Recently, online character recognition approaches are gotten attention everywhere due to the raped growing of touch screen devices industry. Furthermore, keyboards and mice devises become inapplicable to be included in small devises. These reasons would open the gate for discovering new techniques which can enrich and enhance this kind of approaches. These online approaches can be used for recognizing different texts like letters, digits, or symbols. In this paper, an online system for recognizing handwritten Hindi digits is highlighted based on matching alignment algorithm. It illustrates every phase of the system in details which are: digits acquisition, preprocessing, features extraction, and recognition phase. The dataset of the system were collected by 50 writers using a touch screen laptop with 50 sample of each digit. The results of testing the proposed system showed a high accuracy rate with an average of 96%.
{"title":"Online Recognition System for Handwritten Hindi Digits Based on Matching Alignment Algorithm","authors":"Mustafa Ali Abuzaraida, A. Zeki, A. Zeki","doi":"10.1109/ACSAT.2014.36","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.36","url":null,"abstract":"Recently, online character recognition approaches are gotten attention everywhere due to the raped growing of touch screen devices industry. Furthermore, keyboards and mice devises become inapplicable to be included in small devises. These reasons would open the gate for discovering new techniques which can enrich and enhance this kind of approaches. These online approaches can be used for recognizing different texts like letters, digits, or symbols. In this paper, an online system for recognizing handwritten Hindi digits is highlighted based on matching alignment algorithm. It illustrates every phase of the system in details which are: digits acquisition, preprocessing, features extraction, and recognition phase. The dataset of the system were collected by 50 writers using a touch screen laptop with 50 sample of each digit. The results of testing the proposed system showed a high accuracy rate with an average of 96%.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134308793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adeeb Alsaaidah, Mohd Zalisham, Mohd. Fadzli, Hussein Abdel-jaber
In this paper, early stage congestion control method at the router buffer is proposed. The proposed method, namely, Gentle BLUE (GB), extends the well-known BLUE method by providing a dynamic mechanism for calculating the dropping probability based on the status of the queue length. This dynamic-based overcomes the slow-to-congestion response shortage in the existing methods and provides better management for the router buffer. Unlike the original BLUE method, which has a slow response when sudden heavy congestion occurs as it uses fixed Pinc and Pdec values to adjust the dropping probability, the proposed method predicts congestion before it occurs and responds using dynamically updated values. The dropping value is dynamically calculated based on queue length and the remaining buffer capacity. The proposed GB method is simulated and the obtained results are compared with the existing Active Queue Management (AQM) methods namely, Random Early Detection (RED), Adaptive Gentle Random Early Detection (AGRED) and (BLUE) method. The comparison is conducted in terms of mean queue length (mql), queuing waiting time (D), throughput (T), packet loss (PL) and dropping probability (DP). The results show that the proposed method provides better queue length, better delayed queuing, and packet loss probability compared with the existing methods.
本文提出了路由器缓冲区的早期拥塞控制方法。本文提出的方法,即Gentle BLUE (GB),扩展了众所周知的BLUE方法,提供了一种基于队列长度状态计算丢弃概率的动态机制。这种基于动态的方法克服了现有方法中慢到拥塞响应不足的缺点,并为路由器缓冲区提供了更好的管理。与原来的BLUE方法不同,该方法使用固定的pin和Pdec值来调整丢弃概率,在突然发生严重拥塞时响应缓慢,而该方法在拥塞发生之前预测并使用动态更新的值进行响应。丢弃值是根据队列长度和剩余缓冲区容量动态计算的。对所提出的GB方法进行了仿真,并与现有的主动队列管理(AQM)方法即随机早期检测(RED)、自适应温和随机早期检测(AGRED)和(BLUE)方法进行了比较。从平均队列长度(mql)、排队等待时间(D)、吞吐量(T)、丢包率(PL)和丢包概率(DP)等方面进行比较。结果表明,与现有方法相比,该方法具有更好的队列长度、更好的延迟排队和更低的丢包概率。
{"title":"Gentle-BLUE: A New Method for Active Queue Management","authors":"Adeeb Alsaaidah, Mohd Zalisham, Mohd. Fadzli, Hussein Abdel-jaber","doi":"10.1109/ACSAT.2014.19","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.19","url":null,"abstract":"In this paper, early stage congestion control method at the router buffer is proposed. The proposed method, namely, Gentle BLUE (GB), extends the well-known BLUE method by providing a dynamic mechanism for calculating the dropping probability based on the status of the queue length. This dynamic-based overcomes the slow-to-congestion response shortage in the existing methods and provides better management for the router buffer. Unlike the original BLUE method, which has a slow response when sudden heavy congestion occurs as it uses fixed Pinc and Pdec values to adjust the dropping probability, the proposed method predicts congestion before it occurs and responds using dynamically updated values. The dropping value is dynamically calculated based on queue length and the remaining buffer capacity. The proposed GB method is simulated and the obtained results are compared with the existing Active Queue Management (AQM) methods namely, Random Early Detection (RED), Adaptive Gentle Random Early Detection (AGRED) and (BLUE) method. The comparison is conducted in terms of mean queue length (mql), queuing waiting time (D), throughput (T), packet loss (PL) and dropping probability (DP). The results show that the proposed method provides better queue length, better delayed queuing, and packet loss probability compared with the existing methods.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, Khaled Alhatem, A. Al-kandari
Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main risk and how to secure the risk analysis, and business continuity plan. Was distributed to the employees who work in these sections in the government entities. And 90 replies, 74% of them are not penetrate their organization before - 69% of government agencies change the password automatically - 58% have a team to analyze security risks. To resolve the problem business continuity plan that cover and satisfies the requirements of all government entities in Kuwait, according to theoretical and statistical studies, hence ensuring the continuity of all e-services developed in Kuwait as part of the government project, provide a special budget to protect the security of information in all governmental entity. Inform the relevant staff of all that is new and all the developments in the field of information security. Increase educational programs flags on the importance of the security information.
{"title":"Security Risk Analysis Used by Kuwait Government Sectors","authors":"Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, Khaled Alhatem, A. Al-kandari","doi":"10.1109/ACSAT.2014.15","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.15","url":null,"abstract":"Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main risk and how to secure the risk analysis, and business continuity plan. Was distributed to the employees who work in these sections in the government entities. And 90 replies, 74% of them are not penetrate their organization before - 69% of government agencies change the password automatically - 58% have a team to analyze security risks. To resolve the problem business continuity plan that cover and satisfies the requirements of all government entities in Kuwait, according to theoretical and statistical studies, hence ensuring the continuity of all e-services developed in Kuwait as part of the government project, provide a special budget to protect the security of information in all governmental entity. Inform the relevant staff of all that is new and all the developments in the field of information security. Increase educational programs flags on the importance of the security information.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"3 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Othman, H. Yaacob, A. Wahab, Imad Fakhri Taha Alshaikli, M. A. Dzulkifli
In the existing studies, the quantification of human affect from brain signals is not precise because it is merely rely on some approximations of the models from different affective modalities rather than the neurophysiology of emotions. Therefore, the objective of this study is to investigate the cognitive-affective model for quantifying emotions based on the brain activities through electroencephalogram (EEG). For that purpose, the recalibrated Speech Affective Space Model (rSASM) and the 12-Pont Affective Circumplex (12-PAC) were compared. Moreover, Kernel Density Estimation (KDE) and Mel-Frequency Cepstral Coefficients (MFCC) were used for feature extractions and Multi-Layer Perceptron (MLP) neural network was employed as the classifier. The results show that the MFCC-12PAC cognitive-affective model is the best model for all subjects. Furthermore, the results indicate that emotions are unique between participants and consistent throughout performing executive function tasks. Therefore, our empirical work has provided evidences that 12-PAC model may be adapted to improve the quantification of human affects from the brain signals. The analysis may be later expanded for the construction of an automated tool for the understanding of children's emotion during intervention sessions with psychologists.
{"title":"A Cognitive-Affective Measurement Model Based on the 12-Point Affective Circumplex","authors":"M. Othman, H. Yaacob, A. Wahab, Imad Fakhri Taha Alshaikli, M. A. Dzulkifli","doi":"10.1109/ACSAT.2014.8","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.8","url":null,"abstract":"In the existing studies, the quantification of human affect from brain signals is not precise because it is merely rely on some approximations of the models from different affective modalities rather than the neurophysiology of emotions. Therefore, the objective of this study is to investigate the cognitive-affective model for quantifying emotions based on the brain activities through electroencephalogram (EEG). For that purpose, the recalibrated Speech Affective Space Model (rSASM) and the 12-Pont Affective Circumplex (12-PAC) were compared. Moreover, Kernel Density Estimation (KDE) and Mel-Frequency Cepstral Coefficients (MFCC) were used for feature extractions and Multi-Layer Perceptron (MLP) neural network was employed as the classifier. The results show that the MFCC-12PAC cognitive-affective model is the best model for all subjects. Furthermore, the results indicate that emotions are unique between participants and consistent throughout performing executive function tasks. Therefore, our empirical work has provided evidences that 12-PAC model may be adapted to improve the quantification of human affects from the brain signals. The analysis may be later expanded for the construction of an automated tool for the understanding of children's emotion during intervention sessions with psychologists.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132891076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we report on our fundamental results and new work on building cognitive wireless networks that complete resource sharing in a local environment. We emphasize two fundamentals issues. First, a cognitive network with full cooperative nodes. Second, the cooperative and not cooperative behavior of selfish users in our network. The cooperative behavior among the radios is regularly believed to require a rich exchange of information. We show in this work that cooperation can be an emergent phenomenon with a considerable costs. We apply Coalitional Games to cognitive wireless networks to show that coalitional attitude both in sensing and transmission data can give a very good gain. The impacting factors of achievable cooperative gain is mathematically calculated, also incurred cooperation overhead are presented. A simulation proof of the two issues conclude our paper.
{"title":"Cognitive Wireless Network with Cooperative and Selfish Nodes","authors":"Imane Daha Belghiti, Ismail Berrada, L. Omari","doi":"10.1109/ACSAT.2014.24","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.24","url":null,"abstract":"In this paper we report on our fundamental results and new work on building cognitive wireless networks that complete resource sharing in a local environment. We emphasize two fundamentals issues. First, a cognitive network with full cooperative nodes. Second, the cooperative and not cooperative behavior of selfish users in our network. The cooperative behavior among the radios is regularly believed to require a rich exchange of information. We show in this work that cooperation can be an emergent phenomenon with a considerable costs. We apply Coalitional Games to cognitive wireless networks to show that coalitional attitude both in sensing and transmission data can give a very good gain. The impacting factors of achievable cooperative gain is mathematically calculated, also incurred cooperation overhead are presented. A simulation proof of the two issues conclude our paper.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. M. Abdulrazzaq, Shahrul Azman Mohd, M. A. Fadhil
Given the rapid increase in the number of medical images, the process of image retrieval is considered an effective solution that can be used in the automatic search and storage of images. Content-based image retrieval is considerably affected by image classification, also called image annotation. The performance of image annotation is significantly affected by two main issues, namely, automatic extraction for image features and the annotation algorithm. This study addresses these issues by constructing a feature vector from the extraction of multi-level features. Two machine learning techniques are used for evaluation. The K-nearest neighbor and support vector machine methods of learning machine are employed to classify images. Image CLEF med2005 is used as the database for the classification approaches. Furthermore, principal component analysis is utilized thrice to decrease the length of the feature vector. Results demonstrate that the accuracy is significantly improved compared with those of similar classification approaches related to the same database.
{"title":"Medical Image Annotation and Retrieval by Using Classification Techniques","authors":"M. M. Abdulrazzaq, Shahrul Azman Mohd, M. A. Fadhil","doi":"10.1109/ACSAT.2014.13","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.13","url":null,"abstract":"Given the rapid increase in the number of medical images, the process of image retrieval is considered an effective solution that can be used in the automatic search and storage of images. Content-based image retrieval is considerably affected by image classification, also called image annotation. The performance of image annotation is significantly affected by two main issues, namely, automatic extraction for image features and the annotation algorithm. This study addresses these issues by constructing a feature vector from the extraction of multi-level features. Two machine learning techniques are used for evaluation. The K-nearest neighbor and support vector machine methods of learning machine are employed to classify images. Image CLEF med2005 is used as the database for the classification approaches. Furthermore, principal component analysis is utilized thrice to decrease the length of the feature vector. Results demonstrate that the accuracy is significantly improved compared with those of similar classification approaches related to the same database.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121456241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social Networking has been pointed out as an important evolution in the social and Internet history. The leader and the pioneer of this evolution was and still Face book despite the big and tough rivalry nowadays. Although Facebook is very well known and most of the people who surf the Internet use it and know how to use it and what the different pages are and the modules it has, a few number of technologists know the technology basis upon which this success sustains. This research paper shades a light on the web programming aspect and other supporting technologies used for the frontend and backend of social networks. Facebook is taken as an example.
{"title":"Frontend and Backend Web Technologies in Social Networking Sites: Facebook as an Example","authors":"H. M. Abdullah, A. Zeki","doi":"10.1109/ACSAT.2014.22","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.22","url":null,"abstract":"Social Networking has been pointed out as an important evolution in the social and Internet history. The leader and the pioneer of this evolution was and still Face book despite the big and tough rivalry nowadays. Although Facebook is very well known and most of the people who surf the Internet use it and know how to use it and what the different pages are and the modules it has, a few number of technologists know the technology basis upon which this success sustains. This research paper shades a light on the web programming aspect and other supporting technologies used for the frontend and backend of social networks. Facebook is taken as an example.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information security (IS) simply implies the protection and preservation of information, with its central purpose being to protect and preserve the confidentiality, integrity, and availability of information. It may also involve protecting and preserving the authenticity and reliability of information and ensuring that entities can be held accountable. Additionally, putting the educational setting such as International Islamic University Malaysia (IIUM) into consideration, information security awareness (ISA) implies educating the campus community about the inherent risks of the confidentiality, integrity, or availability of systems" & data, and how all individuals/students can protect their systems" & data. The purpose of this research therefore was to examine users' awareness of and perception on IS issues amongst the Kulliyyah of Information and Communication Technology (KICT) post graduate (PG) students of IIUM. To this end, data collection was elicited through the administration of questionnaires and interviews. Data analysis was performed by using the SPSS version 20 on the questionnaire and a qualitative study method that involved breaking the interview into themes was employed for the interview data by determining the commonality among their views.
信息安全(IS)仅仅意味着信息的保护和保存,其中心目的是保护和保存信息的机密性、完整性和可用性。它还可能涉及保护和保持信息的真实性和可靠性,并确保实体能够承担责任。此外,考虑到马来西亚国际伊斯兰大学(IIUM)等教育机构,信息安全意识(ISA)意味着教育校园社区了解系统和数据的机密性、完整性或可用性的固有风险,以及所有个人/学生如何保护他们的系统和数据。因此,本研究的目的是调查IIUM的KICT研究生(PG)学生中用户对IS问题的意识和看法。为此目的,通过问卷调查和访谈收集数据。对调查问卷采用SPSS version 20进行数据分析,对访谈数据采用定性研究方法,将访谈分成主题,确定访谈对象观点的共性。
{"title":"Users' Awareness of and Perception on Information Security Issues: A Case Study of Kulliyyah of ICT Postgraduate Students","authors":"Habiba Hamid, A. Zeki","doi":"10.1109/ACSAT.2014.31","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.31","url":null,"abstract":"Information security (IS) simply implies the protection and preservation of information, with its central purpose being to protect and preserve the confidentiality, integrity, and availability of information. It may also involve protecting and preserving the authenticity and reliability of information and ensuring that entities can be held accountable. Additionally, putting the educational setting such as International Islamic University Malaysia (IIUM) into consideration, information security awareness (ISA) implies educating the campus community about the inherent risks of the confidentiality, integrity, or availability of systems\" & data, and how all individuals/students can protect their systems\" & data. The purpose of this research therefore was to examine users' awareness of and perception on IS issues amongst the Kulliyyah of Information and Communication Technology (KICT) post graduate (PG) students of IIUM. To this end, data collection was elicited through the administration of questionnaires and interviews. Data analysis was performed by using the SPSS version 20 on the questionnaire and a qualitative study method that involved breaking the interview into themes was employed for the interview data by determining the commonality among their views.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"26 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128492658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
User satisfaction is the key of success for any company to succeed and flourish business. Due to tremendous competition among service providers in the online sectors, many competitors feel threaten to be marginalized and loose competitive edge, and so is the profit margin. For many companies to survive business in a highly completive environment, user satisfaction may be such factor to achieve lead over others. User satisfaction is a strong construct that emphasize on factors such as information quality, system quality, and service quality as its key parameters. This study aims to measure user satisfaction for online services provided by mobile companies in Kuwait and to develop a multi-scale model and assess its applicability in Kuwait scenario. This study involves exploratory factor analysis method to measure user satisfaction. The result showed that service quality, system quality, information quality are apex variable for user satisfaction for companies who compete in Kuwait in telecom sector.
{"title":"Mobile Online Services and Measuring User Satisfaction: Study of Kuwait","authors":"T. Alzabi, A. Shah","doi":"10.1109/ACSAT.2014.42","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.42","url":null,"abstract":"User satisfaction is the key of success for any company to succeed and flourish business. Due to tremendous competition among service providers in the online sectors, many competitors feel threaten to be marginalized and loose competitive edge, and so is the profit margin. For many companies to survive business in a highly completive environment, user satisfaction may be such factor to achieve lead over others. User satisfaction is a strong construct that emphasize on factors such as information quality, system quality, and service quality as its key parameters. This study aims to measure user satisfaction for online services provided by mobile companies in Kuwait and to develop a multi-scale model and assess its applicability in Kuwait scenario. This study involves exploratory factor analysis method to measure user satisfaction. The result showed that service quality, system quality, information quality are apex variable for user satisfaction for companies who compete in Kuwait in telecom sector.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"53 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116883746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, Lulwa Ziad Al-Tayyar
The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a questionnaire in government's employees. Then try to find the ideal solutions for these problems to reach the maximum level of security in Kuwait government entities. In this paper found that the information security and especially the intrusion detection system in Kuwait government needs to be more efficient by ensure that the organizations use the principles and criteria of using IDS and Cyber security. In the end of this paper there are some recommendations for the organization to improve their system security.
{"title":"A Survey of Intrusion Detection System Using Case Study Kuwait Governments Entities","authors":"Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, Lulwa Ziad Al-Tayyar","doi":"10.1109/ACSAT.2014.14","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.14","url":null,"abstract":"The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a questionnaire in government's employees. Then try to find the ideal solutions for these problems to reach the maximum level of security in Kuwait government entities. In this paper found that the information security and especially the intrusion detection system in Kuwait government needs to be more efficient by ensure that the organizations use the principles and criteria of using IDS and Cyber security. In the end of this paper there are some recommendations for the organization to improve their system security.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}