Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8990998
A. Hani, Najiba Tagougui, M. Kherallah
Recently, image captioning is a new challenging task that has gathered widespread interest. The task involves generating a concise description of an image in natural language and is currently accomplished by techniques that use a combination of computer vision (CV), natural language processing (NLP), and machine learning methods.In this paper, we presented a model that generates natural language description of an image. We used a combination of convolutional neural networks to extract features and then used recurrent neural networks to generate text from these features. We incorporated the attention mechanism while generating captions. We evaluated the model on MSCOCO database. The obtained results are promising and competitive.
{"title":"Image Caption Generation Using A Deep Architecture","authors":"A. Hani, Najiba Tagougui, M. Kherallah","doi":"10.1109/ACIT47987.2019.8990998","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990998","url":null,"abstract":"Recently, image captioning is a new challenging task that has gathered widespread interest. The task involves generating a concise description of an image in natural language and is currently accomplished by techniques that use a combination of computer vision (CV), natural language processing (NLP), and machine learning methods.In this paper, we presented a model that generates natural language description of an image. We used a combination of convolutional neural networks to extract features and then used recurrent neural networks to generate text from these features. We incorporated the attention mechanism while generating captions. We evaluated the model on MSCOCO database. The obtained results are promising and competitive.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991001
A. Shaout, Udit Gami
Yelp is a business review site that helps people find relevant places, based on the informed opinions of its users. It uses a five-point star rating system with user reviews. The main aim of the paper is to analyze sentiments on the reviews and devise a new five-scale sentiment rating to match it to the star rating that the user provided. Following the n-gram approach, this paper analyzes the adjective and adverbs occurring sequences and determines the trend or pattern of occurrence. After calculating a weighted score for each review, users’ ratings are predicted by treating multi class classification using different classifiers. The objective of the research in this paper is to try and determine how accurate the users are, in giving the ratings by comparing their star based on the calculated results.
{"title":"Sentiment Analysis of Yelp using Advanced V Model","authors":"A. Shaout, Udit Gami","doi":"10.1109/ACIT47987.2019.8991001","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991001","url":null,"abstract":"Yelp is a business review site that helps people find relevant places, based on the informed opinions of its users. It uses a five-point star rating system with user reviews. The main aim of the paper is to analyze sentiments on the reviews and devise a new five-scale sentiment rating to match it to the star rating that the user provided. Following the n-gram approach, this paper analyzes the adjective and adverbs occurring sequences and determines the trend or pattern of occurrence. After calculating a weighted score for each review, users’ ratings are predicted by treating multi class classification using different classifiers. The objective of the research in this paper is to try and determine how accurate the users are, in giving the ratings by comparing their star based on the calculated results.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115557292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991131
Hamzeh Al-Kilani, Mohammed Nasereddin, Ali Hadi, Sara Tedmori
One of the primary concerns of data security specialists is to mitigate insider threats and prevent data leaks. Often, unfortunately, insider threats go unnoticed. In most cases, the longer such activity goes unnoticed, the greater the resulting damages are likely to be. This paper provides an overview of the basic data exfiltration techniques that deal with file structures and were utilized in multiple scenarios in an attempt to bypass a Data Loss Prevention system. Details show which of the scenarios have been detected and which have not been by the Data Loss Prevention system. The paper also proposed solutions for the undetected scenarios.
{"title":"Data Exfiltration Techniques and Data Loss Prevention System","authors":"Hamzeh Al-Kilani, Mohammed Nasereddin, Ali Hadi, Sara Tedmori","doi":"10.1109/ACIT47987.2019.8991131","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991131","url":null,"abstract":"One of the primary concerns of data security specialists is to mitigate insider threats and prevent data leaks. Often, unfortunately, insider threats go unnoticed. In most cases, the longer such activity goes unnoticed, the greater the resulting damages are likely to be. This paper provides an overview of the basic data exfiltration techniques that deal with file structures and were utilized in multiple scenarios in an attempt to bypass a Data Loss Prevention system. Details show which of the scenarios have been detected and which have not been by the Data Loss Prevention system. The paper also proposed solutions for the undetected scenarios.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8990991
Hani Almimi, Samar A. Shahin, M. S. Daoud, Mustafa A. Al-Fayoumi, Yazeed Ghadi
This paper proposes an e-voting protocol to allow voting to be done from any location and still abide with the laws of security including identification, authentication, integrity, and anonymity.The proposed method relies on public key encryption that uses two pairs of certificates one for citizens containing private/public key pairs and the second for National Information Technology Center (NITC) that also contains private/public key pairs.NITC will be acting as a trusted certificate authority by to citizens and government. It is considered an objective and neutral unprejudiced party where no other governmental party has authority upon elections and is auditable by the independent election commission.
{"title":"Enhanced E-Voting Protocol Based on Public Key Cryptography","authors":"Hani Almimi, Samar A. Shahin, M. S. Daoud, Mustafa A. Al-Fayoumi, Yazeed Ghadi","doi":"10.1109/ACIT47987.2019.8990991","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990991","url":null,"abstract":"This paper proposes an e-voting protocol to allow voting to be done from any location and still abide with the laws of security including identification, authentication, integrity, and anonymity.The proposed method relies on public key encryption that uses two pairs of certificates one for citizens containing private/public key pairs and the second for National Information Technology Center (NITC) that also contains private/public key pairs.NITC will be acting as a trusted certificate authority by to citizens and government. It is considered an objective and neutral unprejudiced party where no other governmental party has authority upon elections and is auditable by the independent election commission.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123204203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991094
M. Shurman, Wafaa Alkahla, Haya R. Hasan
Recently NOMA (Non-Orthogonal Multiple Access) has been examined when applied with slotted ALOHA protocol for uncoordinated transmissions. Slotted ALOHA-NOMA (SAN) protocol effectively raised the throughput of the network without any need for bandwidth expansion. In this paper, we consider how employing the priority on channel access in SAN protocol can reduce the collisions and increase the throughput. Meanwhile, we suggest an algorithm based on the priority of the SAN nodes. The simulation outcomes show our proposed Priority-SAN has improved the throughput performance compared with the SAN protocol.
{"title":"Priority-Based Channel Access for SAN Protocol in M2M Communication","authors":"M. Shurman, Wafaa Alkahla, Haya R. Hasan","doi":"10.1109/ACIT47987.2019.8991094","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991094","url":null,"abstract":"Recently NOMA (Non-Orthogonal Multiple Access) has been examined when applied with slotted ALOHA protocol for uncoordinated transmissions. Slotted ALOHA-NOMA (SAN) protocol effectively raised the throughput of the network without any need for bandwidth expansion. In this paper, we consider how employing the priority on channel access in SAN protocol can reduce the collisions and increase the throughput. Meanwhile, we suggest an algorithm based on the priority of the SAN nodes. The simulation outcomes show our proposed Priority-SAN has improved the throughput performance compared with the SAN protocol.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8990986
Ibtisam Mohammed Albahri
With current rapid technology acceleration, and an enormous quantity of generated data. From, Clouds, networks, social media, and statistics. a novel technology appears to facilitate and come out with valuable knowledge that can be useful In all life levels, tasks and profitability returns. Massive quantities of data consider as assets for the government, enterprises, and even individuals. This paper aimed to presents a literature review regarding sentiment analysis and opinion mining recent applications area.
{"title":"Opinion Mining: Applications Trends","authors":"Ibtisam Mohammed Albahri","doi":"10.1109/ACIT47987.2019.8990986","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990986","url":null,"abstract":"With current rapid technology acceleration, and an enormous quantity of generated data. From, Clouds, networks, social media, and statistics. a novel technology appears to facilitate and come out with valuable knowledge that can be useful In all life levels, tasks and profitability returns. Massive quantities of data consider as assets for the government, enterprises, and even individuals. This paper aimed to presents a literature review regarding sentiment analysis and opinion mining recent applications area.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123371235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991065
A. Shaout, A. Hassani
This paper presents an intelligent road sign that provides real time travel time and road conditions. The behavior of US Interstate 94 was modelled, where the typical road throughput was simulated and published to an MQTT broker for the embedded system to display the expected travel time to Ann Arbor, Michigan from the US23 junction. The embedded system additionally sampled a digital temperature and humidity sensor to note road conditions, where an external input allowed operators to provide a real time update when an unexpected event causes traffic (i.e. vehicle collision) or when the road has been cleared. System requirements, design, implementation details, and performance evaluation are included.
{"title":"An Intelligent Real Time Road Sign System","authors":"A. Shaout, A. Hassani","doi":"10.1109/ACIT47987.2019.8991065","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991065","url":null,"abstract":"This paper presents an intelligent road sign that provides real time travel time and road conditions. The behavior of US Interstate 94 was modelled, where the typical road throughput was simulated and published to an MQTT broker for the embedded system to display the expected travel time to Ann Arbor, Michigan from the US23 junction. The embedded system additionally sampled a digital temperature and humidity sensor to note road conditions, where an external input allowed operators to provide a real time update when an unexpected event causes traffic (i.e. vehicle collision) or when the road has been cleared. System requirements, design, implementation details, and performance evaluation are included.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116255547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991122
Z. Houhamdi, B. Athamena
This paper overviews briefly IoT by reviewing the literature and describes a real scenario use case to perceive the requirements and challenges related to user identification. Thus, an automated, easy, and secure Device Recognition (DR) algorithm is suggested to address the user identification problem. A coefficient representing the device identification rate is used for assessing the DR algorithm. A literature review of identification techniques was conducted to identify the research challenges. Then, the paper introduces a new identifier format to address identity management concerning device type, mobility and system scalability.The present paper addresses user identification problems and proposes a new Single Thing Sign-On Identity Management System that focuses on user services. The suggested framework allows user identification and authorized services access by identifying only one of the user’s things (devices, actuators, sensors, etc.).
{"title":"User Identification Algorithm based-on Devices Recognition","authors":"Z. Houhamdi, B. Athamena","doi":"10.1109/ACIT47987.2019.8991122","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991122","url":null,"abstract":"This paper overviews briefly IoT by reviewing the literature and describes a real scenario use case to perceive the requirements and challenges related to user identification. Thus, an automated, easy, and secure Device Recognition (DR) algorithm is suggested to address the user identification problem. A coefficient representing the device identification rate is used for assessing the DR algorithm. A literature review of identification techniques was conducted to identify the research challenges. Then, the paper introduces a new identifier format to address identity management concerning device type, mobility and system scalability.The present paper addresses user identification problems and proposes a new Single Thing Sign-On Identity Management System that focuses on user services. The suggested framework allows user identification and authorized services access by identifying only one of the user’s things (devices, actuators, sensors, etc.).","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991071
S. Mustafa, Ru’ya Alawneh
Measuring software quality attributes helps in determining the degree of the quality of the software system. Among the various software attributes, cohesion is considered one of the most important software design concerns. In this study, the focus was on investigating the impact of transitive or indirect relations between classes on measuring cohesion. It was assumed that software metrics which take into account transitive relations would provide cohesion values equal or greater than metrics which consider direct relations. Four metrics are covered in this study, including: TCC (Tight Class Cohesion), LCC (Loose Class Cohesion), LCC-D (Lack of Class Cohesion - Direct), and LCC-I (Lack of Class Cohesion-Indirect). Several programs in C# were selected and a tool was developed for calculating these metrics and their values were compared and correlated. The findings of the study show that the assumptions of this study were not valid for certain cases. The values of TCC and LCC were identical in most cases and so is the case the values of LCC-D and LCC-I. Nevertheless, both LCC-D and LCC-I which take into account relations based on method invocations besides instance variable-sharing show higher values than those of TCC and LCC.
{"title":"The Impact of Transitive Class Relations on Measuring the Degree of Class Cohesion","authors":"S. Mustafa, Ru’ya Alawneh","doi":"10.1109/ACIT47987.2019.8991071","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991071","url":null,"abstract":"Measuring software quality attributes helps in determining the degree of the quality of the software system. Among the various software attributes, cohesion is considered one of the most important software design concerns. In this study, the focus was on investigating the impact of transitive or indirect relations between classes on measuring cohesion. It was assumed that software metrics which take into account transitive relations would provide cohesion values equal or greater than metrics which consider direct relations. Four metrics are covered in this study, including: TCC (Tight Class Cohesion), LCC (Loose Class Cohesion), LCC-D (Lack of Class Cohesion - Direct), and LCC-I (Lack of Class Cohesion-Indirect). Several programs in C# were selected and a tool was developed for calculating these metrics and their values were compared and correlated. The findings of the study show that the assumptions of this study were not valid for certain cases. The values of TCC and LCC were identical in most cases and so is the case the values of LCC-D and LCC-I. Nevertheless, both LCC-D and LCC-I which take into account relations based on method invocations besides instance variable-sharing show higher values than those of TCC and LCC.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131024737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991046
Sumaya Daoud, Hussam Alrabaiah, Eman Zaitoun
Despite the compelling fact that the World Wide Web has brought an enormous amount of data to the distance of a person’s fingertips, it has also made it easier than before for students to breach academic integrity. The growing challenge of plagiarism in education has triggered the production of several plagiarism detection software programs such as Turnitin. Since it was released, there has been a lot of debate in literature on whether or not the integration of such software in college education does tangibly enhance academic integrity practices by students. The current study builds upon existing literature by seeking to find out whether the use of Turnitin has an influence on the students’ commitment to academic integrity practices. It also explores the students’ perspectives on what skill areas they need support with in order to avoid breaching academic integrity principles. To that end, a group of college students (n=53) were asked to submit two different assignments. The first one was assigned before the integration of Turnitin into the assignment submission platform. The second was assigned through Turnitin, and the instructor provided an explanation to the students on how to avoid plagiarism, and underscored the university policy in this regard. The results indicated that there has been a drop in the students’ incidents of plagiarism. Moreover, the students indicated that the use of the software should be accompanied by hands-on education on the best practices of academic integrity and research writing by their professors.
{"title":"Technology for Promoting Academic Integrity: The Impact of Using Turnitin on Reducing Plagiarism","authors":"Sumaya Daoud, Hussam Alrabaiah, Eman Zaitoun","doi":"10.1109/ACIT47987.2019.8991046","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991046","url":null,"abstract":"Despite the compelling fact that the World Wide Web has brought an enormous amount of data to the distance of a person’s fingertips, it has also made it easier than before for students to breach academic integrity. The growing challenge of plagiarism in education has triggered the production of several plagiarism detection software programs such as Turnitin. Since it was released, there has been a lot of debate in literature on whether or not the integration of such software in college education does tangibly enhance academic integrity practices by students. The current study builds upon existing literature by seeking to find out whether the use of Turnitin has an influence on the students’ commitment to academic integrity practices. It also explores the students’ perspectives on what skill areas they need support with in order to avoid breaching academic integrity principles. To that end, a group of college students (n=53) were asked to submit two different assignments. The first one was assigned before the integration of Turnitin into the assignment submission platform. The second was assigned through Turnitin, and the instructor provided an explanation to the students on how to avoid plagiarism, and underscored the university policy in this regard. The results indicated that there has been a drop in the students’ incidents of plagiarism. Moreover, the students indicated that the use of the software should be accompanied by hands-on education on the best practices of academic integrity and research writing by their professors.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}