Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809080
Mohammad Alshamaileh, Ahmad Hassanat, A. Tarawneh, M. Sohel Rahman, C. Celik, Moohanad Jawthari
Word-based writer identification and authentication have been under investigation for years. In this paper, we present a new Arabic online/offline handwriting dataset for writer authentication and identification. The created dataset includes two parts: AHWDB1 and AHWDB2 which are made freely available for the research community. Each part of the dataset consists of 2000 (10 trials X 200 writers) samples captured using HUAWEI MediaPad M3. Dynamic information such as pressure, timestamp and the coordinates(X, Y) have been collected and involved for both parts of the dataset. In addition, age, gender and education level have been added to the dataset for future investigation. Several experiments are conducted on the dataset. The preliminary identification results are obtained using K-Nearest Neighbor (KNN) with Dynamic time warping (DTW) and support vector machines (SVM). We recorded 81.35% identification rate as the best result using SVM classifier on AHWDB2.
{"title":"New Online/Offline text-dependent Arabic Handwriting dataset for Writer Authentication and Identification","authors":"Mohammad Alshamaileh, Ahmad Hassanat, A. Tarawneh, M. Sohel Rahman, C. Celik, Moohanad Jawthari","doi":"10.1109/IACS.2019.8809080","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809080","url":null,"abstract":"Word-based writer identification and authentication have been under investigation for years. In this paper, we present a new Arabic online/offline handwriting dataset for writer authentication and identification. The created dataset includes two parts: AHWDB1 and AHWDB2 which are made freely available for the research community. Each part of the dataset consists of 2000 (10 trials X 200 writers) samples captured using HUAWEI MediaPad M3. Dynamic information such as pressure, timestamp and the coordinates(X, Y) have been collected and involved for both parts of the dataset. In addition, age, gender and education level have been added to the dataset for future investigation. Several experiments are conducted on the dataset. The preliminary identification results are obtained using K-Nearest Neighbor (KNN) with Dynamic time warping (DTW) and support vector machines (SVM). We recorded 81.35% identification rate as the best result using SVM classifier on AHWDB2.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132829884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809115
S. Khanji, Farkhund Iqbal, P. Hung
Secure communication is a necessity that must be considered in any smart application to guarantee the confidentiality of information. Recently, ZigBee has been utilized in different smart applications such as automatic metering, power fraud detection, industrial automation and many more. In this research paper, we evaluate the performance of ZigBee from a security perspective. We explore the ZigBee built-in security services, encryption techniques, security keys, and the trust center. The research findings serve as guidelines to focus on wireless communication security in general and on the ZigBee security issues in specific. There is a crucial need to fill in the gap where ZigBee has low-complexity processing capabilities and the need to integrate more robust enhancements and security controls.
{"title":"ZigBee Security Vulnerabilities: Exploration and Evaluating","authors":"S. Khanji, Farkhund Iqbal, P. Hung","doi":"10.1109/IACS.2019.8809115","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809115","url":null,"abstract":"Secure communication is a necessity that must be considered in any smart application to guarantee the confidentiality of information. Recently, ZigBee has been utilized in different smart applications such as automatic metering, power fraud detection, industrial automation and many more. In this research paper, we evaluate the performance of ZigBee from a security perspective. We explore the ZigBee built-in security services, encryption techniques, security keys, and the trust center. The research findings serve as guidelines to focus on wireless communication security in general and on the ZigBee security issues in specific. There is a crucial need to fill in the gap where ZigBee has low-complexity processing capabilities and the need to integrate more robust enhancements and security controls.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"30 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809155
Saja Khaled Tawalbehe, Omar Alzoubi, Mohammad Al-Smadi
Emotion Detection (ED) from text has been an active research field recently. It has attracted the attention of researchers as it can measure the emotional contexts while humans interact with computers. Humans could express their emotion in various ways; using typed text, facial expressions, speech, gestures, and physiological measures. ED is considerably different from sentiment analysis SA, where SA goal is to detect polarity from text such as positive, negative or neutral. On the other hand, ED aims to recognize emotions from input text. Emotions can be modeled as discrete categories, e.g. Ekmans six basic emotions (angry, fear, joy, disgust, surprise and sadness). On the other hand there is the dimensional model that express emotions as valence, arousal and dominance values. Social media provides a rich source of emotional text, e.g. Twitter and Facebook. In this paper, we provide a review of recent work on ED from Arabic text. We discuss approaches (lexicons, machine learning, deep neural networks and ensemble approaches), tools for text processing, and We also discuss description of the most popular datasets in this domain.
{"title":"Recent Advances of Affect Detection from Arabic Text","authors":"Saja Khaled Tawalbehe, Omar Alzoubi, Mohammad Al-Smadi","doi":"10.1109/IACS.2019.8809155","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809155","url":null,"abstract":"Emotion Detection (ED) from text has been an active research field recently. It has attracted the attention of researchers as it can measure the emotional contexts while humans interact with computers. Humans could express their emotion in various ways; using typed text, facial expressions, speech, gestures, and physiological measures. ED is considerably different from sentiment analysis SA, where SA goal is to detect polarity from text such as positive, negative or neutral. On the other hand, ED aims to recognize emotions from input text. Emotions can be modeled as discrete categories, e.g. Ekmans six basic emotions (angry, fear, joy, disgust, surprise and sadness). On the other hand there is the dimensional model that express emotions as valence, arousal and dominance values. Social media provides a rich source of emotional text, e.g. Twitter and Facebook. In this paper, we provide a review of recent work on ED from Arabic text. We discuss approaches (lexicons, machine learning, deep neural networks and ensemble approaches), tools for text processing, and We also discuss description of the most popular datasets in this domain.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130753978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809176
Dina M. Ibrahim
With the rapid growth of the internet of Things (IoT) paradigm, another important technology appears on the research field that helps in earning a high performance wireless communication between devices, it is called low power wide area network (LPWAN). In the LPWAN technology, there are two categories: Long Rang (LoRa) and narrowband (NB-IoT). LoRa is not only a long-range network; it is also enables the transfer of information with a low transfer rate and low power consumption. Additionally, LoRa wireless area network (LoRaWAN) is a promising technology developed to overcome the IoT applications challenges. In this paper, the main contribution is focus on the revolution of LoRaWAN network technology considering the IoT requirements. Moreover, we show how this revolution is a powerful candidate in addressing and fixing the IoT challenges and obstacles. Finally, we present how LoRaWAN can handle these problems supporting our discussion with the details of the LoRaWAN characteristics.
{"title":"Internet of Things Technology based on LoRaWAN Revolution","authors":"Dina M. Ibrahim","doi":"10.1109/IACS.2019.8809176","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809176","url":null,"abstract":"With the rapid growth of the internet of Things (IoT) paradigm, another important technology appears on the research field that helps in earning a high performance wireless communication between devices, it is called low power wide area network (LPWAN). In the LPWAN technology, there are two categories: Long Rang (LoRa) and narrowband (NB-IoT). LoRa is not only a long-range network; it is also enables the transfer of information with a low transfer rate and low power consumption. Additionally, LoRa wireless area network (LoRaWAN) is a promising technology developed to overcome the IoT applications challenges. In this paper, the main contribution is focus on the revolution of LoRaWAN network technology considering the IoT requirements. Moreover, we show how this revolution is a powerful candidate in addressing and fixing the IoT challenges and obstacles. Finally, we present how LoRaWAN can handle these problems supporting our discussion with the details of the LoRaWAN characteristics.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122671756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809135
M. M. Deris, M. A. Hamid, N. Ibrahim, R. Efendi, Iwan Tri Riyadi Yanto
Research on data analytics is entering a new challenge where huge data need to be processed in a timely manner. However, there are issues to computational resources when some data are redundant, inconsistent, noisy, and incomplete. It is imperative to reduce data size in order to overcome some issues specifically redundant and incomplete data. Thus, some redundant data or incomplete data need to be removed. In this paper, we would like to present the data reduction approaches using Rough set theory based on similarity class between the two objects and an enhanced tolerance relation when the data is incomplete/imprecise. The data structured with complete and incomplete information systems are discussed. Comparative analysis and experiment result between the proposed approaches to based-line approaches in terms of reduction rate and accuracy are presented. We found that, the proposed approaches are more favorable with high reduction rate for complete information systems and high accuracy for incomplete information systems.
{"title":"Data Reduction using Similarity Class and Enhanced Tolerance Relation for Complete and Incomplete Information Systems","authors":"M. M. Deris, M. A. Hamid, N. Ibrahim, R. Efendi, Iwan Tri Riyadi Yanto","doi":"10.1109/IACS.2019.8809135","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809135","url":null,"abstract":"Research on data analytics is entering a new challenge where huge data need to be processed in a timely manner. However, there are issues to computational resources when some data are redundant, inconsistent, noisy, and incomplete. It is imperative to reduce data size in order to overcome some issues specifically redundant and incomplete data. Thus, some redundant data or incomplete data need to be removed. In this paper, we would like to present the data reduction approaches using Rough set theory based on similarity class between the two objects and an enhanced tolerance relation when the data is incomplete/imprecise. The data structured with complete and incomplete information systems are discussed. Comparative analysis and experiment result between the proposed approaches to based-line approaches in terms of reduction rate and accuracy are presented. We found that, the proposed approaches are more favorable with high reduction rate for complete information systems and high accuracy for incomplete information systems.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130550397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809142
Ayidh Alqahtani, A. Garima, Ahmad Alaiad
Security has always been one of the most significant concerns. Government and security agencies are working hard to prevent crimes and protect their people. However, challenge of dealing with large amount of data has become a major issue for all organizations. Therefore, a crime information system that is able to process large amount of data in a short period of time is needed for investigators to know crimes hotspots, crime patterns and to predict future ones. This paper provides design of Crime Data Information System. Data preprocessing is done in Crime Database and two approaches for crime analysis is performed. These two approaches are compared, and results are confirmed with ground truth.
{"title":"Crime Analysis in Chicago City","authors":"Ayidh Alqahtani, A. Garima, Ahmad Alaiad","doi":"10.1109/IACS.2019.8809142","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809142","url":null,"abstract":"Security has always been one of the most significant concerns. Government and security agencies are working hard to prevent crimes and protect their people. However, challenge of dealing with large amount of data has become a major issue for all organizations. Therefore, a crime information system that is able to process large amount of data in a short period of time is needed for investigators to know crimes hotspots, crime patterns and to predict future ones. This paper provides design of Crime Data Information System. Data preprocessing is done in Crime Database and two approaches for crime analysis is performed. These two approaches are compared, and results are confirmed with ground truth.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123906628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809152
S. Abdel-Hafeez, Sanabel Otoom, Muhannad Quwaider
Register renaming unit is commonly used in most of the microprocessor designs in order to increase the average number of Instructions Per Cycle (IPC). The register renaming unit constitutes several tables, wherein Register Alias Table (RAT) streamlines the operations of register renaming principle. The RAT substitutes the logical instruction operands from the physical table or the architecture table. Thus, it provides a larger set of registers than the scope seen by the software logical set. Despite the limited attention on circuit design of register renaming, we detail the principle of register renaming operational architecture within one clock cycle without pipelining, wherein the absolute delay is considered essential in register renaming unit. Additionally, we propose in this scope a circuit architecture realization for RAT that efficiently provides high performance in reading, writing, and matching content. Mathematical circuit analysis gives detail on complete register renaming principle within one cycle and complete circuit architecture for RAT. The proposed RAT constitutes four read ports along with two ports for match content addressable check, and two write ports along with priority encoder. The RAT table cells are based on SRAM 8T-Cell pre-charge structure.
寄存器重命名单元通常用于大多数微处理器设计中,以增加每周期指令(IPC)的平均数量。寄存器重命名单元由几个表组成,其中寄存器别名表(register Alias Table, RAT)简化了寄存器重命名原理的操作。RAT替换物理表或体系结构表中的逻辑指令操作数。因此,它提供了比软件逻辑集看到的范围更大的寄存器集。尽管对寄存器重命名电路设计的关注有限,但我们详细介绍了在一个时钟周期内无流水线的寄存器重命名操作体系结构的原理,其中绝对延迟被认为是寄存器重命名单元必不可少的。此外,我们在此范围内提出了一种用于RAT的电路架构实现,该电路架构可有效地提供高性能的读取,写入和匹配内容。数学电路分析详细介绍了一个周期内完成寄存器重命名原理和RAT的完整电路结构。建议的RAT包括四个读端口和两个匹配内容可寻址检查端口,以及两个写端口和优先级编码器。RAT表电池基于SRAM 8T-Cell预充电结构。
{"title":"Alias Table Memory Circuit For Register Renaming Unit","authors":"S. Abdel-Hafeez, Sanabel Otoom, Muhannad Quwaider","doi":"10.1109/IACS.2019.8809152","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809152","url":null,"abstract":"Register renaming unit is commonly used in most of the microprocessor designs in order to increase the average number of Instructions Per Cycle (IPC). The register renaming unit constitutes several tables, wherein Register Alias Table (RAT) streamlines the operations of register renaming principle. The RAT substitutes the logical instruction operands from the physical table or the architecture table. Thus, it provides a larger set of registers than the scope seen by the software logical set. Despite the limited attention on circuit design of register renaming, we detail the principle of register renaming operational architecture within one clock cycle without pipelining, wherein the absolute delay is considered essential in register renaming unit. Additionally, we propose in this scope a circuit architecture realization for RAT that efficiently provides high performance in reading, writing, and matching content. Mathematical circuit analysis gives detail on complete register renaming principle within one cycle and complete circuit architecture for RAT. The proposed RAT constitutes four read ports along with two ports for match content addressable check, and two write ports along with priority encoder. The RAT table cells are based on SRAM 8T-Cell pre-charge structure.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131426369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809154
Ali A. Mahmoud, Tahani AL Shawabkeh, W. Salameh, Ibrahim I. Al Amro
In the nowadays-competitive race of finding a suitable talented, qualified, bright and potential personnel to fulfill the needed spot of a vacancy in an industry, and with the beginning of the fourth industrial revolution, employers are taking the hiring process to the digital world. As Artificial Intelligent (AI) has a high-speed computation and adaptively to big data, it used to analyses and represents the data to employers in an easy way so they can make their decisions effectively.An upcoming challenge is raised where if the new candidates for a vacancy will give the expected performance based on the hiring criteria's or not, and how to hire a candidate that will while dealing with the hiring process? Employers are concerned with the performance evaluation of their current employees, but it is a challenge knowing the performance of new candidates before hiring.This study is proposing a follow-up conceptual model of using Artificial Intelligent (AI) in the hiring process with the using of performance management and social screening to predict the new candidate expected performance by analyzing historical performances and conditions of employees. This method will give an additional parameter that assists the decision makers in the hiring process.Although this method is a step forward to eliminate bad hiring, but it is requiring a huge historical data including the tracking of the performance, personal information collected from several sources like surveys and social Media and employees conditions related to the time of old and current employees, to give results that are more efficient and accurate.
{"title":"Performance Predicting in Hiring Process and Performance Appraisals Using Machine Learning","authors":"Ali A. Mahmoud, Tahani AL Shawabkeh, W. Salameh, Ibrahim I. Al Amro","doi":"10.1109/IACS.2019.8809154","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809154","url":null,"abstract":"In the nowadays-competitive race of finding a suitable talented, qualified, bright and potential personnel to fulfill the needed spot of a vacancy in an industry, and with the beginning of the fourth industrial revolution, employers are taking the hiring process to the digital world. As Artificial Intelligent (AI) has a high-speed computation and adaptively to big data, it used to analyses and represents the data to employers in an easy way so they can make their decisions effectively.An upcoming challenge is raised where if the new candidates for a vacancy will give the expected performance based on the hiring criteria's or not, and how to hire a candidate that will while dealing with the hiring process? Employers are concerned with the performance evaluation of their current employees, but it is a challenge knowing the performance of new candidates before hiring.This study is proposing a follow-up conceptual model of using Artificial Intelligent (AI) in the hiring process with the using of performance management and social screening to predict the new candidate expected performance by analyzing historical performances and conditions of employees. This method will give an additional parameter that assists the decision makers in the hiring process.Although this method is a step forward to eliminate bad hiring, but it is requiring a huge historical data including the tracking of the performance, personal information collected from several sources like surveys and social Media and employees conditions related to the time of old and current employees, to give results that are more efficient and accurate.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809149
Tobias Glocker, Timo Mantere
Safety applications play an essential role in our daily life. Without them many accidents would have happened. Especially nowadays, where the amount of traffic increases year by year, safety applications have become an important factor for the vehicle industry. Statistics have shown that the amount of accidents could be remarkably reduced for vehicles with safety systems. However, most of the safety systems are implemented on vehicles but not on trailers.This paper describes the implementation of an Intelligent Trailer Monitoring System which uses a Simple Serial Communication Protocol (SSCPM) for the communication between the vehicle’s board computer and the trailer’s monitoring system.
{"title":"Implementation of an Intelligent Caravan Monitoring System Using a Simple Serial Communication Protocol for Microcontrollers (SSCPM)","authors":"Tobias Glocker, Timo Mantere","doi":"10.1109/IACS.2019.8809149","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809149","url":null,"abstract":"Safety applications play an essential role in our daily life. Without them many accidents would have happened. Especially nowadays, where the amount of traffic increases year by year, safety applications have become an important factor for the vehicle industry. Statistics have shown that the amount of accidents could be remarkably reduced for vehicles with safety systems. However, most of the safety systems are implemented on vehicles but not on trailers.This paper describes the implementation of an Intelligent Trailer Monitoring System which uses a Simple Serial Communication Protocol (SSCPM) for the communication between the vehicle’s board computer and the trailer’s monitoring system.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131984421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809136
Mai A. Alharbi, Nouf T. Alharbi, H. M. Alharbi, Dina M. Ibrahim
Patient Assistance is a priority for all health care providers with the overall objective of achieving a high degree of patient satisfaction. Patient Assistance system (PAS) is an electronic device contracting of a Two-way radio or video transmitter with a phone application to simplify the process of monitoring the patient by helps patient to monitor and organize his treatment and reassure millions of families that their patient is in safe. In this paper, we propose a structure for a patient assistance system that we called PAS, will provide some important features like Easy to use, low cost, organizing the process of patient treat-time remotely, including alarm, and send or receive notifications among assistants, and patients. In comparison with the earlier systems in patient monitoring systems by using the most common features, we found limitations in the current systems; our proposed system will dissolve these disadvantages.
{"title":"Patient Assistance System: A Proposed Structure","authors":"Mai A. Alharbi, Nouf T. Alharbi, H. M. Alharbi, Dina M. Ibrahim","doi":"10.1109/IACS.2019.8809136","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809136","url":null,"abstract":"Patient Assistance is a priority for all health care providers with the overall objective of achieving a high degree of patient satisfaction. Patient Assistance system (PAS) is an electronic device contracting of a Two-way radio or video transmitter with a phone application to simplify the process of monitoring the patient by helps patient to monitor and organize his treatment and reassure millions of families that their patient is in safe. In this paper, we propose a structure for a patient assistance system that we called PAS, will provide some important features like Easy to use, low cost, organizing the process of patient treat-time remotely, including alarm, and send or receive notifications among assistants, and patients. In comparison with the earlier systems in patient monitoring systems by using the most common features, we found limitations in the current systems; our proposed system will dissolve these disadvantages.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}