Riwa Mouawi, M. Awad, A. Chehab, I. Elhajj, A. Kayssi
{"title":"Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing","authors":"Riwa Mouawi, M. Awad, A. Chehab, I. Elhajj, A. Kayssi","doi":"10.1109/INNOVATIONS.2018.8605973","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605973","url":null,"abstract":"In recent years, mobile advertising has gained popularity as a mean for publishers to monetize their free applications. One of the main concerns in the in-app advertising industry is the popular attack known as “click fraud”, which is the act of clicking on an ad, not because of interest in this ad, but rather as a way to generate illegal revenues for the application publisher. Many studies evaluated click fraud attacks in the literature, and some proposed solutions to detect it. In this paper, we propose a click fraud detection model, hereafter CFC, to classify fraudulent clicks by adopting some features and then testing using KNN, ANN and SVM. In fact, based on our experimental results, the different featured classifiers reached an accuracy higher than 93%.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IIT 2018 Keynote Speakers","authors":"","doi":"10.1109/innovations.2018.8606024","DOIUrl":"https://doi.org/10.1109/innovations.2018.8606024","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IIT 2018 Welcome","authors":"","doi":"10.1109/innovations.2018.8605961","DOIUrl":"https://doi.org/10.1109/innovations.2018.8605961","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reem A. Alassaf, Khawla A. Alsulaim, Noura Y. Alroomi, N. Alsharif, Mishael F. Aljubeir, S. Olatunji, Alaa Y. Alahmadi, Mohammed Imran, Rahmah Alzahrani, Nora S. Alturayeif
{"title":"Preemptive Diagnosis of Chronic Kidney Disease Using Machine Learning Techniques","authors":"Reem A. Alassaf, Khawla A. Alsulaim, Noura Y. Alroomi, N. Alsharif, Mishael F. Aljubeir, S. Olatunji, Alaa Y. Alahmadi, Mohammed Imran, Rahmah Alzahrani, Nora S. Alturayeif","doi":"10.1109/INNOVATIONS.2018.8606040","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606040","url":null,"abstract":"Chronic Kidney Disease (CKD) is a major public health concern with rising prevalence. In Saudi Arabia, approximately 2 Billion Riyals are solely allocated for renal replacement therapy which is required for patients with advanced stages of CKD. Therefore, this study aims to decrease the number of patients and the expenses needed for treatment by preemptively diagnosing chronic kidney disease accurately using data mining and machine learning techniques. Data have been collected from a region that has never been explored before in literature. This study uses Saudi data retrieved from King Fahd University Hospital(KFUH) in Khobar to carry out the experiment. Experimental Results show that ANN, SVM, Naïve Bayes achieved a testing accuracy of 98.0% while k-NN has achieved an accuracy of 93.9%.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122530858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IIT 2018 Committees","authors":"","doi":"10.1109/innovations.2018.8606023","DOIUrl":"https://doi.org/10.1109/innovations.2018.8606023","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Terrorist Groups Use Social Networking Media to Attract and Recruit New Members","authors":"Alsaleh Saad, Alwaleed Alhumaid","doi":"10.1109/INNOVATIONS.2018.8605942","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605942","url":null,"abstract":"Social Networking Media (SNM) has a crucial role to play as a communication technology to disseminate terrorism across the world. This study has two aims which are to explore how terrorist groups use SNM to attract and recruit new members and how the Islamic religion confronts the terrorism dilemma. A qualitative study is designed to achieve both aims; primary data will be collected through three main methods which are: a systematic document review, observation, and interviews. The content analysis technique will be used to analyze the data. It is anticipated that the comprehensive analysis and results of the research will expand knowledge of a specific context of SNM; that is, its use for contemporary terrorism purposes, an area which is, as yet, insufficiently explored both theoretically and empirically.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125382687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mayank Tiwary, Shanya Sharma, Pritish Mishra, H. El-Sayed, M. Prasad, Deepak Puthal
{"title":"Building Scalable Mobile Edge Computing by Enhancing Quality of Services","authors":"Mayank Tiwary, Shanya Sharma, Pritish Mishra, H. El-Sayed, M. Prasad, Deepak Puthal","doi":"10.1109/INNOVATIONS.2018.8605955","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605955","url":null,"abstract":"With the new computing archutecture supported by Mobile Edge Computing (MEC) brings services to the physical proximity of end users, resource rich mobile devices such as smartphones can now offer computational services to another smartphones. Leveraging the computational resources from mobile cloudlet clusters the availability of mobile nodes is the most important attribute. The effect of movement of mobile devices in real life scenarios has not been captured reliably. This work focuses on improving the Quality of Service (QoS) by considering the effect of mobility deviation. This paper presents an dynamic pricing model which calculates the deviation of the contributors and optimises the price depending on the demand-supply curve. Finally, the proposed scheme is simulated in NS3 environment and is compared with existing schemes to validate the performance of proposed scheme. We observe that there is a proposed steep increase in overall utility in terms of response time and resource utilization with the proposed scheme.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IIT 2018 Cover Page","authors":"","doi":"10.1109/innovations.2018.8606013","DOIUrl":"https://doi.org/10.1109/innovations.2018.8606013","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Affordable System for Remotely Monitoring Water Quality in Residential Water Tanks","authors":"Asma Al Khaili, A. A. Mamari, H. Amer, W. Ibrahim","doi":"10.1109/INNOVATIONS.2018.8605978","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605978","url":null,"abstract":"Water is an essential human need. In July 2010, the United Nations General Assembly explicitly recognized the human right to water and sanitation and acknowledged that clean drinking water and sanitation are essential to the realization of all human rights. Contaminated water does not only taste bad, it could be deadly. Water-related diseases affect more than 1.5 billion people every year. Unfortunately, there is limited awareness of the possibility of contamination in the residential water tanks, and more should be done to educate consumers on the importance of maintaining a hygienic water tank. In this paper a system is proposed to remotely sense, record, and report the quality of drinking water stored in residential tanks. The system sends alert messages to the landlord and the local authorities (if required) when one of the quality parameter is lower than the standard values.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Mouheb, Rutana Ismail, S. A. Qaraghuli, Z. Aghbari, I. Kamel
{"title":"Detection of Offensive Messages in Arabic Social Media Communications","authors":"D. Mouheb, Rutana Ismail, S. A. Qaraghuli, Z. Aghbari, I. Kamel","doi":"10.1109/INNOVATIONS.2018.8606030","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606030","url":null,"abstract":"The popularity of social networks, such as Facebook, Twitter and Instagram, has dramatically increased during the last years, especially with the exponential growth in smartphones and mobile devices. This has, in turn, opened the door to numerous cyber threats specifically targeting social media users. Cyberbullying is an example of such threat impacting children, teenagers and young adults. Recently, this threat has also become a significant issue in the Arab world, especially with the wide adoption of social media by the young generation. Unfortunately, most existing research contributions detect cyberbullying in English language. These contributions are not relevant in our context due to the differences in the culture and the environment surrounding the users. This paper proposes a scheme for the detection of cyberbullying in Arabic social media streams. The proposed scheme detects cyberbullying comments based on a corpus of bullying and aggressive keywords. In addition, the bullying comments are classified according to their strength into three classes, namely mild, medium, and strong, using a weighted function. We evaluate the proposed scheme using real dataset, collected from Youtube and Twitter. The experiments show that the proposed scheme can accurately identify most of the bullying comments.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121723704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}