Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300053
Chintakindi Balaram Murthy, Mohammad Farukh Hashmi
Autonomous pedestrian detection plays a vital role in Computer Vision tasks such as smart video surveillance, smart traffic monitoring system and smart obstacle detections for building smart cities. Real-time performance is much required in self-driving cars particularly while detecting smaller pedestrians without losing any detection accuracy. The proposed paper introduces an anti-residual module in the robust Enhanced YOLOv3+ network to improve feature extraction. The proposed network is optimized by reducing bounding box loss error. This network is trained on Pascal VOC-2007+ 12 dataset, only on the extracted pedestrian images. Experimental results show this network achieves 79.86% detection accuracy while detecting smaller pedestrians and still meets the real-time requirements.
{"title":"Real Time Pedestrian Detection Using Robust Enhanced YOLOv3+","authors":"Chintakindi Balaram Murthy, Mohammad Farukh Hashmi","doi":"10.1109/ACIT50332.2020.9300053","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300053","url":null,"abstract":"Autonomous pedestrian detection plays a vital role in Computer Vision tasks such as smart video surveillance, smart traffic monitoring system and smart obstacle detections for building smart cities. Real-time performance is much required in self-driving cars particularly while detecting smaller pedestrians without losing any detection accuracy. The proposed paper introduces an anti-residual module in the robust Enhanced YOLOv3+ network to improve feature extraction. The proposed network is optimized by reducing bounding box loss error. This network is trained on Pascal VOC-2007+ 12 dataset, only on the extracted pedestrian images. Experimental results show this network achieves 79.86% detection accuracy while detecting smaller pedestrians and still meets the real-time requirements.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300118
R. R. K. AL-Taie, Hiba A. Abu-Alsaad
The wide use of communication between computers and mobiles become mandatory in our day to day operations. Java enabled two different machines to communicate securely and exchange all kinds of information with the help of certain technologies. Remote Method Invocation (RMI) API is one of the most used interfaces in many applications that require communicating between two machines also in cloud processing. This paper investigates the encryption algorithms which are used with the RMI to ensure security on the transmitted data or objects. Specifically, Advanced Encryption Standards (AES) and Data Encryption Standards (DES) algorithms are applied to this experiment. This paper will also explore the differences between both algorithms with the RMI API. Furthermore, a comparison between the AES and DES algorithms in RMI usage is presented.
{"title":"Application of Encryption Algorithms with RMI Protocol","authors":"R. R. K. AL-Taie, Hiba A. Abu-Alsaad","doi":"10.1109/ACIT50332.2020.9300118","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300118","url":null,"abstract":"The wide use of communication between computers and mobiles become mandatory in our day to day operations. Java enabled two different machines to communicate securely and exchange all kinds of information with the help of certain technologies. Remote Method Invocation (RMI) API is one of the most used interfaces in many applications that require communicating between two machines also in cloud processing. This paper investigates the encryption algorithms which are used with the RMI to ensure security on the transmitted data or objects. Specifically, Advanced Encryption Standards (AES) and Data Encryption Standards (DES) algorithms are applied to this experiment. This paper will also explore the differences between both algorithms with the RMI API. Furthermore, a comparison between the AES and DES algorithms in RMI usage is presented.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115898407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300064
Sultan Badran, N. Arman, Mousa Farajallah
In light of the progress achieved by the technology sector in the areas of internet speed and cloud services development, and in addition to other advantages provided by the cloud such as reliability and easy access from anywhere and anytime, most data owners find an opportunity to take advantage of the cloud to store data. However, data owners find a challenge that was and is still facing them in the field of outsourcing, which is protecting sensitive data from leakage. Researchers found that partitioning data into partitions, based on data sensitivity, can be used to protect data from leakage and to increase performance by storing the partition, which contains sensitive data in an encrypted form. In this paper, we review the methods used in designing partitions and dividing data approaches. A hybrid data partitioning approach is proposed to improve these techniques. We consider the frequency attack types used to guess the sensitive data and the most important properties that must be available in order for the encryption to be strong against frequency attacks.
{"title":"Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing","authors":"Sultan Badran, N. Arman, Mousa Farajallah","doi":"10.1109/ACIT50332.2020.9300064","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300064","url":null,"abstract":"In light of the progress achieved by the technology sector in the areas of internet speed and cloud services development, and in addition to other advantages provided by the cloud such as reliability and easy access from anywhere and anytime, most data owners find an opportunity to take advantage of the cloud to store data. However, data owners find a challenge that was and is still facing them in the field of outsourcing, which is protecting sensitive data from leakage. Researchers found that partitioning data into partitions, based on data sensitivity, can be used to protect data from leakage and to increase performance by storing the partition, which contains sensitive data in an encrypted form. In this paper, we review the methods used in designing partitions and dividing data approaches. A hybrid data partitioning approach is proposed to improve these techniques. We consider the frequency attack types used to guess the sensitive data and the most important properties that must be available in order for the encryption to be strong against frequency attacks.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300105
Zouhaira Noubigh, Anis Mezghani, M. Kherallah
In recent years, the leveraging of deep learning approaches allows a great progress in text recognition task. But they usually need a considerable amount of training examples to learn a new model. Therefore, lack of data can be an issue when developing a new recognition model, especially for handwriting Arabic text recognition where the lack of databases is stilling an interested problem. In this context, the main contributions of this paper is based on transfer learning the parameters learned with a bigger mixed-fonts printed Arabic text database to handwriting one. Experiments shows the good improvement provide with this technique.
{"title":"Transfer Learning to improve Arabic handwriting text Recognition","authors":"Zouhaira Noubigh, Anis Mezghani, M. Kherallah","doi":"10.1109/ACIT50332.2020.9300105","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300105","url":null,"abstract":"In recent years, the leveraging of deep learning approaches allows a great progress in text recognition task. But they usually need a considerable amount of training examples to learn a new model. Therefore, lack of data can be an issue when developing a new recognition model, especially for handwriting Arabic text recognition where the lack of databases is stilling an interested problem. In this context, the main contributions of this paper is based on transfer learning the parameters learned with a bigger mixed-fonts printed Arabic text database to handwriting one. Experiments shows the good improvement provide with this technique.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300065
G. Samara
Energy Efficiency in wireless sensor networks is an important topic in which the nodes rely on battery power, and efficient energy usage is a key issue for sensitive applications that require long working times. This stimulates many scientists at all levels of communication protocols Medium Access Control (MAC) who control the use of the wireless transmitter and receiver unit to create new protocols. Many protocols were suggested that primarily take energy efficiency as the primary objective of sustaining the function of the network for as long as possible into account with different objectives for wireless sensor networks. This paper will look at some of these energy efficiency protocols.
{"title":"Wireless Sensor Network MAC Energy - efficiency Protocols: A Survey","authors":"G. Samara","doi":"10.1109/ACIT50332.2020.9300065","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300065","url":null,"abstract":"Energy Efficiency in wireless sensor networks is an important topic in which the nodes rely on battery power, and efficient energy usage is a key issue for sensitive applications that require long working times. This stimulates many scientists at all levels of communication protocols Medium Access Control (MAC) who control the use of the wireless transmitter and receiver unit to create new protocols. Many protocols were suggested that primarily take energy efficiency as the primary objective of sustaining the function of the network for as long as possible into account with different objectives for wireless sensor networks. This paper will look at some of these energy efficiency protocols.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300054
Marwah Alian, A. Awajan
Word sense disambiguation is the process of determining the proper meaning of a word according to its context. In this study, we represent the impact of word embedding on building Arabic sense inventory by an unsupervised approach. Three pre-trained embeddings are tested to investigate their effect on the resulting sense inventory and their efficiency in word sense disambiguation for Arabic context. Sense inventories are constructed using a fully unsupervised method based on graph-based word sense induction algorithm. The results show that Aravec-Twitter inventory achieves the best accuracy of 0.47 for 50-neighbors and a close accuracy to the Fasttext inventory for 200-neighbors.
{"title":"Sense Inventories for Arabic Texts","authors":"Marwah Alian, A. Awajan","doi":"10.1109/ACIT50332.2020.9300054","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300054","url":null,"abstract":"Word sense disambiguation is the process of determining the proper meaning of a word according to its context. In this study, we represent the impact of word embedding on building Arabic sense inventory by an unsupervised approach. Three pre-trained embeddings are tested to investigate their effect on the resulting sense inventory and their efficiency in word sense disambiguation for Arabic context. Sense inventories are constructed using a fully unsupervised method based on graph-based word sense induction algorithm. The results show that Aravec-Twitter inventory achieves the best accuracy of 0.47 for 50-neighbors and a close accuracy to the Fasttext inventory for 200-neighbors.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300095
Jawaher Abdulwahab Fadhil, Q. Sarhan
The technological revolution of the Internet of Things (IoT) increased the number of objects (e.g., vehicles) connected to the Internet, making our lives easier, safer, and smarter. Putting IoT objects on the wheel has created a new technology called the Internet of Vehicle (IoV). The massive progress in communication and computing concepts brought the IoV to real implementation. The IoV is the advanced version of Vehicular Ad hoc Network (VANET), mainly designed to provide safe driving. Although the number of vehicles connected to the IoV keeps growing, there are various challenges and opportunities of the IoV technology that are still not clear. In this paper, several research papers related to the IoV were examined to identify and categorize the existing challenges of implementing and employing IoV in urban cities. Furthermore, this work outlines the IoV technical limitations that must be addressed. Moreover, various existing and future solutions that tackle the identified challenges were briefly discussed.
{"title":"Internet of Vehicles (IoV): A Survey of Challenges and Solutions","authors":"Jawaher Abdulwahab Fadhil, Q. Sarhan","doi":"10.1109/ACIT50332.2020.9300095","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300095","url":null,"abstract":"The technological revolution of the Internet of Things (IoT) increased the number of objects (e.g., vehicles) connected to the Internet, making our lives easier, safer, and smarter. Putting IoT objects on the wheel has created a new technology called the Internet of Vehicle (IoV). The massive progress in communication and computing concepts brought the IoV to real implementation. The IoV is the advanced version of Vehicular Ad hoc Network (VANET), mainly designed to provide safe driving. Although the number of vehicles connected to the IoV keeps growing, there are various challenges and opportunities of the IoV technology that are still not clear. In this paper, several research papers related to the IoV were examined to identify and categorize the existing challenges of implementing and employing IoV in urban cities. Furthermore, this work outlines the IoV technical limitations that must be addressed. Moreover, various existing and future solutions that tackle the identified challenges were briefly discussed.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117280357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9299967
Abdelsalam M. Maatuk, T. Abdelaziz, Muhammad Akhtar Ali
This paper aims to devise a method for migrating a relational database (RDB) into an XML document. Database migration is concerned with the process of converting schema and data from a source RDB, as a one-time conversion, into a target XML database to be managed and handled in its new environment. The source schema is enriched semantically and translated into a target schema, and the data stored in the source database is converted into a target database based on the new schema. The semantic enrichment process is requisite to produce an enhanced metadata model from the source database and captures essential characteristics of target XML schema, and suitable for converting RDB data into an XML document. Algorithms are developed for producing the target database according to a set of migration rules to translate all constructs of an RDB into an XML Schema, based on which RDB data is then converted. A prototype system has been implemented and empirically evaluated by testing its results, looking at our achievements and reflecting on the results. From the evaluation of results, it is concluded that the proposed solution is efficient and correct.
{"title":"Migrating Relational Databases into XML Documents","authors":"Abdelsalam M. Maatuk, T. Abdelaziz, Muhammad Akhtar Ali","doi":"10.1109/ACIT50332.2020.9299967","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9299967","url":null,"abstract":"This paper aims to devise a method for migrating a relational database (RDB) into an XML document. Database migration is concerned with the process of converting schema and data from a source RDB, as a one-time conversion, into a target XML database to be managed and handled in its new environment. The source schema is enriched semantically and translated into a target schema, and the data stored in the source database is converted into a target database based on the new schema. The semantic enrichment process is requisite to produce an enhanced metadata model from the source database and captures essential characteristics of target XML schema, and suitable for converting RDB data into an XML document. Algorithms are developed for producing the target database according to a set of migration rules to translate all constructs of an RDB into an XML Schema, based on which RDB data is then converted. A prototype system has been implemented and empirically evaluated by testing its results, looking at our achievements and reflecting on the results. From the evaluation of results, it is concluded that the proposed solution is efficient and correct.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300119
Taghrid Z. Ali, T. Abdelaziz, Abdelsalam M. Maatuk, Salwa M. Elakeili
Nowadays, the development of data warehouses shows the importance of data quality in business success. Data warehouse projects fail for many reasons, one of which is the low quality of data. High-quality data achievement in data warehouses is a persistent challenge. Data cleaning aims at finding, correcting data errors and inconsistencies. This paper presents a general framework for the implementation of data cleaning according to the scientific principles followed in the data warehouse field, where the framework offers guidelines that define and facilitate the implementation of the data cleaning process to the enterprises interested in the data warehouse field. The research methodology used in this study is qualitative research, in which the data are collected through system analyst interviews. The study concluded that the low level of data quality is an obstacle to any progress in the implementation of modern technological projects, where data quality is a prerequisite for the success of its business, including the data warehouse.
{"title":"A Framework for Improving Data Quality in Data Warehouse: A Case Study","authors":"Taghrid Z. Ali, T. Abdelaziz, Abdelsalam M. Maatuk, Salwa M. Elakeili","doi":"10.1109/ACIT50332.2020.9300119","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300119","url":null,"abstract":"Nowadays, the development of data warehouses shows the importance of data quality in business success. Data warehouse projects fail for many reasons, one of which is the low quality of data. High-quality data achievement in data warehouses is a persistent challenge. Data cleaning aims at finding, correcting data errors and inconsistencies. This paper presents a general framework for the implementation of data cleaning according to the scientific principles followed in the data warehouse field, where the framework offers guidelines that define and facilitate the implementation of the data cleaning process to the enterprises interested in the data warehouse field. The research methodology used in this study is qualitative research, in which the data are collected through system analyst interviews. The study concluded that the low level of data quality is an obstacle to any progress in the implementation of modern technological projects, where data quality is a prerequisite for the success of its business, including the data warehouse.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122520604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300120
B. Athamena, Z. Houhamdi, Ghaleb A. El Refae
Everyday people make several decisions. The key feature for selecting the best decision is that people possess sufficient information about the outcomes of possible choices. Nevertheless, the investigation and analysis of all outcomes of all possible choices is a complex and expensive task. Accordingly, people lack all appropriate information for making a decision. This paper addresses model in which an agent has to make a decides on behalf of the manager. An important feature in the model is partial and asymmetric information. Generally, the model is separated into two parts. The first part deals with the situation where the manager is better informed than the agent, and the second part, which is the main focus of this study, deals with the situation where the agent is better informed than the manager. Thus, the agent makes a decision about a project. Frequently, an agent does not behave in the interest of the manager. This paper analyzes how the manager makes use of a retention contract to dismiss or to retain the agent.
{"title":"Managing Moral Hazard Impact in Decision Making Process","authors":"B. Athamena, Z. Houhamdi, Ghaleb A. El Refae","doi":"10.1109/ACIT50332.2020.9300120","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300120","url":null,"abstract":"Everyday people make several decisions. The key feature for selecting the best decision is that people possess sufficient information about the outcomes of possible choices. Nevertheless, the investigation and analysis of all outcomes of all possible choices is a complex and expensive task. Accordingly, people lack all appropriate information for making a decision. This paper addresses model in which an agent has to make a decides on behalf of the manager. An important feature in the model is partial and asymmetric information. Generally, the model is separated into two parts. The first part deals with the situation where the manager is better informed than the agent, and the second part, which is the main focus of this study, deals with the situation where the agent is better informed than the manager. Thus, the agent makes a decision about a project. Frequently, an agent does not behave in the interest of the manager. This paper analyzes how the manager makes use of a retention contract to dismiss or to retain the agent.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}