Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921989
Seraj Fayyad, Josef Noll
Having an effective security level for Embedded System (ES), helps a reliable and stable operation of this system. In order to identify, if the current security level for a given ES is effective or not, we need a proactive evaluation for this security level. The evaluation of the security level for ESs is not straightforward process, things like the heterogeneity among the components of ES complicate this process. One of the productive approaches, which overcame the complexity of evaluation for Security, Privacy and Dependability (SPD) is the Multi Metrics (MM). As most of SPD evaluation approaches, the MM approach bases on the experts knowledge for the basic evaluation. Regardless of its advantages, experts evaluation has some drawbacks, which foster the need for less experts-dependent evaluation. In this paper, we propose a framework for security measurability as a part of security, privacy and dependability evaluation. The security evaluation based on Multi Metric (MM) approach as being an effective approach for evaluations, thus, we call it MM framework. The art of evaluation investigated within MM framework, based also on systematic storing and retrieving of experts knowledge. Using MM framework, the administrator of the ES could evaluate and enhance the S-level of their system, without being an expert in security.
{"title":"A framework for measurability of security","authors":"Seraj Fayyad, Josef Noll","doi":"10.1109/IACS.2017.7921989","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921989","url":null,"abstract":"Having an effective security level for Embedded System (ES), helps a reliable and stable operation of this system. In order to identify, if the current security level for a given ES is effective or not, we need a proactive evaluation for this security level. The evaluation of the security level for ESs is not straightforward process, things like the heterogeneity among the components of ES complicate this process. One of the productive approaches, which overcame the complexity of evaluation for Security, Privacy and Dependability (SPD) is the Multi Metrics (MM). As most of SPD evaluation approaches, the MM approach bases on the experts knowledge for the basic evaluation. Regardless of its advantages, experts evaluation has some drawbacks, which foster the need for less experts-dependent evaluation. In this paper, we propose a framework for security measurability as a part of security, privacy and dependability evaluation. The security evaluation based on Multi Metric (MM) approach as being an effective approach for evaluations, thus, we call it MM framework. The art of evaluation investigated within MM framework, based also on systematic storing and retrieving of experts knowledge. Using MM framework, the administrator of the ES could evaluate and enhance the S-level of their system, without being an expert in security.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921969
Jalal Kiswani, Muhanna A. Muhanna, Abdullah Qusef
Enterprise information systems are being widely and extensively used in many business domains. In fact, some of these domains cannot survive in operations without depending heavily on such systems. Although several research studies have been performed that explored the importance of enterprise information systems, only a few have been focusing on an effective and efficient end-to-end method to design and develop such systems. This paper presents a proposed approach of using a metadata model to design and implement APIs that can be utilized and reused as separate libraries to build enterprise information systems more effectively and efficiently than the traditional approaches. Primarily results of validating the proposed approach show promising potentials in reducing the manual development time and effort by an average of 64%.
{"title":"Using metadata in optimizing the design and development of enterprise information systems","authors":"Jalal Kiswani, Muhanna A. Muhanna, Abdullah Qusef","doi":"10.1109/IACS.2017.7921969","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921969","url":null,"abstract":"Enterprise information systems are being widely and extensively used in many business domains. In fact, some of these domains cannot survive in operations without depending heavily on such systems. Although several research studies have been performed that explored the importance of enterprise information systems, only a few have been focusing on an effective and efficient end-to-end method to design and develop such systems. This paper presents a proposed approach of using a metadata model to design and implement APIs that can be utilized and reused as separate libraries to build enterprise information systems more effectively and efficiently than the traditional approaches. Primarily results of validating the proposed approach show promising potentials in reducing the manual development time and effort by an average of 64%.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921982
M. Khalil, S. Berber, K. Sowerby
A new method of analyzing the Asymptotic Bit Error Rate (ABER) performance of Bidirectional Amplify-and-Forward Multiple Relay (BAF-MR) networks is presented in this paper. The analytical expression of the average Signal-to-Noise Ratio (SNR) is derived using both of Arithmetic-Geometric Mean inequality (AGM) and Harmonic Mean (HM). The ABER results obtained from the AGM and HM are then compared to determine the more accurate ABER. All the analytical expressions are verified using simulation results.
{"title":"Comparison of Harmonic and Arithmetic-Geometric Mean inequality for performance analysis of relay networks","authors":"M. Khalil, S. Berber, K. Sowerby","doi":"10.1109/IACS.2017.7921982","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921982","url":null,"abstract":"A new method of analyzing the Asymptotic Bit Error Rate (ABER) performance of Bidirectional Amplify-and-Forward Multiple Relay (BAF-MR) networks is presented in this paper. The analytical expression of the average Signal-to-Noise Ratio (SNR) is derived using both of Arithmetic-Geometric Mean inequality (AGM) and Harmonic Mean (HM). The ABER results obtained from the AGM and HM are then compared to determine the more accurate ABER. All the analytical expressions are verified using simulation results.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921974
Salam Doumiati, H. Artail, K. Kabalan
In fluctuating mobile environments where operators have to confront the increasing demands of their subscribers, insufficient spectrum poses capacity limitations. This work studies the gain that cooperative multicast transmission provides when used to boost the data rate in Device-to-Device (D2D) communication, enabling data sharing among users. A multicast network combines the benefits of both a fixed cellular infrastructure and the flexibility of an ad hoc network. However, a challenging issue is the need to cluster devices in a way that yields good channel quality between the clusterhead and each one of the cluster members. In this paper, we propose a D2D clustering scheme that achieves the above goal and works within the confines of the LTE standard. Simulations conducted using Matlab show how direct communication within a group of devices, cluster, can improve the performance of a conventional cellular system.
{"title":"A framework for clustering LTE devices for implementing group D2D communication and multicast capability","authors":"Salam Doumiati, H. Artail, K. Kabalan","doi":"10.1109/IACS.2017.7921974","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921974","url":null,"abstract":"In fluctuating mobile environments where operators have to confront the increasing demands of their subscribers, insufficient spectrum poses capacity limitations. This work studies the gain that cooperative multicast transmission provides when used to boost the data rate in Device-to-Device (D2D) communication, enabling data sharing among users. A multicast network combines the benefits of both a fixed cellular infrastructure and the flexibility of an ad hoc network. However, a challenging issue is the need to cluster devices in a way that yields good channel quality between the clusterhead and each one of the cluster members. In this paper, we propose a D2D clustering scheme that achieves the above goal and works within the confines of the LTE standard. Simulations conducted using Matlab show how direct communication within a group of devices, cluster, can improve the performance of a conventional cellular system.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129090421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921970
Muhannad Quwaider
Intruder Detection is needed in order to monitor sensitive passages or gateways. These passages are usually existing in airports, police stations, government buildings, courts or even in special laboratories, like nuclear or chemical laboratories. For security or safety purposes, nobody is usually allowed to walk through these passages without permission and during the working hours. Video streaming monitoring systems are usually expensive in terms of data communication and data analysis, which may need an extra human subject analysis. In addition, to the scene limit of the camera visible area. In this paper we present real-time intruder detection mechanism using remote wireless sensor networks. Pair of wireless sensors are deployed in the monitored passage. In order to detect the motion of intruders, the proposed mechanism adopts the measured Received Signal Strength Indicator (RSSI) of the Radio Frequency (RF) signal between the deployed sensors. The results show that the RSSI of the received signal is reduced significantly when there are intruders in the passage and the amount of reduction depends on the number of intruders.
{"title":"Real-time intruder surveillance using low-cost remote wireless sensors","authors":"Muhannad Quwaider","doi":"10.1109/IACS.2017.7921970","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921970","url":null,"abstract":"Intruder Detection is needed in order to monitor sensitive passages or gateways. These passages are usually existing in airports, police stations, government buildings, courts or even in special laboratories, like nuclear or chemical laboratories. For security or safety purposes, nobody is usually allowed to walk through these passages without permission and during the working hours. Video streaming monitoring systems are usually expensive in terms of data communication and data analysis, which may need an extra human subject analysis. In addition, to the scene limit of the camera visible area. In this paper we present real-time intruder detection mechanism using remote wireless sensor networks. Pair of wireless sensors are deployed in the monitored passage. In order to detect the motion of intruders, the proposed mechanism adopts the measured Received Signal Strength Indicator (RSSI) of the Radio Frequency (RF) signal between the deployed sensors. The results show that the RSSI of the received signal is reduced significantly when there are intruders in the passage and the amount of reduction depends on the number of intruders.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921979
Emad Alnawafa, I. Marghescu
Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is considered as one of the most important protocols that are frequently used in the Wireless Sensor Network (WSN). Many protocols were developed to modify and improve the LEACH protocol. The multi-hop technique (MHT-LEACH) is one of these protocols, which appeared to improve the performance of the LEACH protocol. In this paper, an improved multi-hope technique (IMHT-LEACH) is proposed. Instead of distributing all the Cluster Heads (CHs) into two levels as in the MHT-LEACH, the IMHT-LEACH distributes all the CHs into a number of levels. It suggests a new technique to route the data to the Base Station (BS) through the levels. Simulation results indicate that the IMHT-LEACH improves the lifetime, stability and throughput of the WSN comparing with the conventional LEACH and the MHT-LEACH protocols.
{"title":"IMHT: Improved MHT-LEACH protocol for wireless sensor networks","authors":"Emad Alnawafa, I. Marghescu","doi":"10.1109/IACS.2017.7921979","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921979","url":null,"abstract":"Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is considered as one of the most important protocols that are frequently used in the Wireless Sensor Network (WSN). Many protocols were developed to modify and improve the LEACH protocol. The multi-hop technique (MHT-LEACH) is one of these protocols, which appeared to improve the performance of the LEACH protocol. In this paper, an improved multi-hope technique (IMHT-LEACH) is proposed. Instead of distributing all the Cluster Heads (CHs) into two levels as in the MHT-LEACH, the IMHT-LEACH distributes all the CHs into a number of levels. It suggests a new technique to route the data to the Base Station (BS) through the levels. Simulation results indicate that the IMHT-LEACH improves the lifetime, stability and throughput of the WSN comparing with the conventional LEACH and the MHT-LEACH protocols.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116079044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921952
Mohammad Alhaj, Kavya Mallur, B. Stepien, L. Peyton
Business Process Management (BPM) is used to move existing paper-based business processes into online in order to improve the quality of provided services and reduce the operational costs. A typical approach of BPM focuses on implementing the online business process and neglect validating the improvement of quality the new process in terms of defined business goals. It is desirable to detect and anticipate any deficiencies in meeting business goals at the early stages of business process development where corrective actions can be more easily made. In this paper, we propose a model-based approach for developing and providing quality assurance of online business processes. The approach measures the performance of online business processes as they are being developed. It also provides a repeatable, systematic, cost-efficient approach to quality assurance using a testing workbench with a suite of testing tools. The approach prototype is evaluated using a hospital case study developed in collaboration with a hospital in Canada to develop an online business process for cancer patients' assessment.
{"title":"Towards a model-based approach for developing and QA of online business processes","authors":"Mohammad Alhaj, Kavya Mallur, B. Stepien, L. Peyton","doi":"10.1109/IACS.2017.7921952","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921952","url":null,"abstract":"Business Process Management (BPM) is used to move existing paper-based business processes into online in order to improve the quality of provided services and reduce the operational costs. A typical approach of BPM focuses on implementing the online business process and neglect validating the improvement of quality the new process in terms of defined business goals. It is desirable to detect and anticipate any deficiencies in meeting business goals at the early stages of business process development where corrective actions can be more easily made. In this paper, we propose a model-based approach for developing and providing quality assurance of online business processes. The approach measures the performance of online business processes as they are being developed. It also provides a repeatable, systematic, cost-efficient approach to quality assurance using a testing workbench with a suite of testing tools. The approach prototype is evaluated using a hospital case study developed in collaboration with a hospital in Canada to develop an online business process for cancer patients' assessment.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"35 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921957
Nabin Kharel, A. Alsadoon, P. Prasad, A. Elchouemi
The main aim of this paper is to enhance using hybrid solution for early diagnosis of breast cancer using mammogram images. For the CAD system for any image processing system follows mainly four steps that is image pre processing, segmentation, features extraction and classification and evaluation. For this research purpose follows the same structure using best possible methods in each stage found in literature review and proposed solution. From the experiment hybrid image enhancement method using CLAHE and Morphology method helps to enhance image for further computation in CAD system to early diagnosis of breast cancer using mammogram images while maintaining processing time as previous best solution. From the study depict that the purposed solution can help to enhance mammogram images for the further processing for segmentation, feature extraction and classification. However, further testing and implementation of proper classification method needed for before clinical use.
{"title":"Early diagnosis of breast cancer using contrast limited adaptive histogram equalization (CLAHE) and Morphology methods","authors":"Nabin Kharel, A. Alsadoon, P. Prasad, A. Elchouemi","doi":"10.1109/IACS.2017.7921957","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921957","url":null,"abstract":"The main aim of this paper is to enhance using hybrid solution for early diagnosis of breast cancer using mammogram images. For the CAD system for any image processing system follows mainly four steps that is image pre processing, segmentation, features extraction and classification and evaluation. For this research purpose follows the same structure using best possible methods in each stage found in literature review and proposed solution. From the experiment hybrid image enhancement method using CLAHE and Morphology method helps to enhance image for further computation in CAD system to early diagnosis of breast cancer using mammogram images while maintaining processing time as previous best solution. From the study depict that the purposed solution can help to enhance mammogram images for the further processing for segmentation, feature extraction and classification. However, further testing and implementation of proper classification method needed for before clinical use.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123635101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921963
Oumayma Banouar, S. Raghay
Current information systems provide transparent access to multiple, distributed, autonomous and potentially redundant data sources based on a mediation architecture. Their users may not know the sources they questioned, nor their description and content. Consequently, their queries reflect no more a need that must be satisfied but an intention that must be refined based on data sources available at the time of interrogation. The purpose of the personalization is to facilitate the expression of users' needs. It allows them to obtain relevant information by maximizing the exploitation of their preferences grouped in their respective profiles. Our work aims to extend the users queries by extending the research field using ontologies. In a mediation architecture context, founded on the couple mediator-adapter, our process must consider not only the users' profiles but also the semantic description of data sources defined by mediation requests. The mediator solves the problems associated with heterogeneity while adapters describe the available data sources. The users express their requests in terms of a global schema when the system evaluates them over multiple data sources with different structure and content. Each data source is modeled using a local ontology when the global schema is obtained via a global one. The use of an adequate process of ontology alignment will allow us to increase the recall (retrieved information) and the precision or accuracy (relevant information) of our integration system. This article is a comparative study of the existing works that attempt to establish matching and alignment between ontologies. It presents their capabilities in terms of information retrieval metrics namely: precision, recall and F-measure. It highlights then their strength and week points. In addition, it presents the massive role of machine learning techniques to insure the interoperability over large-scale ontologies.
{"title":"Personalized information retrieval through alignment of ontologies: State of art","authors":"Oumayma Banouar, S. Raghay","doi":"10.1109/IACS.2017.7921963","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921963","url":null,"abstract":"Current information systems provide transparent access to multiple, distributed, autonomous and potentially redundant data sources based on a mediation architecture. Their users may not know the sources they questioned, nor their description and content. Consequently, their queries reflect no more a need that must be satisfied but an intention that must be refined based on data sources available at the time of interrogation. The purpose of the personalization is to facilitate the expression of users' needs. It allows them to obtain relevant information by maximizing the exploitation of their preferences grouped in their respective profiles. Our work aims to extend the users queries by extending the research field using ontologies. In a mediation architecture context, founded on the couple mediator-adapter, our process must consider not only the users' profiles but also the semantic description of data sources defined by mediation requests. The mediator solves the problems associated with heterogeneity while adapters describe the available data sources. The users express their requests in terms of a global schema when the system evaluates them over multiple data sources with different structure and content. Each data source is modeled using a local ontology when the global schema is obtained via a global one. The use of an adequate process of ontology alignment will allow us to increase the recall (retrieved information) and the precision or accuracy (relevant information) of our integration system. This article is a comparative study of the existing works that attempt to establish matching and alignment between ontologies. It presents their capabilities in terms of information retrieval metrics namely: precision, recall and F-measure. It highlights then their strength and week points. In addition, it presents the massive role of machine learning techniques to insure the interoperability over large-scale ontologies.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121940517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921968
Ahmad Hassanat, Eman Btoush, M. Abbadi, Bassam M. Al-Mahadeen, Mouhammd Al-Awadi, Khalil I. Mseidein, Amin M. Almseden, A. Tarawneh, M. B. Alhasanat, V. B. Surya Prasath, Fatimah A. Al-alem
Covering the face and all body parts, sometimes the only evidence to identify a person is their hand geometry, and not the whole hand-only two fingers (the index and the middle fingers) while showing the victory sign, as seen in many terrorists videos. This paper investigates for the first time a new way to identify persons, particularly (terrorists) from their victory sign. We have created a new database in this regard using a mobile phone camera, imaging the victory signs of 50 different persons over two sessions. Simple measurements for the fingers, in addition to the Hu Moments for the areas of the fingers were used to extract the geometric features of the shown part of the hand shown after segmentation. The experimental results using the KNN classifier with three different distance metrics were encouraging for most of the recorded persons; with about 40% to 93% total identification accuracy, depending on the features, distance metric and K used.
{"title":"Victory sign biometrie for terrorists identification: Preliminary results","authors":"Ahmad Hassanat, Eman Btoush, M. Abbadi, Bassam M. Al-Mahadeen, Mouhammd Al-Awadi, Khalil I. Mseidein, Amin M. Almseden, A. Tarawneh, M. B. Alhasanat, V. B. Surya Prasath, Fatimah A. Al-alem","doi":"10.1109/IACS.2017.7921968","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921968","url":null,"abstract":"Covering the face and all body parts, sometimes the only evidence to identify a person is their hand geometry, and not the whole hand-only two fingers (the index and the middle fingers) while showing the victory sign, as seen in many terrorists videos. This paper investigates for the first time a new way to identify persons, particularly (terrorists) from their victory sign. We have created a new database in this regard using a mobile phone camera, imaging the victory signs of 50 different persons over two sessions. Simple measurements for the fingers, in addition to the Hu Moments for the areas of the fingers were used to extract the geometric features of the shown part of the hand shown after segmentation. The experimental results using the KNN classifier with three different distance metrics were encouraging for most of the recorded persons; with about 40% to 93% total identification accuracy, depending on the features, distance metric and K used.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}