{"title":"Architectural design of a cloud-based reCAPTCHA service","authors":"H. Abubaker, K. Salah, H. Al-Muhairi, A. Bentiba","doi":"10.1109/INNOVATIONS.2016.7880041","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880041","url":null,"abstract":"reCAPTCHA is a security measure that guards web applications against automated abuse by presenting a random auto-generated challenge to users to solve. These challenges have to be devised to be hard to be solved by computers, yet easy for humans. In this paper, we present an architectural design for a cloud-based reCAPTCHA service and discuss key design issues. These issues include the extraction of individual word images from the scanned pages, optical character recognition (OCR) initial words classification, handling multiple users at the cloud-based service side, and usability and readability. We also show how our design addresses these issues at the implementation phase. It is worth noting that our reCAPTCHA service is designed for the Arabic language, but the underlying proposed architecture and design principles can be applied to any other language.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revolutionizing the healthcare of the future through nanomedicine: Opportunities and challenges","authors":"Hadeel Elayan, R. Shubair, Nawaf I. Almoosa","doi":"10.1109/INNOVATIONS.2016.7880025","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880025","url":null,"abstract":"Nanotechnology refers to the design, production and application of structures, devices or systems at the incredibly small scale of atoms and molecules-the \"nanoscale\". As a result, this technology has the potential to remarkably affect the development of the healthcare sector by revolutionizing both the diagnostic and therapeutic approach of diseases. In this paper, current advances in modern medicine are presented and discussed. Drug delivery, gene delivery, immune system support and health monitoring are demonstrated as few examples of the many applications that uses nanotechnology in disease diagnosis. In addition, the technology of bionanosensors is presented to highlight their ability to sense the biochemical and biophysical signals associated with diseases at the molecular or cellular levels. Further, nanoparticles are demonstrated as essential building blocks of nanotechnology in which various types of materials are presented and characterized. Finally, the challenges and future trends associated with this developing technology are illustrated.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alan Alahmad, A. Rayyan, Fares Al Juheshi, H. Sharif, M. Alahmad, K. Shuaib, Mohammad Abdul-Hafez, N. A. Aljuhaishi
{"title":"Overview of ICT in the advancement of electric vehicle penetration: Overview of vehicle grid communication system and charging infrastructure and a case study of economic and environmental benefits of electric vehicles in Nebraska","authors":"Alan Alahmad, A. Rayyan, Fares Al Juheshi, H. Sharif, M. Alahmad, K. Shuaib, Mohammad Abdul-Hafez, N. A. Aljuhaishi","doi":"10.1109/INNOVATIONS.2016.7880031","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880031","url":null,"abstract":"Information and communication technology (ICT) plays a key role in our society, making management and planning easier across sectors. ICT can also help users during times of transition to promote a newer technology in an industry, such as transportation, and aid in GHG reductions by its enabling technologies. Battery electric vehicles (BEV) emit less CO2 than conventional vehicles, offering a way to lower fuel emissions. The sales of BEVs have shown a strong growth trend in the U.S., but continued use depends on effective ICT based enabling technologies to link BEVs with its environment to provide information such as real-time battery charge levels, location of nearest charging infrastructure, route options to optimize battery performance and energy price in a given area within the BEVs vehicle grid communication (VGC) infrastructure. In an effort to build BEV charging infrastructure aided by ICT enabling technologies to promote and deploy BEV, a case study is presented in which 24 BEVs and 35 Chargepoint charging stations are deployed across communities in Nebraska. Data analysis is used to gain insight into charging times, user charging habits, economic and environmental saving, information that can be used by ICT enabling technologies to optimize the user experience, smart grid operation and wide spread adoption of BEVs.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132413961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nermeen M. Abdal-Ghafour, Ayman A. Abdel-Hamid, M. Nasr, S. Khamis
{"title":"Authentication enhancement techniques for BAC in 2G E-passport","authors":"Nermeen M. Abdal-Ghafour, Ayman A. Abdel-Hamid, M. Nasr, S. Khamis","doi":"10.1109/INNOVATIONS.2016.7880040","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880040","url":null,"abstract":"Electronic passport is one of the hottest research fields nowadays due to reported different attacks against various countries. Several attacks such as brute force attack, guessing machine readable zone's information are performed on Basic Access Control Protocol (BAC) due to its low entropy. This paper presents two proposed authentication enhancement techniques for seed key of BAC. The first proposed enhancement technique depends on a password provided by the citizen as input to the inspection system at the border during the verification process. The second proposed enhancement technique depends on extracting minutiae features from a scanned citizen's fingerprint to increase strength of seed key. Performance evaluation experiments for proposed enhancement techniques are conducted using MATLAB proving that the proposed techniques enhance authentication procedures of BAC and increase entropy of seed key with minimum additional delay. A facial recognition database and fingerprint recognition database are tested proving the strength of proposed techniques against cracking.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social desirability bias in software piracy research: Evidence from pilot studies","authors":"M. Gergely, V. Rao","doi":"10.1109/INNOVATIONS.2016.7880052","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880052","url":null,"abstract":"Social desirability bias (SDB) is the under-or over-reporting of behaviors by a respondent in order to appear more acceptable, or gain the approval of others. The presence of SDB in studies of software piracy behavior has been suspected for long. However, few studies have explicitly addressed this issue in detail. In the current article, results from a set of pilot studies are reported. These pilot studies compare software piracy behavior in experimental studies to responses of intentions to pirate in paper-based scenarios, under equivalent conditions. The comparisons provide valuable preliminary insights into the understanding of SDB in software piracy, and suggest the need to account for SDB research in software piracy studies.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sheikh, Emad A. Felemban, Muhamad Felemban, Saad B. Qaisar
{"title":"Challenges and opportunities for underwater sensor networks","authors":"A. Sheikh, Emad A. Felemban, Muhamad Felemban, Saad B. Qaisar","doi":"10.1109/INNOVATIONS.2016.7880021","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880021","url":null,"abstract":"Wireless sensor networks (WSN) are distributed event-based systems comprising of tiny nodes capable of sensing the environmental phenomena with a limited battery, low processing power and short-range radio for communication. Most of the applications of sensor network are concerned with sensing scalar sensor such as temperature, pressure, humidity, or location of objects that can be conveyed through low-bandwidth and delay-tolerant data streams. More than a decade's research has matured communication protocols, sensor technology, bandwidth, energy efficiency and lifetime of traditional WSNs. The recent interest in underwater wireless sensor networks (UWSN) has resulted in various technological advances in the domain as well however, these advances have faced many challenges that are not seen in traditional WSNs. This paper discusses the technical challenges and available technologies that can be used to establish an underwater sensor network solution for applications such as monitoring of coral reefs.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naima Bousnina, S. Ghouzali, M. Lafkih, Ohoud Nafea, M. Mikram, Wadood Abdul, D. Aboutajdine
{"title":"Watermarking for protected fingerprint authentication","authors":"Naima Bousnina, S. Ghouzali, M. Lafkih, Ohoud Nafea, M. Mikram, Wadood Abdul, D. Aboutajdine","doi":"10.1109/INNOVATIONS.2016.7880039","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880039","url":null,"abstract":"This paper presents a spatial biometric watermarking scheme for multimodal authentication system. This method embeds the face features (watermark) into the fingerprint image (cover) via a generated secret key to locate the pixels to be watermarked while preserving the fingerprint minutia points. The face features are extracted using Orthogonal Locality Preserving Projections technique. The proposed scheme has the advantage that in addition to fingerprint matching, the recovered watermark during the decoding can be used to establish the authenticity of the fingerprint and the user. The experimental results obtained using the ORL face database and FVC2002 DB2 fingerprint database have showed that the fingerprint-face based multimodal authentication system has good performance accuracy.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130725848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight encryption algorithm in wireless body area network for e-health monitoring","authors":"Azza Zayed Alshamsi, E. Barka, M. Serhani","doi":"10.1109/INNOVATIONS.2016.7880042","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880042","url":null,"abstract":"There is an increase in the diseases of the circulatory system in United Arab Emirates, which makes it the first leading cause of death. Therefore, there is a high demand for a continuous care that can be achieved by adopting an emerging technology of e-Health monitoring systems using Wireless Body Area Network (WBAN) that can collect patient's data. Since patient's data is private that makes securing the WBAN is essential. In this paper there is a proposed design architecture to secure data transmission from WBAN sensor to mobile in e-Health monitoring system by encrypting the vital signs of a patient using Lightweight Encryption Algorithm (LEA).","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of personalized language learning systems","authors":"Heba M. Ismail, S. Harous, B. Belkhouche","doi":"10.1109/INNOVATIONS.2016.7880051","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880051","url":null,"abstract":"This study reviews published scientific literature on personalized language learning systems. The focus is threefold: 1) present a review and categorization framework that can be used to analyze and classify personalized language learning systems, 2) analyze recent work in personalized language learning systems and organize them under the proposed framework, 3) identify current trends, challenges and open research questions in the field. Our review led us to propose a review and classification scheme with two dimensions each with a few sub-elements: language learning dimension and technical dimension. The reviewed articles indicate that recent language personalization systems increasingly introduce Artificial Intelligence and focus on cognitive-based personalization. Findings also suggest that language personalization systems may improve by incorporating more complex adaptive learner's model and more complex contextual language learning tasks.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. W. Hsu, Hao-Hsun Wang, Min-Ruey You, Minjaro Lu, Hsin-Yu Tsai
{"title":"Identifying roles of fishing ports using multi-source data aggregation","authors":"W. W. Hsu, Hao-Hsun Wang, Min-Ruey You, Minjaro Lu, Hsin-Yu Tsai","doi":"10.1109/INNOVATIONS.2016.7880043","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880043","url":null,"abstract":"Managing and maintaining fishing ports is crucial for fishing activities. With the lack of budget and labor force, some fishing ports face the brink of being shut down. A first choice for demolishing would be fishing ports with low utilization, but this does not mean the port is totally useless. When severe weather condition, i.e., typhoons, is in the proximity of the coastal line, offshore fishing vessels will return to dock in ports for safety. When major ports are fully docked, some of the minor ports or less active ports will be chosen as the haven. These ports are seldom used and lowly utilized, but should still be maintained for safety issues as they serve as a sanctuary for extreme weather conditions. This research uses big data aggregation approach to identify haven ports by processing fishing vessel states using collected voyage data recorder (VDR) records and correlates this information with the typhoon information data source.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}