首页 > 最新文献

Int. Arab J. Inf. Technol.最新文献

英文 中文
User-centric adaptive password policies to combat password fatigue 以用户为中心的自适应密码策略,以对抗密码疲劳
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/7
Y. Al-Slais, W. El-Medany
Today, online users will have an average of 25 password-protected accounts online, yet use, on average, 6.5 passwords. The excessive cognitive burden of remembering large amounts of passwords causes Password Fatigue. Therefore users tend to reuse passwords or recycle password patterns whenever prompted to change their passwords regularly. Researchers have created Adaptive Password Policies to prevent users from creating new passwords similar to previously created ones. However, this approach creates user frustration as it neglects users’ cognitive burden. This paper proposes a novel User-Centric Adaptive Password Policy (UCAPP) Framework for password creation and management that assigns users system-generated passwords based on a cognitive-behavioural agent-based model. The framework comprises a Password Policy Assignment Test (PassPAST), a Cognitive Burden Scale (CBS), a User Profiling Algorithm, and a Password Generator (PassGEN). The framework creates tailor-made password policies that maintain password memorability for users of different cognitive thresholds without sacrificing password strength and entropy. The framework successfully created 30-40% stronger passwords for Critical users and random (non-mnemonic) passwords for Typical users based on each individual’s cognitive password thresholds in a preliminary test.
如今,在线用户平均拥有25个受密码保护的在线账户,但平均使用6.5个密码。记忆大量密码的过度认知负担会导致“密码疲劳”。因此,每当提示用户定期更改密码时,用户往往会重复使用密码或重复使用密码模式。研究人员创建了自适应密码策略,以防止用户创建与以前创建的密码相似的新密码。然而,这种方法忽略了用户的认知负担,从而造成了用户的挫败感。本文提出了一种新的以用户为中心的自适应密码策略(UCAPP)框架,用于密码创建和管理,该框架基于认知行为智能体模型为用户分配系统生成的密码。该框架包括密码策略分配测试(passspast)、认知负担量表(CBS)、用户分析算法和密码生成器(PassGEN)。该框架创建量身定制的密码策略,在不牺牲密码强度和熵的情况下,为不同认知阈值的用户保持密码可记忆性。在初步测试中,该框架成功地为关键用户创建了30-40%的强密码,并根据每个人的认知密码阈值为典型用户创建了随机(非助记)密码。
{"title":"User-centric adaptive password policies to combat password fatigue","authors":"Y. Al-Slais, W. El-Medany","doi":"10.34028/iajit/19/1/7","DOIUrl":"https://doi.org/10.34028/iajit/19/1/7","url":null,"abstract":"Today, online users will have an average of 25 password-protected accounts online, yet use, on average, 6.5 passwords. The excessive cognitive burden of remembering large amounts of passwords causes Password Fatigue. Therefore users tend to reuse passwords or recycle password patterns whenever prompted to change their passwords regularly. Researchers have created Adaptive Password Policies to prevent users from creating new passwords similar to previously created ones. However, this approach creates user frustration as it neglects users’ cognitive burden. This paper proposes a novel User-Centric Adaptive Password Policy (UCAPP) Framework for password creation and management that assigns users system-generated passwords based on a cognitive-behavioural agent-based model. The framework comprises a Password Policy Assignment Test (PassPAST), a Cognitive Burden Scale (CBS), a User Profiling Algorithm, and a Password Generator (PassGEN). The framework creates tailor-made password policies that maintain password memorability for users of different cognitive thresholds without sacrificing password strength and entropy. The framework successfully created 30-40% stronger passwords for Critical users and random (non-mnemonic) passwords for Typical users based on each individual’s cognitive password thresholds in a preliminary test.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"8 1 1","pages":"55-62"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83426018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Learning Based Hand Wrist Segmentation using Mask R-CNN 基于深度学习的手部腕部分割,使用掩模R-CNN
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/5/10
GokulaKrishnan Elumalai, M. Ganesan
Deep learning is one of the trending technologies in computer vision to identify and classify objects. Deep learning is a subset of Machine Learning and Artificial Intelligence. Detecting and classifying the object was a challenging task in traditional computer vision techniques, and now there are numerous deep learning Techniques scaled up to achieve this. The primary purpose of the research is to detect and segment the human hand wrist region using deep learning methods. This research is widespread to deep learning enthusiasts who needs to segment custom objects using instance segmentation. We demonstrated a segmented hand wrist using the Mask Regional Convolutional Neural Network (R-CNN) technique with an average accuracy of 99.73%. This work also compares the performance evaluation of baseline and custom Hand Wrist Mask R-CNN. The achieved validation class loss is 0.00866 training and 0.02736 validation; both the values are comparatively deficient compared with baseline Mask R-CNN.
深度学习是计算机视觉中目标识别和分类的发展趋势之一。深度学习是机器学习和人工智能的一个子集。在传统的计算机视觉技术中,检测和分类对象是一项具有挑战性的任务,现在有许多深度学习技术扩展到实现这一目标。本研究的主要目的是利用深度学习方法对人的手腕区域进行检测和分割。这项研究广泛应用于需要使用实例分割来分割自定义对象的深度学习爱好者。我们展示了使用Mask区域卷积神经网络(R-CNN)技术进行腕部分割,平均准确率为99.73%。本工作还比较了基线和自定义Hand - Wrist Mask R-CNN的性能评估。实现的验证类损失为0.00866训练和0.02736验证;与基线Mask R-CNN相比,这两个值都相对不足。
{"title":"Deep Learning Based Hand Wrist Segmentation using Mask R-CNN","authors":"GokulaKrishnan Elumalai, M. Ganesan","doi":"10.34028/iajit/19/5/10","DOIUrl":"https://doi.org/10.34028/iajit/19/5/10","url":null,"abstract":"Deep learning is one of the trending technologies in computer vision to identify and classify objects. Deep learning is a subset of Machine Learning and Artificial Intelligence. Detecting and classifying the object was a challenging task in traditional computer vision techniques, and now there are numerous deep learning Techniques scaled up to achieve this. The primary purpose of the research is to detect and segment the human hand wrist region using deep learning methods. This research is widespread to deep learning enthusiasts who needs to segment custom objects using instance segmentation. We demonstrated a segmented hand wrist using the Mask Regional Convolutional Neural Network (R-CNN) technique with an average accuracy of 99.73%. This work also compares the performance evaluation of baseline and custom Hand Wrist Mask R-CNN. The achieved validation class loss is 0.00866 training and 0.02736 validation; both the values are comparatively deficient compared with baseline Mask R-CNN.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"47 1","pages":"785-792"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80896812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A transaction security accountability protocol for electronic health systems 电子健康系统的交易安全责任协议
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3/1
Chian Techapanupreeda, Ekarat Rattagan, W. Kurutach
In the last two decades, the term “electronic health (e-health) systems” were extensively mentioned in the healthcare industry with the aim of replacing paper usage and increasing productivity. Unfortunately, these systems are not still widely used by healthcare professionals and patients due to the concerns on security and accountability issues. In this article, we propose an accountability transaction protocol to overcome all security issues for implementing electronic health systems. To validate our proposed protocol, we used both Automated Validation of Internet Security Protocols and Applications (AVISPA) and Scyther as the tools to prove its soundness.
在过去的二十年中,术语“电子健康(e-health)系统”在医疗保健行业被广泛提及,目的是取代纸张的使用和提高生产力。不幸的是,由于对安全和问责问题的担忧,这些系统仍然没有被医疗保健专业人员和患者广泛使用。在本文中,我们提出了一个问责制事务协议来克服实现电子医疗系统的所有安全问题。为了验证我们提出的协议,我们使用了互联网安全协议和应用程序的自动验证(AVISPA)和Scyther作为证明其合理性的工具。
{"title":"A transaction security accountability protocol for electronic health systems","authors":"Chian Techapanupreeda, Ekarat Rattagan, W. Kurutach","doi":"10.34028/iajit/19/3/1","DOIUrl":"https://doi.org/10.34028/iajit/19/3/1","url":null,"abstract":"In the last two decades, the term “electronic health (e-health) systems” were extensively mentioned in the healthcare industry with the aim of replacing paper usage and increasing productivity. Unfortunately, these systems are not still widely used by healthcare professionals and patients due to the concerns on security and accountability issues. In this article, we propose an accountability transaction protocol to overcome all security issues for implementing electronic health systems. To validate our proposed protocol, we used both Automated Validation of Internet Security Protocols and Applications (AVISPA) and Scyther as the tools to prove its soundness.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"2014 1","pages":"289-297"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82742561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoxCeleb1: speaker age-group classification using probabilistic neural network VoxCeleb1:基于概率神经网络的说话人年龄组分类
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/6/2
A. A. Badr, A. Abdul-Hassan
The human voice speech includes essentially paralinguistic information used in many applications for voice ‎recognition. Classifying speakers according to their age-group has been considered as a valuable tool in ‎various applications, as issuing different levels of permission for different age-groups. In the presented ‎research, an automatic system to classify speaker age-group without depending on the text is proposed. The ‎Fundamental Frequency (F0), Jitter, Shimmer, and Spectral Sub-Band Centroids (SSCs) are used as a ‎feature, while the Probabilistic Neural Network (PNN) is utilized as a classifier for the purpose of ‎classifying the speaker utterances into eight age-groups. Experiments are carried out on VoxCeleb1 dataset ‎to demonstrate the proposed system's performance, which is considered as the first effort of its kind. The ‎suggested system has an overall accuracy of roughly 90.25%, and the findings reveal that it is clearly ‎superior to a variety of base-classifiers in terms of overall accuracy.‎
人类语音本质上包括在许多语音识别应用中使用的副语言信息。根据说话者的年龄对他们进行分类被认为是在各种应用中有价值的工具,为不同的年龄群体颁发不同级别的许可。在本研究中,提出了一种不依赖文本的说话人年龄组自动分类系统。基频(F0)、抖动、闪烁和谱子带质心(ssc)被用作特征,而概率神经网络(PNN)被用作分类器,目的是将说话人的话语分为8个年龄组。在VoxCeleb1数据集上进行了实验,证明了该系统的性能,这被认为是同类系统的首次尝试。该系统的总体准确率约为90.25%,研究结果表明,就总体准确率而言,该系统明显优于各种基本分类器
{"title":"VoxCeleb1: speaker age-group classification using probabilistic neural network","authors":"A. A. Badr, A. Abdul-Hassan","doi":"10.34028/iajit/19/6/2","DOIUrl":"https://doi.org/10.34028/iajit/19/6/2","url":null,"abstract":"The human voice speech includes essentially paralinguistic information used in many applications for voice ‎recognition. Classifying speakers according to their age-group has been considered as a valuable tool in ‎various applications, as issuing different levels of permission for different age-groups. In the presented ‎research, an automatic system to classify speaker age-group without depending on the text is proposed. The ‎Fundamental Frequency (F0), Jitter, Shimmer, and Spectral Sub-Band Centroids (SSCs) are used as a ‎feature, while the Probabilistic Neural Network (PNN) is utilized as a classifier for the purpose of ‎classifying the speaker utterances into eight age-groups. Experiments are carried out on VoxCeleb1 dataset ‎to demonstrate the proposed system's performance, which is considered as the first effort of its kind. The ‎suggested system has an overall accuracy of roughly 90.25%, and the findings reveal that it is clearly ‎superior to a variety of base-classifiers in terms of overall accuracy.‎","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"216 1","pages":"854-860"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90483511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ensemble based on accuracy and diversity weighting for evolving data streams 基于精度和多样性加权的演化数据流集成
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/11
Yange Sun, Han Shao, Bencai Zhang
Ensemble classification is an actively researched paradigm that has received much attention due to increasing real-world applications. The crucial issue of ensemble learning is to construct a pool of base classifiers with accuracy and diversity. In this paper, unlike conventional data-streams oriented ensemble methods, we propose a novel Measure via both Accuracy and Diversity (MAD) instead of one of them to supervise ensemble learning. Based on MAD, a novel online ensemble method called Accuracy and Diversity weighted Ensemble (ADE) effectively handles concept drift in data streams. ADE mainly uses the following three steps to construct a concept-drift oriented ensemble: for the current data window, 1) a new base classifier is constructed based on the current concept when drift detect, 2) MAD is used to measure the performance of ensemble members, and 3) a newly built classifier replaces the worst base classifier. If the newly constructed classifier is the worst one, the replacement has not occurred. Comparing with the state-of-art algorithms, ADE exceeds the current best-related algorithm by 2.38% in average classification accuracy. Experimental results show that the proposed method can effectively adapt to different types of drifts.
集成分类是一种被积极研究的范式,由于越来越多的实际应用而受到广泛关注。集成学习的关键问题是构建一个具有准确性和多样性的基本分类器池。在本文中,与传统的面向数据流的集成方法不同,我们提出了一种新的基于准确性和多样性(MAD)的方法来监督集成学习。在此基础上,提出了一种新的在线集成方法——准确性和多样性加权集成(ADE),可以有效地处理数据流中的概念漂移。ADE主要通过以下三个步骤构建面向概念漂移的集成:对于当前数据窗口,1)漂移检测时基于当前概念构建新的基分类器,2)使用MAD度量集成成员的性能,3)新构建的分类器替换最差的基分类器。如果新构造的分类器是最差的分类器,则没有发生替换。与目前最先进的算法相比,ADE的平均分类准确率比目前最佳相关算法高出2.38%。实验结果表明,该方法能有效适应不同类型的漂移。
{"title":"Ensemble based on accuracy and diversity weighting for evolving data streams","authors":"Yange Sun, Han Shao, Bencai Zhang","doi":"10.34028/iajit/19/1/11","DOIUrl":"https://doi.org/10.34028/iajit/19/1/11","url":null,"abstract":"Ensemble classification is an actively researched paradigm that has received much attention due to increasing real-world applications. The crucial issue of ensemble learning is to construct a pool of base classifiers with accuracy and diversity. In this paper, unlike conventional data-streams oriented ensemble methods, we propose a novel Measure via both Accuracy and Diversity (MAD) instead of one of them to supervise ensemble learning. Based on MAD, a novel online ensemble method called Accuracy and Diversity weighted Ensemble (ADE) effectively handles concept drift in data streams. ADE mainly uses the following three steps to construct a concept-drift oriented ensemble: for the current data window, 1) a new base classifier is constructed based on the current concept when drift detect, 2) MAD is used to measure the performance of ensemble members, and 3) a newly built classifier replaces the worst base classifier. If the newly constructed classifier is the worst one, the replacement has not occurred. Comparing with the state-of-art algorithms, ADE exceeds the current best-related algorithm by 2.38% in average classification accuracy. Experimental results show that the proposed method can effectively adapt to different types of drifts.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"15 1","pages":"90-96"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87814783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voice versus keyboard and mouse for text creation on arabic user interfaces 语音与键盘和鼠标在阿拉伯语用户界面上的文本创建
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/15
K. Majrashi
Voice User Interfaces (VUIs) are increasingly popular owing to improvements in automatic speech recognition. However, the understanding of user interaction with VUIs, particularly Arabic VUIs, remains limited. Hence, this research compared user performance, learnability, and satisfaction when using voice and keyboard-and-mouse input modalities for text creation on Arabic user interfaces. A Voice-enabled Email Interface (VEI) and a Traditional Email Interface (TEI) were developed. Forty participants attempted pre-prepared and self-generated message creation tasks using voice on the VEI, and the keyboard-and-mouse modal on the TEI. The results showed that participants were faster (by 1.76 to 2.67 minutes) in pre-prepared message creation using voice than using the keyboard and mouse. Participants were also faster (by 1.72 to 2.49 minutes) in self-generated message creation using voice than using the keyboard and mouse. Although the learning curves were more efficient with the VEI, more participants were satisfied with the TEI. With the VEI, participants reported problems, such as misrecognitions and misspellings, but were satisfied about the visibility of possible executable commands and about the overall accuracy of voice recognition.
由于自动语音识别技术的进步,语音用户界面(VUIs)越来越受欢迎。然而,对用户与VUIs交互的理解仍然有限,尤其是阿拉伯语的VUIs。因此,本研究比较了在阿拉伯用户界面上使用语音和键盘和鼠标输入方式进行文本创建时的用户性能、易学性和满意度。开发了语音电子邮件接口(VEI)和传统电子邮件接口(TEI)。40名参与者尝试在VEI上使用语音,在TEI上使用键盘和鼠标模式进行预先准备和自生成的消息创建任务。结果显示,参与者使用语音创建预先准备好的消息比使用键盘和鼠标要快(1.76到2.67分钟)。与使用键盘和鼠标相比,参与者使用语音生成信息的速度也更快(分别为1.72分钟和2.49分钟)。虽然VEI的学习曲线更有效率,但更多的参与者对TEI感到满意。对于VEI,参与者报告了错误识别和拼写错误等问题,但对可能执行命令的可见性和语音识别的总体准确性感到满意。
{"title":"Voice versus keyboard and mouse for text creation on arabic user interfaces","authors":"K. Majrashi","doi":"10.34028/iajit/19/1/15","DOIUrl":"https://doi.org/10.34028/iajit/19/1/15","url":null,"abstract":"Voice User Interfaces (VUIs) are increasingly popular owing to improvements in automatic speech recognition. However, the understanding of user interaction with VUIs, particularly Arabic VUIs, remains limited. Hence, this research compared user performance, learnability, and satisfaction when using voice and keyboard-and-mouse input modalities for text creation on Arabic user interfaces. A Voice-enabled Email Interface (VEI) and a Traditional Email Interface (TEI) were developed. Forty participants attempted pre-prepared and self-generated message creation tasks using voice on the VEI, and the keyboard-and-mouse modal on the TEI. The results showed that participants were faster (by 1.76 to 2.67 minutes) in pre-prepared message creation using voice than using the keyboard and mouse. Participants were also faster (by 1.72 to 2.49 minutes) in self-generated message creation using voice than using the keyboard and mouse. Although the learning curves were more efficient with the VEI, more participants were satisfied with the TEI. With the VEI, participants reported problems, such as misrecognitions and misspellings, but were satisfied about the visibility of possible executable commands and about the overall accuracy of voice recognition.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"63 1","pages":"132-142"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86878805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Binary Search Tree Method to Find an Item Using Scaling 一种基于缩放的二叉搜索树查找方法
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/5/2
Praveen Pappula
This Approach comprises of methods to produce novel and efficient methods to implement search of data objects in various applications. It is based on the best match search to implement proximity or best match search over complex or more than one data source. In particular with the availability of very large numeric data set in the present day scenario. The proposed approach which is based on the Arithmetic measures or distance measures called as the predominant Mean based algorithm. It is implemented on the longest common prefix of data object that shows how it can be used to generate various clusters through combining or grouping of data, as it takes O(log n) computational time. And further the approach is based on the process of measuring the distance which is suitable for a hierarchy tree property for proving the classification is needed one for storing or accessing or retrieving the information as required. The results obtained illustrates overall error detection rates in generating the clusters and searching the key value for Denial of Service (DOS) attack 5.15%, Probe attack 3.87%, U2R attack 8.11% and R2L attack 11.14%. as these error detection rates denotes that our proposed algorithm generates less error rates than existing linkage methods.
该方法包括产生新颖有效的方法来实现各种应用程序中数据对象的搜索的方法。它基于最佳匹配搜索来实现对复杂或多个数据源的接近或最佳匹配搜索。特别是在目前的情况下,非常大的数字数据集的可用性。该方法基于算术度量或距离度量,称为优势均值算法。它是在数据对象的最长公共前缀上实现的,显示了如何使用它通过组合或分组数据来生成各种集群,因为它需要O(log n)计算时间。此外,该方法基于测量距离的过程,该过程适合于层次树的属性来证明分类是必要的,适合于存储或访问或检索所需的信息。结果表明,在DOS攻击、Probe攻击、U2R攻击和R2L攻击中,生成聚类和搜索关键值的总体检测错误率分别为5.15%、3.87%、8.11%和11.14%。由于这些错误检测率表明我们提出的算法比现有的链接方法产生更少的错误率。
{"title":"A Novel Binary Search Tree Method to Find an Item Using Scaling","authors":"Praveen Pappula","doi":"10.34028/iajit/19/5/2","DOIUrl":"https://doi.org/10.34028/iajit/19/5/2","url":null,"abstract":"This Approach comprises of methods to produce novel and efficient methods to implement search of data objects in various applications. It is based on the best match search to implement proximity or best match search over complex or more than one data source. In particular with the availability of very large numeric data set in the present day scenario. The proposed approach which is based on the Arithmetic measures or distance measures called as the predominant Mean based algorithm. It is implemented on the longest common prefix of data object that shows how it can be used to generate various clusters through combining or grouping of data, as it takes O(log n) computational time. And further the approach is based on the process of measuring the distance which is suitable for a hierarchy tree property for proving the classification is needed one for storing or accessing or retrieving the information as required. The results obtained illustrates overall error detection rates in generating the clusters and searching the key value for Denial of Service (DOS) attack 5.15%, Probe attack 3.87%, U2R attack 8.11% and R2L attack 11.14%. as these error detection rates denotes that our proposed algorithm generates less error rates than existing linkage methods.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"90 1","pages":"713-720"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83921861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic 用于评估使用移动云计算行为意图的多组结构方程模型——以2019冠状病毒病大流行期间约旦大学为例
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/2/7
N. Matar, Tirad AlMalahmeh, Bilal I. Sowan, Saheer Al-Jaghoub, Wasef Mater
The adoption of new technologies in Jordanian Universities related to cloud services, shows differences in practices between faculty and staff members. Resistance to adoption may accrue by faculty and staff members who are accustomed and favoring old practices. A questionnaire was developed based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model to identify factors that affect behavioral intentions that lead to the use of mobile cloud computing during the covid-19 pandemic, taking into consideration Work-type as the mediating factor. Five Jordanian Universities participated in this study, with a total response of 153 faculty and staff members. The conceptual proposed model was tested to ensure the fitness of the structural model for providing correct estimations. The collected sample was subjected to confirmatory factor analysis to ensure construct, convergent and discriminant validity. The results came positive in terms of composite reliability as they were above 0.70, for Average Variance Extracted (AVE) it came more than 0.05and Cronbach alpha exceeded 0.70. The results revealed the fitness of the proposed model to measure differences in behavioral intentions towards adopting mobile cloud services between faculty members and employees. Moreover, the results showed that work type had some interesting moderating impact on the tested relationships. Moreover, the results showed that there is a high Behavioral Intention (BI) between faculty and staff to use mobile cloud services and solutions within their workplace. In addition, the results showed some inequalities of the behavioral intention toward the adoption of mobile cloud services in Jordanian Universities between the two groups. These results call the university administration to clarify these factors for user groups to obtain a better judgment on investment and future practices for using new technologies.
约旦大学采用与云服务有关的新技术,显示了教职员工在实践方面的差异。对采用的抵制可能来自于那些习惯并偏爱旧做法的教职员工。基于技术接受和使用统一理论(UTAUT)模型,以工作类型为中介因素,编制了一份调查问卷,以确定影响covid-19大流行期间导致使用移动云计算的行为意图的因素。五所约旦大学参与了这项研究,共有153名教职员工作出回应。对提出的概念模型进行了测试,以确保结构模型的适合性,从而提供正确的估计。收集的样本进行验证性因子分析,以确保结构效度、收敛效度和判别效度。在复合信度方面,结果是积极的,因为它们在0.70以上,平均方差提取(AVE)超过0.05,Cronbach alpha超过0.70。结果显示,所提出的模型适合于衡量教师和员工在采用移动云服务的行为意图上的差异。此外,研究结果显示,工作类型对被测关系有一些有趣的调节作用。此外,结果显示,教职员工在工作场所使用移动云服务和解决方案的行为意向(BI)很高。此外,研究结果还显示,两组学生在约旦大学采用移动云服务的行为意愿上存在一些不平等。这些结果要求大学管理部门澄清这些因素,以便用户群体对投资和未来使用新技术的做法有更好的判断。
{"title":"A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic","authors":"N. Matar, Tirad AlMalahmeh, Bilal I. Sowan, Saheer Al-Jaghoub, Wasef Mater","doi":"10.34028/iajit/19/2/7","DOIUrl":"https://doi.org/10.34028/iajit/19/2/7","url":null,"abstract":"The adoption of new technologies in Jordanian Universities related to cloud services, shows differences in practices between faculty and staff members. Resistance to adoption may accrue by faculty and staff members who are accustomed and favoring old practices. A questionnaire was developed based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model to identify factors that affect behavioral intentions that lead to the use of mobile cloud computing during the covid-19 pandemic, taking into consideration Work-type as the mediating factor. Five Jordanian Universities participated in this study, with a total response of 153 faculty and staff members. The conceptual proposed model was tested to ensure the fitness of the structural model for providing correct estimations. The collected sample was subjected to confirmatory factor analysis to ensure construct, convergent and discriminant validity. The results came positive in terms of composite reliability as they were above 0.70, for Average Variance Extracted (AVE) it came more than 0.05and Cronbach alpha exceeded 0.70. The results revealed the fitness of the proposed model to measure differences in behavioral intentions towards adopting mobile cloud services between faculty members and employees. Moreover, the results showed that work type had some interesting moderating impact on the tested relationships. Moreover, the results showed that there is a high Behavioral Intention (BI) between faculty and staff to use mobile cloud services and solutions within their workplace. In addition, the results showed some inequalities of the behavioral intention toward the adoption of mobile cloud services in Jordanian Universities between the two groups. These results call the university administration to clarify these factors for user groups to obtain a better judgment on investment and future practices for using new technologies.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"3 1","pages":"203-213"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85608523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-pose facial expression recognition using hybrid deep learning model with improved variant of gravitational search algorithm 基于改进引力搜索算法的混合深度学习模型的多姿态面部表情识别
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/2/15
Y. Kumar, S. K. Verma, Sandeep Sharma
The recognition of human facial expressions with the variation of poses is one of the challenging tasks in real-time applications such as human physiological interaction detection, intention analysis, marketing interest evaluation, mental disease diagnosis, etc. This research work addresses the problem of expression recognition from different facial poses at the yaw angle. The major contribution of the paper is the proposal of an autonomous pose variant facial expression recognition framework using the amalgamation of a hybrid deep learning model with an improved quantum inspired gravitational search algorithm. The hybrid deep learning model is the integration of the convolutional neural network and recurrent neural network. The applicability of the hybrid deep learning model can be considered as significant if the feature set is efficiently optimized to have the discriminative features respective to each expression class. Here, the Improved Quantum Inspired Gravitational Search Algorithm (IQI-GSA) is utilized for the selection and optimization of features. The IQI-GSA method is significant for optimizing the features compared to quantum-behaved binary gravitation search algorithm for handing the local optima and stochastic characteristics. Comparing with state-of-art techniques, the proposed framework exhibits the outperformed recognition rate for experimentation on Karolinska Directed Emotional Faces (KDEF) and Japanese Female Facial Expression (JAFFE) datasets.
在人体生理交互作用检测、意图分析、营销兴趣评价、精神疾病诊断等实时应用中,面部表情的姿态变化识别是一项具有挑战性的任务。本研究解决了偏航角度下不同面部姿态的表情识别问题。本文的主要贡献是提出了一种自主姿态变化面部表情识别框架,该框架使用混合深度学习模型和改进的量子启发引力搜索算法的合并。混合深度学习模型是卷积神经网络和递归神经网络的集成。如果有效地优化特征集,使其具有对应于每个表达类的判别特征,则混合深度学习模型的适用性是显著的。本文采用改进的量子启发引力搜索算法(IQI-GSA)对特征进行选择和优化。与量子二元引力搜索算法相比,IQI-GSA方法在处理局部最优和随机特性方面具有重要的优化意义。通过对Karolinska Directed Emotional Faces (KDEF)和japan Female Facial Expression (JAFFE)数据集的实验,与现有的技术相比,该框架的识别率更高。
{"title":"Multi-pose facial expression recognition using hybrid deep learning model with improved variant of gravitational search algorithm","authors":"Y. Kumar, S. K. Verma, Sandeep Sharma","doi":"10.34028/iajit/19/2/15","DOIUrl":"https://doi.org/10.34028/iajit/19/2/15","url":null,"abstract":"The recognition of human facial expressions with the variation of poses is one of the challenging tasks in real-time applications such as human physiological interaction detection, intention analysis, marketing interest evaluation, mental disease diagnosis, etc. This research work addresses the problem of expression recognition from different facial poses at the yaw angle. The major contribution of the paper is the proposal of an autonomous pose variant facial expression recognition framework using the amalgamation of a hybrid deep learning model with an improved quantum inspired gravitational search algorithm. The hybrid deep learning model is the integration of the convolutional neural network and recurrent neural network. The applicability of the hybrid deep learning model can be considered as significant if the feature set is efficiently optimized to have the discriminative features respective to each expression class. Here, the Improved Quantum Inspired Gravitational Search Algorithm (IQI-GSA) is utilized for the selection and optimization of features. The IQI-GSA method is significant for optimizing the features compared to quantum-behaved binary gravitation search algorithm for handing the local optima and stochastic characteristics. Comparing with state-of-art techniques, the proposed framework exhibits the outperformed recognition rate for experimentation on Karolinska Directed Emotional Faces (KDEF) and Japanese Female Facial Expression (JAFFE) datasets.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"29 1","pages":"281-287"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73645461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid FiST_CNN approach for feature extraction for vision-based indian sign language recognition 基于视觉的印度手语识别特征提取的混合first_cnn方法
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3/15
Akansha Tyagi, Sandhya Bansal
Indian sign language (ISL) is the commonly used language by the deaf-mute community in the Indian continent. Effective feature extraction is essential for the automatic recognition of gestures. This paper aims at developing an efficient feature extraction technique using FAST, SIFT, and CNN. Features from Fast Accelerated Segment Test(FAST) with Scale-invariant Feature Transformation(SIFT) are used to detect and compute features, respectively. CNN is used for classification with the hybridization of FAST-SIFT features. The system is implemented and tested using the python-based library Keras. The results of the proposed techniques have been tested on 34 gestures of ISL (24 alphabet sets and 10 digit sets) and then compared with the CNN and SIFT_CNN, and it is also tested on two publicly available datasets on Jochen Trisech Dataset(JTD) and NUS-II dataset. The proposed study outperformed some existing ISLR works with an accuracy of 97.89%, 95.68%, 94.90% and 95.87% for ISL-alphabets, MNIST, JTD and NUS-II, respectively.
印度手语(ISL)是印度大陆聋哑人社区常用的语言。有效的特征提取是手势自动识别的关键。本文旨在开发一种基于FAST、SIFT和CNN的高效特征提取技术。利用快速加速片段测试(Fast)和尺度不变特征变换(SIFT)的特征分别进行特征检测和特征计算。采用CNN对FAST-SIFT特征进行杂交分类。该系统使用基于python的库Keras实现和测试。本文在34种ISL手势(24个字母集和10个数字集)上进行了测试,并与CNN和SIFT_CNN进行了比较,并在Jochen Trisech数据集(JTD)和NUS-II数据集上进行了测试。本研究对isl -字母表、MNIST、JTD和NUS-II的准确率分别为97.89%、95.68%、94.90%和95.87%,优于现有的一些ISLR工作。
{"title":"Hybrid FiST_CNN approach for feature extraction for vision-based indian sign language recognition","authors":"Akansha Tyagi, Sandhya Bansal","doi":"10.34028/iajit/19/3/15","DOIUrl":"https://doi.org/10.34028/iajit/19/3/15","url":null,"abstract":"Indian sign language (ISL) is the commonly used language by the deaf-mute community in the Indian continent. Effective feature extraction is essential for the automatic recognition of gestures. This paper aims at developing an efficient feature extraction technique using FAST, SIFT, and CNN. Features from Fast Accelerated Segment Test(FAST) with Scale-invariant Feature Transformation(SIFT) are used to detect and compute features, respectively. CNN is used for classification with the hybridization of FAST-SIFT features. The system is implemented and tested using the python-based library Keras. The results of the proposed techniques have been tested on 34 gestures of ISL (24 alphabet sets and 10 digit sets) and then compared with the CNN and SIFT_CNN, and it is also tested on two publicly available datasets on Jochen Trisech Dataset(JTD) and NUS-II dataset. The proposed study outperformed some existing ISLR works with an accuracy of 97.89%, 95.68%, 94.90% and 95.87% for ISL-alphabets, MNIST, JTD and NUS-II, respectively.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"65 1","pages":"403-411"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74945876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. Arab J. Inf. Technol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1