{"title":"A Reusable Software Architecture for Personalized Learning Systems","authors":"Heba M. Ismail, B. Belkhouche","doi":"10.1109/INNOVATIONS.2018.8605997","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605997","url":null,"abstract":"This paper addresses issues associated with requirements for personalized learning systems and their software architecture. These systems aim to provide unique learning experiences through adapting to a variable set of learners' characteristics at different levels of sophistication in many various contexts using a broad range of technologies. The diversity in personalized learning systems makes it difficult to represent user requirements in a way that software designers are able to use directly. Identifying a process to implement effectively personalized learning software systems remains a serious challenge. We propose a software architecture that simplifies the creation of early design models from requirements and facilitates effective communication between technical designers and stakeholders. First, we define general concepts of personalized learning software systems, and then elaborate a reusable software architecture for personalized learning software systems that can be used in different contexts. Finally, we map various personalized learning software systems from different contexts to the proposed architecture.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"49 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposals on IoT Communication through MQTT over L2 Network and their Performance Evaluation","authors":"Yuya Sasaki, T. Yokotani, H. Mukai","doi":"10.1109/INNOVATIONS.2018.8606029","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606029","url":null,"abstract":"The development of the Internet of Things (IoT) has been accelerated. The Internet is based on the internet protocol (IP), which is applied to most Internet communication. Communication through IP requires the physical location of the connected devices. In IoT, communication based on the IP cannot be optimized because data blocks in the IoT are transferred from various locations. Moreover, if IoT communication is invoked on the current Internet, it may be inefficient because large numbers of connections must be established and communication sessions released. Therefore, IoT requires a new concept of a communication system, which is referred to as an Information Centric Network (ICN). An ICN should be co-operated with IP-based communication. Therefore, we propose a new simplified communication scheme using Message Queuing telemetry transport (MQTT), which is a type of ICN, and evaluate its performance.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. AlRayhi, K. Salah, N. Al-Kork, A. Bentiba, Z. Trabelsi, M. A. Azad
{"title":"Cloud Automation to Run Large-Scale Quantum Chemical Simulations","authors":"N. AlRayhi, K. Salah, N. Al-Kork, A. Bentiba, Z. Trabelsi, M. A. Azad","doi":"10.1109/INNOVATIONS.2018.8606027","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606027","url":null,"abstract":"Scientists and researchers often need to run midscale to large-scale scientific computations on powerful computing machines or platforms. Even with today’s available powerful computing platforms, many of these computations still take enormous runtime. With the advent of cloud computing technology, scientists are now able to reduce significantly the computational time by outsourcing computation functions to the cloud systems. We show in this paper how AWS (Amazon Web Services) cloud computing platform can be automated in executing large-scale computationally expensive scientific experiments. Specifically, we show how quantum chemistry simulations can be executed in parallel and in a cluster-based fashion using the publicly available and popular Amazon cloud platform. With Amazon cloud, we were able to reduce the computation time by almost five orders of magnitude. In addition, the paper offers many important useful guidelines, scripts, and commands for scientists and researchers on how to automate and execute parallel and cluster-based scientific jobs on any cloud platform.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127988592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating MOOC with Open Source Moodle: The New Direction of Learning at Sultan Qaboos University","authors":"Z. Al-Khanjari, Iman Al-Kindi","doi":"10.1109/INNOVATIONS.2018.8605957","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605957","url":null,"abstract":"Massive Online Open Course (MOOC) is considered as a strong competitor for the next availability of educational tools and entered the field of higher education around the world. 2012 was a year of speedy era for education with the beginning of MOOCs to be used and learned for free in the world. It is commonly accepted and preferred because it has several advantages like large scale, no restrictions for the time and place, open free in which it can deliver a new knowledge acquisition approach for learners. In line with this, through investigating the utilization of MOOCs in some continents such as Asia, Europe and USA, it appeared that MOOC had been integrated local curricula through Learning Management System (LMS). The purpose of this paper is to examine the possibility of adapting MOOC to support the currently learning and teaching process in Sultan Qaboos University (SQU) that combines both online and face-to-face in order to promote and improve the way SQU delivers courses' content and host online learning activities by using Modular Object-Oriented Dynamic Learning Environment (Moodle). Also, to highlight possible opportunities when integrating MOOCs in SQU E-learning environment that will allow it to explore new learning models and innovative practices in teaching and learning.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131815433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Area Search with Shared Memory: A Meta-Framework to Improve Pathfinding Algorithms","authors":"O. A. Zoubi, M. Awad","doi":"10.1109/INNOVATIONS.2018.8606025","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606025","url":null,"abstract":"Finding the shortest path between two given objects/states is a common problem for many scenarios/applications. Although many algorithms have been proposed, most of them rely entirely on the heuristic metrics to guide the search for the optimal path. In this work, we proposed a novel and generic approach to learn the underlying structure of the environment while exploring the problem seamlessly. The approach, Dynamic Area Search with Shared Memory (DASSM), learns from already explored areas in the pathfinding problem and efficiently and dynamically reuse the information to guide the utilized pathfinding algorithms. We showed how DASSM can alleviate the computational overhead by limiting and focusing the search to regions that more likely have the optimal path based on the learned information. In addition, we elaborated on the implementation and technical details of the approach and revealed its feasibility to be implemented to a wide range of informed search algorithms. To test DASSM, we applied it for three common pathfinding algorithms and tested them on publicly available benchmarks. DASSM improved the performance in all cases and reduced the execution time up to 75%. Moreover, we examined adding random steps for DASSM, where the results revealed a potential improvement in the execution time.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122589087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Rate and Congestion Control hybrid scheme for VANETs","authors":"M. Taleb, S. Merniz, S. Harous","doi":"10.1109/INNOVATIONS.2018.8605974","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605974","url":null,"abstract":"this article aims to improve two important previous studies, dealing with the congestion problem for VANETs. After giving a brief description of each method, we identify their strong aspects and drawbacks, and we propose some improvements independently of each another. Then we propose a combination of these two methods into one scheme, which results in a general enhancement to the whole system, because it takes advantages of each method. Finally, we present the theoretical expected results of this refinement.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114301932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defense Analysis Against Store and Forward Distributed Reflective Denial of Service Attacks","authors":"M. Fraiwan, Fida'a Al-Quran, Basheer Al-Duwairi","doi":"10.1109/INNOVATIONS.2018.8605972","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605972","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are a dangerous large scale highly coordinated attempts to disable network-based computer systems. The attackers are comprised of a large number of agents working to overwhelm the victim with fake requests. Thus, preventing legitimate users from gaining access to the services provided by the victim. These attacks can target web services, as well as the networking infrastructure of critical cyberphysical systems like power stations and water distribution networks. Recently, a new class of DDoS attacks has emerged; Distributed Reflective Denial of Service (DRDoS) attacks are the new trend in this category. By reflecting and amplifying UDP traffic, the attackers are able to divert a large volume of traffic toward the victim. Under this category, store and flood DRDoS attacks have employed P2P networks to store the attack data on agents prior to the attack phase. These attacks have proved to be highly capable and more dangerous than traditional DoS attacks. In this paper, we to tackle the store and flood DRDoS problem. By studying the elements and mechanism of the attack, we develop mechanisms to mitigate the effects of these attacks and filter unwanted traffic.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115040898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for a Cooperative UAV-UGV System for Path Discovery and Planning","authors":"Abderrahmane Lakas, B. Belkhouche, Omar Benkraouda, Amin Shuaib, Hussain Jaffar Alasmawi","doi":"10.1109/INNOVATIONS.2018.8606028","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606028","url":null,"abstract":"We describe a new framework for computer vision-based cooperative uav-assisted path planning for autonomous ground vehicles. In recent years, unmanned aerial vehicles (UAVs) have proved to be beneficial in many applications and services including path planning for autonomous vehicles. Most of the path planning applications assumes the availability of a digital map that allows a vehicle, be it ground or aerial, to navigate through landmarks and obstacles. However, in the scenario of unavailable maps especially during a natural disaster or a in war zone, it becomes extremely handy to have a drone that serves as an eye in the sky that explores the surrounding environment, and generates in real-time a trajectory guiding the vehicles on the ground around obstacles and obstructions. In this research, the UAV, serving as the eye in the sky is equipped with a camera that collects images of the surroundings and assists the ground vehicle in planning its path towards its final destination. Our approach includes the use of a vision-based algorithm which recognizes roads, pathways and obstacles, and calculates a path around them towards the destination. Simultaneously, the UAV keeps track of the ground vehicle progress towards the destination by monitoring and tracking its movement. The generation of the trajectory is based on an enhanced version of the A*algorithm. The experimental setup includes a robot and a drone, and an ultra-wide band (UWB) indoor positioning system which allows the vehicles to know their current location.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending steganography payload capacity using the L*a*b* color space","authors":"Mohammed Baziyad, T. Rabie, I. Kamel","doi":"10.1109/INNOVATIONS.2018.8606008","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606008","url":null,"abstract":"The traditional trade-off between payload capacity and stego quality of steganographic information systems has kept hiding capacities at relatively low values due to the adverse effect on stego quality. This paper proposes a new strategy that can raise the hiding capacity without negatively impacting stego quality. The proposed scheme exploits a concept derived from the Human Visual System (HVS) which indicates that the sensitivity of human perception is markedly lower in the chrominance channels of an image as compared to the luminance channel. Thus, this new scheme proposes to hide in the L*a*b* color space rather than the RGB color space for higher capacity rates. This is due to the fact that the L*a*b* color transformation has the ability of separating chrominance from luminance information for a given color image. Experimental results demonstrate that the proposed scheme is able to show advantages over traditional RGB schemes in hiding capacity as well as stego quality.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116043393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IIT 2018 TOC","authors":"","doi":"10.1109/innovations.2018.8605982","DOIUrl":"https://doi.org/10.1109/innovations.2018.8605982","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123218465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}