":null,"abstract":"This study aimed at exploring the effect of using iPads on the academic achievement of grade 10 students in ICT class at a Private School in Abu Dhabi, in the United Arab Emirates, and to compare their results with their peers who study the same subject using traditional educational methods. The study was conducted during the second semester of the school year 2017/2018 and the sample consisted of two groups: the control group (42 students) who were taught using the traditional method, and the experimental group (42 students) who were taught using the iPad. An achievement pre and post-tests were given to the two groups, data were statically analyzed and discussed. The study results have shown statistical difference in the achievement of the experimental group indicating that using the iPad in learning has a positive effect on the academic achievement of grade 10 students compared to those who learned by the traditional method.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"14 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of Two Algorithms for Arbitrary Shapes Clustering 任意形状聚类两种算法的性能比较
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991143
Mariam Khader, Ghazi Al-Naymat
{"title":"Performance Comparison of Two Algorithms for Arbitrary Shapes Clustering","authors":"Mariam Khader, Ghazi Al-Naymat","doi":"10.1109/ACIT47987.2019.8991143","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991143","url":null,"abstract":"Discovering clusters with arbitrary shapes has attracted a large number of researchers, due to its importance in analyzing real-world datasets. DENCLUE is an efficient density-based algorithm that provides a compact mathematical definition of clusters with arbitrary shapes. Several variants of DENCLUE have been proposed to enhance its performance, including DENCLUE 2.0. This study aims to discuss the difference between the two variants, DENCLUE 1.0 and DENCLUE 2.0. This will allow for future improvements on both variants and determining the best variant for specific types of datasets. The Adjusted Rand Index measure is used to evaluate the difference between the clustering results of both algorithms. The experimental results conclude that DECNLUE 1.0 outperforms DENCLUE 2.0 in discovering clusters with arbitrary shapes. Specifically, in datasets that contain clusters with multiple modes.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Note about Bias in Bayesian Genetic Algorithms for Discrete Missing Values Imputation 关于离散缺失值估算贝叶斯遗传算法偏差的注意事项
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991024
Hazem Migdady, Hussam Alrabaiah, Mohammad Al-Talib
{"title":"Note about Bias in Bayesian Genetic Algorithms for Discrete Missing Values Imputation","authors":"Hazem Migdady, Hussam Alrabaiah, Mohammad Al-Talib","doi":"10.1109/ACIT47987.2019.8991024","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991024","url":null,"abstract":"A Genetic Algorithm is a sophisticated searching technique that finds the best possible solution in the solution space. The search process is driven by a fitness function which measures the fitness level of a candidate solution. The chosen fitness function varies according to the problem being solved. However, any fitness function should satisfy some conditions. In the Bayesian genetic algorithm for missing values imputation we noted that the used fitness function performs poorly when be applied with datasets that contain missing values, since such datasets hold a level of bias which would adversely affect the efficiency of the entire searching process. In this paper we mentioned that some assumptions should hold in order to apply the technique of Bayesian genetic algorithm efficiently.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Techniques For Face Verification: Literature Review 人脸验证技术:文献综述
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8990975
Ghaliya Alfarsi, J. Jabbar, R. M. Tawafak, A. Alsidiri, M. Alsinani
{"title":"Techniques For Face Verification: Literature Review","authors":"Ghaliya Alfarsi, J. Jabbar, R. M. Tawafak, A. Alsidiri, M. Alsinani","doi":"10.1109/ACIT47987.2019.8990975","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990975","url":null,"abstract":"The aims of this research are to conduct a survey on face verification techniques and to discuss the methods that they used and which one was the optimal and for what it is the best. We searched for articles and review papers related to face verification techniques. Ten papers were selected based on the year of publication and the techniques used. The techniques were studied and a summary report of the techniques used is created. We also suggest merging two techniques that may increase accuracy and effectiveness of verification. A summary report of various techniques by researchers is created. An approach by merging two techniques included in the summary report is suggested to enhance verification. The presence of variable illumination, pretense, facial look, growing old and other unsystematic reasons regularly cause identification errors to occur. Moreover increase in level of controlling and executing of the face verification methods is not only difficult even though it is a critical sense of function. Face verification has a huge contribution in different types of media purposes, like security access control, monitoring and control, retrieval of images, etc. They are used in many domains such as banks, airplanes, police areas and others. Several methods have proved to be the best to show a potential move towards the development of performance achieved since more than prompt and verification.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bee Hive Monitor 蜂箱监测器
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8990982
A. Shaout, Nathan Schmidt
{"title":"Bee Hive Monitor","authors":"A. Shaout, Nathan Schmidt","doi":"10.1109/ACIT47987.2019.8990982","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990982","url":null,"abstract":"This paper will cover a project for a device that will monitor a beehive and give a status of the health and productivity of the hive to the beekeeper. Bee keeping is a very large industry with approximately 2.44 million bee colonies in the US. Bees are vital to our food supply. The value of pollination by bees in the US alone is estimated to be worth $16 billon. A phenomenon known as Colony Collapse Disorder (CCD) has brought significant loss to honeybee colonies. If a hive experiences CCD most of the bees will leave the hive for no apparent reason. It is imperative to understand a hive’s health and activities for a beekeeper to take care of the bees effectively. The system in this paper takes readings from inside the hive such as temperature, humidity, and noise. A camera is mounted on the outside of the hive to monitor bee activity and keep track of the activity at the beehive entrance. All this data is interpreted by algorithms that alert the beekeeper on the health of the hive. Some of these algorithms use machine learning to determine the health of the hive. This paper reviews various project currently in the market for beehive monitoring as well as a literature review of some of the research in bee monitoring systems.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130265951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobility prediction as a time function for mobile networks in 3-D space: A Framework 移动网络在三维空间中的时间函数预测:一个框架
2019 International Arab Conference on Information Technology (ACIT) Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991022
M. Al-Hattab, Nuha Hamada
{"title":"Mobility prediction as a time function for mobile networks in 3-D space: A Framework","authors":"M. Al-Hattab, Nuha Hamada","doi":"10.1109/ACIT47987.2019.8991022","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991022","url":null,"abstract":"Mobility prediction has attracted increasing interest in recent years, as correct and accurate prediction can lead to efficient data delivery and provide the user with high quality of service. Moreover, it enables the network to plan for future tasks in the suitable time. In this paper, we present a framework for a prediction scheme that predict the future mobility of mobile networks in three-dimensional space using polynomial regression and provide a time-space mapping to produce a time function for the three components of the trajectory for the node","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信