首页 > 最新文献

2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

英文 中文
Deep Learning approach for Multiple Source Classification in Remote Sensing Imagery 遥感图像多源分类的深度学习方法
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096746
Huda Alhawiti, Y. Bazi, M. M. Al Rahhal, H. Alhichri, M. Zuair
In this paper, we present a deep learning approach for learning for multiple remote sensing sources. The method starts by eliminating the distribution shift between the different sources and the target dataset using an adversarial learning approach based on min-max entropy optimization. After convergence, the results are aggregated using an average fusion layer. As pre-trained CNN we use in the work the recent state-of-the-art EfficientNet models. In the experiments, we assess the method on four remote sensing datasets acquired over different locations of the earth’s surface and are labeled by different experts. The obtained results confirm the promising capability of the proposed method.
在本文中,我们提出了一种用于多遥感源学习的深度学习方法。该方法首先使用基于最小-最大熵优化的对抗性学习方法消除不同源和目标数据集之间的分布偏移。收敛后,使用平均融合层对结果进行聚合。作为预训练的CNN,我们在工作中使用了最新的最先进的effentnet模型。在实验中,我们对在地球表面不同位置获得的四个遥感数据集进行了评估,这些数据集由不同的专家标记。所得结果证实了该方法的良好性能。
{"title":"Deep Learning approach for Multiple Source Classification in Remote Sensing Imagery","authors":"Huda Alhawiti, Y. Bazi, M. M. Al Rahhal, H. Alhichri, M. Zuair","doi":"10.1109/ICCAIS48893.2020.9096746","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096746","url":null,"abstract":"In this paper, we present a deep learning approach for learning for multiple remote sensing sources. The method starts by eliminating the distribution shift between the different sources and the target dataset using an adversarial learning approach based on min-max entropy optimization. After convergence, the results are aggregated using an average fusion layer. As pre-trained CNN we use in the work the recent state-of-the-art EfficientNet models. In the experiments, we assess the method on four remote sensing datasets acquired over different locations of the earth’s surface and are labeled by different experts. The obtained results confirm the promising capability of the proposed method.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solution of optimal power flow problem of system with FACTS devices using MDE algorithm 用MDE算法求解FACTS设备系统的最优潮流问题
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096778
R. P. Singh, V. Mukherjee, Dharmbir Prasad, W. Ansari
Goal of this paper is to investigate the potential of modified differential evolution (MDE) algorithm, to find solution for optimal power flow (OPF) problem of power systems incorporating flexible ac transmission system (FACTS) devices. The optimization problem of the present work is formulated with four different objective functions viz., (a) fuel cost minimization, (b) power transmission losses minimization, (c) emission reduction and (d) minimization of combined economic and environmental cost. In this context, two FACTS devices, namely, thyristor controlled phase shifter (TCPS) and thyristor controlled series capacitor (TCSC) are integrating at predefined locations on the standard IEEE-57 bus test system. The results demonstrate the potential of the proposed approach and show its effectiveness and robustness to solve the OPF problem for the test systems considered.
本文的目的是研究改进差分进化(MDE)算法的潜力,以寻找包含柔性交流输电系统(FACTS)设备的电力系统的最优潮流(OPF)问题的解。本文的优化问题由四个不同的目标函数组成,即(a)燃料成本最小化,(b)输电损耗最小化,(c)减排,(d)经济和环境综合成本最小化。在这种情况下,两个FACTS器件,即晶闸管控制移相器(TCPS)和晶闸管控制串联电容器(TCSC)在标准IEEE-57总线测试系统的预定义位置集成。结果证明了该方法的潜力,并显示了其解决所考虑的测试系统的OPF问题的有效性和鲁棒性。
{"title":"Solution of optimal power flow problem of system with FACTS devices using MDE algorithm","authors":"R. P. Singh, V. Mukherjee, Dharmbir Prasad, W. Ansari","doi":"10.1109/ICCAIS48893.2020.9096778","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096778","url":null,"abstract":"Goal of this paper is to investigate the potential of modified differential evolution (MDE) algorithm, to find solution for optimal power flow (OPF) problem of power systems incorporating flexible ac transmission system (FACTS) devices. The optimization problem of the present work is formulated with four different objective functions viz., (a) fuel cost minimization, (b) power transmission losses minimization, (c) emission reduction and (d) minimization of combined economic and environmental cost. In this context, two FACTS devices, namely, thyristor controlled phase shifter (TCPS) and thyristor controlled series capacitor (TCSC) are integrating at predefined locations on the standard IEEE-57 bus test system. The results demonstrate the potential of the proposed approach and show its effectiveness and robustness to solve the OPF problem for the test systems considered.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICCAIS 2020 Authors List ICCAIS 2020作者名单
Pub Date : 2020-03-01 DOI: 10.1109/iccais48893.2020.9096737
{"title":"ICCAIS 2020 Authors List","authors":"","doi":"10.1109/iccais48893.2020.9096737","DOIUrl":"https://doi.org/10.1109/iccais48893.2020.9096737","url":null,"abstract":"","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mafqudat: Arabic Smartphone Application for Reporting Lost and Found Items Mafqudat:阿拉伯语智能手机报告失物招领应用程序
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096791
N. Alnaghaimshi, R. A. Alenizy, G. Alfayez, A.A. Almutairi
Nowadays, missing or losing items has become a common problem owing to our stressful and pressured lifestyle. Losing items can be highly inconvenient and may have an effect on emotional well-being. However, technology can be employed to provide effective solutions to help people in searching, verifying and finding their missing items. In response, a solution for effectively searching for the missing items in an outdoor environment is presented. This paper proposes a mobile-based technology designed for Arabic users for a more efficient method of finding lost items easily and quickly.
如今,由于我们紧张的生活方式,丢失或丢失物品已经成为一个常见的问题。丢失物品会给你带来很大的不便,还会影响你的情绪健康。然而,技术可以提供有效的解决方案,帮助人们寻找、核实和找到他们丢失的物品。为此,提出了一种在室外环境下有效寻找遗失物品的解决方案。本文提出了一种为阿拉伯用户设计的基于移动的技术,以便更有效、更快捷地找到丢失的物品。
{"title":"Mafqudat: Arabic Smartphone Application for Reporting Lost and Found Items","authors":"N. Alnaghaimshi, R. A. Alenizy, G. Alfayez, A.A. Almutairi","doi":"10.1109/ICCAIS48893.2020.9096791","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096791","url":null,"abstract":"Nowadays, missing or losing items has become a common problem owing to our stressful and pressured lifestyle. Losing items can be highly inconvenient and may have an effect on emotional well-being. However, technology can be employed to provide effective solutions to help people in searching, verifying and finding their missing items. In response, a solution for effectively searching for the missing items in an outdoor environment is presented. This paper proposes a mobile-based technology designed for Arabic users for a more efficient method of finding lost items easily and quickly.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative study between different energy storage technologies to design hybrid source supplying urban electric vehicles 不同储能技术在城市电动汽车混合电源设计中的比较研究
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096828
Laid Degaa, B. Bendjedia, N. Rizoug, A. Saidane, A. Belaidi
In recent years, the Energy Storage Systems field for all electric vehicle applications has attracted many researchers and academic institutions. The main challenge concerns the design in terms of weight, volume, and increasing as possible the hybrid source lifetime. Therefore, increasing the vehicle drive range is very important parameter to facilitate their commercialization.Several storage components can be used to achieve the needed performances as super capacitor, batteries and fuel cell systems. However, fuel cells are energetic components where it is needed to add a powerful element to ensure the power peaks during acceleration and deceleration phases. This paper deals with, a comparative study between fuel cell and battery based power trains for lightweight electric vehicles. A developed algorithm is used to obtain the optimal sizes and constraints of different Energy Storage Systems (ESS) based on fuel cells, batteries and supercapacitors. The comparison between the several systems is based on their costs, volumes, weights and constraints applied to cells. First, to confirm the hybridization benefits we present a comparative study between single and hybrid ESSs according to the desired drive range in terms of energy consumption, weight and cost. Furthermore, in the objective to improve the hybrid ESS performances, different technologies batteries and supercapacitors are tested and their performances will be evaluated. Simulation results show that the desired range influences the choice of storage system technologies for the hybrid enrgy storage system. This results confirm also the interest of hybrid storage system composed with fuel cells and battery for high drive range (>400km).
近年来,所有电动汽车应用的储能系统领域吸引了许多研究人员和学术机构。设计的主要挑战在于重量、体积和尽可能延长混合源寿命。因此,提高汽车续驶里程是促进其商业化的重要参数。几个存储组件可以用来实现所需的性能,如超级电容器,电池和燃料电池系统。然而,燃料电池是能量组件,它需要添加一个强大的元素,以确保在加速和减速阶段的功率峰值。本文对轻型电动汽车燃料电池动力系统和电池动力系统进行了比较研究。提出了一种基于燃料电池、电池和超级电容器的储能系统的最优尺寸和约束条件求解算法。几种系统之间的比较是基于它们的成本、体积、重量和应用于细胞的限制。首先,为了确认混合动力的好处,我们根据所需的驱动范围,在能耗、重量和成本方面对单一和混合ess进行了比较研究。此外,为了提高混合ESS的性能,对不同技术电池和超级电容器进行了测试,并对其性能进行了评估。仿真结果表明,期望距离影响混合储能系统的储能技术选择。这一结果也证实了燃料电池和电池组成的混合动力存储系统对高行驶里程(>400km)的兴趣。
{"title":"Comparative study between different energy storage technologies to design hybrid source supplying urban electric vehicles","authors":"Laid Degaa, B. Bendjedia, N. Rizoug, A. Saidane, A. Belaidi","doi":"10.1109/ICCAIS48893.2020.9096828","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096828","url":null,"abstract":"In recent years, the Energy Storage Systems field for all electric vehicle applications has attracted many researchers and academic institutions. The main challenge concerns the design in terms of weight, volume, and increasing as possible the hybrid source lifetime. Therefore, increasing the vehicle drive range is very important parameter to facilitate their commercialization.Several storage components can be used to achieve the needed performances as super capacitor, batteries and fuel cell systems. However, fuel cells are energetic components where it is needed to add a powerful element to ensure the power peaks during acceleration and deceleration phases. This paper deals with, a comparative study between fuel cell and battery based power trains for lightweight electric vehicles. A developed algorithm is used to obtain the optimal sizes and constraints of different Energy Storage Systems (ESS) based on fuel cells, batteries and supercapacitors. The comparison between the several systems is based on their costs, volumes, weights and constraints applied to cells. First, to confirm the hybridization benefits we present a comparative study between single and hybrid ESSs according to the desired drive range in terms of energy consumption, weight and cost. Furthermore, in the objective to improve the hybrid ESS performances, different technologies batteries and supercapacitors are tested and their performances will be evaluated. Simulation results show that the desired range influences the choice of storage system technologies for the hybrid enrgy storage system. This results confirm also the interest of hybrid storage system composed with fuel cells and battery for high drive range (>400km).","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Motivational Company’s Characteristics to Secure Software 激励公司的特点,以确保软件安全
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096815
Fatimah Alghamdi
Software companies’ acceptance to adopt security practices during the software development life cycle differs from one company to another. It can be said that one of the reasons for these differences is the varied characteristics of each company, such as its size, resources, and field. This paper aims to study the characteristics of companies that affect the adoption of security practices during software development. We studied eight company characteristics, some of which are classified as primary characteristics, including company size, type of developed software, and type of company. Meanwhile, the remaining five characteristics are classified as secondary characteristics, including company field, years of experience, methodology, presence of security experts, and approach to adopting security practices. A survey method was designed to find company characteristics that impact security adoption during software development. Results show that large companies, especially generic companies, adoption security practices more than other types of companies.
软件公司在软件开发生命周期中采用安全实践的接受程度因公司而异。可以说,造成这些差异的原因之一是每家公司的特点各不相同,比如规模、资源、领域等。本文旨在研究影响软件开发过程中采用安全实践的公司特征。我们研究了八种公司特征,其中一些被归类为主要特征,包括公司规模、开发的软件类型和公司类型。同时,其余五个特征被归类为次要特征,包括公司领域、多年经验、方法、安全专家的存在以及采用安全实践的方法。设计了一种调查方法来发现在软件开发过程中影响安全性采用的公司特征。结果表明,大型公司,尤其是通用公司,比其他类型的公司更多地采用安全实践。
{"title":"Motivational Company’s Characteristics to Secure Software","authors":"Fatimah Alghamdi","doi":"10.1109/ICCAIS48893.2020.9096815","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096815","url":null,"abstract":"Software companies’ acceptance to adopt security practices during the software development life cycle differs from one company to another. It can be said that one of the reasons for these differences is the varied characteristics of each company, such as its size, resources, and field. This paper aims to study the characteristics of companies that affect the adoption of security practices during software development. We studied eight company characteristics, some of which are classified as primary characteristics, including company size, type of developed software, and type of company. Meanwhile, the remaining five characteristics are classified as secondary characteristics, including company field, years of experience, methodology, presence of security experts, and approach to adopting security practices. A survey method was designed to find company characteristics that impact security adoption during software development. Results show that large companies, especially generic companies, adoption security practices more than other types of companies.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125574148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey On Face Recognition Algorithms 人脸识别算法综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096726
Jana Alghamdi, Renad Alharthi, Raneem Alghamdi, Wafaa Alsubaie, Rawan AlSubaie, Dana Alqahtani, Rawan Al ramadan, Leena Alqarni, Reem Alshammari
Facial Recognition System is a computer technology that uses a variety of algorithms that identify the human face in digital images, identify the person and then verify the captured images by comparing them with the facial images stored in the database. Facial recognition is an important topic in computer vision, and many researchers have studied this topic in many different ways; it is important especially in some applications such as surveillance systems. The main objective of this survey paper is to compare the multiple algorithms used for facial recognition.
人脸识别系统是一种计算机技术,它使用各种算法在数字图像中识别人脸,识别人,然后通过与存储在数据库中的面部图像进行比较来验证捕获的图像。人脸识别是计算机视觉中的一个重要课题,许多研究者从不同的角度对这一课题进行了研究;它在监视系统等应用中尤为重要。本调查论文的主要目的是比较用于面部识别的多种算法。
{"title":"A Survey On Face Recognition Algorithms","authors":"Jana Alghamdi, Renad Alharthi, Raneem Alghamdi, Wafaa Alsubaie, Rawan AlSubaie, Dana Alqahtani, Rawan Al ramadan, Leena Alqarni, Reem Alshammari","doi":"10.1109/ICCAIS48893.2020.9096726","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096726","url":null,"abstract":"Facial Recognition System is a computer technology that uses a variety of algorithms that identify the human face in digital images, identify the person and then verify the captured images by comparing them with the facial images stored in the database. Facial recognition is an important topic in computer vision, and many researchers have studied this topic in many different ways; it is important especially in some applications such as surveillance systems. The main objective of this survey paper is to compare the multiple algorithms used for facial recognition.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Developing of Algorithm of HTTP FLOOD DDoS Protection HTTP FLOOD DDoS防护算法的开发
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096870
P. Razumov, O. Safaryan, I. Smirnov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, Sergey A. Osikov
One of most relevant cyberattacks are DDoS–attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users. The consequences of this attack can result in financial losses for IS owner, as well as failure of hardware as a whole. Practical implementation of the method for detecting DDoS attacks at L7 level of OSI model – HTTP Flood if offered. This method is based on mathematical model that reproduces the interaction of clients with the server. It takes into account the individual characteristics of parameters describing operation of network and server, which affects to the possibility of more effective attack detection. Authors’ development offers the software implementation of this procedure as extension module to reflect large number of non– valid requests from attacking side of HTTP_Flood_reject. Such solution realization is aimed to protect critical resources of commercial organizations and natural persons to provide service from DDos–type attacks.
最相关的网络攻击之一是ddos攻击,其目的是服务器失败(拒绝)服务。它的成功实现限制或确保了位于服务器上的信息系统资源对所有用户的不可访问性。这种攻击的后果可能会导致IS所有者的经济损失,以及整个硬件的故障。在OSI模型的L7层检测DDoS攻击的方法的实际实现- HTTP Flood如果提供。该方法基于再现客户机与服务器交互的数学模型。它考虑了描述网络和服务器运行的参数的个体特征,影响了更有效检测攻击的可能性。作者的开发提供了该过程的软件实现作为扩展模块,以反映攻击方对HTTP_Flood_reject的大量无效请求。该解决方案的实现旨在保护商业机构和自然人提供服务的关键资源不受ddos类攻击。
{"title":"Developing of Algorithm of HTTP FLOOD DDoS Protection","authors":"P. Razumov, O. Safaryan, I. Smirnov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, Sergey A. Osikov","doi":"10.1109/ICCAIS48893.2020.9096870","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096870","url":null,"abstract":"One of most relevant cyberattacks are DDoS–attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users. The consequences of this attack can result in financial losses for IS owner, as well as failure of hardware as a whole. Practical implementation of the method for detecting DDoS attacks at L7 level of OSI model – HTTP Flood if offered. This method is based on mathematical model that reproduces the interaction of clients with the server. It takes into account the individual characteristics of parameters describing operation of network and server, which affects to the possibility of more effective attack detection. Authors’ development offers the software implementation of this procedure as extension module to reflect large number of non– valid requests from attacking side of HTTP_Flood_reject. Such solution realization is aimed to protect critical resources of commercial organizations and natural persons to provide service from DDos–type attacks.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Image Encryption Based on AES and RSA Algorithms 基于AES和RSA算法的图像加密
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096809
Dalia Alsaffar, Atheer Sultan Almutiri, Bashaier Alqahtani, Rahaf Alamri, Hanan Fahhad Alqahtani, Nada Alqahtani, Ghadeer Mohammed alshammari, Azza A. Ali
Cryptography is the science that concern of protecting data by transforming its comprehensible form into incomprehensible one. This study aims to compare between Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) encryption algorithms in image encryption using MATLAB. The comparison is done in the terms of testing image encryption quality for each algorithm. In addition, analyzing the histogram and correlation results. The results showed that AES algorithm has a better image encryption quality with a more convergent columns in the histogram. Moreover, AES algorithm correlation coefficient tends to be closer to the zero, thus a stronger correlation. Generally, the outcomes of this study showed that the AES algorithm is better than RSA algorithm in image encryption.1
密码学是一门通过将数据的可理解形式转化为不可理解形式来保护数据的科学。本研究旨在利用MATLAB对高级加密标准AES (Advanced Encryption Standard)和RSA (Rivest-Shamir-Adleman)加密算法在图像加密中的比较。在测试两种算法的图像加密质量方面进行了比较。此外,分析了直方图和相关结果。结果表明,AES算法具有较好的图像加密质量,在直方图中具有更多的收敛列。而且AES算法的相关系数更接近于零,相关性更强。总的来说,本研究的结果表明AES算法在图像加密方面优于RSA算法
{"title":"Image Encryption Based on AES and RSA Algorithms","authors":"Dalia Alsaffar, Atheer Sultan Almutiri, Bashaier Alqahtani, Rahaf Alamri, Hanan Fahhad Alqahtani, Nada Alqahtani, Ghadeer Mohammed alshammari, Azza A. Ali","doi":"10.1109/ICCAIS48893.2020.9096809","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096809","url":null,"abstract":"Cryptography is the science that concern of protecting data by transforming its comprehensible form into incomprehensible one. This study aims to compare between Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) encryption algorithms in image encryption using MATLAB. The comparison is done in the terms of testing image encryption quality for each algorithm. In addition, analyzing the histogram and correlation results. The results showed that AES algorithm has a better image encryption quality with a more convergent columns in the histogram. Moreover, AES algorithm correlation coefficient tends to be closer to the zero, thus a stronger correlation. Generally, the outcomes of this study showed that the AES algorithm is better than RSA algorithm in image encryption.1","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Driving Coach Finder 驾驶教练寻找者
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096853
N. Alnaghaimshi, S. Almutairi, R. A. Alfaham, G. R. Alkhanini
In June 2018, it became legal for women to drive in Saudi. Since then, driving schools cannot keep up with demand for driver training and licensing. Applicants may take several months to start their classes at a school, most of which are located in major cities such as Riyadh. Official driving schools for women in Saudi Arabia are noticeably fewer than those for men and those schools cannot cope with the high demand, thus increasing the waiting time to enrol. The proposed Driving Coach Finder application aims to provide a communication space for Saudi women learning to drive and trainers or coaches. Further, creative features aim to make the experience of driving education enjoyable and support Saudi women willing to learn to drive but who cannot access driving schools. A participatory design process was undertaken with Saudi women who had had no driving experience. During the focus group, participants revealed several challenges and needs in order to learn how to drive; their responses have provided a powerful guidance for the design of proposed application. Saudi women will be able to find, review and share details of female driving instructors and locations in which to practise driving. Driving Coach Finder will assist in the creation of a marketplace to help find a private professional driving instructor and, at the same time, consider the specificity of society local culture and the needs of users. Helping to empower women wishing to obtain a driver’s licence will contribute to the country’s high economic and social growth. Further, Driving Coach Finder is expected to aid the generation of employment opportunities for women.
2018年6月,女性在沙特开车合法。从那时起,驾校就无法满足驾驶员培训和执照的需求。申请者可能需要几个月的时间才能在一所学校开始上课,这些学校大多位于利雅得等主要城市。沙特阿拉伯为女性开设的官方驾校明显少于为男性开设的驾校,而且这些学校无法满足大量需求,因此增加了报名的等待时间。拟议中的“驾驶教练查找器”应用程序旨在为学习驾驶的沙特妇女和培训师或教练提供一个交流空间。此外,创新功能旨在使驾驶教育体验愉快,并支持愿意学习驾驶但无法进入驾驶学校的沙特妇女。对没有驾驶经验的沙特妇女进行了参与性设计过程。在焦点小组中,参与者透露了学习如何驾驶的一些挑战和需求;他们的回答为所建议的应用程序的设计提供了强有力的指导。沙特女性将能够找到、查看和分享女性驾驶教练的详细信息以及练习驾驶的地点。Driving Coach Finder将协助创建一个市场,帮助寻找私人专业驾驶教练,同时考虑到社会、当地文化和用户需求的特殊性。帮助赋予希望获得驾驶执照的妇女权力将有助于该国经济和社会的高速增长。此外,Driving Coach Finder预计将有助于为妇女创造就业机会。
{"title":"Driving Coach Finder","authors":"N. Alnaghaimshi, S. Almutairi, R. A. Alfaham, G. R. Alkhanini","doi":"10.1109/ICCAIS48893.2020.9096853","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096853","url":null,"abstract":"In June 2018, it became legal for women to drive in Saudi. Since then, driving schools cannot keep up with demand for driver training and licensing. Applicants may take several months to start their classes at a school, most of which are located in major cities such as Riyadh. Official driving schools for women in Saudi Arabia are noticeably fewer than those for men and those schools cannot cope with the high demand, thus increasing the waiting time to enrol. The proposed Driving Coach Finder application aims to provide a communication space for Saudi women learning to drive and trainers or coaches. Further, creative features aim to make the experience of driving education enjoyable and support Saudi women willing to learn to drive but who cannot access driving schools. A participatory design process was undertaken with Saudi women who had had no driving experience. During the focus group, participants revealed several challenges and needs in order to learn how to drive; their responses have provided a powerful guidance for the design of proposed application. Saudi women will be able to find, review and share details of female driving instructors and locations in which to practise driving. Driving Coach Finder will assist in the creation of a marketplace to help find a private professional driving instructor and, at the same time, consider the specificity of society local culture and the needs of users. Helping to empower women wishing to obtain a driver’s licence will contribute to the country’s high economic and social growth. Further, Driving Coach Finder is expected to aid the generation of employment opportunities for women.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1