2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

筛选
英文 中文
Power consumption of a chaos-based stream cipher algorithm 基于混沌的流密码算法的功耗
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096730
Basil Atawneh, Layla AL-Hammoury, Mohammed AbuTaha
{"title":"Power consumption of a chaos-based stream cipher algorithm","authors":"Basil Atawneh, Layla AL-Hammoury, Mohammed AbuTaha","doi":"10.1109/ICCAIS48893.2020.9096730","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096730","url":null,"abstract":"With the huge usage of the Internet of Things (IoT), lots of sensitive data are being transferred between devices. This raises the need for security so that unauthorized parties can’t access the data. IoT devices are known to have limited resources; they have limited battery life, limited memory size and their response time should be minimized. With these speed and memory constraints, classical encryption systems and methods don’t work efficiently with the IoT devices, because they can be too slow, huge or very power consuming. Here comes the need to develop a Lightweight cryptosystem that meets the requirements of the Lightweight device. In this paper, a practical lightweight stream cipher based on stream cipher is proposed, then the power consumption is calculated to show the suitability for limited resources devices. Furthermore, some lightweight measurement tools will be used in order to achieve the research objectives.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated Smart Locker for College 大学自动智能储物柜
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096868
Hanan F. Alqahtani, Jeehan A. Albuainain, Badriayh G. Almutiri, Shahad Alansari, Ghaliah B. AL-awwad, Nada Alqahtani, Samia M. Masaad, Rania A. Tabeidi
{"title":"Automated Smart Locker for College","authors":"Hanan F. Alqahtani, Jeehan A. Albuainain, Badriayh G. Almutiri, Shahad Alansari, Ghaliah B. AL-awwad, Nada Alqahtani, Samia M. Masaad, Rania A. Tabeidi","doi":"10.1109/ICCAIS48893.2020.9096868","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096868","url":null,"abstract":"Recently, the use of Internet of Things (IOT) technology in all aspects of life has increased, and the most important areas that have been affected by this development are locks, security systems, and remote-control technologies. In this study, the proposed Smart Locker based on the Bluetooth technique can be controlled remotely using a mobile phone application to design the interfaces that help to enhance security and convenience. In addition to that, an alternative technique will be provided to open the lock by using a Keypad 4x4 when the mobile phone is not available.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ICCAIS 2020 ECF Report ICCAIS 2020 ECF报告
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/iccais48893.2020.9096713
{"title":"ICCAIS 2020 ECF Report","authors":"","doi":"10.1109/iccais48893.2020.9096713","DOIUrl":"https://doi.org/10.1109/iccais48893.2020.9096713","url":null,"abstract":"","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hurricane Tracking Using Multi-GNSS-R and Deep Learning 基于多gnss - r和深度学习的飓风跟踪
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096717
Meshal Alshaye, Faisal Alawwad, I. Elshafiey
{"title":"Hurricane Tracking Using Multi-GNSS-R and Deep Learning","authors":"Meshal Alshaye, Faisal Alawwad, I. Elshafiey","doi":"10.1109/ICCAIS48893.2020.9096717","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096717","url":null,"abstract":"Hurricane Monitoring using GNSS-R is an emerging application in earth remote sensing. Practically, the hurricane is categorized by its maximum win speed which can be measured from the reflected GNSS signals. In order to track the hurricane movement efficiently, a large number of measurements is required. Alternatively, by using deep learning algorithms, useful information from much fewer measurements can be inferred. In this paper, a deep learning-based technique is proposed to track the core of a moving hurricane using limited measurements of a reflected GNSS signals. The proposed technique has achieved a very high accuracy of 96.6% using a CNN model.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Survey On Image Filtring Algorithms 图像滤波算法综述
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096792
Reem Alshammari, Fatimah. H Almuhsin, Fatima. A Albuainain, Salma N. Elsadek, Noura. A Alqhtani, Sarah. A Alkhaldi, Sara K Alghamdi, Wedyan S. Alghamdi
{"title":"A Survey On Image Filtring Algorithms","authors":"Reem Alshammari, Fatimah. H Almuhsin, Fatima. A Albuainain, Salma N. Elsadek, Noura. A Alqhtani, Sarah. A Alkhaldi, Sara K Alghamdi, Wedyan S. Alghamdi","doi":"10.1109/ICCAIS48893.2020.9096792","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096792","url":null,"abstract":"Image processing, especially filtering has become important because there are many factors that affect the quality and purity of the images. For example, the change in pixel density or illumination will negatively affect the images; therefore noise should be removed using filtering. Image filtering is useful for many applications including smoothing, sharping, removing noise and edges enhancement. This paper analyses the various algorithms used for image filtering which improves image quality and clarity. The first section introduces different algorithms that are used in image filtering and how each algorithm processes the image. Then, a discussion and analysis of the literature review has been done to classify and compare between the algorithms studied.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IAS’2019 Cryptographic Protocol Allowing to Protect the Key in the Open Communication Channel IAS 2019加密协议允许在开放通信通道中保护密钥
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096729
I. Smirnov, O. Safaryan, P. Razumov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, P. A. Chub
{"title":"IAS’2019 Cryptographic Protocol Allowing to Protect the Key in the Open Communication Channel","authors":"I. Smirnov, O. Safaryan, P. Razumov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, P. A. Chub","doi":"10.1109/ICCAIS48893.2020.9096729","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096729","url":null,"abstract":"The proposed work considers the development of the cryptographic protocol IAS2019, which allows you to protect the public key in an open communication channel. The advantage of this protocol is that it can be integrated with other cryptographic protocols, thereby increasing their security properties, and also has a higher level of security compared to foreign counterparts.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effectiveness and Efficiency of Course Outcomes Based Assessment Models 基于课程成果的评估模型的有效性和效率
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096773
Salah Hammami
{"title":"Effectiveness and Efficiency of Course Outcomes Based Assessment Models","authors":"Salah Hammami","doi":"10.1109/ICCAIS48893.2020.9096773","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096773","url":null,"abstract":"Outcome Based Assessment (OBA) is one of the recent educational phenomenon that is being increased use especially in high education. This approach applied to improve the learning, increase student mobility and achieve lifelong learning either in traditional learning or in e-learning systems. This study will describe the effectiveness and efficiency of the various outcome based assessment models and will conduct a detailed and comparative analysis of them from different criteria to identify the strengths and limitations of every model. Different factors and criteria will be discussed to evaluate and compare between existing models.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TS2FA: Trilateration System Two Factor Authentication TS2FA:三边系统双因素认证
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096825
A. A. AlQahtani, Hosam Alamleh, J. Gourd, Hend Alnuhait
{"title":"TS2FA: Trilateration System Two Factor Authentication","authors":"A. A. AlQahtani, Hosam Alamleh, J. Gourd, Hend Alnuhait","doi":"10.1109/ICCAIS48893.2020.9096825","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096825","url":null,"abstract":"Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor is something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), something a user does (keystroke), or somewhere a user is (location). In the existing 2FA system, a user is required to act in order to implement the second layer of authentication which is not very user-friendly. Smart devices (phones, laptops, tablets, etc.) can receive signals from different radio frequency technologies within range. As these devices move among networks (Wi-Fi access points, cellphone towers, etc.), they receive broadcast messages, some of which can be used to collect information. This information can be utilized in a variety of ways, such as establishing a connection, sharing information, locating devices, and, most appropriately, identifying users in range. The principal benefit of broadcast messages is that the devices can read and process the embedded information without being connected to the broadcaster. Moreover, the broadcast messages can be received only within range of the wireless access point sending the broadcast, thus inherently limiting access to those devices in close physical proximity and facilitating many applications dependent on that proximity. In the proposed research, a new factor is used - something that is in the user’s environment with minimal user involvement. Data from these broadcast messages is utilized to implement a 2FA scheme by determining whether two devices are proximate or not to ensure that they belong to the same user.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multiple Sequence Alignment using a Multiobjective Artificial Bee Colony Algorithm 基于多目标人工蜂群算法的多序列比对
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096734
Najwa Altwaijry, Malak Almasoud, Areej Almalki, Isra M. Al-Turaiki
{"title":"Multiple Sequence Alignment using a Multiobjective Artificial Bee Colony Algorithm","authors":"Najwa Altwaijry, Malak Almasoud, Areej Almalki, Isra M. Al-Turaiki","doi":"10.1109/ICCAIS48893.2020.9096734","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096734","url":null,"abstract":"Multiple sequences alignment is an essential task in many bioinformatics analyses. However, it is a challenging problem due to its exponential complexity. Although many approaches have been proposed for solving the MSA problem, finding the best alignment of the MSA remains an open problem. In this work, we propose a new multiobjective optimization approach based on the Artificial Bee Colony (ABC) algorithm to solve the MSA problem. The ABC algorithm is inspired by the intelligent behavior of honey bee swarms. Our proposed approach optimizes two objective functions; the sum-of-pairs (SP) function and entropy. Optimizing these objective functions represents a trade off between maximizing the SP function and minimizing the entropy to choose the most suitable alignment. Experiments are conducted on 12 datasets from BAliBASE 3.0. The experimental results show that our proposed approach achieves better alignments than Clustal in four of the tested datasets. In general, the proposed approach performs better on RV12 datasets.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Review of Methods for Adaptive Gamified Learning Environments 自适应游戏化学习环境方法综述
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096871
Yasmeen Alomair, Salah Hammami
{"title":"A Review of Methods for Adaptive Gamified Learning Environments","authors":"Yasmeen Alomair, Salah Hammami","doi":"10.1109/ICCAIS48893.2020.9096871","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096871","url":null,"abstract":"Most of E-learning environments have designed over a \"one-size-fits-all\" approach. Therefore, they are swiftly abandoned by learners in spite of their effectiveness. Providing a more user-centered gamified framework is a critical solution to attract various types of learners and meet their goals, needs, and preferences. It can motivate learners to use learning environments and increase their popularity. In learning environments, the adaptivity concept handles the problem of meeting different types of learners. Gamification aims to increase learners' motivation and engagement inside the adaptive environment by integrating several game features (e.g., badges, leaderboard, level). This paper reviews methods that have applied to incorporate adaptivity and gamification into learning environments. It might serve as a basis for researchers concerning the improvement of learning environments via adaptivity and gamification. Besides, it scales the horizon of opportunities in finding new methods to develop adaptive gamified E-learning environments.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131982785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信