Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Computer Science and Information Technology (CSIT), 2014 6th International Conference on

Date 26-27 March 2014

Filter Results

Displaying Results 1 - 25 of 44
  • [Front cover]

    Publication Year: 2014 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1111 KB)  
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2014 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (105 KB)  
    Freely Available from IEEE
  • 2014 6th International Conference on Computer Science and Information Technology (CSIT) [Copyright notice]

    Publication Year: 2014 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014 , Page(s): iii - vi
    Save to Project icon | Request Permissions | PDF file iconPDF (65 KB)  
    Freely Available from IEEE
  • Welcome massages

    Publication Year: 2014 , Page(s): VII - IX
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (220 KB)  

    Welcome Message from the President of Applied Science University - Prof. Mahfuz Judeh View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speakers [2 abstracts]

    Publication Year: 2014 , Page(s): X - XI
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (134 KB)  

    Provides an abstract for each of the two keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing committee

    Publication Year: 2014 , Page(s): XII - XVI
    Save to Project icon | Request Permissions | PDF file iconPDF (581 KB)  
    Freely Available from IEEE
  • A survey of Internet security risk over social networks

    Publication Year: 2014 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (246 KB) |  | HTML iconHTML  

    The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on the human elements. We raised the problems of social networks in the transformation of societies to another affected by the global economy. The social networking integration needs to strengthen social ties that lead to the existence of these problems. For this we focused on the Internet security risks over the social networks. And study on Risk Management, and then look at resolving various problems that occur from the use of social networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the guessability of hand drawn images based on cultural characteristics

    Publication Year: 2014 , Page(s): 5 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1159 KB) |  | HTML iconHTML  

    The aim of this research is to examine whether or not an attacker could guess hand drawn images chosen as graphical password by others, based on knowledge of some cultural information like where they are come from or their religion or even their hopes and aims. Also, the aim was therefore to ascertain at what level the cross-cultural influences might affect our choice and use of drawn images as password. The investigation made a comparison between Western (Scottish), Arab (Libyans) and Africans (Nigerians) as the comparison between regions which had been well investigated by previous researchers had tended to focus on Western and Eastern subjects. To conclude, it can be accepted that culture significantly affected drawings depending on some human factors such as gender, etc. Moreover, one clear result of this work is that it is apparently highly possible to guess other people's pass images if they contain cultural characteristics, especially religious marks, otherwise it is much more difficult to guess them, and also this depends on many factors. Finally, this paper outlines some rules and guidelines of drawing a strong secret graphical password. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of password authentication system

    Publication Year: 2014 , Page(s): 14 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (219 KB) |  | HTML iconHTML  

    The password authentication systems have been increasing in recent years. Therefore authors have been concentrated these days on introducing more password authentication systems. Thus, in 2011, Lee et al., presented an enhanced system to resolve the vulnerabilities of selected system. But, we notice that Lee et al., system is still weak to server attack and stolen smart card attack. Also, a password change protocol of the system is neither suitable to users nor low efficient. There is no handy data can be gained from the values kept in smart cards. Therefore, a stolen smart card attack can be blocked. To prevent server attack, we suggest transferring a user authentication operation from servers to a registration centre, which can guarantee every server, has another private key. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust image watermarking based on Dual Intermediate Significant Bit (DISB)

    Publication Year: 2014 , Page(s): 18 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (403 KB) |  | HTML iconHTML  

    The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely conflict. In this study, the method focuses on the robustness against chosen attacks for the watermarked image based on Dual Intermediate Significant Bit (DISB) model. This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem which derived and applied in this study. The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image which proved that proposed method is better as compared with the Least Significant Bit (LSB) after embedding two bits. The best values investigated when the Peak Signal to Noise Ratio (PSNR) is equal or more than 30db, and finding the best Normalized Cross Correlation (NCC) to evaluate the image resistance against attacks. The best values investigated when the two embedded bits are k1=4 and k2=6. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic Hash Algorithm

    Publication Year: 2014 , Page(s): 23 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (414 KB) |  | HTML iconHTML  

    Security is becoming a major concern in computing. New techniques are evolving every day; one of these techniques is Hash Visualization. Hash Visualization uses complex random generated images for security, these images can be used to hide data (watermarking). This proposed new technique improves hash visualization by using genetic algorithms. Genetic algorithms are a search optimization technique that is based on the evolution of living creatures. The proposed technique uses genetic algorithms to improve hash visualization. The used genetic algorithm was away faster than traditional previous ones, and it improved hash visualization by evolving the tree that was used to generate the images, in order to obtain a better and larger tree that will generate images with higher security. The security was satisfied by calculating the fitness value for each chromosome based on a specifically designed algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic vs. particle swarm optimization techniques for traffic light signals timing

    Publication Year: 2014 , Page(s): 27 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1174 KB)  

    A good controlling for the traffic lights on the network road may solve the traffic congestion in the cities. This paper deals with the optimization of traffic light signals timing. We used four different heuristic optimization techniques, three types of Genetic algorithm and particle of swarm algorithm. Techniques were applied on a case study of network road which contains 13 traffic lights. We used SUMO (Simulation of Urban MObility) to simulate the network. Heuristic optimization techniques themselves need to be calibrated. Calibrating them using the real problem is time consuming because simulation is computation demanding. We tried to calibrate them using a function that is assumed to have similar response surface but lighter computation demand, then use the calibrated technique to optimize the traffic light signals timing. After some comparing processes of optimization results, we discovered that one type of GA and PS at determined parameters are more suitable to produce the minimum total travel time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a haptic feedback subsystem

    Publication Year: 2014 , Page(s): 36 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (418 KB) |  | HTML iconHTML  

    This paper describes the components and highlights some specifications of a device that allows several combinations of immersed or desktop vision feedback devices to be integrated with a three degree-of-freedom force-feedback device previously known as the `Reactabot™' and currently known as the `Visitact'. The Visitact is a haptic display robot that provides and receives kinaesthetic information from the user, who can touch and manipulate a surrogate object, and feel external forces exerted upon it by obstructions, within a virtual environment. In essence, the Visitact allows a combination of various immersed or desktop visual solutions to be integrated with a three degree-of-freedom force-feedback device. The mechanical interface senses the forces applied by the user and the haptic control system generates a reaction force that moves the surrogate object in the direction of the applied force. The surrogate object can be accelerated up to ±2g (approximately 20m/s2) sustain forces up to 20N, with a virtual mass in the range 0.7- 4 kg. The device provides force feedback over a large proportion of the user's workspace and enables virtual objects to take on user-specified physical properties such as mass, gravity, weight and drag, and was implemented with force/velocity control to allow the robot to interact with an operator, and to share the same working volume. Two techniques are used during a Visitact session. The user, who is normally sitting, holds the surrogate object and either sees a virtual or augmented representation of it on a computer screen, or through a head mounted display. Currently the Visitact is upgraded to work as a six degree of freedom force feedback device. An attempt to extend the device to serve 6- degree of freedom is briefly described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking power photovoltaic system with a fuzzy logic control strategy

    Publication Year: 2014 , Page(s): 42 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (737 KB) |  | HTML iconHTML  

    Photovoltaic generation is the technique which uses photovoltaic cell to convert solar energy to electric energy. Nowadays, PV generation is developing increasingly fast as a renewable energy source. However, the disadvantage is that PV generation is intermittent for depending on weather conditions. This paper proposes an intelligent control method for the maximum power point tracking (MPPT) of a photovoltaic system under variable temperature and solar radiation conditions. This method uses a fuzzy logic controller applied to a DC-DC boost converter device. A photovoltaic system including a solar panel, a DC-DC converter, a Fuzzy MPP tracker and a resistive load is modeled and simulated. Finally performance comparison between fuzzy logic controller and Perturb and Observe method has been carried out which has shown the effectiveness of fuzzy logic controller to draw much energy and fast response against change in working conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Skeleton extraction: Comparison of five methods on the Arabic IFN/ENIT database

    Publication Year: 2014 , Page(s): 50 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (382 KB) |  | HTML iconHTML  

    Thinning “Skeletonization” is a very crucial stage in the Arabic Character Recognition (ACR) system. It simplifies the text shape and reduces the amount of data that needs to be handled and it is usually used as a pre-processing stage for recognition and storage systems. The skeleton of Arabic text can be used for: baseline detection, character segmentation, and features extraction, and ultimately supporting the classification. In this paper, five of the state of the art thinning algorithms are selected and implemented. The five algorithms are: SPTA, Zhang-Suen parallel thinning algorithm, Huang-Wan-Liu thinning algorithm, thinning and skeletonization based morphological operation algorithms. The five selected algorithms are applied on the IFN/ENIT dataset. The results obtained by the five methods are discussed and analyzed against the IFN/ENIT dataset based on preserving shape and the text connectivity, preventing spurious tails, maintaining one pixel width skeleton and avoiding the necking problem as well as running time efficiently. In addition to that some performance measurement for checking text connectivity, spurious tails and calculating the stroke thickness are proposed and carried out. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposed approaches for intelligent classification of mobile apps for smart phones

    Publication Year: 2014 , Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (211 KB) |  | HTML iconHTML  

    This paper examines mobile applications classification models and the methods applied within the field of mobile human-computer interaction. Recent smartphone interfaces demonstrated the existence of usability problems with respect to the mobile apps in terms of accessing these apps after being downloaded by the user. This paper suggests three different approaches for intelligent classification of smartphone downloaded application and provides a proposal to carry out an empirical study to explore the effect of these approaches on the usability of smartphone interfaces in terms of efficiency, effectiveness and user satisfaction. The first suggested approach automatically classifies the installed mobiles apps in folders based on specific key words related to these apps. The second approach provides intelligent classification based on the frequency of use of the downloaded apps. However, the third approach organizes the downloaded apps according to the most recently use. It is believed that this study proposes opportunities for future approaches in mobile HCI and to enhance applications classification that fit with the user needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on security in Cognitive Radio networks

    Publication Year: 2014 , Page(s): 64 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (291 KB) |  | HTML iconHTML  

    Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid tracking system for ZigBee WSNs

    Publication Year: 2014 , Page(s): 71 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    Target localization and tracking problems in Wireless Sensor Networks (WSNs) have received considerable attention recently, driven by the need to achieve high localization accuracy, with the minimum cost possible. A wide range of proposed approaches regarding the localization area have emerged, however most of them suffer from either requiring an extra sensor, high power consumption, inaccessible indoors, or offer high localization error. This paper presents a research and development of a hybrid WSN tracking system using the Received Signal Strength Indicator (RSSI) and the inertial system. The proposed system is an efficient indoors, where it offers reasonable localization accuracy (0.1 - 0.7) meters, and achieves low power consumption. A number of real experiments have been conducted to test the efficiency of the proposed system using XBee modules. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless sensors network and acknowledgement technique based ZigBee system

    Publication Year: 2014 , Page(s): 75 - 81
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (747 KB) |  | HTML iconHTML  

    The attractive features of wireless sensors based ZigBee and IEEE 802.15.4 standard such low cost, flexibility, scalability, and multiple usages contribute to spread it in many trends. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delayed rate monotonic with semi-partitioned technique adapted to multiprocessors

    Publication Year: 2014 , Page(s): 82 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (387 KB) |  | HTML iconHTML  

    This paper presents a semi-partitioned scheduling algorithm for periodic tasks on multiprocessor platforms. The scheduling policy used within each processor is based on delayed rate monotonic algorithm. Delayed rate monotonic is a modified version of rate monotonic algorithm, which can achieve higher processor utilization than rate monotonic. First, it is formally proved that any task which is feasible under rate monotonic is feasible under delayed rate monotonic, as well. Then, based on delayed rate monotonic, a new scheduling algorithm called adapted delayed rate monotonic (ADRM) is designed for multiprocessor systems. ADRM is composed of delayed rate monotonic algorithm and a semi-partitioned technique. Semi-partitioned is a new approach for allocating tasks on multiprocessor platforms. According to the simulation results, ADRM is safer against possible overload than rate monotonic algorithm. Then, a procedure is proposed to achieve processor utilization under ADRM algorithm more than the rate monotonic algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Super nodes for wireless Sensor Networks

    Publication Year: 2014 , Page(s): 90 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (338 KB) |  | HTML iconHTML  

    Wireless Sensor Network is one of the most advance technology in the field of Information Technology because of the various applications implemented in. Coverage issue is a fundamental research in the Wireless Sensor Networks. Many Researchers have implemented techniques in order to reduce the coverage area of the sensor node to conserve the nodes energy. In this paper, a model to use intelligent nodes to perform an easy and secure network. These intelligent nodes are distribute between the ordinary sensor nodes and the destination nodes. The main duty of these nodes is to reduce the transmissions between the other sensor nodes and the base station by managing the nearest nodes and acting as base station for them to collect data and decide the best routing path to send these data. These nodes are different than the ordinary cluster-heads of the Wireless Sensor Network that they have more energy reserved and have more transmission and reception ranges. The performance of this model has been discussed using the simulation result that showed better performance and increasing the network lifetime. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved form navigation on mobile devices

    Publication Year: 2014 , Page(s): 96 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (597 KB) |  | HTML iconHTML  

    In this paper a study was done regarding improving form control and navigation on mobile devices. An observational study of census counters for the Egyptian Agricultural Survey was conducted. This country-wide survey is currently conducted by professional counters using large (100×35 cm double sided) complex paper forms that require manual transcription. Computerization would be beneficial in terms of accuracy and duplication of effort. However there are considerable challenges in reducing the size of the forms to fit mobile devices. Furthermore counters typically have low technological experience. Based on our observations we developed two prototypes: one using traditional form tabs, the other pan-and-zooming. Results from initial user tests showed the pan-and-zoom interface was both faster and had a lower perceived effort. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Users-groups matching in an annotation system: Ontological and URL relevance measures

    Publication Year: 2014 , Page(s): 100 - 109
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (948 KB) |  | HTML iconHTML  

    The MADCOWannotation system supports a notion of group, facilitating focused annotations with respect to a domain. We argue that the use of an ontology to represent knowledge about the domain allows posting more refined annotations to a group, while the use of ontology concepts as tags facilitates the formulation of semantically significant queries for retrieving annotations on specific topics. Services for promoting participation to groups of potentially interested users can also leverage the adoption of domain ontologies, by matching tags users freely employed in their annotations to terms proper to some domain ontology. To this end, we propose a combination of existing relevance measures for matching users to domains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elaboration of a model for an indexed base for teaching Arabic language to disabled people

    Publication Year: 2014 , Page(s): 110 - 116
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (566 KB)  

    In this paper we carried out a bibliographic research concerning distance learning, pedagogical indexing and integration of accessibility in e-Learning platforms. Then, to achieve the goals we have chosen “IMS AccessForALL” as standard to realize our model. The model that we realized is consistent with the standard followed. We also taken into consideration the guidelines of the WAI (Web accessibility Initiative) presented in WCAG. Finally, for the step of indexing, we started with the creation of the XML schema, then the indexation of resources in the true sense of the term. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.