Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994140
M. Al-Hattab
The wild spread of electric vehicles and the rapid growth of their manufacturing requires an easy, convenient and efficient charging system in public places. Wireless charging is one of the strongest candidates for this requirement. It is very safe and offers good business and commercial opportunities and its convenience promotes greener cities. To this end, this paper proposes a wireless power transfer scheme that utilizes the use of air-gapped transformers as the mean of the power transfer from the power source to the vehicle battery. A transformer with a magnetic core that has two air gaps is proposed. The core guides the magnetic flux to the secondary coil while the two air gaps will provide the physical separation between the transmitting and receiving coil. The paper studied the effect of introducing air-gaps in the transformer and the efficiency of the wireless power transfer through a series of experiments which showed promising results and a high potential for continuous development and improvement.
{"title":"Wireless Power Transfer Using Magnatic Core with Air Gaps","authors":"M. Al-Hattab","doi":"10.1109/ACIT57182.2022.9994140","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994140","url":null,"abstract":"The wild spread of electric vehicles and the rapid growth of their manufacturing requires an easy, convenient and efficient charging system in public places. Wireless charging is one of the strongest candidates for this requirement. It is very safe and offers good business and commercial opportunities and its convenience promotes greener cities. To this end, this paper proposes a wireless power transfer scheme that utilizes the use of air-gapped transformers as the mean of the power transfer from the power source to the vehicle battery. A transformer with a magnetic core that has two air gaps is proposed. The core guides the magnetic flux to the secondary coil while the two air gaps will provide the physical separation between the transmitting and receiving coil. The paper studied the effect of introducing air-gaps in the transformer and the efficiency of the wireless power transfer through a series of experiments which showed promising results and a high potential for continuous development and improvement.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994113
Suzan Al Abidi, K. Alarabi, Farah Alabedi
This study aimed at identifying grade 11 students' misconceptions about vectors as well as investigating the impact of implementing information and computer technology (ICT) in teaching physics. The study sample comprised 58 male students in the advanced 11th grade from a public school in Al Ain/UAE. An open-ended questions test was adapted from [1] and [2] to identify students' misconceptions about “vector quantities,” The results indicated a statistically significant difference for those who learned through ICT regarding adding vectors graphically and mathematically, multiplying vectors by number, and distinguishing between vectors and scalars. However, there is no statistically significant difference between determining the vector's magnitude and direction. In addition, three types of errors were commonly identified across the sample: a lack of students' understanding of graphically adding and direct representation, a lack of knowledge (or distinction) between vectors and scalars, and multiple vectors by number.
{"title":"The Impact of Implementing ICT to Address Misconceptions about Vector Quantities in the UAE","authors":"Suzan Al Abidi, K. Alarabi, Farah Alabedi","doi":"10.1109/ACIT57182.2022.9994113","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994113","url":null,"abstract":"This study aimed at identifying grade 11 students' misconceptions about vectors as well as investigating the impact of implementing information and computer technology (ICT) in teaching physics. The study sample comprised 58 male students in the advanced 11th grade from a public school in Al Ain/UAE. An open-ended questions test was adapted from [1] and [2] to identify students' misconceptions about “vector quantities,” The results indicated a statistically significant difference for those who learned through ICT regarding adding vectors graphically and mathematically, multiplying vectors by number, and distinguishing between vectors and scalars. However, there is no statistically significant difference between determining the vector's magnitude and direction. In addition, three types of errors were commonly identified across the sample: a lack of students' understanding of graphically adding and direct representation, a lack of knowledge (or distinction) between vectors and scalars, and multiple vectors by number.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124909485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994179
G. Samara, Mohammad Aljaidi, E. A. Daoud, Maram Y. Al-Safarini, Ghassan M. Alsayyed, S. Almatarneh
Fusion of networking and data mining is an intriguing way to implement an algorithm that will be able to classify and group communication messages in VANET based on whether they are Vehicle to Vehicle (V2V) or Vehicle to Interface (V2I), which will play a significant role in determining the best technology to broadcast those messages using either Mobile Long Term Evolution (LTE-M) or Narrow Band IoT. (NB-IoT). Each LTE-M and NB-IoT has its characteristics and abilities. Moreover, there are significant measures that should be taken into a confederation to help the algorithm make a decision to select the optimal technology. This paper will compare the main features of LTE-M and NB-IoT and suggest a methodology to implement an algorithm that has the ability to broadcast messages over a VENET using the best and most efficient technology in order to manage power consumption and increase the network life cycle in addition to increase the speed of exchanging message.
{"title":"Message Broadcasting Algorithm Implementation Using Mobile Long Term Evolution and Narrow Band Internet of Things Over Intelligent Transportation System (ITS)","authors":"G. Samara, Mohammad Aljaidi, E. A. Daoud, Maram Y. Al-Safarini, Ghassan M. Alsayyed, S. Almatarneh","doi":"10.1109/ACIT57182.2022.9994179","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994179","url":null,"abstract":"Fusion of networking and data mining is an intriguing way to implement an algorithm that will be able to classify and group communication messages in VANET based on whether they are Vehicle to Vehicle (V2V) or Vehicle to Interface (V2I), which will play a significant role in determining the best technology to broadcast those messages using either Mobile Long Term Evolution (LTE-M) or Narrow Band IoT. (NB-IoT). Each LTE-M and NB-IoT has its characteristics and abilities. Moreover, there are significant measures that should be taken into a confederation to help the algorithm make a decision to select the optimal technology. This paper will compare the main features of LTE-M and NB-IoT and suggest a methodology to implement an algorithm that has the ability to broadcast messages over a VENET using the best and most efficient technology in order to manage power consumption and increase the network life cycle in addition to increase the speed of exchanging message.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125097082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994196
Sawsan Taha, E. Abulibdeh, Eman Zaitoun, Sumaya Daoud, Hanadi G. Rawagah
As technology is getting more prevalent in the classroom environment recently, it is evitable to explore the extent to which end-users, i.e. the students accept the implementation of technology, in order to verify its effectiveness in achieving educational goals. Therefore, the purpose of this study is to investigate social science students' perceptions of a specific type of technology, namely, Augmented Reality (AR) technology and whether variables such as gender, specialization or their program level may influence their attitude toward (AR). To this end, a Technology Acceptance Model (TAM) was adopted to elicit the students' degree of acceptance through a questionnaire addressing three domains: perceived usefulness, perceived ease of use and behavioral intention. The findings of the current study show that the students have a significantly positive attitude toward the integration of (AR), and that gender, specialization and program level have almost no impact on the students' perceptions. The implications of these findings are important for policies and practices related to instructional technology in higher education.
{"title":"Investigating Student Perceptions of Augmented Reality Utilizing Technology Acceptance Model (TAM)","authors":"Sawsan Taha, E. Abulibdeh, Eman Zaitoun, Sumaya Daoud, Hanadi G. Rawagah","doi":"10.1109/ACIT57182.2022.9994196","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994196","url":null,"abstract":"As technology is getting more prevalent in the classroom environment recently, it is evitable to explore the extent to which end-users, i.e. the students accept the implementation of technology, in order to verify its effectiveness in achieving educational goals. Therefore, the purpose of this study is to investigate social science students' perceptions of a specific type of technology, namely, Augmented Reality (AR) technology and whether variables such as gender, specialization or their program level may influence their attitude toward (AR). To this end, a Technology Acceptance Model (TAM) was adopted to elicit the students' degree of acceptance through a questionnaire addressing three domains: perceived usefulness, perceived ease of use and behavioral intention. The findings of the current study show that the students have a significantly positive attitude toward the integration of (AR), and that gender, specialization and program level have almost no impact on the students' perceptions. The implications of these findings are important for policies and practices related to instructional technology in higher education.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"824 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126186558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994190
Momin Abdelhafez, Ghaydaa Khateeb, A. Yahya
In this paper we describe an implementation of an Arabic query auto-completion system for student question-answering at a University. University students make many inquiries concerning academic life: about majors, concentrations, dates, instructors, courses, rooms, exams and more. Auto-completion (AC) has recently been part of many user interfaces, such as search bars on web pages, social media sites and mobile applications. We investigate multiple approaches to completion candidate generation and ranking and the role Arabic NLP may play in that. After experimenting with other options, we collected the data used in our system directly from students at the University. This data can be expanded to account for more types of queries and ways to express information needs. We describe our dataset, give an evaluation of individual system components and of the system results in general. The goal of this work is to improve the answer search experience by reducing the time of entering the query and biasing the completed query towards unambiguous and easily answerable questions. We divided the implementation into several stages and report on the results for each stage separately. Despite the difficulties of Arabic NLP, the results of our system were encouraging and compared well with other QAC systems described in the literature. Finally, we give an informal evaluation of overall results and the improvement resulting from using QAC for our QA system.
{"title":"Efficient Arabic Query Auto-Completion for Question Answering at a University","authors":"Momin Abdelhafez, Ghaydaa Khateeb, A. Yahya","doi":"10.1109/ACIT57182.2022.9994190","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994190","url":null,"abstract":"In this paper we describe an implementation of an Arabic query auto-completion system for student question-answering at a University. University students make many inquiries concerning academic life: about majors, concentrations, dates, instructors, courses, rooms, exams and more. Auto-completion (AC) has recently been part of many user interfaces, such as search bars on web pages, social media sites and mobile applications. We investigate multiple approaches to completion candidate generation and ranking and the role Arabic NLP may play in that. After experimenting with other options, we collected the data used in our system directly from students at the University. This data can be expanded to account for more types of queries and ways to express information needs. We describe our dataset, give an evaluation of individual system components and of the system results in general. The goal of this work is to improve the answer search experience by reducing the time of entering the query and biasing the completed query towards unambiguous and easily answerable questions. We divided the implementation into several stages and report on the results for each stage separately. Despite the difficulties of Arabic NLP, the results of our system were encouraging and compared well with other QAC systems described in the literature. Finally, we give an informal evaluation of overall results and the improvement resulting from using QAC for our QA system.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994148
Mohamad M. Al-Laham, Firas Omar, Z. Alqadi
Among the different forms of social media, textmessages are known to be the most extensivelydisseminated forms of information. This informationcould be private or sensitive in nature, and so need tobe shielded from prying eyes. To conceal textmessages in an electronic photograph, the LeastSignificant Bit (LSB) technique is employed. Themechanism of concealing the message is simpleenough to accomplish the process of concealingprivate information yet, not change the carrierImage. Despite its simplicity and apparent success inhiding things, this approach must be used cautiously.In this study, we will examine a different and simpleto-implement approach to increase the LSB method'slevel of security and blocking any attacker attemptingto spy on the text message or retrieving its content,while maintaining a certain level of LSB method'sefficiency. The suggested solution relies on creating asecret and private key that is difficult to crack inorder to conceal the message. Cutting the digitalImage into blocks generates this key, which comprisesthe block's row and column lengths as well as theblock's image size, which is used to conceal themessage In addition to ensure that the sender andreceiver are both has a compatible technique bywhich the key is used to define the length of eachblock line and column and the block number thatcontains the text message, this will also set aside aportion of the Image to store the key.
{"title":"Digital Image Slicing to Strengthen the Security of LSB Technique of Encrypting Text Messages","authors":"Mohamad M. Al-Laham, Firas Omar, Z. Alqadi","doi":"10.1109/ACIT57182.2022.9994148","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994148","url":null,"abstract":"Among the different forms of social media, textmessages are known to be the most extensivelydisseminated forms of information. This informationcould be private or sensitive in nature, and so need tobe shielded from prying eyes. To conceal textmessages in an electronic photograph, the LeastSignificant Bit (LSB) technique is employed. Themechanism of concealing the message is simpleenough to accomplish the process of concealingprivate information yet, not change the carrierImage. Despite its simplicity and apparent success inhiding things, this approach must be used cautiously.In this study, we will examine a different and simpleto-implement approach to increase the LSB method'slevel of security and blocking any attacker attemptingto spy on the text message or retrieving its content,while maintaining a certain level of LSB method'sefficiency. The suggested solution relies on creating asecret and private key that is difficult to crack inorder to conceal the message. Cutting the digitalImage into blocks generates this key, which comprisesthe block's row and column lengths as well as theblock's image size, which is used to conceal themessage In addition to ensure that the sender andreceiver are both has a compatible technique bywhich the key is used to define the length of eachblock line and column and the block number thatcontains the text message, this will also set aside aportion of the Image to store the key.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122643282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994180
S. Almatarneh, Israa Abdullah Almatarneh, G. Samara, Mohammad Aljaidi, Amneh Alamleh, Aref Abuawad
Customer reviews are documentation of their experiences about products, places, services, Etc., and these reviews are the focus of interest for both organizations and individuals because they are the main factor for customers in their purchasing choices. This study aims to compare the performance of three well-known dictionaries in rating the polarity of hotel and restaurant reviews.
{"title":"Polarity Classification of Hotel Reviews: Lexicon-Based Method","authors":"S. Almatarneh, Israa Abdullah Almatarneh, G. Samara, Mohammad Aljaidi, Amneh Alamleh, Aref Abuawad","doi":"10.1109/ACIT57182.2022.9994180","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994180","url":null,"abstract":"Customer reviews are documentation of their experiences about products, places, services, Etc., and these reviews are the focus of interest for both organizations and individuals because they are the main factor for customers in their purchasing choices. This study aims to compare the performance of three well-known dictionaries in rating the polarity of hotel and restaurant reviews.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128532427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994082
G. Samara, Mohammed Bhaa Eid, Mohammad Aljaidi, S. Almatarneh, M. Rasmi, Raed Alazaideh, Yasser Al-Lahham
Recently, the Vehicular Ad Hoc Network, or VANET, has emerged as the most essential topic for researchers and the automobile industry to discuss in order to enhance the level of safety enjoyed by road users. Users of VANET need to be able to access both safety-related and non-safety-related apps. In this paper, we offer sixteen different kinds of attacks, as well as potential defenses against them.
近年来,为了提高道路使用者的安全水平,车辆自组织网络(Vehicular Ad Hoc Network,简称VANET)已成为研究人员和汽车行业讨论的最重要的话题。VANET的用户需要能够访问与安全相关和非安全相关的应用程序。在本文中,我们提供了16种不同类型的攻击,以及对它们的潜在防御。
{"title":"Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures","authors":"G. Samara, Mohammed Bhaa Eid, Mohammad Aljaidi, S. Almatarneh, M. Rasmi, Raed Alazaideh, Yasser Al-Lahham","doi":"10.1109/ACIT57182.2022.9994082","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994082","url":null,"abstract":"Recently, the Vehicular Ad Hoc Network, or VANET, has emerged as the most essential topic for researchers and the automobile industry to discuss in order to enhance the level of safety enjoyed by road users. Users of VANET need to be able to access both safety-related and non-safety-related apps. In this paper, we offer sixteen different kinds of attacks, as well as potential defenses against them.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129359023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994213
Nurashidah Musa, N. Mirza, Adnan Ali
Digital forensics is essential when performing in-depth crime investigations and evidence extraction, especially in the field of the Internet of Things, where there is a ton of information every second boosted with latest and smartest technological devices. However, the enormous growth of data and the nature of its complexity could constrain the data examination process since traditional data acquisition techniques are not applicable nowadays. Therefore, if the knowledge gap between digital forensics and the Internet of Things is not bridged, investigators will jeopardize the loss of a possible rich source of evidence that otherwise could act as a lead in solving open cases. The work aims to introduce examples of employing the latest Internet of Things forensics approaches as a panacea in this regard. The paper covers a variety of articles presenting the new Blockchain, fog, and video-based applications that can aid in easing the process of digital forensics investigation with a focus on the Internet of Things. The results of the review indicated that the above current trends are very promising procedures in the field of Internet of Things digital forensics and need to be explored and applied more actively.
{"title":"Current Trends in Internet of Things Forensics","authors":"Nurashidah Musa, N. Mirza, Adnan Ali","doi":"10.1109/ACIT57182.2022.9994213","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994213","url":null,"abstract":"Digital forensics is essential when performing in-depth crime investigations and evidence extraction, especially in the field of the Internet of Things, where there is a ton of information every second boosted with latest and smartest technological devices. However, the enormous growth of data and the nature of its complexity could constrain the data examination process since traditional data acquisition techniques are not applicable nowadays. Therefore, if the knowledge gap between digital forensics and the Internet of Things is not bridged, investigators will jeopardize the loss of a possible rich source of evidence that otherwise could act as a lead in solving open cases. The work aims to introduce examples of employing the latest Internet of Things forensics approaches as a panacea in this regard. The paper covers a variety of articles presenting the new Blockchain, fog, and video-based applications that can aid in easing the process of digital forensics investigation with a focus on the Internet of Things. The results of the review indicated that the above current trends are very promising procedures in the field of Internet of Things digital forensics and need to be explored and applied more actively.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.1109/ACIT57182.2022.9994186
Bashar Igried, A. Alsarhan, Mohammad Alauthman, Ammar Almomani
Cloud provider can maximize his profit while guaranteeing quality of service (QoS) required by clients. In this work, we propose new scheme for maximizing cloud provider profit while guaranteeing QoS for clients. Cloud provider (CP) manages all available resources on cloud market. The key objective of our scheme is extracting the optimal charging strategy for serving clients requests to maximize CP's profit by choosing proper set of requests to be served, subject to uncertain demand of service and time-varying service cost. As variety of clients classes submit their requests and offer different prices for service, this problem deserves special treatment. To tackle the uncertain service prices, Q-Iearning is proposed to extract the optimal charging policy. Numerical results show that the proposed scheme can improve the reward of CP significantly.
{"title":"Machine learning Scheme for Managing Virtual Computing Resources in Cloud Market","authors":"Bashar Igried, A. Alsarhan, Mohammad Alauthman, Ammar Almomani","doi":"10.1109/ACIT57182.2022.9994186","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994186","url":null,"abstract":"Cloud provider can maximize his profit while guaranteeing quality of service (QoS) required by clients. In this work, we propose new scheme for maximizing cloud provider profit while guaranteeing QoS for clients. Cloud provider (CP) manages all available resources on cloud market. The key objective of our scheme is extracting the optimal charging strategy for serving clients requests to maximize CP's profit by choosing proper set of requests to be served, subject to uncertain demand of service and time-varying service cost. As variety of clients classes submit their requests and offer different prices for service, this problem deserves special treatment. To tackle the uncertain service prices, Q-Iearning is proposed to extract the optimal charging policy. Numerical results show that the proposed scheme can improve the reward of CP significantly.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}