Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096730
Basil Atawneh, Layla AL-Hammoury, Mohammed AbuTaha
With the huge usage of the Internet of Things (IoT), lots of sensitive data are being transferred between devices. This raises the need for security so that unauthorized parties can’t access the data. IoT devices are known to have limited resources; they have limited battery life, limited memory size and their response time should be minimized. With these speed and memory constraints, classical encryption systems and methods don’t work efficiently with the IoT devices, because they can be too slow, huge or very power consuming. Here comes the need to develop a Lightweight cryptosystem that meets the requirements of the Lightweight device. In this paper, a practical lightweight stream cipher based on stream cipher is proposed, then the power consumption is calculated to show the suitability for limited resources devices. Furthermore, some lightweight measurement tools will be used in order to achieve the research objectives.
{"title":"Power consumption of a chaos-based stream cipher algorithm","authors":"Basil Atawneh, Layla AL-Hammoury, Mohammed AbuTaha","doi":"10.1109/ICCAIS48893.2020.9096730","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096730","url":null,"abstract":"With the huge usage of the Internet of Things (IoT), lots of sensitive data are being transferred between devices. This raises the need for security so that unauthorized parties can’t access the data. IoT devices are known to have limited resources; they have limited battery life, limited memory size and their response time should be minimized. With these speed and memory constraints, classical encryption systems and methods don’t work efficiently with the IoT devices, because they can be too slow, huge or very power consuming. Here comes the need to develop a Lightweight cryptosystem that meets the requirements of the Lightweight device. In this paper, a practical lightweight stream cipher based on stream cipher is proposed, then the power consumption is calculated to show the suitability for limited resources devices. Furthermore, some lightweight measurement tools will be used in order to achieve the research objectives.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096868
Hanan F. Alqahtani, Jeehan A. Albuainain, Badriayh G. Almutiri, Shahad Alansari, Ghaliah B. AL-awwad, Nada Alqahtani, Samia M. Masaad, Rania A. Tabeidi
Recently, the use of Internet of Things (IOT) technology in all aspects of life has increased, and the most important areas that have been affected by this development are locks, security systems, and remote-control technologies. In this study, the proposed Smart Locker based on the Bluetooth technique can be controlled remotely using a mobile phone application to design the interfaces that help to enhance security and convenience. In addition to that, an alternative technique will be provided to open the lock by using a Keypad 4x4 when the mobile phone is not available.
{"title":"Automated Smart Locker for College","authors":"Hanan F. Alqahtani, Jeehan A. Albuainain, Badriayh G. Almutiri, Shahad Alansari, Ghaliah B. AL-awwad, Nada Alqahtani, Samia M. Masaad, Rania A. Tabeidi","doi":"10.1109/ICCAIS48893.2020.9096868","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096868","url":null,"abstract":"Recently, the use of Internet of Things (IOT) technology in all aspects of life has increased, and the most important areas that have been affected by this development are locks, security systems, and remote-control technologies. In this study, the proposed Smart Locker based on the Bluetooth technique can be controlled remotely using a mobile phone application to design the interfaces that help to enhance security and convenience. In addition to that, an alternative technique will be provided to open the lock by using a Keypad 4x4 when the mobile phone is not available.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096717
Meshal Alshaye, Faisal Alawwad, I. Elshafiey
Hurricane Monitoring using GNSS-R is an emerging application in earth remote sensing. Practically, the hurricane is categorized by its maximum win speed which can be measured from the reflected GNSS signals. In order to track the hurricane movement efficiently, a large number of measurements is required. Alternatively, by using deep learning algorithms, useful information from much fewer measurements can be inferred. In this paper, a deep learning-based technique is proposed to track the core of a moving hurricane using limited measurements of a reflected GNSS signals. The proposed technique has achieved a very high accuracy of 96.6% using a CNN model.
{"title":"Hurricane Tracking Using Multi-GNSS-R and Deep Learning","authors":"Meshal Alshaye, Faisal Alawwad, I. Elshafiey","doi":"10.1109/ICCAIS48893.2020.9096717","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096717","url":null,"abstract":"Hurricane Monitoring using GNSS-R is an emerging application in earth remote sensing. Practically, the hurricane is categorized by its maximum win speed which can be measured from the reflected GNSS signals. In order to track the hurricane movement efficiently, a large number of measurements is required. Alternatively, by using deep learning algorithms, useful information from much fewer measurements can be inferred. In this paper, a deep learning-based technique is proposed to track the core of a moving hurricane using limited measurements of a reflected GNSS signals. The proposed technique has achieved a very high accuracy of 96.6% using a CNN model.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096792
Reem Alshammari, Fatimah. H Almuhsin, Fatima. A Albuainain, Salma N. Elsadek, Noura. A Alqhtani, Sarah. A Alkhaldi, Sara K Alghamdi, Wedyan S. Alghamdi
Image processing, especially filtering has become important because there are many factors that affect the quality and purity of the images. For example, the change in pixel density or illumination will negatively affect the images; therefore noise should be removed using filtering. Image filtering is useful for many applications including smoothing, sharping, removing noise and edges enhancement. This paper analyses the various algorithms used for image filtering which improves image quality and clarity. The first section introduces different algorithms that are used in image filtering and how each algorithm processes the image. Then, a discussion and analysis of the literature review has been done to classify and compare between the algorithms studied.
{"title":"A Survey On Image Filtring Algorithms","authors":"Reem Alshammari, Fatimah. H Almuhsin, Fatima. A Albuainain, Salma N. Elsadek, Noura. A Alqhtani, Sarah. A Alkhaldi, Sara K Alghamdi, Wedyan S. Alghamdi","doi":"10.1109/ICCAIS48893.2020.9096792","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096792","url":null,"abstract":"Image processing, especially filtering has become important because there are many factors that affect the quality and purity of the images. For example, the change in pixel density or illumination will negatively affect the images; therefore noise should be removed using filtering. Image filtering is useful for many applications including smoothing, sharping, removing noise and edges enhancement. This paper analyses the various algorithms used for image filtering which improves image quality and clarity. The first section introduces different algorithms that are used in image filtering and how each algorithm processes the image. Then, a discussion and analysis of the literature review has been done to classify and compare between the algorithms studied.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096729
I. Smirnov, O. Safaryan, P. Razumov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, P. A. Chub
The proposed work considers the development of the cryptographic protocol IAS2019, which allows you to protect the public key in an open communication channel. The advantage of this protocol is that it can be integrated with other cryptographic protocols, thereby increasing their security properties, and also has a higher level of security compared to foreign counterparts.
{"title":"IAS’2019 Cryptographic Protocol Allowing to Protect the Key in the Open Communication Channel","authors":"I. Smirnov, O. Safaryan, P. Razumov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, P. A. Chub","doi":"10.1109/ICCAIS48893.2020.9096729","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096729","url":null,"abstract":"The proposed work considers the development of the cryptographic protocol IAS2019, which allows you to protect the public key in an open communication channel. The advantage of this protocol is that it can be integrated with other cryptographic protocols, thereby increasing their security properties, and also has a higher level of security compared to foreign counterparts.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096773
Salah Hammami
Outcome Based Assessment (OBA) is one of the recent educational phenomenon that is being increased use especially in high education. This approach applied to improve the learning, increase student mobility and achieve lifelong learning either in traditional learning or in e-learning systems. This study will describe the effectiveness and efficiency of the various outcome based assessment models and will conduct a detailed and comparative analysis of them from different criteria to identify the strengths and limitations of every model. Different factors and criteria will be discussed to evaluate and compare between existing models.
{"title":"Effectiveness and Efficiency of Course Outcomes Based Assessment Models","authors":"Salah Hammami","doi":"10.1109/ICCAIS48893.2020.9096773","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096773","url":null,"abstract":"Outcome Based Assessment (OBA) is one of the recent educational phenomenon that is being increased use especially in high education. This approach applied to improve the learning, increase student mobility and achieve lifelong learning either in traditional learning or in e-learning systems. This study will describe the effectiveness and efficiency of the various outcome based assessment models and will conduct a detailed and comparative analysis of them from different criteria to identify the strengths and limitations of every model. Different factors and criteria will be discussed to evaluate and compare between existing models.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096825
A. A. AlQahtani, Hosam Alamleh, J. Gourd, Hend Alnuhait
Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor is something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), something a user does (keystroke), or somewhere a user is (location). In the existing 2FA system, a user is required to act in order to implement the second layer of authentication which is not very user-friendly. Smart devices (phones, laptops, tablets, etc.) can receive signals from different radio frequency technologies within range. As these devices move among networks (Wi-Fi access points, cellphone towers, etc.), they receive broadcast messages, some of which can be used to collect information. This information can be utilized in a variety of ways, such as establishing a connection, sharing information, locating devices, and, most appropriately, identifying users in range. The principal benefit of broadcast messages is that the devices can read and process the embedded information without being connected to the broadcaster. Moreover, the broadcast messages can be received only within range of the wireless access point sending the broadcast, thus inherently limiting access to those devices in close physical proximity and facilitating many applications dependent on that proximity. In the proposed research, a new factor is used - something that is in the user’s environment with minimal user involvement. Data from these broadcast messages is utilized to implement a 2FA scheme by determining whether two devices are proximate or not to ensure that they belong to the same user.
{"title":"TS2FA: Trilateration System Two Factor Authentication","authors":"A. A. AlQahtani, Hosam Alamleh, J. Gourd, Hend Alnuhait","doi":"10.1109/ICCAIS48893.2020.9096825","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096825","url":null,"abstract":"Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor is something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), something a user does (keystroke), or somewhere a user is (location). In the existing 2FA system, a user is required to act in order to implement the second layer of authentication which is not very user-friendly. Smart devices (phones, laptops, tablets, etc.) can receive signals from different radio frequency technologies within range. As these devices move among networks (Wi-Fi access points, cellphone towers, etc.), they receive broadcast messages, some of which can be used to collect information. This information can be utilized in a variety of ways, such as establishing a connection, sharing information, locating devices, and, most appropriately, identifying users in range. The principal benefit of broadcast messages is that the devices can read and process the embedded information without being connected to the broadcaster. Moreover, the broadcast messages can be received only within range of the wireless access point sending the broadcast, thus inherently limiting access to those devices in close physical proximity and facilitating many applications dependent on that proximity. In the proposed research, a new factor is used - something that is in the user’s environment with minimal user involvement. Data from these broadcast messages is utilized to implement a 2FA scheme by determining whether two devices are proximate or not to ensure that they belong to the same user.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096734
Najwa Altwaijry, Malak Almasoud, Areej Almalki, Isra M. Al-Turaiki
Multiple sequences alignment is an essential task in many bioinformatics analyses. However, it is a challenging problem due to its exponential complexity. Although many approaches have been proposed for solving the MSA problem, finding the best alignment of the MSA remains an open problem. In this work, we propose a new multiobjective optimization approach based on the Artificial Bee Colony (ABC) algorithm to solve the MSA problem. The ABC algorithm is inspired by the intelligent behavior of honey bee swarms. Our proposed approach optimizes two objective functions; the sum-of-pairs (SP) function and entropy. Optimizing these objective functions represents a trade off between maximizing the SP function and minimizing the entropy to choose the most suitable alignment. Experiments are conducted on 12 datasets from BAliBASE 3.0. The experimental results show that our proposed approach achieves better alignments than Clustal in four of the tested datasets. In general, the proposed approach performs better on RV12 datasets.
{"title":"Multiple Sequence Alignment using a Multiobjective Artificial Bee Colony Algorithm","authors":"Najwa Altwaijry, Malak Almasoud, Areej Almalki, Isra M. Al-Turaiki","doi":"10.1109/ICCAIS48893.2020.9096734","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096734","url":null,"abstract":"Multiple sequences alignment is an essential task in many bioinformatics analyses. However, it is a challenging problem due to its exponential complexity. Although many approaches have been proposed for solving the MSA problem, finding the best alignment of the MSA remains an open problem. In this work, we propose a new multiobjective optimization approach based on the Artificial Bee Colony (ABC) algorithm to solve the MSA problem. The ABC algorithm is inspired by the intelligent behavior of honey bee swarms. Our proposed approach optimizes two objective functions; the sum-of-pairs (SP) function and entropy. Optimizing these objective functions represents a trade off between maximizing the SP function and minimizing the entropy to choose the most suitable alignment. Experiments are conducted on 12 datasets from BAliBASE 3.0. The experimental results show that our proposed approach achieves better alignments than Clustal in four of the tested datasets. In general, the proposed approach performs better on RV12 datasets.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096871
Yasmeen Alomair, Salah Hammami
Most of E-learning environments have designed over a "one-size-fits-all" approach. Therefore, they are swiftly abandoned by learners in spite of their effectiveness. Providing a more user-centered gamified framework is a critical solution to attract various types of learners and meet their goals, needs, and preferences. It can motivate learners to use learning environments and increase their popularity. In learning environments, the adaptivity concept handles the problem of meeting different types of learners. Gamification aims to increase learners' motivation and engagement inside the adaptive environment by integrating several game features (e.g., badges, leaderboard, level). This paper reviews methods that have applied to incorporate adaptivity and gamification into learning environments. It might serve as a basis for researchers concerning the improvement of learning environments via adaptivity and gamification. Besides, it scales the horizon of opportunities in finding new methods to develop adaptive gamified E-learning environments.
{"title":"A Review of Methods for Adaptive Gamified Learning Environments","authors":"Yasmeen Alomair, Salah Hammami","doi":"10.1109/ICCAIS48893.2020.9096871","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096871","url":null,"abstract":"Most of E-learning environments have designed over a \"one-size-fits-all\" approach. Therefore, they are swiftly abandoned by learners in spite of their effectiveness. Providing a more user-centered gamified framework is a critical solution to attract various types of learners and meet their goals, needs, and preferences. It can motivate learners to use learning environments and increase their popularity. In learning environments, the adaptivity concept handles the problem of meeting different types of learners. Gamification aims to increase learners' motivation and engagement inside the adaptive environment by integrating several game features (e.g., badges, leaderboard, level). This paper reviews methods that have applied to incorporate adaptivity and gamification into learning environments. It might serve as a basis for researchers concerning the improvement of learning environments via adaptivity and gamification. Besides, it scales the horizon of opportunities in finding new methods to develop adaptive gamified E-learning environments.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131982785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}