首页 > 最新文献

Int. Arab J. Inf. Technol.最新文献

英文 中文
User-centric adaptive password policies to combat password fatigue 以用户为中心的自适应密码策略,以对抗密码疲劳
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/7
Y. Al-Slais, W. El-Medany
Today, online users will have an average of 25 password-protected accounts online, yet use, on average, 6.5 passwords. The excessive cognitive burden of remembering large amounts of passwords causes Password Fatigue. Therefore users tend to reuse passwords or recycle password patterns whenever prompted to change their passwords regularly. Researchers have created Adaptive Password Policies to prevent users from creating new passwords similar to previously created ones. However, this approach creates user frustration as it neglects users’ cognitive burden. This paper proposes a novel User-Centric Adaptive Password Policy (UCAPP) Framework for password creation and management that assigns users system-generated passwords based on a cognitive-behavioural agent-based model. The framework comprises a Password Policy Assignment Test (PassPAST), a Cognitive Burden Scale (CBS), a User Profiling Algorithm, and a Password Generator (PassGEN). The framework creates tailor-made password policies that maintain password memorability for users of different cognitive thresholds without sacrificing password strength and entropy. The framework successfully created 30-40% stronger passwords for Critical users and random (non-mnemonic) passwords for Typical users based on each individual’s cognitive password thresholds in a preliminary test.
如今,在线用户平均拥有25个受密码保护的在线账户,但平均使用6.5个密码。记忆大量密码的过度认知负担会导致“密码疲劳”。因此,每当提示用户定期更改密码时,用户往往会重复使用密码或重复使用密码模式。研究人员创建了自适应密码策略,以防止用户创建与以前创建的密码相似的新密码。然而,这种方法忽略了用户的认知负担,从而造成了用户的挫败感。本文提出了一种新的以用户为中心的自适应密码策略(UCAPP)框架,用于密码创建和管理,该框架基于认知行为智能体模型为用户分配系统生成的密码。该框架包括密码策略分配测试(passspast)、认知负担量表(CBS)、用户分析算法和密码生成器(PassGEN)。该框架创建量身定制的密码策略,在不牺牲密码强度和熵的情况下,为不同认知阈值的用户保持密码可记忆性。在初步测试中,该框架成功地为关键用户创建了30-40%的强密码,并根据每个人的认知密码阈值为典型用户创建了随机(非助记)密码。
{"title":"User-centric adaptive password policies to combat password fatigue","authors":"Y. Al-Slais, W. El-Medany","doi":"10.34028/iajit/19/1/7","DOIUrl":"https://doi.org/10.34028/iajit/19/1/7","url":null,"abstract":"Today, online users will have an average of 25 password-protected accounts online, yet use, on average, 6.5 passwords. The excessive cognitive burden of remembering large amounts of passwords causes Password Fatigue. Therefore users tend to reuse passwords or recycle password patterns whenever prompted to change their passwords regularly. Researchers have created Adaptive Password Policies to prevent users from creating new passwords similar to previously created ones. However, this approach creates user frustration as it neglects users’ cognitive burden. This paper proposes a novel User-Centric Adaptive Password Policy (UCAPP) Framework for password creation and management that assigns users system-generated passwords based on a cognitive-behavioural agent-based model. The framework comprises a Password Policy Assignment Test (PassPAST), a Cognitive Burden Scale (CBS), a User Profiling Algorithm, and a Password Generator (PassGEN). The framework creates tailor-made password policies that maintain password memorability for users of different cognitive thresholds without sacrificing password strength and entropy. The framework successfully created 30-40% stronger passwords for Critical users and random (non-mnemonic) passwords for Typical users based on each individual’s cognitive password thresholds in a preliminary test.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"8 1 1","pages":"55-62"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83426018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Learning Based Hand Wrist Segmentation using Mask R-CNN 基于深度学习的手部腕部分割,使用掩模R-CNN
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/5/10
GokulaKrishnan Elumalai, M. Ganesan
Deep learning is one of the trending technologies in computer vision to identify and classify objects. Deep learning is a subset of Machine Learning and Artificial Intelligence. Detecting and classifying the object was a challenging task in traditional computer vision techniques, and now there are numerous deep learning Techniques scaled up to achieve this. The primary purpose of the research is to detect and segment the human hand wrist region using deep learning methods. This research is widespread to deep learning enthusiasts who needs to segment custom objects using instance segmentation. We demonstrated a segmented hand wrist using the Mask Regional Convolutional Neural Network (R-CNN) technique with an average accuracy of 99.73%. This work also compares the performance evaluation of baseline and custom Hand Wrist Mask R-CNN. The achieved validation class loss is 0.00866 training and 0.02736 validation; both the values are comparatively deficient compared with baseline Mask R-CNN.
深度学习是计算机视觉中目标识别和分类的发展趋势之一。深度学习是机器学习和人工智能的一个子集。在传统的计算机视觉技术中,检测和分类对象是一项具有挑战性的任务,现在有许多深度学习技术扩展到实现这一目标。本研究的主要目的是利用深度学习方法对人的手腕区域进行检测和分割。这项研究广泛应用于需要使用实例分割来分割自定义对象的深度学习爱好者。我们展示了使用Mask区域卷积神经网络(R-CNN)技术进行腕部分割,平均准确率为99.73%。本工作还比较了基线和自定义Hand - Wrist Mask R-CNN的性能评估。实现的验证类损失为0.00866训练和0.02736验证;与基线Mask R-CNN相比,这两个值都相对不足。
{"title":"Deep Learning Based Hand Wrist Segmentation using Mask R-CNN","authors":"GokulaKrishnan Elumalai, M. Ganesan","doi":"10.34028/iajit/19/5/10","DOIUrl":"https://doi.org/10.34028/iajit/19/5/10","url":null,"abstract":"Deep learning is one of the trending technologies in computer vision to identify and classify objects. Deep learning is a subset of Machine Learning and Artificial Intelligence. Detecting and classifying the object was a challenging task in traditional computer vision techniques, and now there are numerous deep learning Techniques scaled up to achieve this. The primary purpose of the research is to detect and segment the human hand wrist region using deep learning methods. This research is widespread to deep learning enthusiasts who needs to segment custom objects using instance segmentation. We demonstrated a segmented hand wrist using the Mask Regional Convolutional Neural Network (R-CNN) technique with an average accuracy of 99.73%. This work also compares the performance evaluation of baseline and custom Hand Wrist Mask R-CNN. The achieved validation class loss is 0.00866 training and 0.02736 validation; both the values are comparatively deficient compared with baseline Mask R-CNN.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"47 1","pages":"785-792"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80896812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A transaction security accountability protocol for electronic health systems 电子健康系统的交易安全责任协议
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3/1
Chian Techapanupreeda, Ekarat Rattagan, W. Kurutach
In the last two decades, the term “electronic health (e-health) systems” were extensively mentioned in the healthcare industry with the aim of replacing paper usage and increasing productivity. Unfortunately, these systems are not still widely used by healthcare professionals and patients due to the concerns on security and accountability issues. In this article, we propose an accountability transaction protocol to overcome all security issues for implementing electronic health systems. To validate our proposed protocol, we used both Automated Validation of Internet Security Protocols and Applications (AVISPA) and Scyther as the tools to prove its soundness.
在过去的二十年中,术语“电子健康(e-health)系统”在医疗保健行业被广泛提及,目的是取代纸张的使用和提高生产力。不幸的是,由于对安全和问责问题的担忧,这些系统仍然没有被医疗保健专业人员和患者广泛使用。在本文中,我们提出了一个问责制事务协议来克服实现电子医疗系统的所有安全问题。为了验证我们提出的协议,我们使用了互联网安全协议和应用程序的自动验证(AVISPA)和Scyther作为证明其合理性的工具。
{"title":"A transaction security accountability protocol for electronic health systems","authors":"Chian Techapanupreeda, Ekarat Rattagan, W. Kurutach","doi":"10.34028/iajit/19/3/1","DOIUrl":"https://doi.org/10.34028/iajit/19/3/1","url":null,"abstract":"In the last two decades, the term “electronic health (e-health) systems” were extensively mentioned in the healthcare industry with the aim of replacing paper usage and increasing productivity. Unfortunately, these systems are not still widely used by healthcare professionals and patients due to the concerns on security and accountability issues. In this article, we propose an accountability transaction protocol to overcome all security issues for implementing electronic health systems. To validate our proposed protocol, we used both Automated Validation of Internet Security Protocols and Applications (AVISPA) and Scyther as the tools to prove its soundness.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"2014 1","pages":"289-297"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82742561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoxCeleb1: speaker age-group classification using probabilistic neural network VoxCeleb1:基于概率神经网络的说话人年龄组分类
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/6/2
A. A. Badr, A. Abdul-Hassan
The human voice speech includes essentially paralinguistic information used in many applications for voice ‎recognition. Classifying speakers according to their age-group has been considered as a valuable tool in ‎various applications, as issuing different levels of permission for different age-groups. In the presented ‎research, an automatic system to classify speaker age-group without depending on the text is proposed. The ‎Fundamental Frequency (F0), Jitter, Shimmer, and Spectral Sub-Band Centroids (SSCs) are used as a ‎feature, while the Probabilistic Neural Network (PNN) is utilized as a classifier for the purpose of ‎classifying the speaker utterances into eight age-groups. Experiments are carried out on VoxCeleb1 dataset ‎to demonstrate the proposed system's performance, which is considered as the first effort of its kind. The ‎suggested system has an overall accuracy of roughly 90.25%, and the findings reveal that it is clearly ‎superior to a variety of base-classifiers in terms of overall accuracy.‎
人类语音本质上包括在许多语音识别应用中使用的副语言信息。根据说话者的年龄对他们进行分类被认为是在各种应用中有价值的工具,为不同的年龄群体颁发不同级别的许可。在本研究中,提出了一种不依赖文本的说话人年龄组自动分类系统。基频(F0)、抖动、闪烁和谱子带质心(ssc)被用作特征,而概率神经网络(PNN)被用作分类器,目的是将说话人的话语分为8个年龄组。在VoxCeleb1数据集上进行了实验,证明了该系统的性能,这被认为是同类系统的首次尝试。该系统的总体准确率约为90.25%,研究结果表明,就总体准确率而言,该系统明显优于各种基本分类器
{"title":"VoxCeleb1: speaker age-group classification using probabilistic neural network","authors":"A. A. Badr, A. Abdul-Hassan","doi":"10.34028/iajit/19/6/2","DOIUrl":"https://doi.org/10.34028/iajit/19/6/2","url":null,"abstract":"The human voice speech includes essentially paralinguistic information used in many applications for voice ‎recognition. Classifying speakers according to their age-group has been considered as a valuable tool in ‎various applications, as issuing different levels of permission for different age-groups. In the presented ‎research, an automatic system to classify speaker age-group without depending on the text is proposed. The ‎Fundamental Frequency (F0), Jitter, Shimmer, and Spectral Sub-Band Centroids (SSCs) are used as a ‎feature, while the Probabilistic Neural Network (PNN) is utilized as a classifier for the purpose of ‎classifying the speaker utterances into eight age-groups. Experiments are carried out on VoxCeleb1 dataset ‎to demonstrate the proposed system's performance, which is considered as the first effort of its kind. The ‎suggested system has an overall accuracy of roughly 90.25%, and the findings reveal that it is clearly ‎superior to a variety of base-classifiers in terms of overall accuracy.‎","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"216 1","pages":"854-860"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90483511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ensemble based on accuracy and diversity weighting for evolving data streams 基于精度和多样性加权的演化数据流集成
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/11
Yange Sun, Han Shao, Bencai Zhang
Ensemble classification is an actively researched paradigm that has received much attention due to increasing real-world applications. The crucial issue of ensemble learning is to construct a pool of base classifiers with accuracy and diversity. In this paper, unlike conventional data-streams oriented ensemble methods, we propose a novel Measure via both Accuracy and Diversity (MAD) instead of one of them to supervise ensemble learning. Based on MAD, a novel online ensemble method called Accuracy and Diversity weighted Ensemble (ADE) effectively handles concept drift in data streams. ADE mainly uses the following three steps to construct a concept-drift oriented ensemble: for the current data window, 1) a new base classifier is constructed based on the current concept when drift detect, 2) MAD is used to measure the performance of ensemble members, and 3) a newly built classifier replaces the worst base classifier. If the newly constructed classifier is the worst one, the replacement has not occurred. Comparing with the state-of-art algorithms, ADE exceeds the current best-related algorithm by 2.38% in average classification accuracy. Experimental results show that the proposed method can effectively adapt to different types of drifts.
集成分类是一种被积极研究的范式,由于越来越多的实际应用而受到广泛关注。集成学习的关键问题是构建一个具有准确性和多样性的基本分类器池。在本文中,与传统的面向数据流的集成方法不同,我们提出了一种新的基于准确性和多样性(MAD)的方法来监督集成学习。在此基础上,提出了一种新的在线集成方法——准确性和多样性加权集成(ADE),可以有效地处理数据流中的概念漂移。ADE主要通过以下三个步骤构建面向概念漂移的集成:对于当前数据窗口,1)漂移检测时基于当前概念构建新的基分类器,2)使用MAD度量集成成员的性能,3)新构建的分类器替换最差的基分类器。如果新构造的分类器是最差的分类器,则没有发生替换。与目前最先进的算法相比,ADE的平均分类准确率比目前最佳相关算法高出2.38%。实验结果表明,该方法能有效适应不同类型的漂移。
{"title":"Ensemble based on accuracy and diversity weighting for evolving data streams","authors":"Yange Sun, Han Shao, Bencai Zhang","doi":"10.34028/iajit/19/1/11","DOIUrl":"https://doi.org/10.34028/iajit/19/1/11","url":null,"abstract":"Ensemble classification is an actively researched paradigm that has received much attention due to increasing real-world applications. The crucial issue of ensemble learning is to construct a pool of base classifiers with accuracy and diversity. In this paper, unlike conventional data-streams oriented ensemble methods, we propose a novel Measure via both Accuracy and Diversity (MAD) instead of one of them to supervise ensemble learning. Based on MAD, a novel online ensemble method called Accuracy and Diversity weighted Ensemble (ADE) effectively handles concept drift in data streams. ADE mainly uses the following three steps to construct a concept-drift oriented ensemble: for the current data window, 1) a new base classifier is constructed based on the current concept when drift detect, 2) MAD is used to measure the performance of ensemble members, and 3) a newly built classifier replaces the worst base classifier. If the newly constructed classifier is the worst one, the replacement has not occurred. Comparing with the state-of-art algorithms, ADE exceeds the current best-related algorithm by 2.38% in average classification accuracy. Experimental results show that the proposed method can effectively adapt to different types of drifts.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"15 1","pages":"90-96"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87814783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voice versus keyboard and mouse for text creation on arabic user interfaces 语音与键盘和鼠标在阿拉伯语用户界面上的文本创建
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/15
K. Majrashi
Voice User Interfaces (VUIs) are increasingly popular owing to improvements in automatic speech recognition. However, the understanding of user interaction with VUIs, particularly Arabic VUIs, remains limited. Hence, this research compared user performance, learnability, and satisfaction when using voice and keyboard-and-mouse input modalities for text creation on Arabic user interfaces. A Voice-enabled Email Interface (VEI) and a Traditional Email Interface (TEI) were developed. Forty participants attempted pre-prepared and self-generated message creation tasks using voice on the VEI, and the keyboard-and-mouse modal on the TEI. The results showed that participants were faster (by 1.76 to 2.67 minutes) in pre-prepared message creation using voice than using the keyboard and mouse. Participants were also faster (by 1.72 to 2.49 minutes) in self-generated message creation using voice than using the keyboard and mouse. Although the learning curves were more efficient with the VEI, more participants were satisfied with the TEI. With the VEI, participants reported problems, such as misrecognitions and misspellings, but were satisfied about the visibility of possible executable commands and about the overall accuracy of voice recognition.
由于自动语音识别技术的进步,语音用户界面(VUIs)越来越受欢迎。然而,对用户与VUIs交互的理解仍然有限,尤其是阿拉伯语的VUIs。因此,本研究比较了在阿拉伯用户界面上使用语音和键盘和鼠标输入方式进行文本创建时的用户性能、易学性和满意度。开发了语音电子邮件接口(VEI)和传统电子邮件接口(TEI)。40名参与者尝试在VEI上使用语音,在TEI上使用键盘和鼠标模式进行预先准备和自生成的消息创建任务。结果显示,参与者使用语音创建预先准备好的消息比使用键盘和鼠标要快(1.76到2.67分钟)。与使用键盘和鼠标相比,参与者使用语音生成信息的速度也更快(分别为1.72分钟和2.49分钟)。虽然VEI的学习曲线更有效率,但更多的参与者对TEI感到满意。对于VEI,参与者报告了错误识别和拼写错误等问题,但对可能执行命令的可见性和语音识别的总体准确性感到满意。
{"title":"Voice versus keyboard and mouse for text creation on arabic user interfaces","authors":"K. Majrashi","doi":"10.34028/iajit/19/1/15","DOIUrl":"https://doi.org/10.34028/iajit/19/1/15","url":null,"abstract":"Voice User Interfaces (VUIs) are increasingly popular owing to improvements in automatic speech recognition. However, the understanding of user interaction with VUIs, particularly Arabic VUIs, remains limited. Hence, this research compared user performance, learnability, and satisfaction when using voice and keyboard-and-mouse input modalities for text creation on Arabic user interfaces. A Voice-enabled Email Interface (VEI) and a Traditional Email Interface (TEI) were developed. Forty participants attempted pre-prepared and self-generated message creation tasks using voice on the VEI, and the keyboard-and-mouse modal on the TEI. The results showed that participants were faster (by 1.76 to 2.67 minutes) in pre-prepared message creation using voice than using the keyboard and mouse. Participants were also faster (by 1.72 to 2.49 minutes) in self-generated message creation using voice than using the keyboard and mouse. Although the learning curves were more efficient with the VEI, more participants were satisfied with the TEI. With the VEI, participants reported problems, such as misrecognitions and misspellings, but were satisfied about the visibility of possible executable commands and about the overall accuracy of voice recognition.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"63 1","pages":"132-142"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86878805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Binary Search Tree Method to Find an Item Using Scaling 一种基于缩放的二叉搜索树查找方法
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/5/2
Praveen Pappula
This Approach comprises of methods to produce novel and efficient methods to implement search of data objects in various applications. It is based on the best match search to implement proximity or best match search over complex or more than one data source. In particular with the availability of very large numeric data set in the present day scenario. The proposed approach which is based on the Arithmetic measures or distance measures called as the predominant Mean based algorithm. It is implemented on the longest common prefix of data object that shows how it can be used to generate various clusters through combining or grouping of data, as it takes O(log n) computational time. And further the approach is based on the process of measuring the distance which is suitable for a hierarchy tree property for proving the classification is needed one for storing or accessing or retrieving the information as required. The results obtained illustrates overall error detection rates in generating the clusters and searching the key value for Denial of Service (DOS) attack 5.15%, Probe attack 3.87%, U2R attack 8.11% and R2L attack 11.14%. as these error detection rates denotes that our proposed algorithm generates less error rates than existing linkage methods.
该方法包括产生新颖有效的方法来实现各种应用程序中数据对象的搜索的方法。它基于最佳匹配搜索来实现对复杂或多个数据源的接近或最佳匹配搜索。特别是在目前的情况下,非常大的数字数据集的可用性。该方法基于算术度量或距离度量,称为优势均值算法。它是在数据对象的最长公共前缀上实现的,显示了如何使用它通过组合或分组数据来生成各种集群,因为它需要O(log n)计算时间。此外,该方法基于测量距离的过程,该过程适合于层次树的属性来证明分类是必要的,适合于存储或访问或检索所需的信息。结果表明,在DOS攻击、Probe攻击、U2R攻击和R2L攻击中,生成聚类和搜索关键值的总体检测错误率分别为5.15%、3.87%、8.11%和11.14%。由于这些错误检测率表明我们提出的算法比现有的链接方法产生更少的错误率。
{"title":"A Novel Binary Search Tree Method to Find an Item Using Scaling","authors":"Praveen Pappula","doi":"10.34028/iajit/19/5/2","DOIUrl":"https://doi.org/10.34028/iajit/19/5/2","url":null,"abstract":"This Approach comprises of methods to produce novel and efficient methods to implement search of data objects in various applications. It is based on the best match search to implement proximity or best match search over complex or more than one data source. In particular with the availability of very large numeric data set in the present day scenario. The proposed approach which is based on the Arithmetic measures or distance measures called as the predominant Mean based algorithm. It is implemented on the longest common prefix of data object that shows how it can be used to generate various clusters through combining or grouping of data, as it takes O(log n) computational time. And further the approach is based on the process of measuring the distance which is suitable for a hierarchy tree property for proving the classification is needed one for storing or accessing or retrieving the information as required. The results obtained illustrates overall error detection rates in generating the clusters and searching the key value for Denial of Service (DOS) attack 5.15%, Probe attack 3.87%, U2R attack 8.11% and R2L attack 11.14%. as these error detection rates denotes that our proposed algorithm generates less error rates than existing linkage methods.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"90 1","pages":"713-720"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83921861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic 用于评估使用移动云计算行为意图的多组结构方程模型——以2019冠状病毒病大流行期间约旦大学为例
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/2/7
N. Matar, Tirad AlMalahmeh, Bilal I. Sowan, Saheer Al-Jaghoub, Wasef Mater
The adoption of new technologies in Jordanian Universities related to cloud services, shows differences in practices between faculty and staff members. Resistance to adoption may accrue by faculty and staff members who are accustomed and favoring old practices. A questionnaire was developed based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model to identify factors that affect behavioral intentions that lead to the use of mobile cloud computing during the covid-19 pandemic, taking into consideration Work-type as the mediating factor. Five Jordanian Universities participated in this study, with a total response of 153 faculty and staff members. The conceptual proposed model was tested to ensure the fitness of the structural model for providing correct estimations. The collected sample was subjected to confirmatory factor analysis to ensure construct, convergent and discriminant validity. The results came positive in terms of composite reliability as they were above 0.70, for Average Variance Extracted (AVE) it came more than 0.05and Cronbach alpha exceeded 0.70. The results revealed the fitness of the proposed model to measure differences in behavioral intentions towards adopting mobile cloud services between faculty members and employees. Moreover, the results showed that work type had some interesting moderating impact on the tested relationships. Moreover, the results showed that there is a high Behavioral Intention (BI) between faculty and staff to use mobile cloud services and solutions within their workplace. In addition, the results showed some inequalities of the behavioral intention toward the adoption of mobile cloud services in Jordanian Universities between the two groups. These results call the university administration to clarify these factors for user groups to obtain a better judgment on investment and future practices for using new technologies.
约旦大学采用与云服务有关的新技术,显示了教职员工在实践方面的差异。对采用的抵制可能来自于那些习惯并偏爱旧做法的教职员工。基于技术接受和使用统一理论(UTAUT)模型,以工作类型为中介因素,编制了一份调查问卷,以确定影响covid-19大流行期间导致使用移动云计算的行为意图的因素。五所约旦大学参与了这项研究,共有153名教职员工作出回应。对提出的概念模型进行了测试,以确保结构模型的适合性,从而提供正确的估计。收集的样本进行验证性因子分析,以确保结构效度、收敛效度和判别效度。在复合信度方面,结果是积极的,因为它们在0.70以上,平均方差提取(AVE)超过0.05,Cronbach alpha超过0.70。结果显示,所提出的模型适合于衡量教师和员工在采用移动云服务的行为意图上的差异。此外,研究结果显示,工作类型对被测关系有一些有趣的调节作用。此外,结果显示,教职员工在工作场所使用移动云服务和解决方案的行为意向(BI)很高。此外,研究结果还显示,两组学生在约旦大学采用移动云服务的行为意愿上存在一些不平等。这些结果要求大学管理部门澄清这些因素,以便用户群体对投资和未来使用新技术的做法有更好的判断。
{"title":"A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic","authors":"N. Matar, Tirad AlMalahmeh, Bilal I. Sowan, Saheer Al-Jaghoub, Wasef Mater","doi":"10.34028/iajit/19/2/7","DOIUrl":"https://doi.org/10.34028/iajit/19/2/7","url":null,"abstract":"The adoption of new technologies in Jordanian Universities related to cloud services, shows differences in practices between faculty and staff members. Resistance to adoption may accrue by faculty and staff members who are accustomed and favoring old practices. A questionnaire was developed based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model to identify factors that affect behavioral intentions that lead to the use of mobile cloud computing during the covid-19 pandemic, taking into consideration Work-type as the mediating factor. Five Jordanian Universities participated in this study, with a total response of 153 faculty and staff members. The conceptual proposed model was tested to ensure the fitness of the structural model for providing correct estimations. The collected sample was subjected to confirmatory factor analysis to ensure construct, convergent and discriminant validity. The results came positive in terms of composite reliability as they were above 0.70, for Average Variance Extracted (AVE) it came more than 0.05and Cronbach alpha exceeded 0.70. The results revealed the fitness of the proposed model to measure differences in behavioral intentions towards adopting mobile cloud services between faculty members and employees. Moreover, the results showed that work type had some interesting moderating impact on the tested relationships. Moreover, the results showed that there is a high Behavioral Intention (BI) between faculty and staff to use mobile cloud services and solutions within their workplace. In addition, the results showed some inequalities of the behavioral intention toward the adoption of mobile cloud services in Jordanian Universities between the two groups. These results call the university administration to clarify these factors for user groups to obtain a better judgment on investment and future practices for using new technologies.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"3 1","pages":"203-213"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85608523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved quantile-point-based evolutionary segmentation representation method of financial time series 一种改进的基于分位数点的金融时间序列进化分割表示方法
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/6/4
Lei Liu, Zheng Pei, Peng Chen, Zhisheng Gao, Zhihao Gan
Abstract: Effective and concise feature representation is crucial for time series mining. However, traditional time series feature representation approaches are inadequate for Financial Time Series (FTS) due to FTS' complex, highly noisy, dynamic and non-linear characteristics. Thus, we proposed an improved linear segmentation method named MS-BU-GA in this work. The critical data points that can represent financial time series are added to the feature representation result. Specifically, firstly, we propose a division criterion based on the quantile segmentation points. On the basis of this criterion, we perform segmentation of the time series under the constraint of the maximum segment fitting error. Then, a bottom-up mechanism is adopted to merge the above segmentation results under the maximum segment fitting error. Next, we apply Genetic Algorithm (GA) to the merged results for further optimization, which reduced the overall segment representation fitting error and the integrated factor of segment representation error and number of segments. The experimental result shows that the MS-BU-GA has outperformed existing methods in segment number and representation error. The overall average representation error is decreased by 21.73% and the integrated factor of the number of segments and the segment representation error is reduced by 23.14%.
摘要:有效、简洁的特征表示是时间序列挖掘的关键。然而,由于金融时间序列具有复杂、高噪声、动态和非线性的特点,传统的时间序列特征表示方法并不适用于金融时间序列。因此,我们提出了一种改进的线性分割方法MS-BU-GA。将能够表示金融时间序列的关键数据点添加到特征表示结果中。具体而言,我们首先提出了基于分位数分割点的分割准则。在此准则的基础上,在最大分段拟合误差的约束下对时间序列进行分割。然后,在最大分段拟合误差下,采用自下而上的机制对上述分割结果进行合并。然后,对合并后的结果应用遗传算法进行进一步优化,减小了整体的段表示拟合误差以及段表示误差与段数的综合因子。实验结果表明,MS-BU-GA在段数和表示误差方面优于现有方法。总体平均表示误差降低了21.73%,段数与段表示误差的综合系数降低了23.14%。
{"title":"An improved quantile-point-based evolutionary segmentation representation method of financial time series","authors":"Lei Liu, Zheng Pei, Peng Chen, Zhisheng Gao, Zhihao Gan","doi":"10.34028/iajit/19/6/4","DOIUrl":"https://doi.org/10.34028/iajit/19/6/4","url":null,"abstract":"Abstract: Effective and concise feature representation is crucial for time series mining. However, traditional time series feature representation approaches are inadequate for Financial Time Series (FTS) due to FTS' complex, highly noisy, dynamic and non-linear characteristics. Thus, we proposed an improved linear segmentation method named MS-BU-GA in this work. The critical data points that can represent financial time series are added to the feature representation result. Specifically, firstly, we propose a division criterion based on the quantile segmentation points. On the basis of this criterion, we perform segmentation of the time series under the constraint of the maximum segment fitting error. Then, a bottom-up mechanism is adopted to merge the above segmentation results under the maximum segment fitting error. Next, we apply Genetic Algorithm (GA) to the merged results for further optimization, which reduced the overall segment representation fitting error and the integrated factor of segment representation error and number of segments. The experimental result shows that the MS-BU-GA has outperformed existing methods in segment number and representation error. The overall average representation error is decreased by 21.73% and the integrated factor of the number of segments and the segment representation error is reduced by 23.14%.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"102 1","pages":"873-883"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86026309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secrecy capacity analysis of reconfigurable intelligent surface based vehicular networks 可重构智能地面车辆网络保密能力分析
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3/7
A. Murugesan, Ananthi Govindasamay
As Vehicular Networks based technologies are in the close proximity of deployment for various wireless applications under proposal worldwide, this research paper proposes secrecy capacity analysis for Reconfigurable Intelligent Surface (RIS) based Vehicular Network. The proposed network model has a fixed infrastructure comprising of source node, destination node incorporated with single antenna and passive eavesdropper forming the scenario. RIS based Vehicular communication links are modelled by Rayleigh fading for source-to RIS link and RIS to destination Vehicle, whereas Eavesdropper channel links are Double-Rayleigh amplitude distribution, induced by double scattering in the channel. For this scenario, we derive the closed-form expressions for the average Secrecy Capacity and Secrecy Outage Probability (SOP) of the considered system. Though, Secrecy Capacity analysis is an excellent performance metric for assessing eavesdropper based system, it has been reported by various research works, this research paper differentiates from other research papers by considering different secrecy rates and different distances of eavesdropper as presented in simulation. Further, to validate the obtained simulation results, theoretical results are also derived for assessing performance of SOP for various secrecy rates which is the highlight of this research paper and it can be used as benchmark for various research works to proceed further.
鉴于基于车联网的技术在全球范围内广泛应用于各种无线应用,本研究提出了基于可重构智能表面(RIS)的车联网的保密能力分析。该网络模型具有固定的基础设施,包括源节点、目标节点和无源窃听器组成的场景。基于RIS的车载通信链路对信源到RIS链路和RIS到目标车辆链路采用瑞利衰落建模,而窃听信道链路采用双瑞利振幅分布,由信道内的双散射引起。对于这种情况,我们导出了所考虑系统的平均保密能力和保密中断概率(SOP)的封闭形式表达式。尽管保密能力分析是评估基于窃听器的系统的一种优秀的性能指标,但已经有各种研究工作报道过,与其他研究论文不同的是,本研究论文在仿真中考虑了不同的保密率和窃听器的不同距离。此外,为了验证得到的仿真结果,还推导了用于评估不同保密率下SOP性能的理论结果,这是本研究的重点,可以作为进一步开展各项研究工作的基准。
{"title":"Secrecy capacity analysis of reconfigurable intelligent surface based vehicular networks","authors":"A. Murugesan, Ananthi Govindasamay","doi":"10.34028/iajit/19/3/7","DOIUrl":"https://doi.org/10.34028/iajit/19/3/7","url":null,"abstract":"As Vehicular Networks based technologies are in the close proximity of deployment for various wireless applications under proposal worldwide, this research paper proposes secrecy capacity analysis for Reconfigurable Intelligent Surface (RIS) based Vehicular Network. The proposed network model has a fixed infrastructure comprising of source node, destination node incorporated with single antenna and passive eavesdropper forming the scenario. RIS based Vehicular communication links are modelled by Rayleigh fading for source-to RIS link and RIS to destination Vehicle, whereas Eavesdropper channel links are Double-Rayleigh amplitude distribution, induced by double scattering in the channel. For this scenario, we derive the closed-form expressions for the average Secrecy Capacity and Secrecy Outage Probability (SOP) of the considered system. Though, Secrecy Capacity analysis is an excellent performance metric for assessing eavesdropper based system, it has been reported by various research works, this research paper differentiates from other research papers by considering different secrecy rates and different distances of eavesdropper as presented in simulation. Further, to validate the obtained simulation results, theoretical results are also derived for assessing performance of SOP for various secrecy rates which is the highlight of this research paper and it can be used as benchmark for various research works to proceed further.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"1 1","pages":"336-341"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90665391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. Arab J. Inf. Technol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1