首页 > 最新文献

2022 International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
Wireless Power Transfer Using Magnatic Core with Air Gaps 无线电力传输使用磁芯与气隙
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994140
M. Al-Hattab
The wild spread of electric vehicles and the rapid growth of their manufacturing requires an easy, convenient and efficient charging system in public places. Wireless charging is one of the strongest candidates for this requirement. It is very safe and offers good business and commercial opportunities and its convenience promotes greener cities. To this end, this paper proposes a wireless power transfer scheme that utilizes the use of air-gapped transformers as the mean of the power transfer from the power source to the vehicle battery. A transformer with a magnetic core that has two air gaps is proposed. The core guides the magnetic flux to the secondary coil while the two air gaps will provide the physical separation between the transmitting and receiving coil. The paper studied the effect of introducing air-gaps in the transformer and the efficiency of the wireless power transfer through a series of experiments which showed promising results and a high potential for continuous development and improvement.
电动汽车的广泛普及及其制造业的快速增长需要一个简单、方便、高效的公共场所充电系统。无线充电是满足这一需求的最佳选择之一。它非常安全,提供了良好的商业和商业机会,它的便利促进了绿色城市。为此,本文提出了一种无线电力传输方案,该方案利用气隙变压器作为从电源到车载电池的电力传输的平均值。提出了一种具有两个气隙的磁芯变压器。磁芯将磁通量引导到次级线圈,而两个气隙将在发射线圈和接收线圈之间提供物理分离。本文通过一系列的实验研究了在变压器中引入气隙的效果和无线电力传输的效率,结果显示出良好的效果,具有不断发展和改进的潜力。
{"title":"Wireless Power Transfer Using Magnatic Core with Air Gaps","authors":"M. Al-Hattab","doi":"10.1109/ACIT57182.2022.9994140","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994140","url":null,"abstract":"The wild spread of electric vehicles and the rapid growth of their manufacturing requires an easy, convenient and efficient charging system in public places. Wireless charging is one of the strongest candidates for this requirement. It is very safe and offers good business and commercial opportunities and its convenience promotes greener cities. To this end, this paper proposes a wireless power transfer scheme that utilizes the use of air-gapped transformers as the mean of the power transfer from the power source to the vehicle battery. A transformer with a magnetic core that has two air gaps is proposed. The core guides the magnetic flux to the secondary coil while the two air gaps will provide the physical separation between the transmitting and receiving coil. The paper studied the effect of introducing air-gaps in the transformer and the efficiency of the wireless power transfer through a series of experiments which showed promising results and a high potential for continuous development and improvement.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Implementing ICT to Address Misconceptions about Vector Quantities in the UAE 实施ICT解决阿联酋对矢量的误解的影响
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994113
Suzan Al Abidi, K. Alarabi, Farah Alabedi
This study aimed at identifying grade 11 students' misconceptions about vectors as well as investigating the impact of implementing information and computer technology (ICT) in teaching physics. The study sample comprised 58 male students in the advanced 11th grade from a public school in Al Ain/UAE. An open-ended questions test was adapted from [1] and [2] to identify students' misconceptions about “vector quantities,” The results indicated a statistically significant difference for those who learned through ICT regarding adding vectors graphically and mathematically, multiplying vectors by number, and distinguishing between vectors and scalars. However, there is no statistically significant difference between determining the vector's magnitude and direction. In addition, three types of errors were commonly identified across the sample: a lack of students' understanding of graphically adding and direct representation, a lack of knowledge (or distinction) between vectors and scalars, and multiple vectors by number.
本研究旨在找出11年级学生对向量的误解,并探讨资讯与电脑科技(ICT)在物理教学中的影响。研究样本包括阿联酋一所公立学校高二年级的58名男生。采用了[1]和[2]的开放式问题测试,以确定学生对“矢量”的误解。结果表明,通过ICT学习的学生在图形和数学上添加矢量、矢量乘以数字以及区分矢量和标量方面存在统计学上的显著差异。然而,在确定矢量的大小和方向之间没有统计学上的显著差异。此外,在整个样本中普遍发现了三种类型的错误:缺乏学生对图形加法和直接表示的理解,缺乏向量和标量之间的知识(或区别),以及通过数字多个向量。
{"title":"The Impact of Implementing ICT to Address Misconceptions about Vector Quantities in the UAE","authors":"Suzan Al Abidi, K. Alarabi, Farah Alabedi","doi":"10.1109/ACIT57182.2022.9994113","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994113","url":null,"abstract":"This study aimed at identifying grade 11 students' misconceptions about vectors as well as investigating the impact of implementing information and computer technology (ICT) in teaching physics. The study sample comprised 58 male students in the advanced 11th grade from a public school in Al Ain/UAE. An open-ended questions test was adapted from [1] and [2] to identify students' misconceptions about “vector quantities,” The results indicated a statistically significant difference for those who learned through ICT regarding adding vectors graphically and mathematically, multiplying vectors by number, and distinguishing between vectors and scalars. However, there is no statistically significant difference between determining the vector's magnitude and direction. In addition, three types of errors were commonly identified across the sample: a lack of students' understanding of graphically adding and direct representation, a lack of knowledge (or distinction) between vectors and scalars, and multiple vectors by number.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124909485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Message Broadcasting Algorithm Implementation Using Mobile Long Term Evolution and Narrow Band Internet of Things Over Intelligent Transportation System (ITS) 基于移动长期演进和窄带物联网的智能交通系统消息广播算法实现
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994179
G. Samara, Mohammad Aljaidi, E. A. Daoud, Maram Y. Al-Safarini, Ghassan M. Alsayyed, S. Almatarneh
Fusion of networking and data mining is an intriguing way to implement an algorithm that will be able to classify and group communication messages in VANET based on whether they are Vehicle to Vehicle (V2V) or Vehicle to Interface (V2I), which will play a significant role in determining the best technology to broadcast those messages using either Mobile Long Term Evolution (LTE-M) or Narrow Band IoT. (NB-IoT). Each LTE-M and NB-IoT has its characteristics and abilities. Moreover, there are significant measures that should be taken into a confederation to help the algorithm make a decision to select the optimal technology. This paper will compare the main features of LTE-M and NB-IoT and suggest a methodology to implement an algorithm that has the ability to broadcast messages over a VENET using the best and most efficient technology in order to manage power consumption and increase the network life cycle in addition to increase the speed of exchanging message.
网络和数据挖掘的融合是一种有趣的实现算法的方法,该算法将能够根据车辆对车辆(V2V)或车辆对接口(V2I)对VANET中的通信消息进行分类和分组,这将在确定使用移动长期演进(LTE-M)或窄带物联网广播这些消息的最佳技术方面发挥重要作用。(NB-IoT)。LTE-M和NB-IoT各有特点和能力。此外,还有一些重要的措施需要纳入联盟,以帮助算法做出选择最优技术的决策。本文将比较LTE-M和NB-IoT的主要特点,并提出一种方法来实现一种算法,该算法能够使用最佳和最有效的技术在VENET上广播消息,以管理功耗并增加网络生命周期,同时提高交换消息的速度。
{"title":"Message Broadcasting Algorithm Implementation Using Mobile Long Term Evolution and Narrow Band Internet of Things Over Intelligent Transportation System (ITS)","authors":"G. Samara, Mohammad Aljaidi, E. A. Daoud, Maram Y. Al-Safarini, Ghassan M. Alsayyed, S. Almatarneh","doi":"10.1109/ACIT57182.2022.9994179","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994179","url":null,"abstract":"Fusion of networking and data mining is an intriguing way to implement an algorithm that will be able to classify and group communication messages in VANET based on whether they are Vehicle to Vehicle (V2V) or Vehicle to Interface (V2I), which will play a significant role in determining the best technology to broadcast those messages using either Mobile Long Term Evolution (LTE-M) or Narrow Band IoT. (NB-IoT). Each LTE-M and NB-IoT has its characteristics and abilities. Moreover, there are significant measures that should be taken into a confederation to help the algorithm make a decision to select the optimal technology. This paper will compare the main features of LTE-M and NB-IoT and suggest a methodology to implement an algorithm that has the ability to broadcast messages over a VENET using the best and most efficient technology in order to manage power consumption and increase the network life cycle in addition to increase the speed of exchanging message.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125097082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigating Student Perceptions of Augmented Reality Utilizing Technology Acceptance Model (TAM) 利用技术接受模型(TAM)调查学生对增强现实的认知
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994196
Sawsan Taha, E. Abulibdeh, Eman Zaitoun, Sumaya Daoud, Hanadi G. Rawagah
As technology is getting more prevalent in the classroom environment recently, it is evitable to explore the extent to which end-users, i.e. the students accept the implementation of technology, in order to verify its effectiveness in achieving educational goals. Therefore, the purpose of this study is to investigate social science students' perceptions of a specific type of technology, namely, Augmented Reality (AR) technology and whether variables such as gender, specialization or their program level may influence their attitude toward (AR). To this end, a Technology Acceptance Model (TAM) was adopted to elicit the students' degree of acceptance through a questionnaire addressing three domains: perceived usefulness, perceived ease of use and behavioral intention. The findings of the current study show that the students have a significantly positive attitude toward the integration of (AR), and that gender, specialization and program level have almost no impact on the students' perceptions. The implications of these findings are important for policies and practices related to instructional technology in higher education.
随着技术在课堂环境中越来越普遍,为了验证其在实现教育目标方面的有效性,不可避免地要探索最终用户(即学生)接受技术实施的程度。因此,本研究的目的是调查社会科学学生对一种特定类型的技术,即增强现实(AR)技术的看法,以及性别、专业或他们的课程水平等变量是否会影响他们对(AR)的态度。为此,本研究采用技术接受模型(TAM),通过问卷调查的三个领域:感知有用性、感知易用性和行为意向,得出学生对技术的接受程度。本研究结果显示,学生对整合(AR)有显著的积极态度,性别、专业和课程水平对学生的认知几乎没有影响。这些发现对高等教育教学技术相关的政策和实践具有重要意义。
{"title":"Investigating Student Perceptions of Augmented Reality Utilizing Technology Acceptance Model (TAM)","authors":"Sawsan Taha, E. Abulibdeh, Eman Zaitoun, Sumaya Daoud, Hanadi G. Rawagah","doi":"10.1109/ACIT57182.2022.9994196","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994196","url":null,"abstract":"As technology is getting more prevalent in the classroom environment recently, it is evitable to explore the extent to which end-users, i.e. the students accept the implementation of technology, in order to verify its effectiveness in achieving educational goals. Therefore, the purpose of this study is to investigate social science students' perceptions of a specific type of technology, namely, Augmented Reality (AR) technology and whether variables such as gender, specialization or their program level may influence their attitude toward (AR). To this end, a Technology Acceptance Model (TAM) was adopted to elicit the students' degree of acceptance through a questionnaire addressing three domains: perceived usefulness, perceived ease of use and behavioral intention. The findings of the current study show that the students have a significantly positive attitude toward the integration of (AR), and that gender, specialization and program level have almost no impact on the students' perceptions. The implications of these findings are important for policies and practices related to instructional technology in higher education.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"824 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126186558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Arabic Query Auto-Completion for Question Answering at a University 高效阿拉伯语查询自动完成在大学的问题回答
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994190
Momin Abdelhafez, Ghaydaa Khateeb, A. Yahya
In this paper we describe an implementation of an Arabic query auto-completion system for student question-answering at a University. University students make many inquiries concerning academic life: about majors, concentrations, dates, instructors, courses, rooms, exams and more. Auto-completion (AC) has recently been part of many user interfaces, such as search bars on web pages, social media sites and mobile applications. We investigate multiple approaches to completion candidate generation and ranking and the role Arabic NLP may play in that. After experimenting with other options, we collected the data used in our system directly from students at the University. This data can be expanded to account for more types of queries and ways to express information needs. We describe our dataset, give an evaluation of individual system components and of the system results in general. The goal of this work is to improve the answer search experience by reducing the time of entering the query and biasing the completed query towards unambiguous and easily answerable questions. We divided the implementation into several stages and report on the results for each stage separately. Despite the difficulties of Arabic NLP, the results of our system were encouraging and compared well with other QAC systems described in the literature. Finally, we give an informal evaluation of overall results and the improvement resulting from using QAC for our QA system.
本文描述了一种用于大学学生答疑的阿拉伯语查询自动完成系统的实现。大学生对学术生活有很多疑问:专业、专业、日期、导师、课程、房间、考试等等。自动补全功能(AC)最近已经成为许多用户界面的一部分,例如网页、社交媒体网站和移动应用程序的搜索栏。我们研究了完成候选生成和排名的多种方法,以及阿拉伯语NLP可能在其中发挥的作用。在试验了其他选项之后,我们直接从大学的学生那里收集了系统中使用的数据。可以扩展该数据,以说明更多类型的查询和表达信息需求的方法。我们描述了我们的数据集,给出了单个系统组件和系统结果的总体评估。这项工作的目标是通过减少输入查询的时间和将完成的查询偏向于明确且易于回答的问题来改善答案搜索体验。我们将实施分为几个阶段,并分别报告每个阶段的结果。尽管阿拉伯语NLP存在困难,但我们系统的结果令人鼓舞,并且与文献中描述的其他QAC系统相比效果良好。最后,我们给出了一个非正式的评估总体结果和改进所产生的QAC用于我们的质量保证系统。
{"title":"Efficient Arabic Query Auto-Completion for Question Answering at a University","authors":"Momin Abdelhafez, Ghaydaa Khateeb, A. Yahya","doi":"10.1109/ACIT57182.2022.9994190","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994190","url":null,"abstract":"In this paper we describe an implementation of an Arabic query auto-completion system for student question-answering at a University. University students make many inquiries concerning academic life: about majors, concentrations, dates, instructors, courses, rooms, exams and more. Auto-completion (AC) has recently been part of many user interfaces, such as search bars on web pages, social media sites and mobile applications. We investigate multiple approaches to completion candidate generation and ranking and the role Arabic NLP may play in that. After experimenting with other options, we collected the data used in our system directly from students at the University. This data can be expanded to account for more types of queries and ways to express information needs. We describe our dataset, give an evaluation of individual system components and of the system results in general. The goal of this work is to improve the answer search experience by reducing the time of entering the query and biasing the completed query towards unambiguous and easily answerable questions. We divided the implementation into several stages and report on the results for each stage separately. Despite the difficulties of Arabic NLP, the results of our system were encouraging and compared well with other QAC systems described in the literature. Finally, we give an informal evaluation of overall results and the improvement resulting from using QAC for our QA system.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Image Slicing to Strengthen the Security of LSB Technique of Encrypting Text Messages 数字图像切片增强LSB短信加密技术的安全性
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994148
Mohamad M. Al-Laham, Firas Omar, Z. Alqadi
Among the different forms of social media, textmessages are known to be the most extensivelydisseminated forms of information. This informationcould be private or sensitive in nature, and so need tobe shielded from prying eyes. To conceal textmessages in an electronic photograph, the LeastSignificant Bit (LSB) technique is employed. Themechanism of concealing the message is simpleenough to accomplish the process of concealingprivate information yet, not change the carrierImage. Despite its simplicity and apparent success inhiding things, this approach must be used cautiously.In this study, we will examine a different and simpleto-implement approach to increase the LSB method'slevel of security and blocking any attacker attemptingto spy on the text message or retrieving its content,while maintaining a certain level of LSB method'sefficiency. The suggested solution relies on creating asecret and private key that is difficult to crack inorder to conceal the message. Cutting the digitalImage into blocks generates this key, which comprisesthe block's row and column lengths as well as theblock's image size, which is used to conceal themessage In addition to ensure that the sender andreceiver are both has a compatible technique bywhich the key is used to define the length of eachblock line and column and the block number thatcontains the text message, this will also set aside aportion of the Image to store the key.
在不同形式的社交媒体中,短信被认为是传播最广泛的信息形式。这些信息可能是私人的或敏感的,因此需要屏蔽窥探。为了在电子照片中隐藏文本信息,采用了最小有效位(LSB)技术。信息隐藏机制简单,在不改变载体形象的前提下,实现了对隐私信息的隐藏。尽管这种方法简单,而且在隐藏东西方面明显成功,但必须谨慎使用。在本研究中,我们将研究一种不同且易于实现的方法,以提高LSB方法的安全级别,并阻止任何试图监视文本消息或检索其内容的攻击者,同时保持一定水平的LSB方法效率。建议的解决方案依赖于创建一个难以破解的秘钥和私钥来隐藏消息。将数字图像切割成块生成这个密钥,它包括块的行和列长度以及块的图像大小,用于隐藏消息。此外,为了确保发送方和接收方都有一个兼容的技术,通过该技术,密钥被用来定义每个块的行和列的长度以及包含文本消息的块号,这也将留出一部分图像来存储密钥。
{"title":"Digital Image Slicing to Strengthen the Security of LSB Technique of Encrypting Text Messages","authors":"Mohamad M. Al-Laham, Firas Omar, Z. Alqadi","doi":"10.1109/ACIT57182.2022.9994148","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994148","url":null,"abstract":"Among the different forms of social media, textmessages are known to be the most extensivelydisseminated forms of information. This informationcould be private or sensitive in nature, and so need tobe shielded from prying eyes. To conceal textmessages in an electronic photograph, the LeastSignificant Bit (LSB) technique is employed. Themechanism of concealing the message is simpleenough to accomplish the process of concealingprivate information yet, not change the carrierImage. Despite its simplicity and apparent success inhiding things, this approach must be used cautiously.In this study, we will examine a different and simpleto-implement approach to increase the LSB method'slevel of security and blocking any attacker attemptingto spy on the text message or retrieving its content,while maintaining a certain level of LSB method'sefficiency. The suggested solution relies on creating asecret and private key that is difficult to crack inorder to conceal the message. Cutting the digitalImage into blocks generates this key, which comprisesthe block's row and column lengths as well as theblock's image size, which is used to conceal themessage In addition to ensure that the sender andreceiver are both has a compatible technique bywhich the key is used to define the length of eachblock line and column and the block number thatcontains the text message, this will also set aside aportion of the Image to store the key.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122643282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Polarity Classification of Hotel Reviews: Lexicon-Based Method 酒店评论的极性分类:基于词典的方法
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994180
S. Almatarneh, Israa Abdullah Almatarneh, G. Samara, Mohammad Aljaidi, Amneh Alamleh, Aref Abuawad
Customer reviews are documentation of their experiences about products, places, services, Etc., and these reviews are the focus of interest for both organizations and individuals because they are the main factor for customers in their purchasing choices. This study aims to compare the performance of three well-known dictionaries in rating the polarity of hotel and restaurant reviews.
顾客评论是他们对产品、地点、服务等的体验的记录,这些评论是组织和个人感兴趣的焦点,因为它们是顾客购买选择的主要因素。本研究旨在比较三种知名词典在评价酒店和餐厅评论极性方面的表现。
{"title":"Polarity Classification of Hotel Reviews: Lexicon-Based Method","authors":"S. Almatarneh, Israa Abdullah Almatarneh, G. Samara, Mohammad Aljaidi, Amneh Alamleh, Aref Abuawad","doi":"10.1109/ACIT57182.2022.9994180","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994180","url":null,"abstract":"Customer reviews are documentation of their experiences about products, places, services, Etc., and these reviews are the focus of interest for both organizations and individuals because they are the main factor for customers in their purchasing choices. This study aims to compare the performance of three well-known dictionaries in rating the polarity of hotel and restaurant reviews.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128532427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures 车载Ad Hoc网络的漏洞及可能的对策
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994082
G. Samara, Mohammed Bhaa Eid, Mohammad Aljaidi, S. Almatarneh, M. Rasmi, Raed Alazaideh, Yasser Al-Lahham
Recently, the Vehicular Ad Hoc Network, or VANET, has emerged as the most essential topic for researchers and the automobile industry to discuss in order to enhance the level of safety enjoyed by road users. Users of VANET need to be able to access both safety-related and non-safety-related apps. In this paper, we offer sixteen different kinds of attacks, as well as potential defenses against them.
近年来,为了提高道路使用者的安全水平,车辆自组织网络(Vehicular Ad Hoc Network,简称VANET)已成为研究人员和汽车行业讨论的最重要的话题。VANET的用户需要能够访问与安全相关和非安全相关的应用程序。在本文中,我们提供了16种不同类型的攻击,以及对它们的潜在防御。
{"title":"Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures","authors":"G. Samara, Mohammed Bhaa Eid, Mohammad Aljaidi, S. Almatarneh, M. Rasmi, Raed Alazaideh, Yasser Al-Lahham","doi":"10.1109/ACIT57182.2022.9994082","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994082","url":null,"abstract":"Recently, the Vehicular Ad Hoc Network, or VANET, has emerged as the most essential topic for researchers and the automobile industry to discuss in order to enhance the level of safety enjoyed by road users. Users of VANET need to be able to access both safety-related and non-safety-related apps. In this paper, we offer sixteen different kinds of attacks, as well as potential defenses against them.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129359023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Current Trends in Internet of Things Forensics 物联网取证的当前趋势
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994213
Nurashidah Musa, N. Mirza, Adnan Ali
Digital forensics is essential when performing in-depth crime investigations and evidence extraction, especially in the field of the Internet of Things, where there is a ton of information every second boosted with latest and smartest technological devices. However, the enormous growth of data and the nature of its complexity could constrain the data examination process since traditional data acquisition techniques are not applicable nowadays. Therefore, if the knowledge gap between digital forensics and the Internet of Things is not bridged, investigators will jeopardize the loss of a possible rich source of evidence that otherwise could act as a lead in solving open cases. The work aims to introduce examples of employing the latest Internet of Things forensics approaches as a panacea in this regard. The paper covers a variety of articles presenting the new Blockchain, fog, and video-based applications that can aid in easing the process of digital forensics investigation with a focus on the Internet of Things. The results of the review indicated that the above current trends are very promising procedures in the field of Internet of Things digital forensics and need to be explored and applied more actively.
在进行深入的犯罪调查和证据提取时,数字取证是必不可少的,特别是在物联网领域,在这个领域,每秒都有大量的信息被最新和最智能的技术设备所推动。然而,由于传统的数据采集技术已不适用,数据的巨大增长及其复杂性可能会限制数据检查过程。因此,如果不能弥合数字取证和物联网之间的知识鸿沟,调查人员将有可能失去一个可能丰富的证据来源,否则这些证据可能会成为解决未决案件的线索。这项工作旨在介绍采用最新的物联网取证方法作为这方面的灵丹妙药的例子。本文涵盖了各种各样的文章,介绍了新的区块链、fog和基于视频的应用程序,这些应用程序可以帮助简化数字取证调查的过程,重点是物联网。综述结果表明,上述趋势是目前物联网数字取证领域非常有前景的程序,需要更积极地探索和应用。
{"title":"Current Trends in Internet of Things Forensics","authors":"Nurashidah Musa, N. Mirza, Adnan Ali","doi":"10.1109/ACIT57182.2022.9994213","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994213","url":null,"abstract":"Digital forensics is essential when performing in-depth crime investigations and evidence extraction, especially in the field of the Internet of Things, where there is a ton of information every second boosted with latest and smartest technological devices. However, the enormous growth of data and the nature of its complexity could constrain the data examination process since traditional data acquisition techniques are not applicable nowadays. Therefore, if the knowledge gap between digital forensics and the Internet of Things is not bridged, investigators will jeopardize the loss of a possible rich source of evidence that otherwise could act as a lead in solving open cases. The work aims to introduce examples of employing the latest Internet of Things forensics approaches as a panacea in this regard. The paper covers a variety of articles presenting the new Blockchain, fog, and video-based applications that can aid in easing the process of digital forensics investigation with a focus on the Internet of Things. The results of the review indicated that the above current trends are very promising procedures in the field of Internet of Things digital forensics and need to be explored and applied more actively.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning Scheme for Managing Virtual Computing Resources in Cloud Market 云市场中虚拟计算资源管理的机器学习方案
Pub Date : 2022-11-22 DOI: 10.1109/ACIT57182.2022.9994186
Bashar Igried, A. Alsarhan, Mohammad Alauthman, Ammar Almomani
Cloud provider can maximize his profit while guaranteeing quality of service (QoS) required by clients. In this work, we propose new scheme for maximizing cloud provider profit while guaranteeing QoS for clients. Cloud provider (CP) manages all available resources on cloud market. The key objective of our scheme is extracting the optimal charging strategy for serving clients requests to maximize CP's profit by choosing proper set of requests to be served, subject to uncertain demand of service and time-varying service cost. As variety of clients classes submit their requests and offer different prices for service, this problem deserves special treatment. To tackle the uncertain service prices, Q-Iearning is proposed to extract the optimal charging policy. Numerical results show that the proposed scheme can improve the reward of CP significantly.
云提供商可以在保证客户所需的服务质量(QoS)的同时实现利润最大化。在这项工作中,我们提出了一种新的方案,以最大化云提供商的利润,同时保证客户的QoS。云提供商(CP)管理云市场上所有可用的资源。该方案的主要目标是在服务需求不确定和服务成本随时间变化的情况下,通过选择合适的服务请求集,提取服务客户请求的最优收费策略,使CP的利润最大化。由于不同的客户阶层提出不同的要求,提供不同的服务价格,这个问题需要特别处理。针对服务价格的不确定性,提出了q -学习方法提取最优收费策略。数值结果表明,该方案能显著提高CP的报酬。
{"title":"Machine learning Scheme for Managing Virtual Computing Resources in Cloud Market","authors":"Bashar Igried, A. Alsarhan, Mohammad Alauthman, Ammar Almomani","doi":"10.1109/ACIT57182.2022.9994186","DOIUrl":"https://doi.org/10.1109/ACIT57182.2022.9994186","url":null,"abstract":"Cloud provider can maximize his profit while guaranteeing quality of service (QoS) required by clients. In this work, we propose new scheme for maximizing cloud provider profit while guaranteeing QoS for clients. Cloud provider (CP) manages all available resources on cloud market. The key objective of our scheme is extracting the optimal charging strategy for serving clients requests to maximize CP's profit by choosing proper set of requests to be served, subject to uncertain demand of service and time-varying service cost. As variety of clients classes submit their requests and offer different prices for service, this problem deserves special treatment. To tackle the uncertain service prices, Q-Iearning is proposed to extract the optimal charging policy. Numerical results show that the proposed scheme can improve the reward of CP significantly.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1