{"title":"Attention Mechanism for Human Motion Prediction","authors":"Amal Fahad Al-aqel, Murtaza Ali Khan","doi":"10.1109/ICCAIS48893.2020.9096777","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096777","url":null,"abstract":"Human motion prediction aims to forecast the most likely future frames of motion conditioned on a given sequence of frames. Because of its importance to many applications especially robotics, it has received a lot of interest and has become an active area of research. Since humans are very flexible in nature, human motion prediction is very challenging Recently, deep learning methods have been dominant in many tasks due to their successful results. Particularly, Recurrent Neural Networks (RNNs) have shown excellent performance on human motion prediction task and other tasks that depend on sequential data, where preserving the order of the sequence items is crucial. The well-known Sequence-to-Sequence (Seq2Seq) architectures have been used for sequence learning where two RNNs namely the encoder and the decoder work cooperatively to transform one sequence to another. In the context of neural machine translation, the use of attention decoders yields state-of-the-art results. This work employs a simple but efficient Seq2Seq model with attention decoder. Both encoder and decoder are trained jointly to predict 15 different categories of human motion. Our experiments have shown that the attention decoder clearly outperforms earlier methods and achieves state-of-the-art results in the short-term (< 500ms) motion prediction task. Contrary to earlier methods that show progressive deterioration as the time of prediction increases, our model shows high quality long-term (> 500ms) motion prediction which stays as high even after 1000ms of prediction.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management of Stakeholder Communications in IT Projects","authors":"Abdulmohsen Alsulaimi, Tariq Abdullah","doi":"10.1109/ICCAIS48893.2020.9096842","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096842","url":null,"abstract":"The study centers on examining communication among stakeholders in information technology projects, exploring measures for application by project managers to ensure success. In projects, the correct management of the stakeholders and ensuring their effective communication is a key challenge. Issues of diversity, varying objectives and other communication barriers adversely affect project success. Other challenges entail resistance and weaknesses in shareholders in sharing information, challenge of reaching multiple audiences, heterogeneous goals and concerns, and resource limitations. The study objective is depicting a need for workflow process automation for effective stakeholder communication, identify challenges in communication and develop a useful workflow automation application for implementation in IT projects using Microsoft Visual Studio (ASP.net). Through the app, there is the defining of stakeholders and communications within the project with the inclusion of tasks, their status, and specific milestones. Finally, we aim in examining communication variation across age, educational level, and gender of stakeholder and explore how response times vary across these facets. The research applies a descriptive-survey method and reviews in expanding on the study, relying on information from reviewers and past studies. In the attainment of the project aims, the design and development of a communication software/application were undertaken. The prototype app was made with Microsoft Visual Studio (ASP.net). The design considers an app platform for adequate coverage and communication of stakeholders on different tasks. The prototype app is vital in supporting IT Project Manager in a dynamic stakeholder communication process. With the app, project managers can conveniently plan and control IT projects. The study shows challenges faced by project managers in communication. This entails resistance in data sharing, inability to reach multiple stakeholder needs and audiences, varied needs among various stakeholders, and limited resources or communication tools. The verification and validation procedures were conducted for measuring the product's performance, its functionalities, and customer perceptions. A sample of 102 reviewers was vital in the verification process during the inspection meeting. The data analysis from stakeholders showed that the average response time on project task communication was 300.20 minutes. From the analyzed demographic data collected from the reviewers, it was demonstrated that age affects the communication process and involvement level during the task in the stakeholders. Education and gender were shown as not affecting communication and task involvement.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raja H. Alyaffer, D. Alboaneen, Nourah F. Alqahtani
{"title":"NewsScatter: Topic Similarity in Social Media","authors":"Raja H. Alyaffer, D. Alboaneen, Nourah F. Alqahtani","doi":"10.1109/ICCAIS48893.2020.9096776","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096776","url":null,"abstract":"News organisations that use social media sites (such as Twitter) rapidly generate a large volume of data every day. Data visualisation is an effective way to represent microblogging data graphically in order to increase understanding of what news organisations are reporting over a given time period. This paper focuses on visualising the tweets (posts on Twitter) of a broad cross-section of English-language news outlets over time, with the goal of developing an interactive web-based visualisation system that summarises the output of news outlets’ tweets as a scatter plot where each point refers to a news outlet. Such a visualisation could enable interested parties to explore similarities and differences among what news outlets report based on the frequency with which specific words are used.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130510457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Z. Iqbal, Dania Huzam, N. Aleliwi, Asma Alabdulkareem, Shikah Alalyani, Shaikha Alfaris, H. Gull
{"title":"Smart Fair Guide: Requirements and Design of a Smart Fair Management System","authors":"S. Z. Iqbal, Dania Huzam, N. Aleliwi, Asma Alabdulkareem, Shikah Alalyani, Shaikha Alfaris, H. Gull","doi":"10.1109/ICCAIS48893.2020.9096722","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096722","url":null,"abstract":"Reading is an essential part of our life, and it is a way by which we acquire new knowledge, discover ourselves and develop our skills. A book fair is an event that provides visitors with the opportunity to further enhance their knowledge, to obtain rare books and to meet their favorite authors. In this event, the staff aim to achieve visitor’s satisfaction, and to increase the fair’s value. Every year Kingdom of Saudi Arabia alos arrange such events to promote knowledge. These events provide readers a chance to acquire international books that may not be available in the Kingdom. The Book Fair organizers are always seeking to reach a better level of organization to gain visitors’ satisfaction and avoid losing the basic value of the Book Fair. SmartFair Guide is a web- based and application-based system that will manage the Kingdom’s book fair event and that will enhance the experience of all individuals involved. The reason the system is referred to as smart is its outstanding features and most specifically, the system includes implementing number of data mining techniques anticipated to have a direct effect on the books classification process and the recommendation system. In this research paper the proposed model structure will display the main procedures and the user’s role behavior in the cycle of the system. The cycle includes seven of the system’s processes which are the donation, ticket trade, barcode scanning, crowd deduction, recommendation, classification and section locating processes. The system analysis demonstrates the diagrams which includes the Use Case, DFDs, ER, Activity, Sequence diagrams and their description.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134318633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI Driven Methodology for Anomaly Detection in Apache Spark Streaming Systems","authors":"Ahmad Alnafessah, G. Casale","doi":"10.1109/ICCAIS48893.2020.9096667","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096667","url":null,"abstract":"Cloud computing, Artificial Intelligence, and Big Data technologies have recently become one of the most impactful forms of technology innovation. It is common to have multiple users share the same computing resources. This practice noticeably leads to performance anomalies. For instance, some applications can feature variability in processing time due to interference from other applications, or software contention from the other users, which may lead to unexpectedly long execution time and be considered anomalous. There is an urgent need for an automated effective performance anomaly detection method that can be used within the production environment for the streaming system to avoid any late detection of unexpected system failures. To address this challenge, we introduce a new black-box training workload configuration optimization with a neural network driven methodology to identify anomalous performance in an in-memory Spark streaming Big Data platform. The proposed methodology effectively uses Bayesian Optimization to find the ideal training dataset size and Spark streaming workload configuration parameters to train the anomaly detection model. The proposed model is validated on the Apache Spark streaming system. The results demonstrate that the proposed solution succeeds and accurately detects many types of performance anomalies. In addition, the training time for the machine learning model is reduced by more than 50%, which offers a fast anomaly detection deployment for system developers to utilize more efficient monitoring solutions.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Yuwono, M. F. Edy Purnomo, Dandy Imam Zaki, A. Rafli
{"title":"Design of Symmetric and Asymmetric Array Clover Patch Microstrip Antennas at 2.4 GHz Frequency","authors":"R. Yuwono, M. F. Edy Purnomo, Dandy Imam Zaki, A. Rafli","doi":"10.1109/ICCAIS48893.2020.9096716","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096716","url":null,"abstract":"Efficient and easy-to-produce characteristics of microstrip antenna makes it very common of being applied on communication devices. This research used five clover-shaped patch array microstrip antenna with 1×1, 2×2, 3×3, 4×4, and 5×5 format to analyze the parameters on 2.4 GHz operation frequency. VSWR, return loss, bandwidth and gain of each antennas are analyzed on this research. In conclusion, the addition of radiating element (patch) of the antenna lower the antenna’s performance in VSWR and return loss, but widen the bandwidth and increasing gain of the antenna.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"84 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133136175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Escape The Countries: A VR Escape Room Game","authors":"Samira Yeasmin, Layla Abdulrahman Albabtain","doi":"10.1109/ICCAIS48893.2020.9096727","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096727","url":null,"abstract":"Technology has become an integral part of our life. One of the most emerging technologies of the 21st century is Virtual Reality. It is being applied to medicine, education, engineering, architecture, training, entertainment and so on. Nowadays it is being used in the gaming field as well. Game developers are turning their games into VR games and it is gaining a lot of popularity. Virtual reality gaming is the application of a 3D artificial environment to games. A VR gaming accessory involves VR headsets, sensor-equipped gloves, hand controllers, etc. Virtual reality games can be played on standalone systems, on specialized game consoles, or using advanced laptops and PCs using Oculus Rift, HTC Vive and Lenovo Explorer [1]. An escape room game is a game where players have to ‘escape’ a room by solving challenges within a given time limit [2]. Sometimes the challenges are made inaccessible and must be found by completing puzzles. Therefore, this project proposes to create a VR escape room game that will help the players to enhance their skills. The game will have several rooms to escape representing different cultures of different countries to help the player interact with different cultures. The game will have puzzle-solving challenges to solve so that players can escape the room. The challenges will be based on math, arrangement, and pattern recognition. During the project, a survey will be carried out to gather information about playing VR games and the significance of a VR escape room game. Similar games around the world will also be reviewed. The goal of the project is to use people’s free time to teach them skills.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126825588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Farhat, N. Alhazmi, P. Avery, R. Tezaur, Y. Ghazi
{"title":"Parametric studies of aerodynamic properties of wings using various forms of machine learning","authors":"C. Farhat, N. Alhazmi, P. Avery, R. Tezaur, Y. Ghazi","doi":"10.1109/ICCAIS48893.2020.9096831","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096831","url":null,"abstract":"In aerodynamic studies, models are essential tools for understanding complex fluid flow phenomena. However, their use can be expensive in terms of computer power and calculation time. Therefore, machine learning algorithms have become essential when it comes to analyzing uncertainty in modelling and predicting the values for new input parameters with sensitivity quantifications and in a reasonably short time. The aim of this paper is to predict the key factors in aircraft design by finding the best estimation of the dependent variable in the form of the lift to drag ratio, for any new input-dependent values in the form of Mach numbers and angle of attack. Therefore, different regressions of classical supervised learning algorithms have been applied. The statistical errors have been calculated for these regressions in order to choose the best fit for an unknown model. In addition, artificial neural networks (ANN) have been used to train the data, and to predict the ratio of lift to drag in a practical time compared to the use of experimental tests and the computational fluid dynamics (CFD) technique.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114780324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rolando Treviño-Lozano, Juan Raúl Martinez-Gutierrez, Francisco Javier Cantu Ortiz, Hector Gibran Ceballos Cancino
{"title":"Analysis of hydrocarbon fuels imports under a new Mexican regime","authors":"Rolando Treviño-Lozano, Juan Raúl Martinez-Gutierrez, Francisco Javier Cantu Ortiz, Hector Gibran Ceballos Cancino","doi":"10.1109/ICCAIS48893.2020.9096848","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096848","url":null,"abstract":"In 2018 a new regime arrived to Mexican administrative apparatus. This new regime has expressed plans to abolish public policies from previous administrations, energetic policy among them. This document tries to determine if hydrocarbon fuels imports have been affected by this new regime.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Accuracy Phishing Detection Based on Convolutional Neural Networks","authors":"S. Yerima, Mohammed K. Alzaylaee","doi":"10.1109/ICCAIS48893.2020.9096869","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096869","url":null,"abstract":"The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber-attacks. Consequently, more effective phishing detection is required for improved cyber defence. Hence, in this paper we present a deep learning-based approach to enable high accuracy detection of phishing sites. The proposed approach utilizes convolutional neural networks (CNN) for high accuracy classification to distinguish genuine sites from phishing sites. We evaluate the models using a dataset obtained from 6,157 genuine and 4,898 phishing websites. Based on the results of extensive experiments, our CNN based models proved to be highly effective in detecting unknown phishing sites. Furthermore, the CNN based approach performed better than traditional machine learning classifiers evaluated on the same dataset, reaching 98.2% phishing detection rate with an F1-score of 0.976. The method presented in this paper compares favourably to the state-of-the art in deep learning based phishing website detection.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}