首页 > 最新文献

2020 21st International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
Real Time Pedestrian Detection Using Robust Enhanced YOLOv3+ 实时行人检测使用鲁棒增强YOLOv3+
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300053
Chintakindi Balaram Murthy, Mohammad Farukh Hashmi
Autonomous pedestrian detection plays a vital role in Computer Vision tasks such as smart video surveillance, smart traffic monitoring system and smart obstacle detections for building smart cities. Real-time performance is much required in self-driving cars particularly while detecting smaller pedestrians without losing any detection accuracy. The proposed paper introduces an anti-residual module in the robust Enhanced YOLOv3+ network to improve feature extraction. The proposed network is optimized by reducing bounding box loss error. This network is trained on Pascal VOC-2007+ 12 dataset, only on the extracted pedestrian images. Experimental results show this network achieves 79.86% detection accuracy while detecting smaller pedestrians and still meets the real-time requirements.
自动行人检测在智能视频监控、智能交通监控系统和智能障碍物检测等计算机视觉任务中发挥着至关重要的作用。自动驾驶汽车非常需要实时性能,特别是在检测较小的行人时,同时又不损失任何检测精度。本文在鲁棒增强YOLOv3+网络中引入了一个抗残差模块,以改进特征提取。通过减小边界盒损失误差对网络进行了优化。该网络在Pascal VOC-2007+ 12数据集上进行训练,仅在提取的行人图像上进行训练。实验结果表明,该网络在检测较小行人的情况下,检测准确率达到79.86%,仍能满足实时性要求。
{"title":"Real Time Pedestrian Detection Using Robust Enhanced YOLOv3+","authors":"Chintakindi Balaram Murthy, Mohammad Farukh Hashmi","doi":"10.1109/ACIT50332.2020.9300053","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300053","url":null,"abstract":"Autonomous pedestrian detection plays a vital role in Computer Vision tasks such as smart video surveillance, smart traffic monitoring system and smart obstacle detections for building smart cities. Real-time performance is much required in self-driving cars particularly while detecting smaller pedestrians without losing any detection accuracy. The proposed paper introduces an anti-residual module in the robust Enhanced YOLOv3+ network to improve feature extraction. The proposed network is optimized by reducing bounding box loss error. This network is trained on Pascal VOC-2007+ 12 dataset, only on the extracted pedestrian images. Experimental results show this network achieves 79.86% detection accuracy while detecting smaller pedestrians and still meets the real-time requirements.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Encryption Algorithms with RMI Protocol RMI协议下加密算法的应用
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300118
R. R. K. AL-Taie, Hiba A. Abu-Alsaad
The wide use of communication between computers and mobiles become mandatory in our day to day operations. Java enabled two different machines to communicate securely and exchange all kinds of information with the help of certain technologies. Remote Method Invocation (RMI) API is one of the most used interfaces in many applications that require communicating between two machines also in cloud processing. This paper investigates the encryption algorithms which are used with the RMI to ensure security on the transmitted data or objects. Specifically, Advanced Encryption Standards (AES) and Data Encryption Standards (DES) algorithms are applied to this experiment. This paper will also explore the differences between both algorithms with the RMI API. Furthermore, a comparison between the AES and DES algorithms in RMI usage is presented.
在我们的日常工作中,广泛使用电脑和手机之间的通信变得必不可少。Java使两台不同的机器能够在某些技术的帮助下安全地通信并交换各种信息。远程方法调用(RMI) API是许多应用程序中最常用的接口之一,这些应用程序需要在云处理中的两台机器之间进行通信。本文研究了与RMI一起使用的加密算法,以确保传输数据或对象的安全性。具体来说,本实验采用了高级加密标准AES (Advanced Encryption Standards)和数据加密标准DES (Data Encryption Standards)算法。本文还将探讨两种算法与RMI API之间的差异。此外,还比较了AES和DES算法在RMI使用中的差异。
{"title":"Application of Encryption Algorithms with RMI Protocol","authors":"R. R. K. AL-Taie, Hiba A. Abu-Alsaad","doi":"10.1109/ACIT50332.2020.9300118","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300118","url":null,"abstract":"The wide use of communication between computers and mobiles become mandatory in our day to day operations. Java enabled two different machines to communicate securely and exchange all kinds of information with the help of certain technologies. Remote Method Invocation (RMI) API is one of the most used interfaces in many applications that require communicating between two machines also in cloud processing. This paper investigates the encryption algorithms which are used with the RMI to ensure security on the transmitted data or objects. Specifically, Advanced Encryption Standards (AES) and Data Encryption Standards (DES) algorithms are applied to this experiment. This paper will also explore the differences between both algorithms with the RMI API. Furthermore, a comparison between the AES and DES algorithms in RMI usage is presented.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115898407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing 面向安全数据外包的混合数据分区技术研究
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300064
Sultan Badran, N. Arman, Mousa Farajallah
In light of the progress achieved by the technology sector in the areas of internet speed and cloud services development, and in addition to other advantages provided by the cloud such as reliability and easy access from anywhere and anytime, most data owners find an opportunity to take advantage of the cloud to store data. However, data owners find a challenge that was and is still facing them in the field of outsourcing, which is protecting sensitive data from leakage. Researchers found that partitioning data into partitions, based on data sensitivity, can be used to protect data from leakage and to increase performance by storing the partition, which contains sensitive data in an encrypted form. In this paper, we review the methods used in designing partitions and dividing data approaches. A hybrid data partitioning approach is proposed to improve these techniques. We consider the frequency attack types used to guess the sensitive data and the most important properties that must be available in order for the encryption to be strong against frequency attacks.
鉴于技术部门在互联网速度和云服务发展方面取得的进展,以及云提供的其他优势,如可靠性和随时随地方便访问,大多数数据所有者都发现了利用云存储数据的机会。然而,数据所有者发现,在外包领域,保护敏感数据免遭泄露是他们过去和现在仍然面临的挑战。研究人员发现,基于数据敏感性将数据划分为多个分区,可用于保护数据免受泄漏,并通过以加密形式存储包含敏感数据的分区来提高性能。在本文中,我们回顾了用于设计分区和划分数据方法的方法。提出了一种混合数据划分方法来改进这些技术。我们考虑了用于猜测敏感数据的频率攻击类型和最重要的属性,这些属性必须可用,以便加密能够抵御频率攻击。
{"title":"Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing","authors":"Sultan Badran, N. Arman, Mousa Farajallah","doi":"10.1109/ACIT50332.2020.9300064","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300064","url":null,"abstract":"In light of the progress achieved by the technology sector in the areas of internet speed and cloud services development, and in addition to other advantages provided by the cloud such as reliability and easy access from anywhere and anytime, most data owners find an opportunity to take advantage of the cloud to store data. However, data owners find a challenge that was and is still facing them in the field of outsourcing, which is protecting sensitive data from leakage. Researchers found that partitioning data into partitions, based on data sensitivity, can be used to protect data from leakage and to increase performance by storing the partition, which contains sensitive data in an encrypted form. In this paper, we review the methods used in designing partitions and dividing data approaches. A hybrid data partitioning approach is proposed to improve these techniques. We consider the frequency attack types used to guess the sensitive data and the most important properties that must be available in order for the encryption to be strong against frequency attacks.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transfer Learning to improve Arabic handwriting text Recognition 迁移学习提高阿拉伯语手写文本识别
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300105
Zouhaira Noubigh, Anis Mezghani, M. Kherallah
In recent years, the leveraging of deep learning approaches allows a great progress in text recognition task. But they usually need a considerable amount of training examples to learn a new model. Therefore, lack of data can be an issue when developing a new recognition model, especially for handwriting Arabic text recognition where the lack of databases is stilling an interested problem. In this context, the main contributions of this paper is based on transfer learning the parameters learned with a bigger mixed-fonts printed Arabic text database to handwriting one. Experiments shows the good improvement provide with this technique.
近年来,深度学习方法的利用使得文本识别任务取得了很大的进展。但是他们通常需要大量的训练样本来学习一个新的模型。因此,在开发新的识别模型时,缺乏数据可能是一个问题,特别是对于手写阿拉伯文本识别,其中缺乏数据库仍然是一个令人感兴趣的问题。在此背景下,本文的主要贡献是基于迁移学习的参数,从一个更大的混合字体印刷阿拉伯文本数据库学习到手写文本数据库。实验表明,该技术具有良好的改进效果。
{"title":"Transfer Learning to improve Arabic handwriting text Recognition","authors":"Zouhaira Noubigh, Anis Mezghani, M. Kherallah","doi":"10.1109/ACIT50332.2020.9300105","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300105","url":null,"abstract":"In recent years, the leveraging of deep learning approaches allows a great progress in text recognition task. But they usually need a considerable amount of training examples to learn a new model. Therefore, lack of data can be an issue when developing a new recognition model, especially for handwriting Arabic text recognition where the lack of databases is stilling an interested problem. In this context, the main contributions of this paper is based on transfer learning the parameters learned with a bigger mixed-fonts printed Arabic text database to handwriting one. Experiments shows the good improvement provide with this technique.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wireless Sensor Network MAC Energy - efficiency Protocols: A Survey 无线传感器网络MAC能效协议综述
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300065
G. Samara
Energy Efficiency in wireless sensor networks is an important topic in which the nodes rely on battery power, and efficient energy usage is a key issue for sensitive applications that require long working times. This stimulates many scientists at all levels of communication protocols Medium Access Control (MAC) who control the use of the wireless transmitter and receiver unit to create new protocols. Many protocols were suggested that primarily take energy efficiency as the primary objective of sustaining the function of the network for as long as possible into account with different objectives for wireless sensor networks. This paper will look at some of these energy efficiency protocols.
无线传感器网络中的能量效率是一个重要的课题,其中节点依赖于电池供电,对于需要长时间工作的敏感应用来说,有效的能量使用是一个关键问题。这就刺激了许多研究各级通信协议的媒体访问控制(MAC)的科学家们去创造新的协议,他们控制着无线发送和接收单元的使用。提出了许多协议,主要以能源效率为主要目标,以尽可能长时间地维持网络的功能,同时考虑到无线传感器网络的不同目标。本文将探讨其中一些能效协议。
{"title":"Wireless Sensor Network MAC Energy - efficiency Protocols: A Survey","authors":"G. Samara","doi":"10.1109/ACIT50332.2020.9300065","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300065","url":null,"abstract":"Energy Efficiency in wireless sensor networks is an important topic in which the nodes rely on battery power, and efficient energy usage is a key issue for sensitive applications that require long working times. This stimulates many scientists at all levels of communication protocols Medium Access Control (MAC) who control the use of the wireless transmitter and receiver unit to create new protocols. Many protocols were suggested that primarily take energy efficiency as the primary objective of sustaining the function of the network for as long as possible into account with different objectives for wireless sensor networks. This paper will look at some of these energy efficiency protocols.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Sense Inventories for Arabic Texts 阿拉伯语文本的感觉清单
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300054
Marwah Alian, A. Awajan
Word sense disambiguation is the process of determining the proper meaning of a word according to its context. In this study, we represent the impact of word embedding on building Arabic sense inventory by an unsupervised approach. Three pre-trained embeddings are tested to investigate their effect on the resulting sense inventory and their efficiency in word sense disambiguation for Arabic context. Sense inventories are constructed using a fully unsupervised method based on graph-based word sense induction algorithm. The results show that Aravec-Twitter inventory achieves the best accuracy of 0.47 for 50-neighbors and a close accuracy to the Fasttext inventory for 200-neighbors.
词义消歧是根据上下文确定一个词的正确意义的过程。在这项研究中,我们通过一种无监督的方法来描述词嵌入对建立阿拉伯语语义库的影响。测试了三个预训练的嵌入,以研究它们对产生的语义清单的影响以及它们在阿拉伯语上下文的词义消歧中的效率。使用基于基于图的词义归纳算法的完全无监督方法构建语义清单。结果表明,Aravec-Twitter清单在50个邻居的情况下达到了0.47的最佳精度,在200个邻居的情况下接近Fasttext清单的精度。
{"title":"Sense Inventories for Arabic Texts","authors":"Marwah Alian, A. Awajan","doi":"10.1109/ACIT50332.2020.9300054","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300054","url":null,"abstract":"Word sense disambiguation is the process of determining the proper meaning of a word according to its context. In this study, we represent the impact of word embedding on building Arabic sense inventory by an unsupervised approach. Three pre-trained embeddings are tested to investigate their effect on the resulting sense inventory and their efficiency in word sense disambiguation for Arabic context. Sense inventories are constructed using a fully unsupervised method based on graph-based word sense induction algorithm. The results show that Aravec-Twitter inventory achieves the best accuracy of 0.47 for 50-neighbors and a close accuracy to the Fasttext inventory for 200-neighbors.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Internet of Vehicles (IoV): A Survey of Challenges and Solutions 车联网(IoV):挑战与解决方案综述
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300095
Jawaher Abdulwahab Fadhil, Q. Sarhan
The technological revolution of the Internet of Things (IoT) increased the number of objects (e.g., vehicles) connected to the Internet, making our lives easier, safer, and smarter. Putting IoT objects on the wheel has created a new technology called the Internet of Vehicle (IoV). The massive progress in communication and computing concepts brought the IoV to real implementation. The IoV is the advanced version of Vehicular Ad hoc Network (VANET), mainly designed to provide safe driving. Although the number of vehicles connected to the IoV keeps growing, there are various challenges and opportunities of the IoV technology that are still not clear. In this paper, several research papers related to the IoV were examined to identify and categorize the existing challenges of implementing and employing IoV in urban cities. Furthermore, this work outlines the IoV technical limitations that must be addressed. Moreover, various existing and future solutions that tackle the identified challenges were briefly discussed.
物联网(IoT)的技术革命增加了连接到互联网的物体(例如车辆)的数量,使我们的生活更轻松,更安全,更智能。将物联网物体放在车轮上创造了一种称为车辆互联网(IoV)的新技术。通信和计算概念的巨大进步使车联网真正实现。IoV是车辆自组织网络(VANET)的高级版本,主要用于提供安全驾驶。虽然连接到车联网的车辆数量不断增长,但车联网技术面临的各种挑战和机遇仍然不明朗。在本文中,研究了几篇与车联网相关的研究论文,以确定和分类在城市中实施和使用车联网的现有挑战。此外,本工作概述了必须解决的车联网技术限制。此外,还简要讨论了解决已确定挑战的各种现有和未来解决方案。
{"title":"Internet of Vehicles (IoV): A Survey of Challenges and Solutions","authors":"Jawaher Abdulwahab Fadhil, Q. Sarhan","doi":"10.1109/ACIT50332.2020.9300095","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300095","url":null,"abstract":"The technological revolution of the Internet of Things (IoT) increased the number of objects (e.g., vehicles) connected to the Internet, making our lives easier, safer, and smarter. Putting IoT objects on the wheel has created a new technology called the Internet of Vehicle (IoV). The massive progress in communication and computing concepts brought the IoV to real implementation. The IoV is the advanced version of Vehicular Ad hoc Network (VANET), mainly designed to provide safe driving. Although the number of vehicles connected to the IoV keeps growing, there are various challenges and opportunities of the IoV technology that are still not clear. In this paper, several research papers related to the IoV were examined to identify and categorize the existing challenges of implementing and employing IoV in urban cities. Furthermore, this work outlines the IoV technical limitations that must be addressed. Moreover, various existing and future solutions that tackle the identified challenges were briefly discussed.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117280357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Migrating Relational Databases into XML Documents 将关系数据库迁移到XML文档
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9299967
Abdelsalam M. Maatuk, T. Abdelaziz, Muhammad Akhtar Ali
This paper aims to devise a method for migrating a relational database (RDB) into an XML document. Database migration is concerned with the process of converting schema and data from a source RDB, as a one-time conversion, into a target XML database to be managed and handled in its new environment. The source schema is enriched semantically and translated into a target schema, and the data stored in the source database is converted into a target database based on the new schema. The semantic enrichment process is requisite to produce an enhanced metadata model from the source database and captures essential characteristics of target XML schema, and suitable for converting RDB data into an XML document. Algorithms are developed for producing the target database according to a set of migration rules to translate all constructs of an RDB into an XML Schema, based on which RDB data is then converted. A prototype system has been implemented and empirically evaluated by testing its results, looking at our achievements and reflecting on the results. From the evaluation of results, it is concluded that the proposed solution is efficient and correct.
本文旨在设计一种将关系数据库(RDB)迁移到XML文档的方法。数据库迁移涉及将模式和数据从源RDB一次性转换为目标XML数据库的过程,以便在其新环境中进行管理和处理。源模式在语义上得到丰富并转换为目标模式,存储在源数据库中的数据基于新模式转换为目标数据库。语义充实过程对于从源数据库生成增强的元数据模型和捕获目标XML模式的基本特征是必需的,并且适合于将RDB数据转换为XML文档。为了根据一组迁移规则生成目标数据库,开发了一些算法,以便将RDB的所有构造转换为XML Schema,然后根据XML Schema转换RDB数据。原型系统已经实现,并通过测试其结果进行经验评估,查看我们的成就并反思结果。从结果的评价来看,所提出的解决方案是有效和正确的。
{"title":"Migrating Relational Databases into XML Documents","authors":"Abdelsalam M. Maatuk, T. Abdelaziz, Muhammad Akhtar Ali","doi":"10.1109/ACIT50332.2020.9299967","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9299967","url":null,"abstract":"This paper aims to devise a method for migrating a relational database (RDB) into an XML document. Database migration is concerned with the process of converting schema and data from a source RDB, as a one-time conversion, into a target XML database to be managed and handled in its new environment. The source schema is enriched semantically and translated into a target schema, and the data stored in the source database is converted into a target database based on the new schema. The semantic enrichment process is requisite to produce an enhanced metadata model from the source database and captures essential characteristics of target XML schema, and suitable for converting RDB data into an XML document. Algorithms are developed for producing the target database according to a set of migration rules to translate all constructs of an RDB into an XML Schema, based on which RDB data is then converted. A prototype system has been implemented and empirically evaluated by testing its results, looking at our achievements and reflecting on the results. From the evaluation of results, it is concluded that the proposed solution is efficient and correct.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Framework for Improving Data Quality in Data Warehouse: A Case Study 一个提高数据仓库数据质量的框架:一个案例研究
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300119
Taghrid Z. Ali, T. Abdelaziz, Abdelsalam M. Maatuk, Salwa M. Elakeili
Nowadays, the development of data warehouses shows the importance of data quality in business success. Data warehouse projects fail for many reasons, one of which is the low quality of data. High-quality data achievement in data warehouses is a persistent challenge. Data cleaning aims at finding, correcting data errors and inconsistencies. This paper presents a general framework for the implementation of data cleaning according to the scientific principles followed in the data warehouse field, where the framework offers guidelines that define and facilitate the implementation of the data cleaning process to the enterprises interested in the data warehouse field. The research methodology used in this study is qualitative research, in which the data are collected through system analyst interviews. The study concluded that the low level of data quality is an obstacle to any progress in the implementation of modern technological projects, where data quality is a prerequisite for the success of its business, including the data warehouse.
如今,数据仓库的发展表明了数据质量对业务成功的重要性。数据仓库项目失败的原因有很多,其中之一就是数据质量低。在数据仓库中实现高质量的数据是一个持久的挑战。数据清理的目的是发现和纠正数据错误和不一致。本文根据数据仓库领域所遵循的科学原则,提出了一个实现数据清理的通用框架,该框架为对数据仓库领域感兴趣的企业提供了定义和促进数据清理过程实现的指导方针。本研究使用的研究方法是定性研究,其中通过系统分析师访谈收集数据。该研究的结论是,低水平的数据质量阻碍了现代技术项目的实施,在这些项目中,数据质量是其业务(包括数据仓库)成功的先决条件。
{"title":"A Framework for Improving Data Quality in Data Warehouse: A Case Study","authors":"Taghrid Z. Ali, T. Abdelaziz, Abdelsalam M. Maatuk, Salwa M. Elakeili","doi":"10.1109/ACIT50332.2020.9300119","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300119","url":null,"abstract":"Nowadays, the development of data warehouses shows the importance of data quality in business success. Data warehouse projects fail for many reasons, one of which is the low quality of data. High-quality data achievement in data warehouses is a persistent challenge. Data cleaning aims at finding, correcting data errors and inconsistencies. This paper presents a general framework for the implementation of data cleaning according to the scientific principles followed in the data warehouse field, where the framework offers guidelines that define and facilitate the implementation of the data cleaning process to the enterprises interested in the data warehouse field. The research methodology used in this study is qualitative research, in which the data are collected through system analyst interviews. The study concluded that the low level of data quality is an obstacle to any progress in the implementation of modern technological projects, where data quality is a prerequisite for the success of its business, including the data warehouse.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122520604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Managing Moral Hazard Impact in Decision Making Process 管理决策过程中的道德风险影响
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300120
B. Athamena, Z. Houhamdi, Ghaleb A. El Refae
Everyday people make several decisions. The key feature for selecting the best decision is that people possess sufficient information about the outcomes of possible choices. Nevertheless, the investigation and analysis of all outcomes of all possible choices is a complex and expensive task. Accordingly, people lack all appropriate information for making a decision. This paper addresses model in which an agent has to make a decides on behalf of the manager. An important feature in the model is partial and asymmetric information. Generally, the model is separated into two parts. The first part deals with the situation where the manager is better informed than the agent, and the second part, which is the main focus of this study, deals with the situation where the agent is better informed than the manager. Thus, the agent makes a decision about a project. Frequently, an agent does not behave in the interest of the manager. This paper analyzes how the manager makes use of a retention contract to dismiss or to retain the agent.
人们每天都要做几个决定。选择最佳决策的关键特征是人们对可能选择的结果拥有足够的信息。然而,调查和分析所有可能选择的所有结果是一项复杂而昂贵的任务。因此,人们缺乏做出决定所需的所有适当信息。本文研究了代理人必须代表管理者做出决策的模型。该模型的一个重要特征是部分信息和不对称信息。一般来说,模型分为两部分。第一部分研究的是管理者比代理人了解更多信息的情况,第二部分研究的是代理人比管理者了解更多信息的情况,这也是本研究的主要重点。因此,代理对项目做出决策。通常,代理人的行为不符合经理的利益。本文分析了管理者如何利用保留合同来解雇或保留代理人。
{"title":"Managing Moral Hazard Impact in Decision Making Process","authors":"B. Athamena, Z. Houhamdi, Ghaleb A. El Refae","doi":"10.1109/ACIT50332.2020.9300120","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300120","url":null,"abstract":"Everyday people make several decisions. The key feature for selecting the best decision is that people possess sufficient information about the outcomes of possible choices. Nevertheless, the investigation and analysis of all outcomes of all possible choices is a complex and expensive task. Accordingly, people lack all appropriate information for making a decision. This paper addresses model in which an agent has to make a decides on behalf of the manager. An important feature in the model is partial and asymmetric information. Generally, the model is separated into two parts. The first part deals with the situation where the manager is better informed than the agent, and the second part, which is the main focus of this study, deals with the situation where the agent is better informed than the manager. Thus, the agent makes a decision about a project. Frequently, an agent does not behave in the interest of the manager. This paper analyzes how the manager makes use of a retention contract to dismiss or to retain the agent.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 21st International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1