首页 > 最新文献

2014 3rd International Conference on Advanced Computer Science Applications and Technologies最新文献

英文 中文
Online Recognition System for Handwritten Hindi Digits Based on Matching Alignment Algorithm 基于匹配对齐算法的手写印地语数字在线识别系统
Mustafa Ali Abuzaraida, A. Zeki, A. Zeki
Recently, online character recognition approaches are gotten attention everywhere due to the raped growing of touch screen devices industry. Furthermore, keyboards and mice devises become inapplicable to be included in small devises. These reasons would open the gate for discovering new techniques which can enrich and enhance this kind of approaches. These online approaches can be used for recognizing different texts like letters, digits, or symbols. In this paper, an online system for recognizing handwritten Hindi digits is highlighted based on matching alignment algorithm. It illustrates every phase of the system in details which are: digits acquisition, preprocessing, features extraction, and recognition phase. The dataset of the system were collected by 50 writers using a touch screen laptop with 50 sample of each digit. The results of testing the proposed system showed a high accuracy rate with an average of 96%.
最近,随着触摸屏产业的迅猛发展,在线字符识别方法受到了广泛的关注。此外,键盘和鼠标设备变得不适合包含在小型设备中。这些原因将为发现可以丰富和增强这种方法的新技术打开大门。这些在线方法可用于识别不同的文本,如字母、数字或符号。本文重点介绍了一种基于匹配对齐算法的手写印地语数字在线识别系统。详细说明了系统的各个阶段:数字采集、预处理、特征提取和识别阶段。该系统的数据集由50位作者使用触摸屏笔记本电脑收集,每个数字50个样本。测试结果表明,该系统具有较高的准确率,平均准确率达96%。
{"title":"Online Recognition System for Handwritten Hindi Digits Based on Matching Alignment Algorithm","authors":"Mustafa Ali Abuzaraida, A. Zeki, A. Zeki","doi":"10.1109/ACSAT.2014.36","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.36","url":null,"abstract":"Recently, online character recognition approaches are gotten attention everywhere due to the raped growing of touch screen devices industry. Furthermore, keyboards and mice devises become inapplicable to be included in small devises. These reasons would open the gate for discovering new techniques which can enrich and enhance this kind of approaches. These online approaches can be used for recognizing different texts like letters, digits, or symbols. In this paper, an online system for recognizing handwritten Hindi digits is highlighted based on matching alignment algorithm. It illustrates every phase of the system in details which are: digits acquisition, preprocessing, features extraction, and recognition phase. The dataset of the system were collected by 50 writers using a touch screen laptop with 50 sample of each digit. The results of testing the proposed system showed a high accuracy rate with an average of 96%.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134308793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Gentle-BLUE: A New Method for Active Queue Management Gentle-BLUE:一种主动队列管理新方法
Adeeb Alsaaidah, Mohd Zalisham, Mohd. Fadzli, Hussein Abdel-jaber
In this paper, early stage congestion control method at the router buffer is proposed. The proposed method, namely, Gentle BLUE (GB), extends the well-known BLUE method by providing a dynamic mechanism for calculating the dropping probability based on the status of the queue length. This dynamic-based overcomes the slow-to-congestion response shortage in the existing methods and provides better management for the router buffer. Unlike the original BLUE method, which has a slow response when sudden heavy congestion occurs as it uses fixed Pinc and Pdec values to adjust the dropping probability, the proposed method predicts congestion before it occurs and responds using dynamically updated values. The dropping value is dynamically calculated based on queue length and the remaining buffer capacity. The proposed GB method is simulated and the obtained results are compared with the existing Active Queue Management (AQM) methods namely, Random Early Detection (RED), Adaptive Gentle Random Early Detection (AGRED) and (BLUE) method. The comparison is conducted in terms of mean queue length (mql), queuing waiting time (D), throughput (T), packet loss (PL) and dropping probability (DP). The results show that the proposed method provides better queue length, better delayed queuing, and packet loss probability compared with the existing methods.
本文提出了路由器缓冲区的早期拥塞控制方法。本文提出的方法,即Gentle BLUE (GB),扩展了众所周知的BLUE方法,提供了一种基于队列长度状态计算丢弃概率的动态机制。这种基于动态的方法克服了现有方法中慢到拥塞响应不足的缺点,并为路由器缓冲区提供了更好的管理。与原来的BLUE方法不同,该方法使用固定的pin和Pdec值来调整丢弃概率,在突然发生严重拥塞时响应缓慢,而该方法在拥塞发生之前预测并使用动态更新的值进行响应。丢弃值是根据队列长度和剩余缓冲区容量动态计算的。对所提出的GB方法进行了仿真,并与现有的主动队列管理(AQM)方法即随机早期检测(RED)、自适应温和随机早期检测(AGRED)和(BLUE)方法进行了比较。从平均队列长度(mql)、排队等待时间(D)、吞吐量(T)、丢包率(PL)和丢包概率(DP)等方面进行比较。结果表明,与现有方法相比,该方法具有更好的队列长度、更好的延迟排队和更低的丢包概率。
{"title":"Gentle-BLUE: A New Method for Active Queue Management","authors":"Adeeb Alsaaidah, Mohd Zalisham, Mohd. Fadzli, Hussein Abdel-jaber","doi":"10.1109/ACSAT.2014.19","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.19","url":null,"abstract":"In this paper, early stage congestion control method at the router buffer is proposed. The proposed method, namely, Gentle BLUE (GB), extends the well-known BLUE method by providing a dynamic mechanism for calculating the dropping probability based on the status of the queue length. This dynamic-based overcomes the slow-to-congestion response shortage in the existing methods and provides better management for the router buffer. Unlike the original BLUE method, which has a slow response when sudden heavy congestion occurs as it uses fixed Pinc and Pdec values to adjust the dropping probability, the proposed method predicts congestion before it occurs and responds using dynamically updated values. The dropping value is dynamically calculated based on queue length and the remaining buffer capacity. The proposed GB method is simulated and the obtained results are compared with the existing Active Queue Management (AQM) methods namely, Random Early Detection (RED), Adaptive Gentle Random Early Detection (AGRED) and (BLUE) method. The comparison is conducted in terms of mean queue length (mql), queuing waiting time (D), throughput (T), packet loss (PL) and dropping probability (DP). The results show that the proposed method provides better queue length, better delayed queuing, and packet loss probability compared with the existing methods.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Risk Analysis Used by Kuwait Government Sectors 科威特政府部门安全风险分析
Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, Khaled Alhatem, A. Al-kandari
Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main risk and how to secure the risk analysis, and business continuity plan. Was distributed to the employees who work in these sections in the government entities. And 90 replies, 74% of them are not penetrate their organization before - 69% of government agencies change the password automatically - 58% have a team to analyze security risks. To resolve the problem business continuity plan that cover and satisfies the requirements of all government entities in Kuwait, according to theoretical and statistical studies, hence ensuring the continuity of all e-services developed in Kuwait as part of the government project, provide a special budget to protect the security of information in all governmental entity. Inform the relevant staff of all that is new and all the developments in the field of information security. Increase educational programs flags on the importance of the security information.
在我们的日常生活中,长期使用电脑必须保护我们的个人信息免受任何外部威胁,如果网络安全是解决方案,以建立一个安全的空间欢迎邮件在政府机构。风险分析是风险管理的一个重要过程,风险分析有定性和定量两种。向科威特的政府实体分发了调查报告,以证明主要风险以及如何确保风险分析和业务连续性计划。分发给在政府机构这些部门工作的雇员。在90份回复中,74%的人之前没有渗透过他们的组织,69%的政府机构会自动更改密码,58%的人有一个团队来分析安全风险。为解决这一问题,根据理论和统计研究,业务连续性计划涵盖并满足科威特所有政府实体的要求,从而确保作为政府项目一部分在科威特开发的所有电子服务的连续性,提供一项特别预算,以保护所有政府实体的信息安全。向相关人员通报信息安全领域的最新动态和发展情况。增加安全信息重要性的教育项目标志。
{"title":"Security Risk Analysis Used by Kuwait Government Sectors","authors":"Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, Khaled Alhatem, A. Al-kandari","doi":"10.1109/ACSAT.2014.15","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.15","url":null,"abstract":"Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main risk and how to secure the risk analysis, and business continuity plan. Was distributed to the employees who work in these sections in the government entities. And 90 replies, 74% of them are not penetrate their organization before - 69% of government agencies change the password automatically - 58% have a team to analyze security risks. To resolve the problem business continuity plan that cover and satisfies the requirements of all government entities in Kuwait, according to theoretical and statistical studies, hence ensuring the continuity of all e-services developed in Kuwait as part of the government project, provide a special budget to protect the security of information in all governmental entity. Inform the relevant staff of all that is new and all the developments in the field of information security. Increase educational programs flags on the importance of the security information.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"3 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cognitive-Affective Measurement Model Based on the 12-Point Affective Circumplex 基于12点情感环的认知-情感测量模型
M. Othman, H. Yaacob, A. Wahab, Imad Fakhri Taha Alshaikli, M. A. Dzulkifli
In the existing studies, the quantification of human affect from brain signals is not precise because it is merely rely on some approximations of the models from different affective modalities rather than the neurophysiology of emotions. Therefore, the objective of this study is to investigate the cognitive-affective model for quantifying emotions based on the brain activities through electroencephalogram (EEG). For that purpose, the recalibrated Speech Affective Space Model (rSASM) and the 12-Pont Affective Circumplex (12-PAC) were compared. Moreover, Kernel Density Estimation (KDE) and Mel-Frequency Cepstral Coefficients (MFCC) were used for feature extractions and Multi-Layer Perceptron (MLP) neural network was employed as the classifier. The results show that the MFCC-12PAC cognitive-affective model is the best model for all subjects. Furthermore, the results indicate that emotions are unique between participants and consistent throughout performing executive function tasks. Therefore, our empirical work has provided evidences that 12-PAC model may be adapted to improve the quantification of human affects from the brain signals. The analysis may be later expanded for the construction of an automated tool for the understanding of children's emotion during intervention sessions with psychologists.
在现有的研究中,从大脑信号中量化人类情感并不精确,因为它仅仅依赖于来自不同情感模式的模型的一些近似,而不是情感的神经生理学。因此,本研究旨在探讨基于脑电活动的认知-情感情绪量化模型。为此,我们比较了重新校准的语音情感空间模型(rSASM)和12-Pont情感环(12-PAC)。采用核密度估计(KDE)和Mel-Frequency Cepstral系数(MFCC)进行特征提取,并采用多层感知器(MLP)神经网络作为分类器。结果表明,MFCC-12PAC认知情感模型是所有被试的最佳模型。此外,结果表明情绪在参与者之间是独特的,并且在执行功能任务的过程中是一致的。因此,我们的实证工作提供了证据,证明12-PAC模型可以用于改进大脑信号对人类情绪的量化。在心理学家的干预过程中,该分析可能会被扩展为一个自动化工具的构建,用于理解儿童的情绪。
{"title":"A Cognitive-Affective Measurement Model Based on the 12-Point Affective Circumplex","authors":"M. Othman, H. Yaacob, A. Wahab, Imad Fakhri Taha Alshaikli, M. A. Dzulkifli","doi":"10.1109/ACSAT.2014.8","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.8","url":null,"abstract":"In the existing studies, the quantification of human affect from brain signals is not precise because it is merely rely on some approximations of the models from different affective modalities rather than the neurophysiology of emotions. Therefore, the objective of this study is to investigate the cognitive-affective model for quantifying emotions based on the brain activities through electroencephalogram (EEG). For that purpose, the recalibrated Speech Affective Space Model (rSASM) and the 12-Pont Affective Circumplex (12-PAC) were compared. Moreover, Kernel Density Estimation (KDE) and Mel-Frequency Cepstral Coefficients (MFCC) were used for feature extractions and Multi-Layer Perceptron (MLP) neural network was employed as the classifier. The results show that the MFCC-12PAC cognitive-affective model is the best model for all subjects. Furthermore, the results indicate that emotions are unique between participants and consistent throughout performing executive function tasks. Therefore, our empirical work has provided evidences that 12-PAC model may be adapted to improve the quantification of human affects from the brain signals. The analysis may be later expanded for the construction of an automated tool for the understanding of children's emotion during intervention sessions with psychologists.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132891076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cognitive Wireless Network with Cooperative and Selfish Nodes 具有合作和自利节点的认知无线网络
Imane Daha Belghiti, Ismail Berrada, L. Omari
In this paper we report on our fundamental results and new work on building cognitive wireless networks that complete resource sharing in a local environment. We emphasize two fundamentals issues. First, a cognitive network with full cooperative nodes. Second, the cooperative and not cooperative behavior of selfish users in our network. The cooperative behavior among the radios is regularly believed to require a rich exchange of information. We show in this work that cooperation can be an emergent phenomenon with a considerable costs. We apply Coalitional Games to cognitive wireless networks to show that coalitional attitude both in sensing and transmission data can give a very good gain. The impacting factors of achievable cooperative gain is mathematically calculated, also incurred cooperation overhead are presented. A simulation proof of the two issues conclude our paper.
在本文中,我们报告了我们在构建认知无线网络方面的基本结果和新工作,该网络可以在本地环境中完成资源共享。我们强调两个基本问题。首先,一个具有全合作节点的认知网络。二是网络中自私用户的合作与不合作行为。无线电之间的合作行为通常被认为需要丰富的信息交换。我们在这项工作中表明,合作可以是一种具有相当成本的新兴现象。我们将联盟博弈应用于认知无线网络,以表明联盟态度在感知和传输数据方面都可以获得非常好的收益。对影响可实现合作收益的因素进行了数学计算,并给出了产生的合作开销。最后对这两个问题进行了仿真证明。
{"title":"Cognitive Wireless Network with Cooperative and Selfish Nodes","authors":"Imane Daha Belghiti, Ismail Berrada, L. Omari","doi":"10.1109/ACSAT.2014.24","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.24","url":null,"abstract":"In this paper we report on our fundamental results and new work on building cognitive wireless networks that complete resource sharing in a local environment. We emphasize two fundamentals issues. First, a cognitive network with full cooperative nodes. Second, the cooperative and not cooperative behavior of selfish users in our network. The cooperative behavior among the radios is regularly believed to require a rich exchange of information. We show in this work that cooperation can be an emergent phenomenon with a considerable costs. We apply Coalitional Games to cognitive wireless networks to show that coalitional attitude both in sensing and transmission data can give a very good gain. The impacting factors of achievable cooperative gain is mathematically calculated, also incurred cooperation overhead are presented. A simulation proof of the two issues conclude our paper.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical Image Annotation and Retrieval by Using Classification Techniques 基于分类技术的医学图像标注与检索
M. M. Abdulrazzaq, Shahrul Azman Mohd, M. A. Fadhil
Given the rapid increase in the number of medical images, the process of image retrieval is considered an effective solution that can be used in the automatic search and storage of images. Content-based image retrieval is considerably affected by image classification, also called image annotation. The performance of image annotation is significantly affected by two main issues, namely, automatic extraction for image features and the annotation algorithm. This study addresses these issues by constructing a feature vector from the extraction of multi-level features. Two machine learning techniques are used for evaluation. The K-nearest neighbor and support vector machine methods of learning machine are employed to classify images. Image CLEF med2005 is used as the database for the classification approaches. Furthermore, principal component analysis is utilized thrice to decrease the length of the feature vector. Results demonstrate that the accuracy is significantly improved compared with those of similar classification approaches related to the same database.
鉴于医学图像数量的快速增长,图像检索过程被认为是一种有效的解决方案,可以用于图像的自动搜索和存储。基于内容的图像检索在很大程度上受到图像分类(也称为图像标注)的影响。图像特征的自动提取和图像标注算法是影响图像标注性能的主要问题。本研究通过从提取的多层次特征中构造特征向量来解决这些问题。两种机器学习技术用于评估。采用学习机的k近邻和支持向量机方法对图像进行分类。使用CLEF med2005图像作为分类方法的数据库。此外,利用三次主成分分析来减小特征向量的长度。结果表明,与同类数据库的分类方法相比,该方法的准确率有了显著提高。
{"title":"Medical Image Annotation and Retrieval by Using Classification Techniques","authors":"M. M. Abdulrazzaq, Shahrul Azman Mohd, M. A. Fadhil","doi":"10.1109/ACSAT.2014.13","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.13","url":null,"abstract":"Given the rapid increase in the number of medical images, the process of image retrieval is considered an effective solution that can be used in the automatic search and storage of images. Content-based image retrieval is considerably affected by image classification, also called image annotation. The performance of image annotation is significantly affected by two main issues, namely, automatic extraction for image features and the annotation algorithm. This study addresses these issues by constructing a feature vector from the extraction of multi-level features. Two machine learning techniques are used for evaluation. The K-nearest neighbor and support vector machine methods of learning machine are employed to classify images. Image CLEF med2005 is used as the database for the classification approaches. Furthermore, principal component analysis is utilized thrice to decrease the length of the feature vector. Results demonstrate that the accuracy is significantly improved compared with those of similar classification approaches related to the same database.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121456241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Frontend and Backend Web Technologies in Social Networking Sites: Facebook as an Example 社交网站的前端和后端Web技术:以Facebook为例
H. M. Abdullah, A. Zeki
Social Networking has been pointed out as an important evolution in the social and Internet history. The leader and the pioneer of this evolution was and still Face book despite the big and tough rivalry nowadays. Although Facebook is very well known and most of the people who surf the Internet use it and know how to use it and what the different pages are and the modules it has, a few number of technologists know the technology basis upon which this success sustains. This research paper shades a light on the web programming aspect and other supporting technologies used for the frontend and backend of social networks. Facebook is taken as an example.
社交网络被认为是社交和互联网历史上的一次重要演变。这一演变的领导者和先驱一直是facebook,尽管如今它面临着巨大而严峻的竞争。虽然Facebook非常有名,大多数上网的人都使用它,知道如何使用它,知道不同的页面是什么,它有什么模块,但只有少数技术专家知道这种成功所依赖的技术基础。这篇研究论文对网络编程方面以及用于社交网络前端和后端的其他支持技术进行了阐述。以Facebook为例。
{"title":"Frontend and Backend Web Technologies in Social Networking Sites: Facebook as an Example","authors":"H. M. Abdullah, A. Zeki","doi":"10.1109/ACSAT.2014.22","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.22","url":null,"abstract":"Social Networking has been pointed out as an important evolution in the social and Internet history. The leader and the pioneer of this evolution was and still Face book despite the big and tough rivalry nowadays. Although Facebook is very well known and most of the people who surf the Internet use it and know how to use it and what the different pages are and the modules it has, a few number of technologists know the technology basis upon which this success sustains. This research paper shades a light on the web programming aspect and other supporting technologies used for the frontend and backend of social networks. Facebook is taken as an example.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Users' Awareness of and Perception on Information Security Issues: A Case Study of Kulliyyah of ICT Postgraduate Students 用户对信息安全问题的意识和感知——以ICT研究生Kulliyyah为例
Habiba Hamid, A. Zeki
Information security (IS) simply implies the protection and preservation of information, with its central purpose being to protect and preserve the confidentiality, integrity, and availability of information. It may also involve protecting and preserving the authenticity and reliability of information and ensuring that entities can be held accountable. Additionally, putting the educational setting such as International Islamic University Malaysia (IIUM) into consideration, information security awareness (ISA) implies educating the campus community about the inherent risks of the confidentiality, integrity, or availability of systems" & data, and how all individuals/students can protect their systems" & data. The purpose of this research therefore was to examine users' awareness of and perception on IS issues amongst the Kulliyyah of Information and Communication Technology (KICT) post graduate (PG) students of IIUM. To this end, data collection was elicited through the administration of questionnaires and interviews. Data analysis was performed by using the SPSS version 20 on the questionnaire and a qualitative study method that involved breaking the interview into themes was employed for the interview data by determining the commonality among their views.
信息安全(IS)仅仅意味着信息的保护和保存,其中心目的是保护和保存信息的机密性、完整性和可用性。它还可能涉及保护和保持信息的真实性和可靠性,并确保实体能够承担责任。此外,考虑到马来西亚国际伊斯兰大学(IIUM)等教育机构,信息安全意识(ISA)意味着教育校园社区了解系统和数据的机密性、完整性或可用性的固有风险,以及所有个人/学生如何保护他们的系统和数据。因此,本研究的目的是调查IIUM的KICT研究生(PG)学生中用户对IS问题的意识和看法。为此目的,通过问卷调查和访谈收集数据。对调查问卷采用SPSS version 20进行数据分析,对访谈数据采用定性研究方法,将访谈分成主题,确定访谈对象观点的共性。
{"title":"Users' Awareness of and Perception on Information Security Issues: A Case Study of Kulliyyah of ICT Postgraduate Students","authors":"Habiba Hamid, A. Zeki","doi":"10.1109/ACSAT.2014.31","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.31","url":null,"abstract":"Information security (IS) simply implies the protection and preservation of information, with its central purpose being to protect and preserve the confidentiality, integrity, and availability of information. It may also involve protecting and preserving the authenticity and reliability of information and ensuring that entities can be held accountable. Additionally, putting the educational setting such as International Islamic University Malaysia (IIUM) into consideration, information security awareness (ISA) implies educating the campus community about the inherent risks of the confidentiality, integrity, or availability of systems\" & data, and how all individuals/students can protect their systems\" & data. The purpose of this research therefore was to examine users' awareness of and perception on IS issues amongst the Kulliyyah of Information and Communication Technology (KICT) post graduate (PG) students of IIUM. To this end, data collection was elicited through the administration of questionnaires and interviews. Data analysis was performed by using the SPSS version 20 on the questionnaire and a qualitative study method that involved breaking the interview into themes was employed for the interview data by determining the commonality among their views.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"26 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128492658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobile Online Services and Measuring User Satisfaction: Study of Kuwait 移动在线服务和测量用户满意度:科威特的研究
T. Alzabi, A. Shah
User satisfaction is the key of success for any company to succeed and flourish business. Due to tremendous competition among service providers in the online sectors, many competitors feel threaten to be marginalized and loose competitive edge, and so is the profit margin. For many companies to survive business in a highly completive environment, user satisfaction may be such factor to achieve lead over others. User satisfaction is a strong construct that emphasize on factors such as information quality, system quality, and service quality as its key parameters. This study aims to measure user satisfaction for online services provided by mobile companies in Kuwait and to develop a multi-scale model and assess its applicability in Kuwait scenario. This study involves exploratory factor analysis method to measure user satisfaction. The result showed that service quality, system quality, information quality are apex variable for user satisfaction for companies who compete in Kuwait in telecom sector.
用户满意度是任何公司成功和蓬勃发展的关键。由于网络服务提供商之间的激烈竞争,许多竞争对手感到被边缘化的威胁,竞争优势失去,利润率也在下降。对于许多公司来说,要在高度竞争的环境中生存下来,用户满意度可能是实现领先的因素。用户满意度是一个强大的结构,强调信息质量、系统质量和服务质量等因素作为其关键参数。本研究旨在衡量科威特移动公司提供的在线服务的用户满意度,并开发一个多尺度模型,并评估其在科威特情景中的适用性。本研究采用探索性因子分析法测量用户满意度。结果表明,服务质量、系统质量、信息质量是影响科威特电信行业企业用户满意度的最高变量。
{"title":"Mobile Online Services and Measuring User Satisfaction: Study of Kuwait","authors":"T. Alzabi, A. Shah","doi":"10.1109/ACSAT.2014.42","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.42","url":null,"abstract":"User satisfaction is the key of success for any company to succeed and flourish business. Due to tremendous competition among service providers in the online sectors, many competitors feel threaten to be marginalized and loose competitive edge, and so is the profit margin. For many companies to survive business in a highly completive environment, user satisfaction may be such factor to achieve lead over others. User satisfaction is a strong construct that emphasize on factors such as information quality, system quality, and service quality as its key parameters. This study aims to measure user satisfaction for online services provided by mobile companies in Kuwait and to develop a multi-scale model and assess its applicability in Kuwait scenario. This study involves exploratory factor analysis method to measure user satisfaction. The result showed that service quality, system quality, information quality are apex variable for user satisfaction for companies who compete in Kuwait in telecom sector.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"53 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116883746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Intrusion Detection System Using Case Study Kuwait Governments Entities 入侵检测系统的案例研究——以科威特政府为例
Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, Lulwa Ziad Al-Tayyar
The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a questionnaire in government's employees. Then try to find the ideal solutions for these problems to reach the maximum level of security in Kuwait government entities. In this paper found that the information security and especially the intrusion detection system in Kuwait government needs to be more efficient by ensure that the organizations use the principles and criteria of using IDS and Cyber security. In the end of this paper there are some recommendations for the organization to improve their system security.
当今世界信息技术的飞速发展需要一种现代化的入侵检测系统来防止对系统的破坏或危害。电脑事故应变小组负责处理电脑系统中的电脑事故。在科威特政府机构可能会发现入侵检测系统的一些弱点,本研究通过在政府雇员中分发调查问卷来探讨这些问题。然后尝试为这些问题找到理想的解决方案,以达到科威特政府实体的最大安全水平。本文发现科威特政府的信息安全,特别是入侵检测系统需要通过确保组织使用入侵检测和网络安全的原则和标准来提高效率。在本文的最后,对企业如何提高系统安全性提出了一些建议。
{"title":"A Survey of Intrusion Detection System Using Case Study Kuwait Governments Entities","authors":"Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, Lulwa Ziad Al-Tayyar","doi":"10.1109/ACSAT.2014.14","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.14","url":null,"abstract":"The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a questionnaire in government's employees. Then try to find the ideal solutions for these problems to reach the maximum level of security in Kuwait government entities. In this paper found that the information security and especially the intrusion detection system in Kuwait government needs to be more efficient by ensure that the organizations use the principles and criteria of using IDS and Cyber security. In the end of this paper there are some recommendations for the organization to improve their system security.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2014 3rd International Conference on Advanced Computer Science Applications and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1