{"title":"An extensive study of the Bag-of-Words approach for gender identification of Arabic articles","authors":"Kholoud Alsmearat, M. Al-Ayyoub, R. Al-Shalabi","doi":"10.1109/AICCSA.2014.7073254","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073254","url":null,"abstract":"The prevalent use of Online Social Networks (OSN) and the anonymity and lack of accountability they inherent from being online give rise to many problems related to finding the connection between the massive amount of text data on OSN and the people who actually wrote them. Analyzing text data for such purposes is called authorship analysis. This work is focused on one specific type of authorship analysis, which is identifying the author's gender. Gender identification has various applications from marketing to security. The focus of this work is on Arabic articles. The problem is basically a classification problem and the current approaches differ in the way they compute the features of each document. However, they all agree on following some “stylometric features” approach. Unlike these works, ours treat this problem as a variation of the Text Classification (TC) problem and follow the Bag-Of-Words (BOW) approach for feature selection. We perform an extensive set of experiments on the feature selection and classification phase and the results show that such an approach yield surprisingly high results.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LPS for LBS: Location-Privacy scheme for location-based services","authors":"Salam Doumiati, Tarek Al Choikani, H. Artail","doi":"10.1109/AICCSA.2014.7073233","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073233","url":null,"abstract":"A Vehicular Ad-hoc Network (VANET) is a type of Mobile Ad-hoc Network (MANET) that is used to provide communications between nearby vehicles on a hand, and between vehicles and fixed infrastructure on the roadside on the other hand. VANET is not only used for road safety and driving comfort but also for infotainment. An application area which is expected to greatly benefit from this advanced technology is Location Based Service (LBS): a service which helps users in finding nearby places. However, this application raises a privacy issue for these users since it can profile them and track their physical location. Therefore, to successfully deploy LBS, user's privacy is one of major challenges that must be addressed. In this paper, we propose a location privacy protection scheme to encourage drivers to use this service without any risk of being pursued. Our system was implemented using NS2 network simulator and found to achieve high values of anonymity.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114509087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic authorship classification of two ancient books: Quran and Hadith","authors":"H. Sayoud","doi":"10.1109/AICCSA.2014.7073263","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073263","url":null,"abstract":"Nowadays the need of a scientific and rigorous tool of automatic authorship classification has become pretty important, especially for ancient documents authentication such as religious or historical books. Hence, in this paper, we conduct some experiments of authorship classification on the Quran and Hadith in order to see if they could have the same author or not (ie. Was the Quran written by the Prophet or only sent down to him, as claimed?). This task, which is commonly called authorship discrimination, represents an important authorship classification application. It consists in checking whether two texts are written by the same author or not by using some AI (Artificial Intelligence) and TM (Text mining) techniques. In our case, two main investigations are conducted and presented: in the first one, the two books are analyzed in a global form; in the second investigation, the two books are segmented into 25 different text segments: 14 segments are extracted from the Quran and 11 ones are extracted from the Hadith. The different segments have more or less the same size, with approximately 2080 tokens per text segment. Several classifiers are employed: SMO-based Support Vector Machines (SVM), Multi Layer Perceptron (MLP) and Linear Regression (LR). This research work has allowed getting extremely interesting information on the ancient books origins.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114497896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Halabi, Mariam Ba Hameish, Latefa T. Al-Naimi, A. Kaabi
{"title":"A study on the design and effectiveness of tactile feedback in driving simulator","authors":"O. Halabi, Mariam Ba Hameish, Latefa T. Al-Naimi, A. Kaabi","doi":"10.1109/AICCSA.2014.7073274","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073274","url":null,"abstract":"Driving simulations are widely used to send navigational and warning information to help drivers navigate safely. The traditional approaches are to use visual and auditory channels which can cause sensory overloading. Haptic has major safety implication on reducing visual and auditory overloading in driving, and since seats are the largest area in touch with the driver's body, it is a sensible choice to consider for delivering the haptic information. This paper presents the design and development of an optimal vibrotactile seat to provide a high level of satisfaction to the driver. The seat was designed by experimenting with different design parameters such as the intensity, position, and the rhythm of vibrations. Experiments were conducted to investigate the proper values of voltage, frequency, and amplitude that are specifically related to the developed haptic seat. A driving simulation was developed to evaluate the haptic seat for vehicle navigation in an immersive virtual driving simulator. Results showed that users preferred the vibrations to the audio feedback.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"480 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133632340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Network Protection Framework for DNP3 over TCP/IP protocol","authors":"J. Bai, S. Hariri, Y. Al-Nashif","doi":"10.1109/AICCSA.2014.7073172","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073172","url":null,"abstract":"The pervasive deployment of intelligent devices in the critical infrastructures sector and the high dependency of these devices on the Internet motivated attackers to target the communication and control protocols of these devices. DNP3 over TCP/IP is among those protocols that are widely used as communication and control protocols in critical infrastructures. Due to the facts that security was not part of the goals for designing the DNP3 and the incompetent of current protection systems, adversary can easily succeed in attacking DNP3 devices and network. In this paper, we present an Autonomic Network Protection Framework for DNP3 over TCP/IP that detects old attacks that cannot be prevented by the legacy DNP3 security devices as well as new attacks. The system's detection module is based on rule-based anomaly intrusion detection. We evaluated the effectiveness of the generated rules in detecting anomalies through both offline and online testing. Both the false positive and the false negative rates of our approach are quite low. In addition, we present a classification technique and an access control mechanism to provide autonomic network protection.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121899296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new broadcast scheme for sensor networks","authors":"Kholoud Alsmearat, M. Al-Ayyoub, M. B. Yassein","doi":"10.1109/AICCSA.2014.7073286","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073286","url":null,"abstract":"The future of the Internet envisions connecting all objects around us in a proactive way in what is known as the Internet of Things (IoT). Wireless sensor networks (WSN) represent a prominent example of IoT. Broadcasting is one of most important procedures in wireless networks. However, broadcast may have immense effect on the network's performance in what is know as the broadcast storm problem. In this work, we propose a new broadcast scheme to address the broadcast storm problem. The proposed scheme is an amalgamation of three popular broadcast schemes: the probabilistic scheme, the distance-based scheme and the counter-based scheme. The proposed scheme is implemented and tested on the QualNet simulation environment where it is integrated into the Ad-hoc On-Demand Distance Vector (AODV) routing protocol. The results show that the percentage of saved rebroadcasts can reach more than 50% in some cases.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124941903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker based clustering using the differential energy","authors":"Siham Ouamour-Sayoud, H. Sayoud","doi":"10.1109/AICCSA.2014.7073264","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073264","url":null,"abstract":"A new approach of speaker clustering is presented and discussed in this paper. The main technique consists in grouping all the homogeneous speech segments obtained at the end of the segmentation process, by using the spatial information provided by the stereophonic speech. The proposed system is suitable for debates or multi-conferences for which the speakers are located at fixed positions. The new method uses the differential energy of the two stereophonic signals collected by two cardioid microphones, in order to group all the speech segments that are uttered by the same speaker. The total number of clusters obtained at the end should be equal to the real number of speakers present in the meeting room and each cluster should contain the global intervention of only one speaker. The new proposed approach (which we called Energy Differential based Spatial Clustering or EDSC) has been experimented comparatively with a classic statistical approach called \"Mono-Gaussian Sequential Clustering\". Experiments of speaker clustering are done on a stereophonic speech corpus called DB15, composed of 15 stereophonic scenarios of about 3.5 minutes each. Every scenario corresponds to a free discussion between several speakers seated at fixed positions in the meeting room. Results show the strong performances of the new approach in terms of precision and speed, especially for short speech segments.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127305765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mahfouz, P. Honeine, F. Mourad, J. Farah, H. Snoussi
{"title":"Combining a physical model with a nonlinear fluctuation for signal propagation modeling in WSNs","authors":"S. Mahfouz, P. Honeine, F. Mourad, J. Farah, H. Snoussi","doi":"10.1109/AICCSA.2014.7073228","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073228","url":null,"abstract":"In this paper, we propose a semiparametric regression model that relates the received signal strength indicators (RSSIs) to the distances separating stationary sensors and moving sensors in a wireless sensor network. This model combines the well-known log-distance theoretical propagation model with a nonlinear fluctuation term, estimated within the framework of kernel-based machines. This leads to a more robust propagation model. A fully comprehensive study of the choices of parameters is provided, and a comparison to state-of-the-art models using real and simulated data is given as well.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129596436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Development Environment for generation of middleware for hybrid processors based embedded systems","authors":"Mavera M. Butt, Atif Alvi, S. Khan","doi":"10.1109/AICCSA.2014.7073174","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073174","url":null,"abstract":"Multiprocessor system on chip (SoC) contains hundreds of cores on a chip that require high speed interconnections for fast data communication between the cores. With an increased number of cores, an on-chip bus or a multi-layer bus architecture is the bottleneck for SoC. In contrast, Network-on-chip (NoC) mitigates the flaws of the SoC technology by introducing high scalability, improved communication performance and lesser power consumption. It provides such an on-chip communication architecture that allows multiple cores to communicate via packets routed on a network. A Network-on-System (NoS) architectural framework caters for the major issues of high latency and decreased throughput of reprogrammable and reconfigurable hybrid embedded systems. This paper presents a novel idea of hybrid processors configuration in NoS using an Integrated Development Environment (IDE) generated middleware. The user will be able to configure or reconfigure the NoS, whereas the inter-communication of hybrid processors on the NoS will take place in an abstraction layer without any user intervention. The basic model of NoS and the proposed prototype for GUI based IDE used for middleware generation have been explained in detail. The paper also discusses how such an IDE can be used in the middleware generation of real-time applications like SDR. The proposed methodology is ideally suited to address the complexities of a hybrid embedded system.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matching with quantum genetic algorithm and shape contexts","authors":"Khalil M. Mezghiche, K. Melkemi, S. Foufou","doi":"10.1109/AICCSA.2014.7073245","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073245","url":null,"abstract":"In this paper, we propose to combine the shape context (SC) descriptor with quantum genetic algorithms (QGA) to define a new shape matching and retrieval method. The SC matching method is based on finding the best correspondence between two point sets. The proposed method uses the QGA to find the best configuration of sample points in order to achieve the best possible matching between the two shapes. This combination of SC and QGA leads to a better retrieval results based on our tests. The SC is a very powerful discriminative descriptor which is translation and scale invariant, but weak against rotation and flipping. In our proposed quantum shape context algorithm (QSC), we use the QGA to estimate the best orientation of the target shape to ensure the best matching for rotated and flipped shapes. The experimental results showed that our proposed QSC matching method is much powerful than the classic SC method for the retrieval of shapes with orientation changes.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}