Research Article
Hachem H. Alaoui; Elkaber Hachem; Cherif Ziti; Mohammed Karim
Abstract
Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation ...
Read More
Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation in our learning training; during every session, an image of the learner will be taken by the webcam to be compared to that already stored in the database. As soon as the learner is recognized, he/she must be arranged in the accordion to an appropriate profile that takes into consideration his/her weaknesses and strength, which is conducted with the help of the J48 as a predictive study. Furthermore, we utilize a light processing module on the client device with a compact code in order that we can have a lot of in formation transmission capable to send the component over the network and to have the option to record many photos in an enormous database in the cloud.
Research Article
Aymen M. Al-Kadhimi; Salim A. Mohammed Ali; Sami Hasan
Abstract
This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss ...
Read More
This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss and a broad stopband rejection of 55 dB. The filter produces 11 transmission zeros (attenuation poles), one at infinity and 5 pairs located at finite frequencies offering better wide stopband attenuation performance as well as sharp selectivity. The filter is built based on suspended stripline structure (SSS) using aluminium as a cavity and with 2mm as a ground spacing. The filter measurements show a reasonable agreement has been achieved with the simulated response.An eleventh-order lowpass filter satisfying generalized Chebyshev response with asymmetrical topology, a wide stopband rejection and high selectivity has been presented. The filter has a total of 11 TZs, one is located at infinity and 5 pairs located at different finite frequencies contributing response improvements in both passband and stopband re- gions
Research Article
Osama Ali Awad; Mais Monqith
Abstract
Wireless Networked Control System (WNCS) consists of a control system and communication network system. The insertion of the communication network in control systems has enormous advantages but on the other hand, it brings several issues like network induced delays or packet dropouts that bring negative ...
Read More
Wireless Networked Control System (WNCS) consists of a control system and communication network system. The insertion of the communication network in control systems has enormous advantages but on the other hand, it brings several issues like network induced delays or packet dropouts that bring negative impact on the performance of the system and may lead to instability, the delay caused by wireless network transmission may have bad impacts on the system, so We need to know the behaviour of networked control systems to design better and optimum control that reduces the effect of the delay. In this paper the wireless networked control system is simulated using TrueTime. TrueTime is a Matlab/Simulink-based simulation toolbox which is used to design a wireless network model of ZigBee, using PID control for DC motor system. The evaluation tests show that the PID controller cannot stabilize the system when the data rare of ZigBee network is 20kbps.
Research Article
Abdllkader Esaid; Mary Agoyi; Muhannad Tahboush
Abstract
Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be also secured and kept confidential. Therefore, hybrid cryptography is proposed to ...
Read More
Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be also secured and kept confidential. Therefore, hybrid cryptography is proposed to avoid unauthorized access to data. Data will be transmitted in an encrypted state, through Diffie-Hellman and later decrypted by the intended party. If a third party intercepts the encrypted data, it will be difficult to decipher. Ad Hoc on Demand Distance Vector (AODV) routing protocol is employed to determine the destination. The proposed solution is a hybrid mechanism of encryption algorithms. The NS-2.3 simulator was used to evaluate the performance of the proposed security algorithm. Simulation results have shown the performance of the proposed algorithm in the ad-hoc network on several metrics outperformed many developed security algorithm. A hybrid encryption algorithm for mitigating the effects of attacks in ad hoc networks was developed based on ADOV routing protocol. The algorithm manipulated AES and Blowfish encryption algorithms to increase the speed of the algorithm as well as encryption which will lead to preventing access to a packet while transmission in Ado- hoc network
Research Article
Sumayia Al-Anazi; Isra Al-Turaiki; Najwa Altwaijry
Abstract
Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ...
Read More
Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ensemble methods. A review and classification of current ensemble motif discovery tools is presented. We then propose our Cluster-based Ensemble Motif Discovery Tool (CEMD) which is based on k-medoids clustering of state-of-art stand-alone motif finding tools. We evaluate the performance of CEMD on benchmark datasets and compare the results to both stand-alone and similar ensemble tools. Experimental results indicate that CEMD has better sensitivity than state-of-art stand-alone tools when dealing with human datasets. CEMD also obtains better values of sensitivity when motifs are implanted in real promoter sequences. As for the comparison of CEMD with ensemble motif discovery tools, results indicate that CEMD achieves better results than MEME-ChIP on all evaluation measures. CEMD shows comparable performance to RSAT peak-motifs and MODSIDE.
Research Article
Isra Al-Turaiki; Najwa Altwaijry; Abeer Agil; Haya Aljodhi; sara Alharbi; Lina Alqassem
Abstract
With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). ...
Read More
With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). These systems are an essential component for ensuring the security of computer networks against attacks. In this paper, two deep learning architectures are proposed for both binary and multi-class classification of network attacks. The models, CNN-IDS and LSTM-IDS, are based on Convolutional Neural Network and Long Short Term Memory architectures, respectively. The models are evaluated using the well-known NSL-KDD dataset. The performance is measured in terms of accuracy, precision, recall, and F-measure. Experimental results show that the models achieve good performance in terms of accuracy and recall. Network intrusion detection systems are an integral part of contemporary networks. They provide administrators with an early warning for known and unknown attacks. In this paper, two deep learning architectures to aid administrators in detecting network attacks are outlined
Research Article
Saja Ahmed Albliwi; Hanan Abdullah Alkharmani
Abstract
With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing ...
Read More
With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing to a massive shift to a cashless society. However, some Mobile Payment users may be resistant to changing from conventional Payment methods. Therefore, it is critical to guarantee users’ continuance intention (CI) toward Mobile Payments to ensure the widespread uptake of Mobile Payments. Given this, this research aims to study the influence of the quality of Mobile Payment impacts users’ CI in Saudi Arabia (SA). Methods: The conceptual model was constructed based on the Information System Success Model and Information System post-adoption researches to support the framework of the current study. Results are drawn from a self-administered survey of a random sample of 389 respondents who regularly use Mobile Payment services in SA. Quantitative analysis is used to determine the impact of Mobile Payment quality on persistence intention to operate in Saudi Arabia. Results: The current study outcomes have shown that all three dimensions of quality (system quality (SYSQ), service quality (SERQ), and information quality (INFQ)), influence user satisfaction (SAT).
Research Article
Marcelo S. Alencar; Karcius D. R. Assis
Abstract
This paper reviews the characteristics of the main digest algorithms, and presents a new derivation of the leftover hash lemma, using the collision probability to derive an upper bound on the statistical distance between the key and seed joint probability, and the hash bit sequence distribution. The ...
Read More
This paper reviews the characteristics of the main digest algorithms, and presents a new derivation of the leftover hash lemma, using the collision probability to derive an upper bound on the statistical distance between the key and seed joint probability, and the hash bit sequence distribution. The paper discussed the use of the hash function in cryptography and presented a new derivation of the upper bound on the statistical distance between the joint distribution of the key and the seed, and the distribution of the hash bit distribution, based on the collision probability. A cryptographic hash function is used to verify whether a data file maps onto a certain hash value. On the other hand, it is difficult to reconstruct the information based on the hash value. Therefore, it is used to assure data in- integrity, and is the building block of a Hash-based Message Authentication Code (HMAC), which provide message authentication.
Research Article
Bodor Almotairy; Manal Abdullah; Rabeeh Abbasi
Abstract
Entrepreneurship involves an immense network of activities, linked via collaborations and information propagation. Information dissemination is extremely important for entrepreneurs. Finding influential users with high levels of interaction and connectivity in social media and involving them in information ...
Read More
Entrepreneurship involves an immense network of activities, linked via collaborations and information propagation. Information dissemination is extremely important for entrepreneurs. Finding influential users with high levels of interaction and connectivity in social media and involving them in information spread helps disseminating the information quickly. Thus, facilitating key entrepreneurial actors to find and collaborate with each other. Identifying and ranking entrepreneurial top influential people is still in infancy. This paper proposes an ERank framework for topic-specific influence theories that are specialized with respect to Twitter. Firstly, it extracts four dimensions to characterize influencers, including user popularity, activity, reliability, and tweet quality. Afterwards, it uses linear combinations of these dimensions to assign influence score to each user. Experimental results on a real-life dataset containing 233,018 Arabic tweets show that ERank successfully ranks 8 out of 10 entrepreneurial influencers. Unlike other existing approaches, ERank doesn’t require any labelled data and has lower computational cost. To ensure the effectiveness and efficiency of ERank, three validation techniques were used (1) to compare the detected influencers with the real-world influencers, (2) to investigate the spread of information of the detected influencers, and (3) to compare the quality of ERank results with other ranking methods.
Research Article
Shereen S. Jumaa
Abstract
Simple signs existent in mammograms for diagnosing breast cancer are considered to be microcalcifications or MCs. Therefore, true detection of MCs is needed to minimize schedule diagnosis, efficient care and death rate due to breast cancer. A challenging task is to evaluate and interpret mammograms and, ...
Read More
Simple signs existent in mammograms for diagnosing breast cancer are considered to be microcalcifications or MCs. Therefore, true detection of MCs is needed to minimize schedule diagnosis, efficient care and death rate due to breast cancer. A challenging task is to evaluate and interpret mammograms and, moreover to the poor contrast consistency of MCs relative to the remainder of the tissue, the precise identification of MCs, such as the minor size and random shape and size of the MC clusters, has several obstacles. These restrictions in the manual analysis of MCs increase the demand for an automated recognition system to help radiologists in mammogram analysis and it is important to design strength algorithm for this purpose. The goal of this paper is to present an efficient procedure that can be used to enhance images for extracting features to give excellent classification. The classifier senses which the region was normal, benign or malignant. The performance of KNN classifier with fuzzy histogram equalization using Otsu’s multi-threshold segmentation gives excellent results in detection and recognition in mammograms for breast cancer distinguished in image mammograms obtained from the hospital.
Research Article
Talib M. J. Al Taleb; Sami Hasan; Yaqoob Yousif Mahdi
Abstract
The data warehouse size and query complexity may cause an unacceptable delay in decision support queries. A basic condition for the success of a data warehouse is the capability to supply decision-makers with both precise information and best response time. For this purpose, the concept of indexed views ...
Read More
The data warehouse size and query complexity may cause an unacceptable delay in decision support queries. A basic condition for the success of a data warehouse is the capability to supply decision-makers with both precise information and best response time. For this purpose, the concept of indexed views is used. Indexed views help to speed-up query processing and reduce the response time for tracing queries, especially for queries about past histories. Indexed views may significantly by reducing the amount of work that SQL Server to return the required data and im- prove query performance and solve the problem of decision support workloads. this article is applicable to data warehouse de-signed by using SQL Server. It is not applicable if the data warehouse was designed by using another software like Oracle, DB2 and Informix. For many years, Mi- Microsoft SQL Server has supported the ability to create virtual tables known as views.
Research Article
Mustapha Bassiri; Abderrazak Mazouak; Imad Lamniai; Malika Tridane; Said Belaaouad; Said Belaaouad
Abstract
The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed ...
Read More
The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed to revive pedagogies to a new digital without or less presence. Our purpose is to verify the impact of open distance learning on the development of socio-professional skills among future administrators of the Ministry of National Education in initial training. In addition, the instrumentation of these training devices also provides a framework for evaluating, monitoring and controlling the training process, using the resources of computers and the Internet. Our research context takes place at the level of TAZA Regional Center of Trades Education and Training (CRMEF) during the academic year 2016-2017, the use of technological tools by trainers or trainees is quite common in courses, parallel activities, self-training, communication trainers-trainees or trainee-counsellors but all these forms suffer from the absence of a general frame of reference and regulation which guides the training actions via these tools. Indeed, the recommended methodology based on engineering training devices and skills in a virtual environment ie ” The technical instrumentation “and” educational scripting ” objects and training content. During its creation as its implementation, our platform experienced several difficulties including technical. Or today seeing the results of the questionnaires and following the feedbacks of trainee administrators we can judge that our goal is achieved.
Research Article
Najah K. Almazmomi
Abstract
Today, in the area of telecommunication, social media, the internet of things (IoT), and the virtual world, enormous amounts of data are being generated which are extracted to discover knowledge. Knowledge discovery from data in the cloud-computing environment entails the extraction of the new and necessary ...
Read More
Today, in the area of telecommunication, social media, the internet of things (IoT), and the virtual world, enormous amounts of data are being generated which are extracted to discover knowledge. Knowledge discovery from data in the cloud-computing environment entails the extraction of the new and necessary information from the large and complex datasets. This study is qualitative and exploratory in nature. To review based on the recent literature, the articles published in the last five years (2014-2018) were searched. Different databases were searched using the keywords: ‘Knowledge management’ or ‘Knowledge discover*’ and ‘Cloud computing.'. The literature review section is divided into three sub-section based on the findings. The first two sub-sections present the data security and data privacy concerns under two main techniques (Big data analytics and machine learning) used in knowledge discovery, and the last sub-section presents various protocols proposed to address the related security and privacy concerns. This review consolidates the related data security and privacy challenges under two techniques used for knowledge discovery in a cloud environment. Also, the review consolidates the proposals proposed by different experts to address the data security and privacy concerned
Research Article
Wafa Abdulaziz Alkenazan; Ashraf A. Taha; Mohammed J.F. Alenazi; Wadood Abdul
Abstract
Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air pollution. Wireless Sensor Networks used in smart parking systems consists of a ...
Read More
Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air pollution. Wireless Sensor Networks used in smart parking systems consists of a number of sensors to monitor the events or changes and send the data, cluster head to manage the linked sensors, and base stations to manipulate and forward the data to the end system. All of these devices are used together to monitor a specific area. This paper analyzes the performance of IEEE802.11ac and compares with IEEE802.15.4 and IEEE802.11b using three different scenarios by measuring the average end to end delay and throughput with respect to the number of sensors (manually and automatically). This is done using Thing Speak cloud (An open IoT platform with MATLAB 2019 analytics) in IEEE 802.11ac and without a cloud setup in IEEE802.15.4 and IEEE802.11b. Three scenarios are considered in this work. First, the sensors are distributed manually in all the standards. Second, the sensors are distributed automatically in IEEE802.11 ac and manually in IEEE802.15.4 and IEEE802.11b. Third, the sensors are distributed automatically in IEEE802.11ac along with the cloud. While the sensors are placed manually with grid placement without the cloud in IEEE802.15.4 and IEEE802.11b. Finally, the results show that the IEEE802.11ac gave better results than other standards and it is suitable for applications with very high throughput.
Research Article
Ghada Al-Hudhud; Abeer Al-Humamidi
Abstract
A Chatbot is a smart software that responds to natural language input and attempts to hold a conversation in a way that simulates humans. Chatbots have the potential to save any individual’s time, hassle, and tedium by automating mundane tasks. The idea of this research is that to investigate how ...
Read More
A Chatbot is a smart software that responds to natural language input and attempts to hold a conversation in a way that simulates humans. Chatbots have the potential to save any individual’s time, hassle, and tedium by automating mundane tasks. The idea of this research is that to investigate how to help the user efficiently interact with the robot receptionist through an Intelligent Assistant dialogue. Chatbots are an effective way to improve services with their 24 /7 uptime, and their cost efficiency, and their multi-user quality. Despite the chatbots reduce human errors and give more answers that are accurate. Successful implementation of a chatbot requires correct analysis of the user’s query by the bot and ensures the correct response that should be given to the user. This research develops a chatbot for the Airports, which provides the visitors to the SWE chatbot Relevant information about the department. Throughout our extensive search since the very begin- ning of our project, we have been through multiple re- sources and endured a strenuous vetting process.
Research Article
Abeer Sulaiman Al-Humaimeedy; Abeer Salman Al-Hammad; Ghada Al-Hudhud
Abstract
In a world full of many ideas turning to various kinds of products that need to be protected and here comes the importance of intellectual property rights. Intellectual property has many types however, our interest is in trademarks. The Madrid system is a system used by a group of countries that were ...
Read More
In a world full of many ideas turning to various kinds of products that need to be protected and here comes the importance of intellectual property rights. Intellectual property has many types however, our interest is in trademarks. The Madrid system is a system used by a group of countries that were in the Madrid level of the agreement so they authorize it and they that has the agreement with them to use but the problem with it that it is a text-based system because of that we proposed a reverse image engine and that is because the reverse search image is better than the text-based system. we have discussed all of the terms and terminology that we need in our project. Along with reviewing the famous reverse-image search engines and the first systems of trademark image retrieval (TIR) and some of the related papers. Introducing our project with all the system analysis phases. The project approach is a reverse image search engine, it will be designed using a CBIR system with deep neural networks. This project will be implemented in the second semester of the 2020 year.