首页 > 最新文献

2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

英文 中文
Controlling the Resources of the Intrusion Detection System at Network Objects Monitoring 基于网络对象监控的入侵检测系统资源控制
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096741
N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov
The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.
本文研究了在对一组网络对象进行监控时,入侵检测系统资源的优化问题。本文提出的方法的应用使得基于这些对象的可用先验信息在网络基础设施的多个对象之间优化分配信息系统的计算资源成为可能。科学的新颖性在于,所提出的方法使我们能够将观测控制理论的数学装置适应于为通信网络提供信息保护的任务。
{"title":"Controlling the Resources of the Intrusion Detection System at Network Objects Monitoring","authors":"N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov","doi":"10.1109/ICCAIS48893.2020.9096741","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096741","url":null,"abstract":"The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICCAIS 2020 Keynote Speaker ICCAIS 2020主题演讲
Pub Date : 2020-03-01 DOI: 10.1109/iccais48893.2020.9096858
{"title":"ICCAIS 2020 Keynote Speaker","authors":"","doi":"10.1109/iccais48893.2020.9096858","DOIUrl":"https://doi.org/10.1109/iccais48893.2020.9096858","url":null,"abstract":"","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Preference Based Weighted Page Ranking Algorithm 基于用户偏好的加权页面排名算法
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096823
F. Alhaidari, Sarah Alwarthan, Abrar Alamoudi
Due to the huge number of information on the internet, users use search engines to fetch the relevant pages, which include the information that meet users' needs. Search engines encountered some challenges in the process of retrieving pages matching user queries. To improve search results and how the user navigates the results of pages, search engines applied ranking method on the obtained search results. In this paper, we discussed the main Page Ranking algorithms including PageRank, Weighted Page Rank and Hyperlink- Induced Topic Search algorithms. we presented a comparative study of the latest improvements on the page ranking algorithms focusing on the algorithms that are related to user preference and user behavior. The main contribution of this paper is the proposal of an algorithm called User Preference Based Weighted Page Ranking Algorithm (UPWPR) which is an enhancement for existing ranking algorithms. UPWPR algorithm uses web content mining and web usage mining in order to rank the search results based on user preferences. A numerical case study was used to validate and compare UPWPR proposed algorithm. Results showed better ranking output based on different parameters such as the Content Weight, the User Activities Time, Page Reading Time, and the number of visits.
由于互联网上的信息数量巨大,用户使用搜索引擎获取相关页面,其中包含满足用户需求的信息。搜索引擎在检索匹配用户查询的页面过程中遇到了一些挑战。为了改进搜索结果和用户导航页面结果的方式,搜索引擎对获得的搜索结果应用了排名方法。在本文中,我们讨论了主要的页面排名算法,包括PageRank,加权页面排名和超链接诱导主题搜索算法。我们对页面排名算法的最新改进进行了比较研究,重点研究了与用户偏好和用户行为相关的算法。本文的主要贡献是提出了一种基于用户偏好的加权页面排名算法(UPWPR),该算法是对现有排名算法的改进。UPWPR算法利用web内容挖掘和web使用挖掘,根据用户偏好对搜索结果进行排序。通过数值算例对UPWPR算法进行了验证和比较。结果显示,基于不同参数(如内容权重、用户活动时间、页面阅读时间和访问次数)的排名输出更好。
{"title":"User Preference Based Weighted Page Ranking Algorithm","authors":"F. Alhaidari, Sarah Alwarthan, Abrar Alamoudi","doi":"10.1109/ICCAIS48893.2020.9096823","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096823","url":null,"abstract":"Due to the huge number of information on the internet, users use search engines to fetch the relevant pages, which include the information that meet users' needs. Search engines encountered some challenges in the process of retrieving pages matching user queries. To improve search results and how the user navigates the results of pages, search engines applied ranking method on the obtained search results. In this paper, we discussed the main Page Ranking algorithms including PageRank, Weighted Page Rank and Hyperlink- Induced Topic Search algorithms. we presented a comparative study of the latest improvements on the page ranking algorithms focusing on the algorithms that are related to user preference and user behavior. The main contribution of this paper is the proposal of an algorithm called User Preference Based Weighted Page Ranking Algorithm (UPWPR) which is an enhancement for existing ranking algorithms. UPWPR algorithm uses web content mining and web usage mining in order to rank the search results based on user preferences. A numerical case study was used to validate and compare UPWPR proposed algorithm. Results showed better ranking output based on different parameters such as the Content Weight, the User Activities Time, Page Reading Time, and the number of visits.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130834558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The World University Rankings Model Validation and a Top 50 Universities Predictive Model 世界大学排名模型验证及50强大学预测模型
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096841
Alejandra De Luna Pámanes, Jorge Antonio Ayala Urbina, Francisco J. Cantú Ortiz, Héctor Gibrán Ceballos Cancino
Data analytics has opened the possibility of exploring great amounts of information and finding patterns which helps us make predictions or give an explanation to certain behaviours and phenomena. Research analytics helps us uncover trends and relationships in different academic fields, and implement metrics that assess the quality of researchers and educational institutions. In this work we take the World University Rankings by Times Higher Education and their indicators from 2011 to 2019 to validate their evaluation model, assess the predicting potential of their rankings and uncover potential relationships between the ranking’s indicators. We found out a good prediction model and that some of the indicators carry relationships worth exploring and explaining.
数据分析开启了探索大量信息和发现模式的可能性,这些模式有助于我们做出预测或解释某些行为和现象。研究分析帮助我们揭示不同学术领域的趋势和关系,并实施评估研究人员和教育机构质量的指标。在这项工作中,我们以2011年至2019年《泰晤士报高等教育》世界大学排名及其指标为例,验证其评估模型,评估其排名的预测潜力,并揭示排名指标之间的潜在关系。我们发现了一个很好的预测模型,其中一些指标具有值得探索和解释的关系。
{"title":"The World University Rankings Model Validation and a Top 50 Universities Predictive Model","authors":"Alejandra De Luna Pámanes, Jorge Antonio Ayala Urbina, Francisco J. Cantú Ortiz, Héctor Gibrán Ceballos Cancino","doi":"10.1109/ICCAIS48893.2020.9096841","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096841","url":null,"abstract":"Data analytics has opened the possibility of exploring great amounts of information and finding patterns which helps us make predictions or give an explanation to certain behaviours and phenomena. Research analytics helps us uncover trends and relationships in different academic fields, and implement metrics that assess the quality of researchers and educational institutions. In this work we take the World University Rankings by Times Higher Education and their indicators from 2011 to 2019 to validate their evaluation model, assess the predicting potential of their rankings and uncover potential relationships between the ranking’s indicators. We found out a good prediction model and that some of the indicators carry relationships worth exploring and explaining.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122429988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review of Recent Trends in Replication Techniques 复制技术最新趋势的系统文献综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096684
Albandari L. Alanazi, Almetwally M. Mostafa, A. Alnuaim
Nowadays, most software systems manage large amount of data. The clients depend heavily on these data and expect them to be available at all times. To use and manage these data in an efficient way and to ensure availability, the data replication technique is applied. So far, three basic models for replication exist with their variants. This paper reviews these three basic models of replication techniques and their variants with regard to how the load is distributed among replicas, what the total throughput is for these set of replicas, and which type of consistency models is supported by them.
如今,大多数软件系统都管理着大量的数据。客户端严重依赖这些数据,并期望它们随时可用。为了有效地使用和管理这些数据并确保可用性,应用了数据复制技术。到目前为止,存在三种基本的复制模型及其变体。本文回顾了复制技术的这三种基本模型及其变体,包括负载如何在副本之间分布,这些副本的总吞吐量是多少,以及它们支持哪种类型的一致性模型。
{"title":"A Systematic Literature Review of Recent Trends in Replication Techniques","authors":"Albandari L. Alanazi, Almetwally M. Mostafa, A. Alnuaim","doi":"10.1109/ICCAIS48893.2020.9096684","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096684","url":null,"abstract":"Nowadays, most software systems manage large amount of data. The clients depend heavily on these data and expect them to be available at all times. To use and manage these data in an efficient way and to ensure availability, the data replication technique is applied. So far, three basic models for replication exist with their variants. This paper reviews these three basic models of replication techniques and their variants with regard to how the load is distributed among replicas, what the total throughput is for these set of replicas, and which type of consistency models is supported by them.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Investigation of New Waveforms in CRAN Architecture for 5G Communication Systems 5G通信系统中CRAN体系结构新波形性能研究
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096676
H. Mrabet
In this paper, an investigation of system performance is addressed for new emergent air interface waveforms for 5G communication systems and beyond applications. Therefore, filter-bank multi-carrier (FBMC) and universal filtered multi-carrier (UBMC) are compared to the classical OFDM waveform in the context of the cloud radio access network (CRAN) architecture. In addition, additive white Gaussian noise (AWGN) and chromatic dispersion due to single-mode-fiber (SMF) are the main system limitations that are considered in the system performance study. Likewise, the system performance is carried out through power spectral density and constellation diagrams for both pulse amplitude modulation (PAM) and quadrature amplitude modulation (QAM) high order format. Finally, it is demonstrated that FBMC-PAM waveform outperforms both UBMC-QAM and OFDM- QAM in terms of power spectral density and robustness against AWGN and chromatic dispersion.
在本文中,研究了5G通信系统及其他应用的新型紧急空中接口波形的系统性能。因此,在云无线接入网(CRAN)架构背景下,将滤波器组多载波(FBMC)和通用滤波多载波(UBMC)与经典OFDM波形进行了比较。此外,加性高斯白噪声(AWGN)和单模光纤(SMF)引起的色散是系统性能研究中主要考虑的系统限制。同样,系统性能通过脉冲调幅(PAM)和正交调幅(QAM)高阶格式的功率谱密度和星座图进行。最后,证明了FBMC-PAM波形在功率谱密度、抗AWGN和色散鲁棒性方面优于UBMC-QAM和OFDM- QAM。
{"title":"Performance Investigation of New Waveforms in CRAN Architecture for 5G Communication Systems","authors":"H. Mrabet","doi":"10.1109/ICCAIS48893.2020.9096676","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096676","url":null,"abstract":"In this paper, an investigation of system performance is addressed for new emergent air interface waveforms for 5G communication systems and beyond applications. Therefore, filter-bank multi-carrier (FBMC) and universal filtered multi-carrier (UBMC) are compared to the classical OFDM waveform in the context of the cloud radio access network (CRAN) architecture. In addition, additive white Gaussian noise (AWGN) and chromatic dispersion due to single-mode-fiber (SMF) are the main system limitations that are considered in the system performance study. Likewise, the system performance is carried out through power spectral density and constellation diagrams for both pulse amplitude modulation (PAM) and quadrature amplitude modulation (QAM) high order format. Finally, it is demonstrated that FBMC-PAM waveform outperforms both UBMC-QAM and OFDM- QAM in terms of power spectral density and robustness against AWGN and chromatic dispersion.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115875690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine Learning Approach to Predict Computer Operating Systems Vulnerabilities 预测计算机操作系统漏洞的机器学习方法
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096731
Freeh Alenezi, C. Tsokos
Information security is everyone’s concern. Computer systems are used to store sensitive data. Any weakness in their reliability and security makes them vulnerable. The Common Vulnerability Scoring System (CVSS) is a commonly used scoring system, which helps in knowing the severity of a software vulnerability. In this research, we show the effectiveness of common machine learning algorithms in predicting the computer operating systems security using the published vulnerability data in Common Vulnerabilities and Exposures and National Vulnerability Database repositories. The Random Forest algorithm has the best performance, compared to other algorithms, in predicting the computer operating system vulnerability severity levels based on precision, recall, and F-measure evaluation metrics. In addition, a predictive model was developed to predict whether a newly discovered computer operating system vulnerability would allow attackers to cause denial of service to the subject system.
信息安全是每个人都关心的问题。计算机系统用于存储敏感数据。它们在可靠性和安全性方面的任何弱点都会使它们变得脆弱。通用漏洞评分系统(CVSS)是一个常用的评分系统,它有助于了解软件漏洞的严重程度。在这项研究中,我们展示了通用机器学习算法在预测计算机操作系统安全性方面的有效性,该算法使用了通用漏洞和暴露以及国家漏洞数据库存储库中发布的漏洞数据。与其他算法相比,随机森林算法在基于精度、召回率和F-measure评估指标预测计算机操作系统漏洞严重程度方面具有最佳性能。此外,还开发了一个预测模型来预测新发现的计算机操作系统漏洞是否允许攻击者对目标系统造成拒绝服务。
{"title":"Machine Learning Approach to Predict Computer Operating Systems Vulnerabilities","authors":"Freeh Alenezi, C. Tsokos","doi":"10.1109/ICCAIS48893.2020.9096731","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096731","url":null,"abstract":"Information security is everyone’s concern. Computer systems are used to store sensitive data. Any weakness in their reliability and security makes them vulnerable. The Common Vulnerability Scoring System (CVSS) is a commonly used scoring system, which helps in knowing the severity of a software vulnerability. In this research, we show the effectiveness of common machine learning algorithms in predicting the computer operating systems security using the published vulnerability data in Common Vulnerabilities and Exposures and National Vulnerability Database repositories. The Random Forest algorithm has the best performance, compared to other algorithms, in predicting the computer operating system vulnerability severity levels based on precision, recall, and F-measure evaluation metrics. In addition, a predictive model was developed to predict whether a newly discovered computer operating system vulnerability would allow attackers to cause denial of service to the subject system.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"514 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward a Natural Language-Based Approach for the Specification of Decisional-Users Requirements 基于自然语言的决策用户需求描述方法研究
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096732
Abeer A. Alzahrani, J. Feki
The number of organizations adopting the Data Warehouse (DW) technology along with data analytics in order to improve the effectiveness of their decision–making processes is permanently increasing. Despite the efforts invested, the DW design remains a great challenge research domain. More accurately, the design quality of the DW depends on several aspects; among them, the requirement-gathering phase is a critical and complex task. In this context, we propose a Natural language (NL) NL-template based design approach, which is twofold; firstly, it facilitates the involvement of decision-makers in the early step of the DW design; indeed, using NL is a good and natural means to encourage the decision-makers to express their requirements as query-like English sentences. Secondly, our approach aims to generate a DW multidimensional schema from a set of gathered requirements (as OLAP: On-Line-Analytical-Processing queries, written according to the NL suggested templates). This approach articulates around: (i) two NL-templates for specifying multidimensional components, and (ii) a set of five heuristic rules for extracting the multidimensional concepts from requirements. Really, we are developing a software prototype that accepts the decision-makers' requirements then automatically identifies the multidimensional components of the DW model.
为了提高决策过程的有效性,采用数据仓库(DW)技术和数据分析的组织数量正在不断增加。尽管付出了努力,但DW设计仍然是一个巨大的挑战研究领域。更准确地说,DW的设计质量取决于几个方面;其中,需求收集阶段是一项关键而复杂的任务。在这种背景下,我们提出了一种基于自然语言模板的设计方法,它有两个方面;首先,它有利于决策者在DW设计的早期阶段的参与;事实上,使用自然语言是一种很好的、自然的手段,可以鼓励决策者将他们的需求表达为类似查询的英语句子。其次,我们的方法旨在从一组收集到的需求(作为OLAP:在线分析处理查询,根据NL建议的模板编写)生成DW多维模式。该方法围绕:(i)两个用于指定多维组件的nl模板,以及(ii)一组用于从需求中提取多维概念的五个启发式规则进行阐述。实际上,我们正在开发一个软件原型,它接受决策者的需求,然后自动识别DW模型的多维组件。
{"title":"Toward a Natural Language-Based Approach for the Specification of Decisional-Users Requirements","authors":"Abeer A. Alzahrani, J. Feki","doi":"10.1109/ICCAIS48893.2020.9096732","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096732","url":null,"abstract":"The number of organizations adopting the Data Warehouse (DW) technology along with data analytics in order to improve the effectiveness of their decision–making processes is permanently increasing. Despite the efforts invested, the DW design remains a great challenge research domain. More accurately, the design quality of the DW depends on several aspects; among them, the requirement-gathering phase is a critical and complex task. In this context, we propose a Natural language (NL) NL-template based design approach, which is twofold; firstly, it facilitates the involvement of decision-makers in the early step of the DW design; indeed, using NL is a good and natural means to encourage the decision-makers to express their requirements as query-like English sentences. Secondly, our approach aims to generate a DW multidimensional schema from a set of gathered requirements (as OLAP: On-Line-Analytical-Processing queries, written according to the NL suggested templates). This approach articulates around: (i) two NL-templates for specifying multidimensional components, and (ii) a set of five heuristic rules for extracting the multidimensional concepts from requirements. Really, we are developing a software prototype that accepts the decision-makers' requirements then automatically identifies the multidimensional components of the DW model.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116840752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Application for Productive Families Business 生产家庭企业的移动应用程序
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096736
Noura Alosaimi, N. M. Elzein, Afaf Mohammed Tukka
In line with Vision 2030 KSA, to enable women economically by promoting and marketing family-made products at the lowest-cost. Moreover, Saudi productive families' projects considered as one of the main sources promote employment opportunities especially for low-income families. our project promotes self-employment by manufacturing products variety. The research aims to create a suitable-safe working environment for low-income families capable of producing goods. Furthermore, it to improve product quality through customer interaction. This search was carried out by building an Android application written in java, android studio and Firebase. In fact, we aspire to manage productive family projects with a one-application which ensures that risks are reduced while saving consumer effort with multiple options for the same product. As a result of the project's implementation low-income families market their products professionally and effectively. Also, the application allows consumers to evaluate items after receiving the service to be used for optimizations process.
根据《2030年愿景》,以最低成本推广和销售家庭制造的产品,在经济上帮助妇女。此外,沙特生产性家庭的项目被认为是促进就业机会的主要来源之一,特别是低收入家庭。我们的项目通过制造多样化的产品来促进个体经营。该研究旨在为有生产能力的低收入家庭创造一个合适的安全的工作环境。通过与顾客的互动来提高产品质量。这个搜索是通过用java、Android studio和Firebase编写的Android应用程序来完成的。事实上,我们渴望用一个应用程序来管理富有成效的家庭项目,这确保了风险的降低,同时为同一产品的多个选项节省了消费者的精力。由于该项目的实施,低收入家庭专业有效地推销了他们的产品。此外,应用程序允许消费者在接收到用于优化过程的服务后对项目进行评估。
{"title":"Mobile Application for Productive Families Business","authors":"Noura Alosaimi, N. M. Elzein, Afaf Mohammed Tukka","doi":"10.1109/ICCAIS48893.2020.9096736","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096736","url":null,"abstract":"In line with Vision 2030 KSA, to enable women economically by promoting and marketing family-made products at the lowest-cost. Moreover, Saudi productive families' projects considered as one of the main sources promote employment opportunities especially for low-income families. our project promotes self-employment by manufacturing products variety. The research aims to create a suitable-safe working environment for low-income families capable of producing goods. Furthermore, it to improve product quality through customer interaction. This search was carried out by building an Android application written in java, android studio and Firebase. In fact, we aspire to manage productive family projects with a one-application which ensures that risks are reduced while saving consumer effort with multiple options for the same product. As a result of the project's implementation low-income families market their products professionally and effectively. Also, the application allows consumers to evaluate items after receiving the service to be used for optimizations process.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Incorporating a Decision Support Approach within the Agile Mobile Application Development Process 在敏捷移动应用程序开发过程中加入决策支持方法
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096751
Abdulmajeed Aljuhani, Abdulaziz Alhubaishy
According to the literature, traditional desktop-based application development processes profit from the adoption of Multi-Criteria Decision-Making (MCDM) approaches under specific conditions. However, agile methodology often shuns this method, instead encouraging a cooperative decision support structure. Within the domain of mobile-based applications, an optimized structure is constitutionally introduced, thus, the presentation of a powerful decision-making approach in agile mobile application development should prompt a more significant level of contentment with mobile applications built in this way. The present paper introduces an approach to adopting the MCDM method for the agile mobile application development process. The paper consists of a framework for investigating insertion points for decision-making method - namely, the Best- Worst Method (BWM) - and a practical example of the application of the Best-Worst decision support method in the development process of agile mobile applications.
根据文献,传统的基于桌面的应用程序开发过程受益于在特定条件下采用多准则决策(MCDM)方法。然而,敏捷方法经常避免这种方法,而是鼓励协作决策支持结构。在基于移动应用程序的领域中,一个优化的结构是有组织地引入的,因此,在敏捷移动应用程序开发中提出一个强大的决策方法应该会促使人们对以这种方式构建的移动应用程序更加满意。本文介绍了在敏捷移动应用开发过程中采用MCDM方法的一种方法。本文提出了一个研究决策方法插入点的框架,即最佳-最差方法(Best-Worst method, BWM),并给出了最佳-最差决策支持方法在敏捷移动应用开发过程中的应用实例。
{"title":"Incorporating a Decision Support Approach within the Agile Mobile Application Development Process","authors":"Abdulmajeed Aljuhani, Abdulaziz Alhubaishy","doi":"10.1109/ICCAIS48893.2020.9096751","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096751","url":null,"abstract":"According to the literature, traditional desktop-based application development processes profit from the adoption of Multi-Criteria Decision-Making (MCDM) approaches under specific conditions. However, agile methodology often shuns this method, instead encouraging a cooperative decision support structure. Within the domain of mobile-based applications, an optimized structure is constitutionally introduced, thus, the presentation of a powerful decision-making approach in agile mobile application development should prompt a more significant level of contentment with mobile applications built in this way. The present paper introduces an approach to adopting the MCDM method for the agile mobile application development process. The paper consists of a framework for investigating insertion points for decision-making method - namely, the Best- Worst Method (BWM) - and a practical example of the application of the Best-Worst decision support method in the development process of agile mobile applications.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125122732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1