Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672706
Dima El Zein, A. Kalakech
Keystroke Dynamic Authentication is the way of authenticating users by analyzing their typing rhythm and behavior. While key hold time, inter-key interval time and flight time can be captured on all devices; applying Keystroke Dynamic Authentication to mobile devices allows capturing and analyzing additional keystroke features like finger area on screen, and pressure applied on the key. This paper aims to reduce the number of captured features without affecting the efficiency of the user prediction. For this purpose, we used a benchmark dataset and implemented 3 different filter feature selection methods to sort the features by their relevance. Sets of different sizes were created and tested against classification methods.
{"title":"Feature Selection for Android Keystroke Dynamics","authors":"Dima El Zein, A. Kalakech","doi":"10.1109/ACIT.2018.8672706","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672706","url":null,"abstract":"Keystroke Dynamic Authentication is the way of authenticating users by analyzing their typing rhythm and behavior. While key hold time, inter-key interval time and flight time can be captured on all devices; applying Keystroke Dynamic Authentication to mobile devices allows capturing and analyzing additional keystroke features like finger area on screen, and pressure applied on the key. This paper aims to reduce the number of captured features without affecting the efficiency of the user prediction. For this purpose, we used a benchmark dataset and implemented 3 different filter feature selection methods to sort the features by their relevance. Sets of different sizes were created and tested against classification methods.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"36 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672674
Dima Suleiman, A. Awajan
Word embeddings is the representation of the text using vectors such that the words that have similar syntax and semantic will have similar vector representation. Representing words using vectors is very crucial for most of natural language processing applications. In natural language, when using neural network for processing, the words vectors will be fed as input to the network. In this paper, a comparative study of several word embeddings models is conducted including Glove and the two approaches of word2vec model called CBOW and Skip-gram. Furthermore, this study surveying most of the state-of-art of using word embeddings in Arabic language applications such as sentiment analysis, semantic similarity, short answer grading, information retrieval, paraphrase identification, plagiarism detection and Textual Entailment.
{"title":"Comparative Study of Word Embeddings Models and Their Usage in Arabic Language Applications","authors":"Dima Suleiman, A. Awajan","doi":"10.1109/ACIT.2018.8672674","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672674","url":null,"abstract":"Word embeddings is the representation of the text using vectors such that the words that have similar syntax and semantic will have similar vector representation. Representing words using vectors is very crucial for most of natural language processing applications. In natural language, when using neural network for processing, the words vectors will be fed as input to the network. In this paper, a comparative study of several word embeddings models is conducted including Glove and the two approaches of word2vec model called CBOW and Skip-gram. Furthermore, this study surveying most of the state-of-art of using word embeddings in Arabic language applications such as sentiment analysis, semantic similarity, short answer grading, information retrieval, paraphrase identification, plagiarism detection and Textual Entailment.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672692
Manel Kolli
In this paper, we propose a new way for the ontology alignment formalization using the Kripke structure in order to be able to exploiting a reliable tool as the Model checking. This later is a powerful mechanism for system verification. Here, the Kripke structures are used to model the behaviors of the ontology of alignment.
{"title":"A Kripke Structure for the Ontology Alignment","authors":"Manel Kolli","doi":"10.1109/ACIT.2018.8672692","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672692","url":null,"abstract":"In this paper, we propose a new way for the ontology alignment formalization using the Kripke structure in order to be able to exploiting a reliable tool as the Model checking. This later is a powerful mechanism for system verification. Here, the Kripke structures are used to model the behaviors of the ontology of alignment.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672667
R. Maalej, M. Kherallah
There have been an exciting advance in machine learning during the last decade. In fact, increasing computer processing power has supported the analytical capabilities of recognition systems. In this study, we focus on Offline Arabic handwritten recognition and for this task, we propose a new system based on the integration of two deep neural networks. First a Convolutional Neural Network (CNN) to automatically extract features from raw images, then the Bidirectional Long Short-Term Memory (BLSTM) followed by a Connectionist Temporal Classification layer (CTC) for sequence labelling. We validate this model on an extended IFN/ENIT database, created with data augmentation techniques. This hybrid architecture results in appealing performance. It outperforms both hand-crafted features-based approaches and models based on automatic features extraction. According to the experiments results, the recognition rate reaches 92.21%.
{"title":"Convolutional Neural Network and BLSTM for Offline Arabic Handwriting Recognition","authors":"R. Maalej, M. Kherallah","doi":"10.1109/ACIT.2018.8672667","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672667","url":null,"abstract":"There have been an exciting advance in machine learning during the last decade. In fact, increasing computer processing power has supported the analytical capabilities of recognition systems. In this study, we focus on Offline Arabic handwritten recognition and for this task, we propose a new system based on the integration of two deep neural networks. First a Convolutional Neural Network (CNN) to automatically extract features from raw images, then the Bidirectional Long Short-Term Memory (BLSTM) followed by a Connectionist Temporal Classification layer (CTC) for sequence labelling. We validate this model on an extended IFN/ENIT database, created with data augmentation techniques. This hybrid architecture results in appealing performance. It outperforms both hand-crafted features-based approaches and models based on automatic features extraction. According to the experiments results, the recognition rate reaches 92.21%.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672672
S. Chelbi, Nora Taleb
The semantic representation of organizations' performance measurement systems is critical in limiting problems arising from the increasing complexity of enterprises. Ontologies offer unambiguous semantics, which allows better information management and facilitates automated reasoning. In this work, a documentary analysis was done to summarize the most commonly cited performance measurement systems in the literature. The article also shows the contribution of using ontological models to support these systems and presents some examples of related work.
{"title":"Performance Measurement Systems-Related Ontologies","authors":"S. Chelbi, Nora Taleb","doi":"10.1109/ACIT.2018.8672672","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672672","url":null,"abstract":"The semantic representation of organizations' performance measurement systems is critical in limiting problems arising from the increasing complexity of enterprises. Ontologies offer unambiguous semantics, which allows better information management and facilitates automated reasoning. In this work, a documentary analysis was done to summarize the most commonly cited performance measurement systems in the literature. The article also shows the contribution of using ontological models to support these systems and presents some examples of related work.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672678
Anas Al-Far, A. Qusef, Sufyan Almajali
Confidentiality, Integrity, and Availability are principal keys to build any secure software. Considering the security principles during the different software development phases would reduce software vulnerabilities. This paper measures the impact of the different software quality metrics on Confidentiality, Integrity, or Availability for any given object-oriented PHP application, which has a list of reported vulnerabilities. The National Vulnerability Database was used to provide the impact score on confidentiality, integrity, and availability for the reported vulnerabilities on the selected applications. This paper includes a study for these scores and its correlation with 25 code metrics for the given vulnerable source code. The achieved results were able to correlate 23.7% of the variability in ‘Integrity’ to four metrics: Vocabulary Used in Code, Card and Agresti, Intelligent Content, and Efferent Coupling metrics. The Length (Halstead metric) could alone predict about 24.2 % of the observed variability in ‘ Availability’. The results indicate no significant correlation of ‘Confidentiality’ with the tested code metrics.
{"title":"Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics","authors":"Anas Al-Far, A. Qusef, Sufyan Almajali","doi":"10.1109/ACIT.2018.8672678","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672678","url":null,"abstract":"Confidentiality, Integrity, and Availability are principal keys to build any secure software. Considering the security principles during the different software development phases would reduce software vulnerabilities. This paper measures the impact of the different software quality metrics on Confidentiality, Integrity, or Availability for any given object-oriented PHP application, which has a list of reported vulnerabilities. The National Vulnerability Database was used to provide the impact score on confidentiality, integrity, and availability for the reported vulnerabilities on the selected applications. This paper includes a study for these scores and its correlation with 25 code metrics for the given vulnerable source code. The achieved results were able to correlate 23.7% of the variability in ‘Integrity’ to four metrics: Vocabulary Used in Code, Card and Agresti, Intelligent Content, and Efferent Coupling metrics. The Length (Halstead metric) could alone predict about 24.2 % of the observed variability in ‘ Availability’. The results indicate no significant correlation of ‘Confidentiality’ with the tested code metrics.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"501 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134387179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672721
A. Shaout, Dhanush Mysuru, Karthik Raghupathy
There are many Electronic Control Units (ECU) and sensors in a vehicle. The sensor information is sent via the Control Area Network (CAN) of a vehicle. Crucial data base by the CAN. This data may not be important to the driver, but if the CAN messages are analysed, then vehicle parameters and vehicle conditions can be determined. This data can determine ahead of time any possible future failure and the driver can be alerted about it. This paper presents standalone embedded system that could do the aforementioned task were valuable lives may be saved. The proposed hardware system acquires CAN data from a vehicle (CAN sniffing). The data is then processed and appropriate message is then displayed to the driver. The proposed system also stores the CAN messages on to an industrial grade SD card (CAN logging) for future analysis. The proposed system also perform driver behaviour and driving terrain analysis.
{"title":"CAN Sniffing for Vehicle Condition, Driver Behavior Analysis and Data Logging","authors":"A. Shaout, Dhanush Mysuru, Karthik Raghupathy","doi":"10.1109/ACIT.2018.8672721","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672721","url":null,"abstract":"There are many Electronic Control Units (ECU) and sensors in a vehicle. The sensor information is sent via the Control Area Network (CAN) of a vehicle. Crucial data base by the CAN. This data may not be important to the driver, but if the CAN messages are analysed, then vehicle parameters and vehicle conditions can be determined. This data can determine ahead of time any possible future failure and the driver can be alerted about it. This paper presents standalone embedded system that could do the aforementioned task were valuable lives may be saved. The proposed hardware system acquires CAN data from a vehicle (CAN sniffing). The data is then processed and appropriate message is then displayed to the driver. The proposed system also stores the CAN messages on to an industrial grade SD card (CAN logging) for future analysis. The proposed system also perform driver behaviour and driving terrain analysis.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129469912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/acit.2018.8672580
ACIT 2018
ACIT 2018
{"title":"ACIT 2018","authors":"","doi":"10.1109/acit.2018.8672580","DOIUrl":"https://doi.org/10.1109/acit.2018.8672580","url":null,"abstract":"ACIT 2018","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"9 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672675
O. Zahwe, Wala’a H. Nasser, Hassan Harb
This paper takes place in the field of passive microwave components. Coming from the requirements of mobile communication devices, miniaturization of microwave components is needed. Aimed at this objective, from several years we work on the development of a miniature planar circulator/isolator. The main aim in this paper is to show the circulator with different ferrite thickness and then to present a method to reduce the insertion loss of the circulator in function of the thickness of the ferrite film. The circulator is designed with new topology coplanar/microstrip. The analytical structure based on stripline circulator and analysed by using a three dimensional finite-element method. The circulator is then fabricated, and its properties in the microwave range are characterised using a network analyzer and a probing system. An additional part for the isolator with non-symmetrical was designed in order to reduce the insertion loss in the conductor and to obtain a large bandwidth comparing to the existing devices.
{"title":"Analytical, Numerical and Experimental Study of an Original Design for a Coplanar Circulator/Isolator Based on Thick and Thin Ferrite Film","authors":"O. Zahwe, Wala’a H. Nasser, Hassan Harb","doi":"10.1109/ACIT.2018.8672675","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672675","url":null,"abstract":"This paper takes place in the field of passive microwave components. Coming from the requirements of mobile communication devices, miniaturization of microwave components is needed. Aimed at this objective, from several years we work on the development of a miniature planar circulator/isolator. The main aim in this paper is to show the circulator with different ferrite thickness and then to present a method to reduce the insertion loss of the circulator in function of the thickness of the ferrite film. The circulator is designed with new topology coplanar/microstrip. The analytical structure based on stripline circulator and analysed by using a three dimensional finite-element method. The circulator is then fabricated, and its properties in the microwave range are characterised using a network analyzer and a probing system. An additional part for the isolator with non-symmetrical was designed in order to reduce the insertion loss in the conductor and to obtain a large bandwidth comparing to the existing devices.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ACIT.2018.8672583
Nevrus Kaja, A. Shaout
Trust is an important factor to consider when selecting a cloud computing provider. While some security models have failed to provide extended trustworthy in this space, this paper aims to propose a new approach to entering and trusting cloud computing. The proposed approach consists of developing a cloud computing trust model (CCTM) through a cloud computing security solution called H-AES. CCTM is designed with security features in mind and contains elements that are needed to build trust in a cloud computing environment. The CCMT model was derived heuristically based on literature review and surveying IT professionals. H-AES is a hardware implementation of the advanced encryption standard (AES) for data in transmission and is able to encrypt, decrypt and transmit information in a real time communication mode.
{"title":"CCTM - Cloud Computing Trust Model","authors":"Nevrus Kaja, A. Shaout","doi":"10.1109/ACIT.2018.8672583","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672583","url":null,"abstract":"Trust is an important factor to consider when selecting a cloud computing provider. While some security models have failed to provide extended trustworthy in this space, this paper aims to propose a new approach to entering and trusting cloud computing. The proposed approach consists of developing a cloud computing trust model (CCTM) through a cloud computing security solution called H-AES. CCTM is designed with security features in mind and contains elements that are needed to build trust in a cloud computing environment. The CCMT model was derived heuristically based on literature review and surveying IT professionals. H-AES is a hardware implementation of the advanced encryption standard (AES) for data in transmission and is able to encrypt, decrypt and transmit information in a real time communication mode.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}