Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991003
Tasneem AlSalem, Lina Nazzal, M. Samara, M. Sulieman
Addition is one of the most important operations in microprocessors and digital signal processing systems. Different adder architectures have been proposed in the literature. One of the most widely used architectures is the Carry-Look-Ahead (CLA) which is known for its high speed. In this paper, we present a CLA adder design using Threshold Logic Gates (TLG) instead of conventional logic gates. The adder was designed in 90nm CMOS technology, with wired-inverters TLGs. Moreover, a transistor-level power reduction technique was applied to all TLGs that comprise the adder.
{"title":"Design and Simulation of 90 nm Threshold Logic Carry-Look-Ahead Adder","authors":"Tasneem AlSalem, Lina Nazzal, M. Samara, M. Sulieman","doi":"10.1109/ACIT47987.2019.8991003","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991003","url":null,"abstract":"Addition is one of the most important operations in microprocessors and digital signal processing systems. Different adder architectures have been proposed in the literature. One of the most widely used architectures is the Carry-Look-Ahead (CLA) which is known for its high speed. In this paper, we present a CLA adder design using Threshold Logic Gates (TLG) instead of conventional logic gates. The adder was designed in 90nm CMOS technology, with wired-inverters TLGs. Moreover, a transistor-level power reduction technique was applied to all TLGs that comprise the adder.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128431841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8990987
Q. Althebyan
Taking care of security at the cloud is a major issue that needs to be carefully considered and solved for both individuals as well as organizations. Organizations usually expect more trust from employees as well as customers in one hand. On the other hand, cloud users expect their private data is maintained and secured. Although this must be case, however, some malicious outsiders of the cloud as well as malicious insiders who are cloud internal users tend to disclose private data for their malicious uses. Although outsiders of the cloud should be a concern, however, the more serious problems come from Insiders whose malicious actions are more serious and sever. Hence, insiders’ threats in the cloud should be the top most problem that needs to be tackled and resolved. This paper aims to find a proper solution for the insider threat problem in the cloud. The paper presents a Mobile Edge Computing (MEC) mitigation model as a solution that suits the specialized nature of this problem where the solution needs to be very close to the place where insiders reside. This in fact gives real-time responses to attack, and hence, reduces the overhead in the cloud.
{"title":"A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach","authors":"Q. Althebyan","doi":"10.1109/ACIT47987.2019.8990987","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990987","url":null,"abstract":"Taking care of security at the cloud is a major issue that needs to be carefully considered and solved for both individuals as well as organizations. Organizations usually expect more trust from employees as well as customers in one hand. On the other hand, cloud users expect their private data is maintained and secured. Although this must be case, however, some malicious outsiders of the cloud as well as malicious insiders who are cloud internal users tend to disclose private data for their malicious uses. Although outsiders of the cloud should be a concern, however, the more serious problems come from Insiders whose malicious actions are more serious and sever. Hence, insiders’ threats in the cloud should be the top most problem that needs to be tackled and resolved. This paper aims to find a proper solution for the insider threat problem in the cloud. The paper presents a Mobile Edge Computing (MEC) mitigation model as a solution that suits the specialized nature of this problem where the solution needs to be very close to the place where insiders reside. This in fact gives real-time responses to attack, and hence, reduces the overhead in the cloud.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/acit47987.2019.8991091
{"title":"ACIT 2019 Sponsors","authors":"","doi":"10.1109/acit47987.2019.8991091","DOIUrl":"https://doi.org/10.1109/acit47987.2019.8991091","url":null,"abstract":"","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991052
G. Bhatia, Ismail Hamed Al Sulti
Cloud computing is the delivery of computing as a service rather than product. Cloud has fundamentally changed the way we use software, develop applications, and deliver resources. Studies have shown that cloud computing can play a major role in higher education. Nowadays, higher education institutions are teaching many IT courses. Their curriculum requires multiple servers, operating systems, network devices and many software tools to study and perform lab practical. Cloud computing can fulfil the growing demands of IT lab resources for HEI. Private cloud can provide alternative to hardware resources using virtualization. This paper presents the proof-of-concept private cloud for higher education and discusses the process of setting up a working model of a private cloud using OpenStack. Outcomes show that it can provide a cost effective solution for IT hardware devices and provision multiple operating systems required in higher education.
{"title":"CASCloud: An Open Source Private Cloud for Higher Education","authors":"G. Bhatia, Ismail Hamed Al Sulti","doi":"10.1109/ACIT47987.2019.8991052","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991052","url":null,"abstract":"Cloud computing is the delivery of computing as a service rather than product. Cloud has fundamentally changed the way we use software, develop applications, and deliver resources. Studies have shown that cloud computing can play a major role in higher education. Nowadays, higher education institutions are teaching many IT courses. Their curriculum requires multiple servers, operating systems, network devices and many software tools to study and perform lab practical. Cloud computing can fulfil the growing demands of IT lab resources for HEI. Private cloud can provide alternative to hardware resources using virtualization. This paper presents the proof-of-concept private cloud for higher education and discusses the process of setting up a working model of a private cloud using OpenStack. Outcomes show that it can provide a cost effective solution for IT hardware devices and provision multiple operating systems required in higher education.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"13 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120916574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991136
A. Qusef, Mohammad Daradkah, G. Sammour, Aalaa Albadarneh
Along with the revolution in information technology solutions and the wide replacement of the legacy manual procedures with the automated and digital workflow procedures, many electronic solutions have been developed and used to digitize the supply chain processes and as one of the main process in the supply chain, it is highly demanded nowadays to perform the procurement processes in the enterprises using e-procurement system. As part of e-Procurement, this paper emphasizes the importance of leveraging the tendering process in an enterprise to be fully electronic by adopting the e-Tendering approach. This research proposes a new model for e-Tendering which enables an enterprise to conduct a fully automated web-based tendering process. The proposed model is a new conceptual model of fully automated, digital and web-based tendering solution that is covering all steps of the tendering process and involving all related departmental computer system modules and stakeholders. It also proposes a new mechanism for bidders’ engagement into the e-Tendering system which result in full digital cycle for complete tendering process as this is one of the main challenges in e-Tendering solutions which is still lagging behind the digital environment and being done via paperwork and entered manually in almost all tendering systems that are available nowadays. The model can be considered as a base for building a new framework for the development of an applicable e-Tendering system that is fully automating the tendering process in any enterprise’s Tendering Management System (TMS).
{"title":"A New e-Tendering Model For Fully Automated Tendering Process","authors":"A. Qusef, Mohammad Daradkah, G. Sammour, Aalaa Albadarneh","doi":"10.1109/ACIT47987.2019.8991136","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991136","url":null,"abstract":"Along with the revolution in information technology solutions and the wide replacement of the legacy manual procedures with the automated and digital workflow procedures, many electronic solutions have been developed and used to digitize the supply chain processes and as one of the main process in the supply chain, it is highly demanded nowadays to perform the procurement processes in the enterprises using e-procurement system. As part of e-Procurement, this paper emphasizes the importance of leveraging the tendering process in an enterprise to be fully electronic by adopting the e-Tendering approach. This research proposes a new model for e-Tendering which enables an enterprise to conduct a fully automated web-based tendering process. The proposed model is a new conceptual model of fully automated, digital and web-based tendering solution that is covering all steps of the tendering process and involving all related departmental computer system modules and stakeholders. It also proposes a new mechanism for bidders’ engagement into the e-Tendering system which result in full digital cycle for complete tendering process as this is one of the main challenges in e-Tendering solutions which is still lagging behind the digital environment and being done via paperwork and entered manually in almost all tendering systems that are available nowadays. The model can be considered as a base for building a new framework for the development of an applicable e-Tendering system that is fully automating the tendering process in any enterprise’s Tendering Management System (TMS).","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121427261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991028
N. Mirza
This paper essentially discusses different methodologies of Fuzzy Neural Networks which are implemented to robust the functionality of mobile robots in dynamic and static environment. Fusion of algorithms is important to increase the working of any system provided. Different kind of mobile robots along with various algorithms frameworks are taken as case studies for this paper. Due to the reason that typical mathematical models used to make robots mobile in real environment were not very useful as they were not catering for the limitation of robotic system memory. Thus new methodologies are being discussed and implemented by robotics research community.
{"title":"Application of Fuzzy Neural Networks in Robotic Path Planning","authors":"N. Mirza","doi":"10.1109/ACIT47987.2019.8991028","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991028","url":null,"abstract":"This paper essentially discusses different methodologies of Fuzzy Neural Networks which are implemented to robust the functionality of mobile robots in dynamic and static environment. Fusion of algorithms is important to increase the working of any system provided. Different kind of mobile robots along with various algorithms frameworks are taken as case studies for this paper. Due to the reason that typical mathematical models used to make robots mobile in real environment were not very useful as they were not catering for the limitation of robotic system memory. Thus new methodologies are being discussed and implemented by robotics research community.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991085
Hassan M. Najadat, Amer Badarneh, Sawsan Alodibat
This paper examines the status of e-government portals in Jordan considering their performance measures. It involves data collection, data preprocessing, and Data Envelopment Analysis (DEA) of these websites. Some steps are added like data reduction through features selection and clustering. In this paper, we propose a new model for collecting data, analyzing data, classifying data, and evaluating the results. We have applied one type of DEA models which is BCC VRS model. Moreover, we implemented ensemble stacking algorithm to improve the accuracy of classifiers. The population of this research is 111 Jordanian e-government websites. According to DEA analysis, the number of inefficient websites is 30. The proposed model could be like a recommender system for web development community to consider the improvement of some factors of e-government websites. The results of ensemble method improved the results of these classifiers.
{"title":"A Hybrid Model of Ensemble Method and Data Envelopment Analysis (DEA) for E-government Websites Efficiency Evaluation","authors":"Hassan M. Najadat, Amer Badarneh, Sawsan Alodibat","doi":"10.1109/ACIT47987.2019.8991085","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991085","url":null,"abstract":"This paper examines the status of e-government portals in Jordan considering their performance measures. It involves data collection, data preprocessing, and Data Envelopment Analysis (DEA) of these websites. Some steps are added like data reduction through features selection and clustering. In this paper, we propose a new model for collecting data, analyzing data, classifying data, and evaluating the results. We have applied one type of DEA models which is BCC VRS model. Moreover, we implemented ensemble stacking algorithm to improve the accuracy of classifiers. The population of this research is 111 Jordanian e-government websites. According to DEA analysis, the number of inefficient websites is 30. The proposed model could be like a recommender system for web development community to consider the improvement of some factors of e-government websites. The results of ensemble method improved the results of these classifiers.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122996611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991103
Hassan M. Najadat, Q. Althebyan, Yasmin Al-Omary
Higher education plays a vital role in community development and provides indicators of national strength in all aspects of life. Moreover, it is able to achieve the desired economic growth. Therefore, measurement performance of decision-making units is a vital process in this issue. Higher education institutions are multi-input and output institutions and this type of institutions is difficult to be evaluated using traditional economic methods. This study aims to evaluate the efficiency and quality of higher education institutions based on Data Envelopment Analysis (DEA). Furthermore, we also aim to find solutions and proposals for universities with low efficiency values (or inefficient) by identifying weaknesses in the resources of these universities.The DEA assumes that all Decision Making Units (DMUs) are homogenous in their environments while the DEA process is not enough to compare universities’ performances. So, our work proposes to use an unsupervised data mining technique such as kmeans algorithm to group universities with similar characteristics. Then, the DEA is utilized for each cluster separately. The result shows a better improvements and a fair comparison of performance between universities.
{"title":"Higher Education Units Assessment Based on Data Envelopment Analysis and Clustering Techniques","authors":"Hassan M. Najadat, Q. Althebyan, Yasmin Al-Omary","doi":"10.1109/ACIT47987.2019.8991103","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991103","url":null,"abstract":"Higher education plays a vital role in community development and provides indicators of national strength in all aspects of life. Moreover, it is able to achieve the desired economic growth. Therefore, measurement performance of decision-making units is a vital process in this issue. Higher education institutions are multi-input and output institutions and this type of institutions is difficult to be evaluated using traditional economic methods. This study aims to evaluate the efficiency and quality of higher education institutions based on Data Envelopment Analysis (DEA). Furthermore, we also aim to find solutions and proposals for universities with low efficiency values (or inefficient) by identifying weaknesses in the resources of these universities.The DEA assumes that all Decision Making Units (DMUs) are homogenous in their environments while the DEA process is not enough to compare universities’ performances. So, our work proposes to use an unsupervised data mining technique such as kmeans algorithm to group universities with similar characteristics. Then, the DEA is utilized for each cluster separately. The result shows a better improvements and a fair comparison of performance between universities.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129727713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991037
Naeem A. Nawaz, H. Malik, A. Alshaor
Dynamic crowd causes many challenges including estimation of crowd capacity in a restricted area. It’s one of the problems for estimating the crowd capacity when crowd strength increases or decreases (fluctuates) at different time (peak and off-peak time) and during different activities. This may cause difficulty in managing the crowd according to capacity of the area, time and activity. To overcome the issue of capacity estimation according to the space or area available, this paper proposed a conceptual framework to calculate the number of persons in a definite zone or level and calculate the remaining capacity in the area (Zone and level). IoT, cloud computing and WSN are used to estimate the remaining capacity in the restricted area according to the time and activity.
{"title":"A Framework for Smart Capacity Estimation at Crowded Area using WSN","authors":"Naeem A. Nawaz, H. Malik, A. Alshaor","doi":"10.1109/ACIT47987.2019.8991037","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991037","url":null,"abstract":"Dynamic crowd causes many challenges including estimation of crowd capacity in a restricted area. It’s one of the problems for estimating the crowd capacity when crowd strength increases or decreases (fluctuates) at different time (peak and off-peak time) and during different activities. This may cause difficulty in managing the crowd according to capacity of the area, time and activity. To overcome the issue of capacity estimation according to the space or area available, this paper proposed a conceptual framework to calculate the number of persons in a definite zone or level and calculate the remaining capacity in the area (Zone and level). IoT, cloud computing and WSN are used to estimate the remaining capacity in the restricted area according to the time and activity.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8990981
Mohammed Ali Taleb, Jamal Haydar, W. Fahs, A. Mokdad
One of the significant sources of environmental conservation is the utilization of renewable energy. Renewable energy is the energy derived from natural sources that are replenished automatically from unlimited sources. In this paper, we study the solar energy and how to increase the performance by solving the problem of dust and dirt accumulated on solar cells. Dust and dirt are the most important reasons that reduce the performance of solar cells in natural conditions. We use artificial intelligence neural networks to make the decision that solar cells need to be cleaned. Moreover, we propose two scenarios and we compare them. In the first scenario, the variables, temperature, weather and humidity are considered and in the second scenario, the variables, temperature, weather, light Intensity and humidity are considered. Concerning the weather conditions, a system prediction based on previous years is done. Results show that this system increases the solar cells’ performance by cleaning the dust and dirt in correct time.
{"title":"RBF Neural Network Model to Increase the Performance of Solar Panels","authors":"Mohammed Ali Taleb, Jamal Haydar, W. Fahs, A. Mokdad","doi":"10.1109/ACIT47987.2019.8990981","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990981","url":null,"abstract":"One of the significant sources of environmental conservation is the utilization of renewable energy. Renewable energy is the energy derived from natural sources that are replenished automatically from unlimited sources. In this paper, we study the solar energy and how to increase the performance by solving the problem of dust and dirt accumulated on solar cells. Dust and dirt are the most important reasons that reduce the performance of solar cells in natural conditions. We use artificial intelligence neural networks to make the decision that solar cells need to be cleaned. Moreover, we propose two scenarios and we compare them. In the first scenario, the variables, temperature, weather and humidity are considered and in the second scenario, the variables, temperature, weather, light Intensity and humidity are considered. Concerning the weather conditions, a system prediction based on previous years is done. Results show that this system increases the solar cells’ performance by cleaning the dust and dirt in correct time.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}