{"title":"Secure Data Quiry Using Unique Hash Indexing Utilizing MAC Address in a Remote Data Storage","authors":"K. Kaabneh, Rakan Alhwaidi","doi":"10.1109/ACIT47987.2019.8991119","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991119","url":null,"abstract":"Data privacy and protection is the hottest topic in cloud computing-based systems. Cloud based systems users keen on finding a way to ensure the security of information and maintaining privacy using remote document search to eliminate the need to retrieve data from the cloud. In this paper, we propose a novel model to provide a unique index using SHA-256 Hashing and to utilize the uniqueness of MAC address to produce a unique MAC-HASH with no collision and minimal processing time. The results has been proven to be irreversible and give a unique value for each user and lies in dispersing infiltrators of data and the hacker would have no access to the original data. Therefore, the files will be blind searched and the cloud administrator and the hacker would have no knowledge of your search.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127732392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model-Oriented Requirements Traceability Framework for Small and Medium Software Industries","authors":"Gullelala Jadoon, M. Shafi, Sadaqat Jan","doi":"10.1109/ACIT47987.2019.8991116","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991116","url":null,"abstract":"The Capability Maturity Model Integration (CMMI) has been a proficient approach to judge the maturity level of any software development business. For all software companies, it is very essential to develop standardize software systems for the characteristics essential for that maturity stage. The revolution in the software industry has brought advancement from programming-oriented development to model-oriented approach. Presently Model-Driven Development is turning into a rising method for creating software solutions most effectively. At Managed, which is the second level of CMMI, we need to keep up the bi-directional trace of the meta-models for better administration of user demands. Keeping up a bi-directional trace in such systems is very difficult for engineers, particularly during the assessment and upgrading stages. In this research, we have foreseen a model-based trace model and assessed its presentation dependent on currently used methodologies. This procedure will give a premise to software designers and scientists to propose progressively productive strategies for trace management in model-based systems for organizations.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Meta-strategy for Multi-issue Negotiation","authors":"Safeyah Tawil, Khalid Mansour, Yaser A. Al-Lahham","doi":"10.1109/ACIT47987.2019.8991030","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991030","url":null,"abstract":"Automated negotiation is a process where multiple software agents interact with each other over certain matters through making offers and counteroffers. This paper considers a buyer agent negotiating with a seller agent over multiple issues. A meta-negotiation strategy is proposed to improve the negotiation process outcomes. The presented negotiation strategy is a cooperative negotiation one that uses both, preference-based and fuzzy similarity mechanisms. The preference-based mechanism is used for generating quantitative offers while the fuzzy similarity is used for in the process of generating qualitative offers. The preference-based mechanism considers the preferences of the opponent when making offers; the agent makes more concessions on the negotiation issues that are believed to be more preferred to the opponent. In the fuzzy similarity approach, the agent formulates an offer that is believed to be most similar to the one received from the opponent in the last negotiation round. The experimental results show that the proposed cooperative negotiation strategy outperforms the basic negotiation strategy in all the evaluation criteria such as utility, agreement rate and Nash product.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131147780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Loan Default Prediction Model Improvement through Comprehensive Preprocessing and Features Selection","authors":"Ahmad Al-qerem, Ghazi Al-Naymat, M. Alhasan","doi":"10.1109/ACIT47987.2019.8991084","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991084","url":null,"abstract":"For financial institutions and the banking industry, it is very crucial to have predictive models for their financial activities, as they play a major role in risk management. Predicting loan default is one of the critical issues that they focus on, as huge revenue loss could be prevented by predicting customer’s ability to pay back on time. In this paper, different classification methods (Naïve Bayes, Decision Tree, and Random Forest) are being used for prediction, comprehensive different pre-processing techniques are being applied on the dataset, and three different feature extractions algorithms are used to enhance the accuracy and the performance. Results are compared using F1 accuracy measure, and an improvement of over 3% has been obtained.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving of Shared Data in Deep Learning","authors":"Ahmad Al-qerem, Eman Al Nagi","doi":"10.1109/ACIT47987.2019.8991105","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991105","url":null,"abstract":"In the age of Big Data the need of developing machine learning algorithms has increased. Such algorithms are used to extract valuable information needed for different types of sectors; health, education, financial …etc. In many cases data has to be shared among several parties to guarantee better accuracy of the results of such algorithms. In these cases privacy of data would be questionable. In this paper a survey has been conducted on research that focused on Privacy Preserving techniques when applying deep learning algorithms on distributed or shared data.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/acit47987.2019.8990978","DOIUrl":"https://doi.org/10.1109/acit47987.2019.8990978","url":null,"abstract":"","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Controlled Medium Access Control Design For Cognitive Radio Ad-Hoc Network","authors":"Ala’eddin Masadeh, H. Salameh, A. Abu-El-Haija","doi":"10.1109/ACIT47987.2019.8991072","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991072","url":null,"abstract":"In this work, we propose efficient channel assignment as well as transmission power control (TPC) algorithm to improve the performance of multi-channel single-radio cognitive radio ad-hoc networks (CRAHNs). The channel assignment algorithm aims to assign channels among users in a way that reduces the probability of collision. The TPC aims to tune the transmit power used by nodes. By this mechanism several goals can be achieved, which are: prolonging the battery life, reducing the interference among users, and increasing the frequency spatial reuse. The results show that an enhancement can be achieved when the proposed protocol is integrated to ad-hoc networks, which can be seen through increase in the network’s throughput performance and decrease in access delay. Here, the network simulator 2 (NS2) has been used to verify the theoretical model, which indicates a significant enhancement in network performance.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129625325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Paradoxes in the Middle East: A Content Analysis from Instagram","authors":"Faten F. Kharbat, Ajayeb S. Abu Daabes","doi":"10.1109/ACIT47987.2019.8991070","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991070","url":null,"abstract":"In this research we present several interpretations of the privacy paradox from the point view of youth people in UAE. Privacy is not a major concern in general, privacy paradox is a complex phenomenon that needs more effort and more research focus..","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Sharing Platform for Multi-site Organisation","authors":"Ahmad Ghandour","doi":"10.1109/ACIT47987.2019.8991121","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991121","url":null,"abstract":"in today’s dynamic and highly agile business environment, Knowledge Management (KM) have become increasingly important factor in competitiveness and sustainability. Organizations are facing growing challenges in documenting, sharing and reusing the knowledge across teams and geographic locations due to the absence of a collaborative platform. Organizational knowledge accumulated over time needs to be indexed and shared among employees. In this paper, a framework to design a KM platform with multiple portals is proposed to be implemented as internal information sharing platforms for a multi-site organization. A meta-requirements were collected from literature and then translated into design principles for efficient and effective KM system development for multi-site organizations","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127861302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Based Threat Assessment Model (FTAM)","authors":"Nevrus Kaja, A. Shaout, Di Ma","doi":"10.1109/ACIT47987.2019.8991129","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991129","url":null,"abstract":"Threat assessment is the process of identifying and characterizing a cybersecurity threat by evaluating and assessing its properties. This is a tool used by many organizations around the globe in order to evaluate their systems and perform a risk analysis against common threats. SAE J3061 guidelines provide a set of principles for automotive cybersecurity which includes threat identification, assessment, and analysis. This standard defines threat assessment as “an analysis technique that is applied in the concept phase to help identify potential threats to a feature and to assess the risk associated with the identified threats”. This paper presents an innovative, Fuzzy Based Threat Assessment Model (FTAM). FTAM leverages the threat characterization from established threat assessment models, while focusing on improving its assessment capabilities by using Fuzzy Logic. Through this methodology, FTAM is able to improve the efficiency and accuracy of the threat assessment process to determine the “degree” of the threat. This is different from using subjective assessment processes based on table look-ups or scoring like some of the current threat assessment models do. This paper provides an analysis on the design and performance of FTAM as well as benchmarking with other existing models.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}