首页 > 最新文献

2014 3rd International Conference on Advanced Computer Science Applications and Technologies最新文献

英文 中文
Hiding Message in Color Image Using Auto Key Generator 隐藏信息在彩色图像使用自动密钥生成器
Q. M. Hussein
This paper suggests a new method for hidden secret message text in a RGB 24-bit color image. The positions of hidden text are selected randomly using auto key generator. The auto key is generated by selected three bytes from image each time, and then deposits these pixels to the main components Red, Green and Blue bytes. The values of least significant bits (LSB) from red color bytes are used to configure a binary number. The binary number determines the hidden position of message text bit in either LSB of green or blue color in the selected bytes, depending on specific criteria. After implementing this method on different images, it was founded easy to implement, high security, and difficulty of detection. The values of some metrics used to measure the efficiency of the proposed method are well. Also, there is no difference between the images before and after the information hiding which detect with human eye perception.
提出了一种在RGB 24位彩色图像中隐藏秘密信息文本的新方法。使用自动密钥生成器随机选择隐藏文本的位置。每次从图像中选择三个字节生成自动密钥,然后将这些像素存入主要组件红、绿、蓝字节。红色字节中的最低有效位(LSB)值用于配置二进制数。二进制数根据特定的标准确定所选字节中消息文本位在绿色或蓝色LSB中的隐藏位置。在不同的图像上实现后,发现该方法易于实现,安全性高,检测难度大。用于衡量所提出方法效率的一些指标的值是良好的。人眼感知检测到的信息隐藏前后的图像也没有差异。
{"title":"Hiding Message in Color Image Using Auto Key Generator","authors":"Q. M. Hussein","doi":"10.1109/ACSAT.2014.33","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.33","url":null,"abstract":"This paper suggests a new method for hidden secret message text in a RGB 24-bit color image. The positions of hidden text are selected randomly using auto key generator. The auto key is generated by selected three bytes from image each time, and then deposits these pixels to the main components Red, Green and Blue bytes. The values of least significant bits (LSB) from red color bytes are used to configure a binary number. The binary number determines the hidden position of message text bit in either LSB of green or blue color in the selected bytes, depending on specific criteria. After implementing this method on different images, it was founded easy to implement, high security, and difficulty of detection. The values of some metrics used to measure the efficiency of the proposed method are well. Also, there is no difference between the images before and after the information hiding which detect with human eye perception.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software Process Improvement Initiatives in Small and Medium Firms: A Systematic Review 中小企业的软件过程改进计划:系统回顾
M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh
Nowadays, software firms are playing very important roles in economies all over the world, and majority of these firms are Small and Medium Enterprises (SMEs). The SMEs recognize that it is important to improve their development processes and activities in order to produce software with high quality and to be competitive in the software industry. However, several studies have shown that the SMEs used ad-hoc manner in their development processes and they suffer from lack of the knowledge and resources to do Software Process Improvement (SPI). In this paper, a Systematic Literature Review (SLR) is used to identify and discuss the SPI initiatives in SME software firms. The results of the systematic review showed that the majority of software process improvement initiatives in SME firms are carried out in America and Europe. Only in one Asian country, Hong Kong was the SPI initiative considered and CMM Fast-Track was the model developed. The developed model did not cover all the CMM levels, only levels 1 and 2 were considered. In conclusion, many Software Process Improvement initiatives have been proposed for SME software firms but they have shortcomings such as lack of generalizability and take a lot of time to gain the benefits/advantage of the SPI model after implementation.
如今,软件公司在世界各地的经济中扮演着非常重要的角色,这些公司中的大多数是中小型企业(SMEs)。中小企业认识到,为了生产高质量的软件并在软件业中具有竞争力,改进其开发过程和活动是非常重要的。然而,一些研究表明,中小企业在其开发过程中使用临时方式,他们缺乏知识和资源来进行软件过程改进(SPI)。本文采用系统文献综述(SLR)的方法来识别和讨论中小企业软件企业的SPI举措。系统回顾的结果表明,大多数中小企业的软件过程改进计划是在美国和欧洲进行的。只有在一个亚洲国家,香港考虑了SPI倡议,并开发了CMM快速通道模型。所开发的模型没有覆盖CMM的所有级别,只考虑了级别1和级别2。总之,许多软件过程改进计划已经为中小企业软件公司提出,但它们有缺点,例如缺乏通用性,并且在实施后需要花费大量时间才能获得SPI模型的好处/优势。
{"title":"Software Process Improvement Initiatives in Small and Medium Firms: A Systematic Review","authors":"M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh","doi":"10.1109/ACSAT.2014.35","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.35","url":null,"abstract":"Nowadays, software firms are playing very important roles in economies all over the world, and majority of these firms are Small and Medium Enterprises (SMEs). The SMEs recognize that it is important to improve their development processes and activities in order to produce software with high quality and to be competitive in the software industry. However, several studies have shown that the SMEs used ad-hoc manner in their development processes and they suffer from lack of the knowledge and resources to do Software Process Improvement (SPI). In this paper, a Systematic Literature Review (SLR) is used to identify and discuss the SPI initiatives in SME software firms. The results of the systematic review showed that the majority of software process improvement initiatives in SME firms are carried out in America and Europe. Only in one Asian country, Hong Kong was the SPI initiative considered and CMM Fast-Track was the model developed. The developed model did not cover all the CMM levels, only levels 1 and 2 were considered. In conclusion, many Software Process Improvement initiatives have been proposed for SME software firms but they have shortcomings such as lack of generalizability and take a lot of time to gain the benefits/advantage of the SPI model after implementation.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods 基于特征选择方法的电子邮件分类属性评估实验研究
Issa Qabajeh, F. Thabtah
Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.
电子邮件网络钓鱼分类是网络安全研究领域的重要问题之一,由于其对用户日常在线支付的影响,吸引了众多学者的关注。检测算法在邮件网络钓鱼问题中达到良好性能的一个方面是识别对提高网络钓鱼检测率有显著影响的最小特征集。本文研究了针对电子邮件网络钓鱼问题的信息增益(Information Gain, IG)、卡方(Chi-square)和相关特征集(Correlation Features Set, CFS)三种已知的特征选择方法,在网络钓鱼检测中分离高影响特征和低影响特征。我们通过在大量特征上应用四种数据挖掘算法来衡量影响程度。我们比较了这些算法在应用特征选择之前和应用特征选择之后在完整特征集上的准确性。实验结果表明,通过特征选择方法,在考虑的特征中选出了12个共同的显著特征。此外,与从47个特征集获得的平均检测精度相比,数据挖掘算法在减少的12个特征集上获得的平均检测精度受到很小的影响。
{"title":"An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods","authors":"Issa Qabajeh, F. Thabtah","doi":"10.1109/ACSAT.2014.29","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.29","url":null,"abstract":"Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128760819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Arabic-Malay Cognates as a Computer Assisted Language Learning 计算机辅助语言学习的阿拉伯-马来语同源词
R. Shehab, A. Zeki
This paper aims to build an Arabic WEB-based learning system for Malaysian learners focusing on cognate words in the Arabic language and Malay language. This paper focuses only on the highlighted cognates in the lessons interface in the WEB-based system. The paper starts by the importance of Computer-Assisted Language Learning (CALL), benefits of using cognates in leaning a foreign language, and the bower of highlighting vocabulary strategy in language learning. Finally, the paper concluded by the technical details of building the present WEB-based system.
本文旨在为马来西亚学习者建立一个以阿拉伯语和马来语同源词为重点的阿拉伯语网络学习系统。本文只关注基于web系统的课程界面中突出的同源词。本文从计算机辅助语言学习的重要性、使用同源词在外语学习中的好处、突出词汇策略在语言学习中的重要性入手。最后,通过构建基于web的系统的技术细节对论文进行了总结。
{"title":"Arabic-Malay Cognates as a Computer Assisted Language Learning","authors":"R. Shehab, A. Zeki","doi":"10.1109/ACSAT.2014.39","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.39","url":null,"abstract":"This paper aims to build an Arabic WEB-based learning system for Malaysian learners focusing on cognate words in the Arabic language and Malay language. This paper focuses only on the highlighted cognates in the lessons interface in the WEB-based system. The paper starts by the importance of Computer-Assisted Language Learning (CALL), benefits of using cognates in leaning a foreign language, and the bower of highlighting vocabulary strategy in language learning. Finally, the paper concluded by the technical details of building the present WEB-based system.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 3rd International Conference on Advanced Computer Science Applications and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1