首页 > 最新文献

2019 International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
Image Caption Generation Using A Deep Architecture 使用深度架构生成图像标题
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8990998
A. Hani, Najiba Tagougui, M. Kherallah
Recently, image captioning is a new challenging task that has gathered widespread interest. The task involves generating a concise description of an image in natural language and is currently accomplished by techniques that use a combination of computer vision (CV), natural language processing (NLP), and machine learning methods.In this paper, we presented a model that generates natural language description of an image. We used a combination of convolutional neural networks to extract features and then used recurrent neural networks to generate text from these features. We incorporated the attention mechanism while generating captions. We evaluated the model on MSCOCO database. The obtained results are promising and competitive.
近年来,图像字幕是一项具有挑战性的新课题,引起了人们的广泛关注。该任务涉及用自然语言生成图像的简明描述,目前通过结合使用计算机视觉(CV),自然语言处理(NLP)和机器学习方法的技术来完成。在本文中,我们提出了一个生成图像自然语言描述的模型。我们使用卷积神经网络的组合来提取特征,然后使用循环神经网络从这些特征中生成文本。我们在生成字幕时加入了注意力机制。我们在MSCOCO数据库上对模型进行了评估。所得结果具有一定的前景和竞争力。
{"title":"Image Caption Generation Using A Deep Architecture","authors":"A. Hani, Najiba Tagougui, M. Kherallah","doi":"10.1109/ACIT47987.2019.8990998","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990998","url":null,"abstract":"Recently, image captioning is a new challenging task that has gathered widespread interest. The task involves generating a concise description of an image in natural language and is currently accomplished by techniques that use a combination of computer vision (CV), natural language processing (NLP), and machine learning methods.In this paper, we presented a model that generates natural language description of an image. We used a combination of convolutional neural networks to extract features and then used recurrent neural networks to generate text from these features. We incorporated the attention mechanism while generating captions. We evaluated the model on MSCOCO database. The obtained results are promising and competitive.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Sentiment Analysis of Yelp using Advanced V Model 基于高级V模型的Yelp情感分析
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991001
A. Shaout, Udit Gami
Yelp is a business review site that helps people find relevant places, based on the informed opinions of its users. It uses a five-point star rating system with user reviews. The main aim of the paper is to analyze sentiments on the reviews and devise a new five-scale sentiment rating to match it to the star rating that the user provided. Following the n-gram approach, this paper analyzes the adjective and adverbs occurring sequences and determines the trend or pattern of occurrence. After calculating a weighted score for each review, users’ ratings are predicted by treating multi class classification using different classifiers. The objective of the research in this paper is to try and determine how accurate the users are, in giving the ratings by comparing their star based on the calculated results.
Yelp是一个商业评论网站,帮助人们根据用户的意见找到相关的地方。它使用带有用户评论的五星评级系统。本文的主要目的是分析评论上的情绪,并设计一个新的五级情绪评级,将其与用户提供的星级评级相匹配。本文采用n-gram方法,分析形容词和副词的发生顺序,确定其发生的趋势或模式。在计算每个评论的加权分数后,通过使用不同的分类器处理多类分类来预测用户的评分。本文研究的目的是试图确定用户在给出评级时的准确性,根据计算结果比较他们的星级。
{"title":"Sentiment Analysis of Yelp using Advanced V Model","authors":"A. Shaout, Udit Gami","doi":"10.1109/ACIT47987.2019.8991001","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991001","url":null,"abstract":"Yelp is a business review site that helps people find relevant places, based on the informed opinions of its users. It uses a five-point star rating system with user reviews. The main aim of the paper is to analyze sentiments on the reviews and devise a new five-scale sentiment rating to match it to the star rating that the user provided. Following the n-gram approach, this paper analyzes the adjective and adverbs occurring sequences and determines the trend or pattern of occurrence. After calculating a weighted score for each review, users’ ratings are predicted by treating multi class classification using different classifiers. The objective of the research in this paper is to try and determine how accurate the users are, in giving the ratings by comparing their star based on the calculated results.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115557292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Exfiltration Techniques and Data Loss Prevention System 数据泄露技术和数据丢失预防系统
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991131
Hamzeh Al-Kilani, Mohammed Nasereddin, Ali Hadi, Sara Tedmori
One of the primary concerns of data security specialists is to mitigate insider threats and prevent data leaks. Often, unfortunately, insider threats go unnoticed. In most cases, the longer such activity goes unnoticed, the greater the resulting damages are likely to be. This paper provides an overview of the basic data exfiltration techniques that deal with file structures and were utilized in multiple scenarios in an attempt to bypass a Data Loss Prevention system. Details show which of the scenarios have been detected and which have not been by the Data Loss Prevention system. The paper also proposed solutions for the undetected scenarios.
数据安全专家的主要关注点之一是减轻内部威胁并防止数据泄漏。不幸的是,内部威胁常常被忽视。在大多数情况下,这种活动被忽视的时间越长,可能造成的损害就越大。本文概述了处理文件结构的基本数据泄露技术,并在多种情况下利用这些技术试图绕过数据丢失预防系统。详细信息显示数据丢失预防系统已检测到哪些场景,哪些场景未检测到。本文还针对未检测到的场景提出了解决方案。
{"title":"Data Exfiltration Techniques and Data Loss Prevention System","authors":"Hamzeh Al-Kilani, Mohammed Nasereddin, Ali Hadi, Sara Tedmori","doi":"10.1109/ACIT47987.2019.8991131","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991131","url":null,"abstract":"One of the primary concerns of data security specialists is to mitigate insider threats and prevent data leaks. Often, unfortunately, insider threats go unnoticed. In most cases, the longer such activity goes unnoticed, the greater the resulting damages are likely to be. This paper provides an overview of the basic data exfiltration techniques that deal with file structures and were utilized in multiple scenarios in an attempt to bypass a Data Loss Prevention system. Details show which of the scenarios have been detected and which have not been by the Data Loss Prevention system. The paper also proposed solutions for the undetected scenarios.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced E-Voting Protocol Based on Public Key Cryptography 基于公钥加密的增强型电子投票协议
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8990991
Hani Almimi, Samar A. Shahin, M. S. Daoud, Mustafa A. Al-Fayoumi, Yazeed Ghadi
This paper proposes an e-voting protocol to allow voting to be done from any location and still abide with the laws of security including identification, authentication, integrity, and anonymity.The proposed method relies on public key encryption that uses two pairs of certificates one for citizens containing private/public key pairs and the second for National Information Technology Center (NITC) that also contains private/public key pairs.NITC will be acting as a trusted certificate authority by to citizens and government. It is considered an objective and neutral unprejudiced party where no other governmental party has authority upon elections and is auditable by the independent election commission.
本文提出了一种电子投票协议,允许在任何地点进行投票,并且仍然遵守安全法律,包括身份、认证、完整性和匿名性。所提出的方法依赖于使用两对证书的公钥加密,一对证书用于公民,其中包含私钥/公钥对,另一对用于国家信息技术中心(NITC),其中也包含私钥/公钥对。NITC将成为公民和政府信任的证书颁发机构。它被认为是一个客观、中立、无偏见的政党,没有其他政府政党对选举有权力,并可由独立的选举委员会进行审计。
{"title":"Enhanced E-Voting Protocol Based on Public Key Cryptography","authors":"Hani Almimi, Samar A. Shahin, M. S. Daoud, Mustafa A. Al-Fayoumi, Yazeed Ghadi","doi":"10.1109/ACIT47987.2019.8990991","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990991","url":null,"abstract":"This paper proposes an e-voting protocol to allow voting to be done from any location and still abide with the laws of security including identification, authentication, integrity, and anonymity.The proposed method relies on public key encryption that uses two pairs of certificates one for citizens containing private/public key pairs and the second for National Information Technology Center (NITC) that also contains private/public key pairs.NITC will be acting as a trusted certificate authority by to citizens and government. It is considered an objective and neutral unprejudiced party where no other governmental party has authority upon elections and is auditable by the independent election commission.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123204203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Priority-Based Channel Access for SAN Protocol in M2M Communication M2M通信中基于优先级的SAN协议信道访问
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991094
M. Shurman, Wafaa Alkahla, Haya R. Hasan
Recently NOMA (Non-Orthogonal Multiple Access) has been examined when applied with slotted ALOHA protocol for uncoordinated transmissions. Slotted ALOHA-NOMA (SAN) protocol effectively raised the throughput of the network without any need for bandwidth expansion. In this paper, we consider how employing the priority on channel access in SAN protocol can reduce the collisions and increase the throughput. Meanwhile, we suggest an algorithm based on the priority of the SAN nodes. The simulation outcomes show our proposed Priority-SAN has improved the throughput performance compared with the SAN protocol.
最近研究了NOMA(非正交多址)与开槽ALOHA协议在非协调传输中的应用。开槽ALOHA-NOMA (SAN)协议在不需要带宽扩展的情况下有效地提高了网络的吞吐量。本文研究了如何在SAN协议的信道访问中使用优先级来减少冲突和提高吞吐量。同时,我们提出了一种基于SAN节点优先级的算法。仿真结果表明,与SAN协议相比,我们提出的优先级SAN协议提高了吞吐量性能。
{"title":"Priority-Based Channel Access for SAN Protocol in M2M Communication","authors":"M. Shurman, Wafaa Alkahla, Haya R. Hasan","doi":"10.1109/ACIT47987.2019.8991094","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991094","url":null,"abstract":"Recently NOMA (Non-Orthogonal Multiple Access) has been examined when applied with slotted ALOHA protocol for uncoordinated transmissions. Slotted ALOHA-NOMA (SAN) protocol effectively raised the throughput of the network without any need for bandwidth expansion. In this paper, we consider how employing the priority on channel access in SAN protocol can reduce the collisions and increase the throughput. Meanwhile, we suggest an algorithm based on the priority of the SAN nodes. The simulation outcomes show our proposed Priority-SAN has improved the throughput performance compared with the SAN protocol.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opinion Mining: Applications Trends 意见挖掘:应用趋势
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8990986
Ibtisam Mohammed Albahri
With current rapid technology acceleration, and an enormous quantity of generated data. From, Clouds, networks, social media, and statistics. a novel technology appears to facilitate and come out with valuable knowledge that can be useful In all life levels, tasks and profitability returns. Massive quantities of data consider as assets for the government, enterprises, and even individuals. This paper aimed to presents a literature review regarding sentiment analysis and opinion mining recent applications area.
随着当前技术的快速加速,以及产生的大量数据。来自,云,网络,社会媒体和统计。一项新技术似乎促进并产生了有价值的知识,这些知识可以在生活的各个层面、任务和利润回报中发挥作用。海量数据被视为政府、企业甚至个人的资产。本文旨在对情感分析和意见挖掘的最新应用领域进行文献综述。
{"title":"Opinion Mining: Applications Trends","authors":"Ibtisam Mohammed Albahri","doi":"10.1109/ACIT47987.2019.8990986","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990986","url":null,"abstract":"With current rapid technology acceleration, and an enormous quantity of generated data. From, Clouds, networks, social media, and statistics. a novel technology appears to facilitate and come out with valuable knowledge that can be useful In all life levels, tasks and profitability returns. Massive quantities of data consider as assets for the government, enterprises, and even individuals. This paper aimed to presents a literature review regarding sentiment analysis and opinion mining recent applications area.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123371235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Real Time Road Sign System 一种智能实时道路标志系统
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991065
A. Shaout, A. Hassani
This paper presents an intelligent road sign that provides real time travel time and road conditions. The behavior of US Interstate 94 was modelled, where the typical road throughput was simulated and published to an MQTT broker for the embedded system to display the expected travel time to Ann Arbor, Michigan from the US23 junction. The embedded system additionally sampled a digital temperature and humidity sensor to note road conditions, where an external input allowed operators to provide a real time update when an unexpected event causes traffic (i.e. vehicle collision) or when the road has been cleared. System requirements, design, implementation details, and performance evaluation are included.
本文提出了一种实时提供行车时间和路况信息的智能路标。我们对美国94号州际公路的行为进行了建模,其中模拟了典型的道路吞吐量,并将其发布给MQTT代理,以便嵌入式系统显示从美国23号州际公路到密歇根州安娜堡的预期旅行时间。此外,嵌入式系统还对数字温度和湿度传感器进行采样,以记录路况,当意外事件导致交通堵塞(例如车辆碰撞)或道路清理完毕时,操作员可以通过外部输入提供实时更新。包括系统需求、设计、实现细节和性能评估。
{"title":"An Intelligent Real Time Road Sign System","authors":"A. Shaout, A. Hassani","doi":"10.1109/ACIT47987.2019.8991065","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991065","url":null,"abstract":"This paper presents an intelligent road sign that provides real time travel time and road conditions. The behavior of US Interstate 94 was modelled, where the typical road throughput was simulated and published to an MQTT broker for the embedded system to display the expected travel time to Ann Arbor, Michigan from the US23 junction. The embedded system additionally sampled a digital temperature and humidity sensor to note road conditions, where an external input allowed operators to provide a real time update when an unexpected event causes traffic (i.e. vehicle collision) or when the road has been cleared. System requirements, design, implementation details, and performance evaluation are included.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116255547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User Identification Algorithm based-on Devices Recognition 基于设备识别的用户识别算法
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991122
Z. Houhamdi, B. Athamena
This paper overviews briefly IoT by reviewing the literature and describes a real scenario use case to perceive the requirements and challenges related to user identification. Thus, an automated, easy, and secure Device Recognition (DR) algorithm is suggested to address the user identification problem. A coefficient representing the device identification rate is used for assessing the DR algorithm. A literature review of identification techniques was conducted to identify the research challenges. Then, the paper introduces a new identifier format to address identity management concerning device type, mobility and system scalability.The present paper addresses user identification problems and proposes a new Single Thing Sign-On Identity Management System that focuses on user services. The suggested framework allows user identification and authorized services access by identifying only one of the user’s things (devices, actuators, sensors, etc.).
本文通过回顾文献简要概述了物联网,并描述了一个真实场景用例,以了解与用户识别相关的需求和挑战。因此,提出一种自动化、简单、安全的DR (Device Recognition)算法来解决用户身份识别问题。一个代表设备识别率的系数用于评估容灾算法。对识别技术进行了文献综述,以确定研究挑战。然后,介绍了一种新的标识符格式,以解决设备类型、移动性和系统可扩展性方面的身份管理问题。本文针对用户身份识别问题,提出了一种以用户服务为核心的单点登录身份管理系统。建议的框架通过仅标识用户的一件物品(设备、执行器、传感器等)来允许用户标识和授权的服务访问。
{"title":"User Identification Algorithm based-on Devices Recognition","authors":"Z. Houhamdi, B. Athamena","doi":"10.1109/ACIT47987.2019.8991122","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991122","url":null,"abstract":"This paper overviews briefly IoT by reviewing the literature and describes a real scenario use case to perceive the requirements and challenges related to user identification. Thus, an automated, easy, and secure Device Recognition (DR) algorithm is suggested to address the user identification problem. A coefficient representing the device identification rate is used for assessing the DR algorithm. A literature review of identification techniques was conducted to identify the research challenges. Then, the paper introduces a new identifier format to address identity management concerning device type, mobility and system scalability.The present paper addresses user identification problems and proposes a new Single Thing Sign-On Identity Management System that focuses on user services. The suggested framework allows user identification and authorized services access by identifying only one of the user’s things (devices, actuators, sensors, etc.).","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of Transitive Class Relations on Measuring the Degree of Class Cohesion 及物类关系对衡量类内聚程度的影响
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991071
S. Mustafa, Ru’ya Alawneh
Measuring software quality attributes helps in determining the degree of the quality of the software system. Among the various software attributes, cohesion is considered one of the most important software design concerns. In this study, the focus was on investigating the impact of transitive or indirect relations between classes on measuring cohesion. It was assumed that software metrics which take into account transitive relations would provide cohesion values equal or greater than metrics which consider direct relations. Four metrics are covered in this study, including: TCC (Tight Class Cohesion), LCC (Loose Class Cohesion), LCC-D (Lack of Class Cohesion - Direct), and LCC-I (Lack of Class Cohesion-Indirect). Several programs in C# were selected and a tool was developed for calculating these metrics and their values were compared and correlated. The findings of the study show that the assumptions of this study were not valid for certain cases. The values of TCC and LCC were identical in most cases and so is the case the values of LCC-D and LCC-I. Nevertheless, both LCC-D and LCC-I which take into account relations based on method invocations besides instance variable-sharing show higher values than those of TCC and LCC.
度量软件质量属性有助于确定软件系统的质量程度。在各种软件属性中,内聚被认为是最重要的软件设计关注点之一。在本研究中,重点是调查类之间的传递关系或间接关系对测量凝聚力的影响。假设考虑传递关系的软件度量将提供等于或大于考虑直接关系的度量的内聚值。本研究涵盖了四个指标,包括:TCC(紧密类内聚),LCC(松散类内聚),LCC- d(缺乏类内聚-直接)和LCC- i(缺乏类内聚-间接)。我们选择了几个c#程序,并开发了一个工具来计算这些指标,并对它们的值进行了比较和关联。研究结果表明,本研究的假设在某些情况下是无效的。在大多数情况下,TCC和LCC的值相同,LCC- d和LCC- i的值也相同。然而,除了实例变量共享之外,考虑基于方法调用关系的LCC- d和LCC- i的值都高于TCC和LCC。
{"title":"The Impact of Transitive Class Relations on Measuring the Degree of Class Cohesion","authors":"S. Mustafa, Ru’ya Alawneh","doi":"10.1109/ACIT47987.2019.8991071","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991071","url":null,"abstract":"Measuring software quality attributes helps in determining the degree of the quality of the software system. Among the various software attributes, cohesion is considered one of the most important software design concerns. In this study, the focus was on investigating the impact of transitive or indirect relations between classes on measuring cohesion. It was assumed that software metrics which take into account transitive relations would provide cohesion values equal or greater than metrics which consider direct relations. Four metrics are covered in this study, including: TCC (Tight Class Cohesion), LCC (Loose Class Cohesion), LCC-D (Lack of Class Cohesion - Direct), and LCC-I (Lack of Class Cohesion-Indirect). Several programs in C# were selected and a tool was developed for calculating these metrics and their values were compared and correlated. The findings of the study show that the assumptions of this study were not valid for certain cases. The values of TCC and LCC were identical in most cases and so is the case the values of LCC-D and LCC-I. Nevertheless, both LCC-D and LCC-I which take into account relations based on method invocations besides instance variable-sharing show higher values than those of TCC and LCC.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131024737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology for Promoting Academic Integrity: The Impact of Using Turnitin on Reducing Plagiarism 促进学术诚信的技术:使用Turnitin对减少剽窃的影响
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991046
Sumaya Daoud, Hussam Alrabaiah, Eman Zaitoun
Despite the compelling fact that the World Wide Web has brought an enormous amount of data to the distance of a person’s fingertips, it has also made it easier than before for students to breach academic integrity. The growing challenge of plagiarism in education has triggered the production of several plagiarism detection software programs such as Turnitin. Since it was released, there has been a lot of debate in literature on whether or not the integration of such software in college education does tangibly enhance academic integrity practices by students. The current study builds upon existing literature by seeking to find out whether the use of Turnitin has an influence on the students’ commitment to academic integrity practices. It also explores the students’ perspectives on what skill areas they need support with in order to avoid breaching academic integrity principles. To that end, a group of college students (n=53) were asked to submit two different assignments. The first one was assigned before the integration of Turnitin into the assignment submission platform. The second was assigned through Turnitin, and the instructor provided an explanation to the students on how to avoid plagiarism, and underscored the university policy in this regard. The results indicated that there has been a drop in the students’ incidents of plagiarism. Moreover, the students indicated that the use of the software should be accompanied by hands-on education on the best practices of academic integrity and research writing by their professors.
尽管令人信服的事实是,万维网将大量的数据带到一个人指尖的距离,但它也使学生比以前更容易破坏学术诚信。教育领域日益增长的剽窃挑战已经引发了诸如Turnitin等几个剽窃检测软件程序的生产。自发布以来,关于将此类软件整合到大学教育中是否能切实提高学生的学术诚信实践,文献中存在很多争论。目前的研究建立在现有文献的基础上,试图找出Turnitin的使用是否对学生对学术诚信实践的承诺有影响。它还探讨了学生的观点,他们需要哪些技能领域的支持,以避免违反学术诚信原则。为此,一组大学生(n=53)被要求提交两份不同的作业。第一个作业是在Turnitin集成到作业提交平台之前布置的。第二次是通过Turnitin布置的,老师给学生们讲解了如何避免抄袭,并强调了学校在这方面的政策。结果表明,学生的抄袭事件有所下降。此外,学生们表示,在使用该软件的同时,他们的教授还应该对学术诚信和研究写作的最佳实践进行实践教育。
{"title":"Technology for Promoting Academic Integrity: The Impact of Using Turnitin on Reducing Plagiarism","authors":"Sumaya Daoud, Hussam Alrabaiah, Eman Zaitoun","doi":"10.1109/ACIT47987.2019.8991046","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991046","url":null,"abstract":"Despite the compelling fact that the World Wide Web has brought an enormous amount of data to the distance of a person’s fingertips, it has also made it easier than before for students to breach academic integrity. The growing challenge of plagiarism in education has triggered the production of several plagiarism detection software programs such as Turnitin. Since it was released, there has been a lot of debate in literature on whether or not the integration of such software in college education does tangibly enhance academic integrity practices by students. The current study builds upon existing literature by seeking to find out whether the use of Turnitin has an influence on the students’ commitment to academic integrity practices. It also explores the students’ perspectives on what skill areas they need support with in order to avoid breaching academic integrity principles. To that end, a group of college students (n=53) were asked to submit two different assignments. The first one was assigned before the integration of Turnitin into the assignment submission platform. The second was assigned through Turnitin, and the instructor provided an explanation to the students on how to avoid plagiarism, and underscored the university policy in this regard. The results indicated that there has been a drop in the students’ incidents of plagiarism. Moreover, the students indicated that the use of the software should be accompanied by hands-on education on the best practices of academic integrity and research writing by their professors.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1