Hachem H. Alaoui; Elkaber Hachem; Cherif Ziti; Mohammed Karim
Abstract
Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation ...
Read More
Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation in our learning training; during every session, an image of the learner will be taken by the webcam to be compared to that already stored in the database. As soon as the learner is recognized, he/she must be arranged in the accordion to an appropriate profile that takes into consideration his/her weaknesses and strength, which is conducted with the help of the J48 as a predictive study. Furthermore, we utilize a light processing module on the client device with a compact code in order that we can have a lot of in formation transmission capable to send the component over the network and to have the option to record many photos in an enormous database in the cloud.
Aymen M. Al-Kadhimi; Salim A. Mohammed Ali; Sami Hasan
Abstract
This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss ...
Read More
This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss and a broad stopband rejection of 55 dB. The filter produces 11 transmission zeros (attenuation poles), one at infinity and 5 pairs located at finite frequencies offering better wide stopband attenuation performance as well as sharp selectivity. The filter is built based on suspended stripline structure (SSS) using aluminium as a cavity and with 2mm as a ground spacing. The filter measurements show a reasonable agreement has been achieved with the simulated response.An eleventh-order lowpass filter satisfying generalized Chebyshev response with asymmetrical topology, a wide stopband rejection and high selectivity has been presented. The filter has a total of 11 TZs, one is located at infinity and 5 pairs located at different finite frequencies contributing response improvements in both passband and stopband re- gions
Sumayia Al-Anazi; Isra Al-Turaiki; Najwa Altwaijry
Abstract
Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ...
Read More
Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ensemble methods. A review and classification of current ensemble motif discovery tools is presented. We then propose our Cluster-based Ensemble Motif Discovery Tool (CEMD) which is based on k-medoids clustering of state-of-art stand-alone motif finding tools. We evaluate the performance of CEMD on benchmark datasets and compare the results to both stand-alone and similar ensemble tools. Experimental results indicate that CEMD has better sensitivity than state-of-art stand-alone tools when dealing with human datasets. CEMD also obtains better values of sensitivity when motifs are implanted in real promoter sequences. As for the comparison of CEMD with ensemble motif discovery tools, results indicate that CEMD achieves better results than MEME-ChIP on all evaluation measures. CEMD shows comparable performance to RSAT peak-motifs and MODSIDE.
Isra Al-Turaiki; Najwa Altwaijry; Abeer Agil; Haya Aljodhi; sara Alharbi; Lina Alqassem
Abstract
With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). ...
Read More
With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). These systems are an essential component for ensuring the security of computer networks against attacks. In this paper, two deep learning architectures are proposed for both binary and multi-class classification of network attacks. The models, CNN-IDS and LSTM-IDS, are based on Convolutional Neural Network and Long Short Term Memory architectures, respectively. The models are evaluated using the well-known NSL-KDD dataset. The performance is measured in terms of accuracy, precision, recall, and F-measure. Experimental results show that the models achieve good performance in terms of accuracy and recall. Network intrusion detection systems are an integral part of contemporary networks. They provide administrators with an early warning for known and unknown attacks. In this paper, two deep learning architectures to aid administrators in detecting network attacks are outlined
Saja Ahmed Albliwi; Hanan Abdullah Alkharmani
Abstract
With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing ...
Read More
With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing to a massive shift to a cashless society. However, some Mobile Payment users may be resistant to changing from conventional Payment methods. Therefore, it is critical to guarantee users’ continuance intention (CI) toward Mobile Payments to ensure the widespread uptake of Mobile Payments. Given this, this research aims to study the influence of the quality of Mobile Payment impacts users’ CI in Saudi Arabia (SA). Methods: The conceptual model was constructed based on the Information System Success Model and Information System post-adoption researches to support the framework of the current study. Results are drawn from a self-administered survey of a random sample of 389 respondents who regularly use Mobile Payment services in SA. Quantitative analysis is used to determine the impact of Mobile Payment quality on persistence intention to operate in Saudi Arabia. Results: The current study outcomes have shown that all three dimensions of quality (system quality (SYSQ), service quality (SERQ), and information quality (INFQ)), influence user satisfaction (SAT).
Mustapha Bassiri; Abderrazak Mazouak; Imad Lamniai; Malika Tridane; Said Belaaouad; Said Belaaouad
Abstract
The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed ...
Read More
The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed to revive pedagogies to a new digital without or less presence. Our purpose is to verify the impact of open distance learning on the development of socio-professional skills among future administrators of the Ministry of National Education in initial training. In addition, the instrumentation of these training devices also provides a framework for evaluating, monitoring and controlling the training process, using the resources of computers and the Internet. Our research context takes place at the level of TAZA Regional Center of Trades Education and Training (CRMEF) during the academic year 2016-2017, the use of technological tools by trainers or trainees is quite common in courses, parallel activities, self-training, communication trainers-trainees or trainee-counsellors but all these forms suffer from the absence of a general frame of reference and regulation which guides the training actions via these tools. Indeed, the recommended methodology based on engineering training devices and skills in a virtual environment ie ” The technical instrumentation “and” educational scripting ” objects and training content. During its creation as its implementation, our platform experienced several difficulties including technical. Or today seeing the results of the questionnaires and following the feedbacks of trainee administrators we can judge that our goal is achieved.