{"title":"Usability Assessment on Symmetric Cryptography Learning Module","authors":"I. Syamsuddin, Arif Bramantoro","doi":"10.1109/ICCIS49240.2020.9257644","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257644","url":null,"abstract":"Teaching information security requires lecturer to introduce several tools to encourage students performing hands on practices in better way in order to enhance their understanding. In this study, a novel learning module as a tool for student to perform symmetric cryptography exercises is introduced. It is called NgeXTEA, a novel learning module to describe how a simple yet powerful symmetric cryptography called Extended Tiny Encryption Algorithm (XTEA) works. The main objective of the study is to conduct assessment from usability point of view on NgeXTEA learning module using System Usability Scale (SUS) method. Finally, SUS based assessment indicated that the learning module is considered useful to enhance students' understanding and skills on the given topic.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129971198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lock-free Fill-in Queue","authors":"Basem Assiri","doi":"10.1109/ICCIS49240.2020.9257673","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257673","url":null,"abstract":"One of the fundamental data structure that is commonly used in parallel and concurrent systems is first-in-first-out queue. Many studies propose lock-based concurrent queue algorithms to satisfy correctness property. However, the use of locks results in delays, contention, deadlock and some other issues. Instead, lock-free algorithms are introduced to overcome such issues and improve performance. Some lock-free algorithms use an atomic operation compare-and-swap (CAS) while some others replace it with fetch-and-add (FAA), to improve the performance. From implementation perspective, some queue algorithms use array data structure to ease the enqueuing and dequeuing processes but the size of queue is static. On the other hand, many queue algorithms use linked data structure where the size of queue is dynamic but the enqueuing and dequeuing processes are complicated. In this paper, we introduce new algorithms for concurrent queue that merge the ideas of array and linked data structure to get the advantages of both. Actually, our queue consists of circular linked list with $k$ empty (dummy) nodes. Therefore, in normal case it works like array. The enqueue process places the data in one of the empty nodes (at tail position), while the dequeue process deletes the data from a non-empty node (at head position), and no need to maintain the linked list queue. However, our queue is dynamic such that we change the queue size by either creating new node and connect it to the linked-list, or deleting some exist nodes. Our algorithm eases the enqueue and dequeue processes, and reduces the use of CAS operations. Therefore, it improves the performance comparing to existing queue algorithms that use CAS, and almost matches the performances of the algorithms that use FAA.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131695296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Khan, Irfan Haider, Muhammad Nazir, Ammar Armghan, H. M. J. Lodhi, J. Khan
{"title":"Traditional Features based Automated System for Human Activities Recognition","authors":"M. A. Khan, Irfan Haider, Muhammad Nazir, Ammar Armghan, H. M. J. Lodhi, J. Khan","doi":"10.1109/ICCIS49240.2020.9257697","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257697","url":null,"abstract":"Human Activities Recognition (HAR) is an important research topic and its applications are spread in all the fields of computer vision and machine learning including video surveillance, robotics, and name a few more. In this paper, a new traditional feature fusion and selection-based method is proposed for automated HAR. The proposed methodology consists of three core steps- optical flow-based motion region extraction and later ROI detection, shape and gray level difference matrix (GLDM) features are combined in one matrix based on seniority value indexes, and finally, Reyni entropy-controlled Euclidean classifier based best features selection. The final selected features are put to Cubic SVM for final recognition. The validation of the proposed technique is conducted on three datasets- KTH, YouTube, and Weizmann and achieved an accuracy of 99.30%, 99.80%, and 99.60%, respectively. Overall, Cubic SVM outperforms among existing techniques.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130624876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-state resistance degradation of power RF N-LDMOS devices due to defects created at interface","authors":"M. Belaid, A. Almusallam","doi":"10.1109/ICCIS49240.2020.9257695","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257695","url":null,"abstract":"The papier study the temperature effects on I-V characteristics of N-channel power RF LDMOS devices, and especially of RDS-on resistance; which is a main constraint of LDMOS devices in high temperature operations, that can partially or total change the performances of physical and electrical device. RDS-on has strong temperature dependence. The main parameters electrical relevant to the temperature effects of the device behavior is reported and proven by the basic physical behavior. The analysis of the experimental results is presented and the physical simulations (2D ATLAS-SILVACO) are used to explain and observe the preview of temperature impacts on power RF LDMOS performance. The physical parameters like current lines, concentration, electric field and mobility are taken into consideration follows temperature dependence. Finally, initial impacts analysis is discussed.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134398429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coded hierarchical dictionary strategy for face recognition efficiency","authors":"Mohammed Saaidia, M. Ramdani","doi":"10.1109/ICCIS49240.2020.9257711","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257711","url":null,"abstract":"Face recognition is the most studied topic in the pattern recognition research field. This is probably due to the multiple useful applications which can be developed for important domains. Such deployed research efforts produced a huge number of methods, techniques and algorithms with different characteristics according to their simplicity, efficiency, robustness and speed. Present work investigates the performances of a simplified technique using a hierarchical classification scheme based on a constructed multi parts dictionary. The elementary features of the constructed dictionary were obtained using the well-known cross-correlation operator applied to the original images and their transformed images known as integral images and Discrete Cosine Transform. Hierarchical classification scheme is used to overcome the fact that this operator has high consumption time cost. The proposed strategy was implemented and tested on the images of the well known ORL and YALE database sets. Practical results demonstrate largely recognizable efficiency and speed characteristics.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133606150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shanmugasundaram Marappan, P. Kuppusamy, Rajan John, Shanmuga Vadivu Natesan
{"title":"A Novel Approach to Preserve Small Scale Details in Fused Image using Guide Filter with NSCT for Visual and Infrared Images","authors":"Shanmugasundaram Marappan, P. Kuppusamy, Rajan John, Shanmuga Vadivu Natesan","doi":"10.1109/ICCIS49240.2020.9257704","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257704","url":null,"abstract":"Fusion of more than a single image create a new version of image which holds plenty of information producing suitable and accurate decision making for the real-world applications. There is no accurate fusion mechanism to produce such a complement detailed image even though huge number of techniques and methodologies are available in the literature. This is an attempt to analyze the pros and cons of the existing popular fusion methods and provide a methodology to contribute in a fusion community. In this approach, the source images are fused by NSCT method. Though NSCT is good in preserving small scale details, it introduces some artifacts in the fused image. To overcome this drawback, the residual of the sources are derived as they retain small scale details such as edges and textures. The fusion version of the source-residuals is bind with NSCT fused image, an approach to compensate the loss details in this way. The resulted fusion images are compared with other techniques qualitatively and quantitatively. Result shows that the proposed approach outperforms the other approaches.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126022124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling and FEA Anaylsis of MEMS ETA for Flying Robot","authors":"F. Ahmad, S. Gilani, Farhan Mehmood","doi":"10.1109/ICCIS49240.2020.9257643","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257643","url":null,"abstract":"In recent years, MEMS sensors and actuators are getting more attention in daily life application of science & technology due to its compactness, miniaturization, economically inexpensive and highly efficient as compare to the other ordinary devices. The Electro Thermal Actuators (ETA) are playing an important role in Micro-Electro-Mechanical System (MEMS) technology due to its high efficiency. In this research work ETA is modeled and simulated. ETA for micro flying robot is designed and fabricated in virtual environment using 0.35 µm Complementary Metal Oxide Semiconductor (CMOS) MEMS technology. INTELLISUITE and MATLAB software have been used for simulation and modeling purpose. The thermal force-based CMOS-MEMS micro actuator consists of four supporting beams in a wing. The wing resonates in lateral mode (1st mode of direction) in the consequence of AC biasing through four long beams. Beam is made of polysilicon and aluminum using bimorph actuation mechanism where polysilicon works as heating resistor. In the presence of thermal force, ETA was actuated to produce maximum amplitude at resonance. Resonance frequency, maximum amplitude and thermal force was measured 843Hz, 124.15mm and 3.26µN mathematically, while the simulated measurements were found to be 970Hz, 97.2mm and 4.67µN.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Schools: Using IoTs and Fog Computing to Predict Underperformance","authors":"M. Sharaf","doi":"10.1109/ICCIS49240.2020.9257689","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257689","url":null,"abstract":"The existing centralized computing paradigm is no longer suitable to achieve the digital continuum in the ever-growing Internet of Things (IoTs). IoT-based applications and the data harvested by these smart objects require a design of a system model that can handle intensive data and provide suitable communication protocols. In this paper, we present a school attendance system that facilitates the usage and collaboration of the digital continuum in a manner that shuns high bandwidth consumption and big latency. This work has the following contributions: (a) offers a novel usage of IoTs and fog in the school absenteeism system. It promotes a transparent workload offloading among the digital continuum layers (IoTs, edge, HPC, big data, Artificial Intelligence (AI), cloud) using two famous protocols, MQTT and TCP; (b) presents a case study that utilizes the digital continuum to achieve a task of interest.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133995366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Framework for Fog Network Based on Multisink Wireless Sensor Networks","authors":"R. Ramadan, E. Alreshidi, Md. Haidar Sharif","doi":"10.1109/ICCIS49240.2020.9257703","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257703","url":null,"abstract":"Based on our research, cloud Computing may not be for many of Internet of Things (IoT) applications. Fog computing makes available the cloud computing paradigm by taking up the gap between centralized data servers and various geographically distributed applications. It functions by deploying fog nodes throughout the Internet. In addition, WSNs are the core of any Internet of Things applications as well as they are emergent networks in many of the real-time applications. Therefore, energy is the most critical issue of WSNs, In this paper, we propose an energy efficient framework for fog computing based on multi-sink WSNs (FOGSink). We believe that selecting the best sink node(s) on the border of the fog network will save the overall energy for many of the applications. Four criteria are used for multi-sink selections which are distance from the fog network nodes, nodes degree, nodes energy, and nodes processing capabilities. Simulation results show the effectiveness of our proposed framework.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114521549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software project failures prediction using logistic regression modeling","authors":"M. Ibraigheeth, S. A. Fadzli","doi":"10.1109/ICCIS49240.2020.9257648","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257648","url":null,"abstract":"The prediction of software project failure early can help in taking an enhancement steps that can steer the project outcome from failure to success. A range of risks may affect the software project during the development process and may lead to project failure. This paper presents a software project failure evaluation model developed based on real data collected from different software project reports, surveys and case studies. The constructed dataset describes the relationship between software project failure and independent failure factors. In this paper, the researchers have developed a failure prediction model using logistic regression method. This model can be used by project managers to assess the expected failures. The developed model helps in estimating the project outcome (Failed/Success). Furthermore, the model provides a probability of software project failure. The model is developed to enable the project decision makers to perform evaluation for the project status during any phase of the software development life cycle.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"2002 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}