首页 > 最新文献

2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)最新文献

英文 中文
Towards an approach for weaving Open Digital Rights Language into Role-Based Access Control 一种将开放数字权利语言编织到基于角色的访问控制中的方法
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10100036
Aisha Alshamsi, Z. Maamar, M. Kuhail
Establishing an adequate and flexible access control over assets in an organization is one of the main pillars of a successful information and technology security-strategy. To ensure efficient use of these assets in terms of availability, safety, and confidentiality, organizations roll out different strategies and adopt different techniques. These strategies and techniques could be based on roles to set access controls (Role-Based Access Control). Despite its popularity, there is an increasing interest in addressing RBAC's limitations with focus on how to enforce an adequate level of access control over the available resources and how to define a flexible control over these resources so that accessibility and authenticity are achieved at the right time and right place. This paper addresses some of these limitations by adopting the Open Digital Rights Language (ODRL) to express who can do what, where, when, and how. ODRL is a policy language that offers flexible control over digital content. By weaving ODRL into RBAC, this paper illustrates how to specify what users are allowed, not allowed, and must be allowed to do through a set of constrained rules specialized into permissions, prohibitions, and duties.
对组织中的资产建立充分而灵活的访问控制是成功的信息和技术安全策略的主要支柱之一。为了确保在可用性、安全性和机密性方面有效地使用这些资产,组织推出了不同的策略并采用了不同的技术。这些策略和技术可以基于角色来设置访问控制(基于角色的访问控制)。尽管RBAC很流行,但人们越来越关注如何对可用资源实施适当级别的访问控制,以及如何定义对这些资源的灵活控制,以便在正确的时间和正确的位置实现可访问性和真实性。本文通过采用开放数字权利语言(ODRL)来表达谁可以做什么、在哪里、何时以及如何做,从而解决了其中的一些限制。ODRL是一种策略语言,提供对数字内容的灵活控制。通过将ODRL编织到RBAC中,本文说明了如何通过一组专门用于权限、禁止和职责的约束规则来指定允许、不允许和必须允许用户做什么。
{"title":"Towards an approach for weaving Open Digital Rights Language into Role-Based Access Control","authors":"Aisha Alshamsi, Z. Maamar, M. Kuhail","doi":"10.1109/ITIKD56332.2023.10100036","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10100036","url":null,"abstract":"Establishing an adequate and flexible access control over assets in an organization is one of the main pillars of a successful information and technology security-strategy. To ensure efficient use of these assets in terms of availability, safety, and confidentiality, organizations roll out different strategies and adopt different techniques. These strategies and techniques could be based on roles to set access controls (Role-Based Access Control). Despite its popularity, there is an increasing interest in addressing RBAC's limitations with focus on how to enforce an adequate level of access control over the available resources and how to define a flexible control over these resources so that accessibility and authenticity are achieved at the right time and right place. This paper addresses some of these limitations by adopting the Open Digital Rights Language (ODRL) to express who can do what, where, when, and how. ODRL is a policy language that offers flexible control over digital content. By weaving ODRL into RBAC, this paper illustrates how to specify what users are allowed, not allowed, and must be allowed to do through a set of constrained rules specialized into permissions, prohibitions, and duties.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125218944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Factor Authentication Modeling using Petri Nets: Review 使用Petri网的多因素认证建模:综述
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099567
Maryam Waheed Alawadhi, Wasan Shaker Awad
As the cyber security field enhanced within years, threats and vulnerabilities have increased massively among the world by each second. Such risks have resulted an immediate action by businesses and organization by implementing and deploying different technologies in order to secure and defend such attacks that may cause problematic actions by hackers. This paper will discuss one of the key techniques to increase the security for the organizations' data. Multi-Factor Authentication (MFA) is known as a technique that uses two - or more- factors of authentication when accessing the systems/software of the business in order to rise data's protection. However, to design and plan the implementation of such technique, another model is presented and benchmarked with other models mentioned to improve the representation of MFA using Petri Nets.
近年来,随着网络安全领域的不断加强,全球范围内的威胁和漏洞每秒都在大量增加。这些风险导致企业和组织通过实施和部署不同的技术来立即采取行动,以保护和防御可能导致黑客采取问题行动的此类攻击。本文将讨论提高组织数据安全性的关键技术之一。多因素身份验证(MFA)是一种在访问业务系统/软件时使用两个或多个身份验证因素以提高数据保护的技术。然而,为了设计和规划这种技术的实现,提出了另一个模型,并与提到的其他模型进行了基准测试,以改进使用Petri网的MFA表示。
{"title":"Multi-Factor Authentication Modeling using Petri Nets: Review","authors":"Maryam Waheed Alawadhi, Wasan Shaker Awad","doi":"10.1109/ITIKD56332.2023.10099567","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099567","url":null,"abstract":"As the cyber security field enhanced within years, threats and vulnerabilities have increased massively among the world by each second. Such risks have resulted an immediate action by businesses and organization by implementing and deploying different technologies in order to secure and defend such attacks that may cause problematic actions by hackers. This paper will discuss one of the key techniques to increase the security for the organizations' data. Multi-Factor Authentication (MFA) is known as a technique that uses two - or more- factors of authentication when accessing the systems/software of the business in order to rise data's protection. However, to design and plan the implementation of such technique, another model is presented and benchmarked with other models mentioned to improve the representation of MFA using Petri Nets.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125796692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Baseline Estimation in Face Detection for AI Proctored Examinations through Convoluted Neural Networks 基于卷积神经网络的人工智能监考人脸检测基线估计
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10100328
Abdelrahman Shata, Zineddine N. Haitaamar, A. Benkrid
The COVID-19 pandemic took the world by surprise, and everything came to a halt. The education sector had to adjust accordingly by shifting to online learning. If the online delivery experience was overall successful, assessment integrity becomes questionable as examinees still manage to circumvent the anti-plagiarism mechanism put in place. In this paper, we propose an artificial intelligence solution using face and head pose detection to estimate the neutral position of the examinee which will form the basis to detect any suspicious behavior. The resulting implementation achieved a 97% accuracy when detecting the examinee in the frame and a 98% accuracy when there are multiple faces detected.
2019冠状病毒病大流行震惊世界,一切都停止了。教育部门不得不相应地调整,转向在线学习。如果在线交付体验总体上是成功的,评估的完整性就会受到质疑,因为考生仍然设法绕过已经到位的反剽窃机制。在本文中,我们提出了一种人工智能解决方案,使用面部和头部姿势检测来估计考生的中立位置,这将成为检测任何可疑行为的基础。当检测到帧中的考生时,最终实现的准确率为97%,当检测到多个人脸时,准确率为98%。
{"title":"Baseline Estimation in Face Detection for AI Proctored Examinations through Convoluted Neural Networks","authors":"Abdelrahman Shata, Zineddine N. Haitaamar, A. Benkrid","doi":"10.1109/ITIKD56332.2023.10100328","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10100328","url":null,"abstract":"The COVID-19 pandemic took the world by surprise, and everything came to a halt. The education sector had to adjust accordingly by shifting to online learning. If the online delivery experience was overall successful, assessment integrity becomes questionable as examinees still manage to circumvent the anti-plagiarism mechanism put in place. In this paper, we propose an artificial intelligence solution using face and head pose detection to estimate the neutral position of the examinee which will form the basis to detect any suspicious behavior. The resulting implementation achieved a 97% accuracy when detecting the examinee in the frame and a 98% accuracy when there are multiple faces detected.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125580288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware doppler shift emulation and compensation for LoRa LEO satellite communication LoRa低轨卫星通信硬件多普勒频移仿真与补偿
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10100192
V. Subramanian, Jayakumar V. Karunamurthy, Balaji Ramachandran
LoRa is the de facto wireless platform of the Internet of Things (IoT). It is a smart and globally accepted low power ultra-long range, low-data rate communication protocol widely used for low frequent sensor telemetry and actuation. The simplicity, license-free spectrum, and long range enable the end user to transmit data even to Low Earth Orbit (LEO) satellites. The relative velocity of the LEO satellite from a stationary transmitter on the earth's surface is very high and time-varying, because of its short orbital period and high velocity, due to which the doppler shift and doppler rate are more prominent. LEO satellite signal reception is highest at the mid-pass duration, but unfortunately, the doppler rate is also highest during the same duration. In LoRa communication protocol, a higher spreading factor (SF12) results in better signal reception and communication range. But the LoRa communication at a higher spreading factor (SF12) results in packet error mainly due to the doppler rate, due to which a transmitter is forced to choose a lower spreading factor (SF9). This paper looks at precisely emulating the doppler shift and doppler rate for the entire pass duration of a LEO satellite using dynamic external hardware clock manipulation on an SX1262 LoRa chipset. A low-cost transmitter-side hardware doppler compensation technique is also explored, which encourages the transmitter to use a higher spreading factor (SF12) for better-guaranteed packet reception by the satellite.
LoRa实际上是物联网(IoT)的无线平台。它是一种智能的、全球公认的低功耗超长距离、低数据速率通信协议,广泛用于低频传感器遥测和驱动。其简单性、免许可频谱和长距离使最终用户甚至可以向低地球轨道(LEO)卫星传输数据。近地轨道卫星轨道周期短,速度快,从地球表面静止发射机发射的相对速度非常快,而且时变,因此多普勒频移和多普勒速率更加突出。低轨道卫星信号接收在中通持续时间是最高的,但不幸的是,在同一持续时间内,多普勒率也是最高的。在LoRa通信协议中,更高的扩频因子(SF12)可以获得更好的信号接收和通信范围。但在较高的扩频因子(SF12)下的LoRa通信主要由于多普勒速率导致包错误,因此发射机被迫选择较低的扩频因子(SF9)。本文着眼于在SX1262 LoRa芯片组上使用动态外部硬件时钟操作精确模拟LEO卫星整个通过时间内的多普勒频移和多普勒速率。本文还探讨了一种低成本的发射机侧硬件多普勒补偿技术,该技术鼓励发射机使用更高的扩频因子(SF12)来更好地保证卫星接收数据包。
{"title":"Hardware doppler shift emulation and compensation for LoRa LEO satellite communication","authors":"V. Subramanian, Jayakumar V. Karunamurthy, Balaji Ramachandran","doi":"10.1109/ITIKD56332.2023.10100192","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10100192","url":null,"abstract":"LoRa is the de facto wireless platform of the Internet of Things (IoT). It is a smart and globally accepted low power ultra-long range, low-data rate communication protocol widely used for low frequent sensor telemetry and actuation. The simplicity, license-free spectrum, and long range enable the end user to transmit data even to Low Earth Orbit (LEO) satellites. The relative velocity of the LEO satellite from a stationary transmitter on the earth's surface is very high and time-varying, because of its short orbital period and high velocity, due to which the doppler shift and doppler rate are more prominent. LEO satellite signal reception is highest at the mid-pass duration, but unfortunately, the doppler rate is also highest during the same duration. In LoRa communication protocol, a higher spreading factor (SF12) results in better signal reception and communication range. But the LoRa communication at a higher spreading factor (SF12) results in packet error mainly due to the doppler rate, due to which a transmitter is forced to choose a lower spreading factor (SF9). This paper looks at precisely emulating the doppler shift and doppler rate for the entire pass duration of a LEO satellite using dynamic external hardware clock manipulation on an SX1262 LoRa chipset. A low-cost transmitter-side hardware doppler compensation technique is also explored, which encourages the transmitter to use a higher spreading factor (SF12) for better-guaranteed packet reception by the satellite.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud Classification In Financial Statements Using Machine Learning Techniques 利用机器学习技术在财务报表中进行舞弊分类
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10100257
Abdulla Hussain Ali Mohamed, S. Subramanian
With the blooming of technology, the financial sector has shown various number of improvements and has provided multiple e-financial services. Frauds can occur easily and quickly in data that lack safety levels. Although there are many laws that reduces the outcome of hacking, but unfortunately these laws cannot keep up with the enormous increase of hacking attacks level that are present. In this research, Bayes point machine, Random Forest, Cat Boost, Decision tree and Isolation Forest algorithms were applied on the credit card dataset, and it was found that Random Forest algorithm was outperforming well comparing to other algorithms.
随着科技的蓬勃发展,金融领域出现了各种各样的改进,并提供了多种电子金融服务。在缺乏安全级别的数据中,欺诈很容易迅速发生。虽然有许多法律可以减少黑客攻击的后果,但不幸的是,这些法律无法跟上目前黑客攻击水平的巨大增长。本研究将贝叶斯点机、随机森林、Cat Boost、决策树和隔离森林算法应用于信用卡数据集,发现随机森林算法比其他算法表现更好。
{"title":"Fraud Classification In Financial Statements Using Machine Learning Techniques","authors":"Abdulla Hussain Ali Mohamed, S. Subramanian","doi":"10.1109/ITIKD56332.2023.10100257","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10100257","url":null,"abstract":"With the blooming of technology, the financial sector has shown various number of improvements and has provided multiple e-financial services. Frauds can occur easily and quickly in data that lack safety levels. Although there are many laws that reduces the outcome of hacking, but unfortunately these laws cannot keep up with the enormous increase of hacking attacks level that are present. In this research, Bayes point machine, Random Forest, Cat Boost, Decision tree and Isolation Forest algorithms were applied on the credit card dataset, and it was found that Random Forest algorithm was outperforming well comparing to other algorithms.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116287752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for Labor Market Analysis using Machine Learning 使用机器学习的劳动力市场分析框架
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099838
Noor Alsayed, W. Awad
Combining machine learning and labor market data is advantageous for jobseekers, companies, and decision-makers. Jobs in great demand in the future can be predicted using machine learning algorithms and data collected from the labor market. This study highlights the importance of labor market analysis and the economic impact of merging machine learning with labor market analysis as media impacts the labor market. This study presents a framework model recommended for analyzing online job postings and news to determine in-demand industries, occupations, and skills. The study indicates that the framework simulates labor market intelligence where results are more efficient and give a faster examination of labor market trends-utilizing the news offered reliable insight into forthcoming labor market trends.
机器学习和劳动力市场数据的结合对求职者、公司和决策者都是有利的。使用机器学习算法和从劳动力市场收集的数据可以预测未来需求量很大的工作。这项研究强调了劳动力市场分析的重要性,以及随着媒体对劳动力市场的影响,将机器学习与劳动力市场分析结合起来的经济影响。本研究提出了一个框架模型,推荐用于分析在线招聘和新闻,以确定需求的行业,职业和技能。该研究表明,该框架模拟了劳动力市场情报,其结果更有效,并能更快地检查劳动力市场趋势——利用新闻提供的对即将到来的劳动力市场趋势的可靠洞察。
{"title":"A framework for Labor Market Analysis using Machine Learning","authors":"Noor Alsayed, W. Awad","doi":"10.1109/ITIKD56332.2023.10099838","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099838","url":null,"abstract":"Combining machine learning and labor market data is advantageous for jobseekers, companies, and decision-makers. Jobs in great demand in the future can be predicted using machine learning algorithms and data collected from the labor market. This study highlights the importance of labor market analysis and the economic impact of merging machine learning with labor market analysis as media impacts the labor market. This study presents a framework model recommended for analyzing online job postings and news to determine in-demand industries, occupations, and skills. The study indicates that the framework simulates labor market intelligence where results are more efficient and give a faster examination of labor market trends-utilizing the news offered reliable insight into forthcoming labor market trends.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125716048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Era of Internet of Things: Towards better security using machine learning 物联网时代:利用机器学习实现更好的安全性
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099608
Husain Abdulla, Hamed S. Al-Raweshidy, W. Awad
The IoT has various applications in various industries, including logistics tracking, healthcare, automotive, and smart cities. To prepare for a future in which the IoT is everywhere and accessible from anywhere, it is more necessary than ever to address significant IoT security concerns. Traditional methods of securing IoT networks, which include applying security in the form of a “patch” against known vulnerabilities, are ineffective due to the growing scale of IoT networks, the characteristics of IoT devices, and the complexity of IoT networks. Machine Learning-based security systems and solutions have the potential to address the issues in traditional approaches to improve the security of the IoT Networks. In this paper, we show the existing challenges in securing IoT devices. We also explore the gaps in the research related to applying machine learning to securing IoT Devices. Through this research, we aim to encourage researchers to discover techniques to make the Internet of Things ecosystem safer.
物联网在各个行业都有各种应用,包括物流跟踪、医疗保健、汽车和智能城市。为了应对物联网无处不在、可从任何地方访问的未来,解决重大的物联网安全问题比以往任何时候都更有必要。由于物联网网络的规模不断扩大、物联网设备的特点以及物联网网络的复杂性,保护物联网网络的传统方法(包括针对已知漏洞以“补丁”的形式应用安全性)已经失效。基于机器学习的安全系统和解决方案有潜力解决传统方法中的问题,以提高物联网网络的安全性。在本文中,我们展示了保护物联网设备的现有挑战。我们还探讨了与应用机器学习保护物联网设备相关的研究差距。通过这项研究,我们旨在鼓励研究人员发现使物联网生态系统更安全的技术。
{"title":"The Era of Internet of Things: Towards better security using machine learning","authors":"Husain Abdulla, Hamed S. Al-Raweshidy, W. Awad","doi":"10.1109/ITIKD56332.2023.10099608","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099608","url":null,"abstract":"The IoT has various applications in various industries, including logistics tracking, healthcare, automotive, and smart cities. To prepare for a future in which the IoT is everywhere and accessible from anywhere, it is more necessary than ever to address significant IoT security concerns. Traditional methods of securing IoT networks, which include applying security in the form of a “patch” against known vulnerabilities, are ineffective due to the growing scale of IoT networks, the characteristics of IoT devices, and the complexity of IoT networks. Machine Learning-based security systems and solutions have the potential to address the issues in traditional approaches to improve the security of the IoT Networks. In this paper, we show the existing challenges in securing IoT devices. We also explore the gaps in the research related to applying machine learning to securing IoT Devices. Through this research, we aim to encourage researchers to discover techniques to make the Internet of Things ecosystem safer.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133763457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Role of Knowledge Sharing in Reinforcing Civic Engagement Practices in the context of Artificial Intelligence: The Case of the Kingdom of Bahrain 人工智能背景下知识共享在加强公民参与实践中的作用:以巴林王国为例
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10100329
Husain al Ansari, Fatema Alnasser
This research paper assesses the influence of knowledge sharing on reinforcing knowledge sharing in the context of AI in Bahrain. Since civic engagement is mainly made up of two components which are trust and value, the research seeks to examine the influence of knowledge sharing both on trust and value. The research is a quantitative one that makes use of the experimental design. The research makes use of the questionnaire as a research tool for collecting data. An experiment is applied on the sample of the research in which a chatbot is applied to examine university students' knowledge about using AI for the purpose of knowledge sharing especially through social media platforms. The questionnaire is applied in Pre-experiment stage and post-experiment. The population included 387university students. One hundred were required to complete it pre the experiment. The post-experiment stage 263responses were delivered. The data analysis made the researcher conclude that there is a significant difference toward the influence of knowledge sharing on Civic engagement in the kingdom of Bahrain attributed to the data collected pre and post the experiment. It was also concluded that the relationships between knowledge sharing and civic engagement, and between knowledge sharing and trust and values, indicate a conceptual framework which adds to the existing body of literature in this knowledge domain.
本研究论文评估了巴林人工智能背景下知识共享对加强知识共享的影响。由于公民参与主要由信任和价值两个组成部分组成,因此本研究旨在考察知识共享对信任和价值的影响。本研究是利用实验设计的定量研究。本研究利用问卷作为收集数据的研究工具。在研究样本上应用了一个实验,其中使用聊天机器人来检查大学生关于使用人工智能进行知识分享的知识,特别是通过社交媒体平台。实验前和实验后分别采用问卷调查。调查对象包括387名大学生。在实验前,100人需要完成它。实验后阶段共收到263份回复。通过数据分析,研究人员得出结论,由于实验前后收集的数据,巴林王国的知识共享对公民参与的影响存在显著差异。研究还得出结论,知识共享与公民参与之间的关系,以及知识共享与信任和价值观之间的关系,表明了一个概念框架,增加了这一知识领域现有文献的内容。
{"title":"The Role of Knowledge Sharing in Reinforcing Civic Engagement Practices in the context of Artificial Intelligence: The Case of the Kingdom of Bahrain","authors":"Husain al Ansari, Fatema Alnasser","doi":"10.1109/ITIKD56332.2023.10100329","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10100329","url":null,"abstract":"This research paper assesses the influence of knowledge sharing on reinforcing knowledge sharing in the context of AI in Bahrain. Since civic engagement is mainly made up of two components which are trust and value, the research seeks to examine the influence of knowledge sharing both on trust and value. The research is a quantitative one that makes use of the experimental design. The research makes use of the questionnaire as a research tool for collecting data. An experiment is applied on the sample of the research in which a chatbot is applied to examine university students' knowledge about using AI for the purpose of knowledge sharing especially through social media platforms. The questionnaire is applied in Pre-experiment stage and post-experiment. The population included 387university students. One hundred were required to complete it pre the experiment. The post-experiment stage 263responses were delivered. The data analysis made the researcher conclude that there is a significant difference toward the influence of knowledge sharing on Civic engagement in the kingdom of Bahrain attributed to the data collected pre and post the experiment. It was also concluded that the relationships between knowledge sharing and civic engagement, and between knowledge sharing and trust and values, indicate a conceptual framework which adds to the existing body of literature in this knowledge domain.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"437 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123608895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic-based Job Recommendation Framework Using OWL Ontology 基于OWL本体的基于语义的工作推荐框架
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099674
Eman H. Alkhammash
This paper proposes a new semantic framework for a job recommendation based on OWL ontology. The proposed framework will aid in the job search and recruitment process. The framework consists of a number of techniques: A web crawler is used to collect information from various web sites, the OWL job recommendation ontology provides a well-defined semantic model related to the job domain, SP ARQL constructs queries on OWL ontologies, EasyRDF allows sending SP ARQL queries to a third party server Virtuoso which will handle it and retrieve the results. The proposed framework recommends a suitable career opportunity for people based on their qualifications, skills, technological background, and so on. The OWL job recommendation ontology has been developed using Protégé 5.5.0 and the main components of the concepts and relations are discussed. The OWL ontology gives semantics to job information gathered from the web and enables more effective management, sharing, and recommendation of job information.
提出了一种新的基于OWL本体的工作推荐语义框架。拟议的框架将有助于求职和招聘过程。该框架由许多技术组成:网络爬虫用于从各种网站收集信息,OWL作业推荐本体提供了与作业域相关的定义良好的语义模型,SP ARQL在OWL本体上构造查询,EasyRDF允许将SP ARQL查询发送给第三方服务器Virtuoso,由后者处理并检索结果。拟议的框架根据人们的资格、技能、技术背景等为他们推荐合适的职业机会。使用prot 5.5.0开发了OWL作业推荐本体,并讨论了概念和关系的主要组成部分。OWL本体为从web收集的职位信息提供语义,并支持对职位信息进行更有效的管理、共享和推荐。
{"title":"Semantic-based Job Recommendation Framework Using OWL Ontology","authors":"Eman H. Alkhammash","doi":"10.1109/ITIKD56332.2023.10099674","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099674","url":null,"abstract":"This paper proposes a new semantic framework for a job recommendation based on OWL ontology. The proposed framework will aid in the job search and recruitment process. The framework consists of a number of techniques: A web crawler is used to collect information from various web sites, the OWL job recommendation ontology provides a well-defined semantic model related to the job domain, SP ARQL constructs queries on OWL ontologies, EasyRDF allows sending SP ARQL queries to a third party server Virtuoso which will handle it and retrieve the results. The proposed framework recommends a suitable career opportunity for people based on their qualifications, skills, technological background, and so on. The OWL job recommendation ontology has been developed using Protégé 5.5.0 and the main components of the concepts and relations are discussed. The OWL ontology gives semantics to job information gathered from the web and enables more effective management, sharing, and recommendation of job information.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"206 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Games Data Storing Methods, Vulnerabilities, and Solutions 网络游戏数据存储方法、漏洞和解决方案
Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099671
Moaiad Ahmed Khder, Samer Shorman, Ahmed Ali, Mohammed O. Al-Mudaifa
online games provide a competitive environment where most players compete and try to gain advantages by efficiently using game mechanics and resources provided by the gameplay loop. This competitive nature of online games sometimes goes above and beyond where some players resort to using unethical methods such as: Cheating, exploiting bugs and vulnerabilities which provide them with unfair advantages over most normal players. This results in normal players leaving the game as they lose the desire to continue playing in an unfair environment. Failure to combat such behaviour causes huge damage to the player base, game itself, company revenue and reputation. Persistent Massively Multiplayer Online Games can contain thousands of players sharing the same world view. the large number of updates performed each second has made storing the game state a big challenge, the game state should not be lost when a crash or failure to the server happen, commonly implemented solution fixes this problem by trading consistency with efficiency due to the database limited capability of handling large amount of data. This paper aims to shed a light on current popular user data storage methods, their vulnerabilities and propose a solution.. This paper aims to shed a light on current popular user data storage methods, their vulnerabilities and propose a solution
在线游戏提供了一个竞争环境,大多数玩家通过有效利用游戏机制和游戏循环提供的资源来竞争并获得优势。在线游戏的竞争性质有时会超出一些玩家使用不道德方法的范围,如作弊、利用漏洞和漏洞,这些方法为他们提供了比大多数普通玩家更不公平的优势。这将导致普通玩家离开游戏,因为他们在不公平的环境中失去了继续游戏的欲望。如果不能对抗这种行为,就会对玩家基础、游戏本身、公司收益和声誉造成巨大损害。持久的大型多人在线游戏可以包含数千名共享相同世界观的玩家。每秒执行的大量更新使得存储游戏状态成为一个巨大的挑战,当服务器发生崩溃或故障时,游戏状态不应该丢失,通常执行的解决方案通过交易一致性和效率来解决这个问题,因为数据库处理大量数据的能力有限。本文旨在揭示当前流行的用户数据存储方法及其漏洞,并提出解决方案。本文旨在揭示当前流行的用户数据存储方法及其漏洞,并提出解决方案
{"title":"Online Games Data Storing Methods, Vulnerabilities, and Solutions","authors":"Moaiad Ahmed Khder, Samer Shorman, Ahmed Ali, Mohammed O. Al-Mudaifa","doi":"10.1109/ITIKD56332.2023.10099671","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099671","url":null,"abstract":"online games provide a competitive environment where most players compete and try to gain advantages by efficiently using game mechanics and resources provided by the gameplay loop. This competitive nature of online games sometimes goes above and beyond where some players resort to using unethical methods such as: Cheating, exploiting bugs and vulnerabilities which provide them with unfair advantages over most normal players. This results in normal players leaving the game as they lose the desire to continue playing in an unfair environment. Failure to combat such behaviour causes huge damage to the player base, game itself, company revenue and reputation. Persistent Massively Multiplayer Online Games can contain thousands of players sharing the same world view. the large number of updates performed each second has made storing the game state a big challenge, the game state should not be lost when a crash or failure to the server happen, commonly implemented solution fixes this problem by trading consistency with efficiency due to the database limited capability of handling large amount of data. This paper aims to shed a light on current popular user data storage methods, their vulnerabilities and propose a solution.. This paper aims to shed a light on current popular user data storage methods, their vulnerabilities and propose a solution","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130263280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1