(cache)2023 24th International Arab Conference on Information Technology (ACIT) - Conference Table of Contents | IEEE Xplore

Information Technology (ACIT)

2023 24th International Arab Conference on Information Technology (ACIT)

DOI: 10.1109/ACIT58888.2023

6-8 Dec. 2023

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

58888- ACIT, 2023 (PRT)

Title Page

Publication Year: 2023,Page(s):1 - 1

Copyright Page

Publication Year: 2023,Page(s):1 - 1

Table of Contents

Publication Year: 2023,Page(s):1 - 9
This paper focuses on the potential of Indian Original Equipment Manufacturers (OEMs) and the “Make in India” movement while providing a thorough comparative analysis of the Indian market for Hyper-Converged Infrastructure (HCI) technologies. Secondary data from a variety of sources, such as performance matrices, product specifications, business profiles, and market reports, provides the foundatio...Show More
The study's aimed was to give a suggested perspective for the development of education colleges at private Jordanian universities, with an emphasis on artificial intelligence (AI) applications, as seen through the eyes of faculty members. The study employed a descriptive-analytical approach, and a questionnaire was developed to collect information from a sample of 64 academics from private Jordani...Show More
This study aims to study the impact of the marketing artificial intelligence tools represented by the chatbots, voice search, visual search, predictive analytics and the customer profile building on the customer buying decision. The study examined the independent variable dimensions based on the five dimensions that reflect the buying decision process stages; Need Recognition, Information Collecti...Show More
Introducing a fresh perspective to address challenges in software engineering courses, this paper unveils the Software Engineering Problem-Based Learning (SEPBL) approach as an innovative solution. Recognizing the gap between theoretical knowledge and practical application, SEPBL aims to cultivate critical thinking, problem-solving, and teamwork skills among students. To evaluate its effectiveness...Show More
The increasing popularity of smart home devices has led to a growing concern over cyberthreats to these devices. This study aims to investigate the perceived cyberthreats to smart home devices and identify ways to protect privacy and countermeasure against these threats. Five experts in the field of smart home technology were selected for this study. Semi-structured interviews were conducted with ...Show More
Multiple travelling salesman problem (MTSP) is considered as one of the common critical problems in the operational research area to find a solution for many complex issues. In this research, a novel approach is proposed to find a sufficient solution for the MTSP based on Gaussian mixture model (GMM) and artificial neural network (ANN). Clustering the cities is the first step in this research whic...Show More
The vascular structure in retinal images plays a crucial role in ophthalmic diagnostics, and its accuracies are directly influenced by the quality of the retinal image. Contrast enhancement is one of the crucial steps in any segmentation algorithm - the more so since the retinal images are related to medical diagnosis. Contrast enhancement is a vital step that not only intensifies the darkness of ...Show More
Recently artificial intelligence and computer vision have drawn lots of attention and interest in industry. This paper presents an application of fuzzy logic and convolutional neural networks to crack detection of concrete images, aiming to identify cracks more accurately and efficiently. Existing methods are not accurate and not efficient in identify concrete cracks. The paper will present an alg...Show More
The most used command in Structured Query Language (SQL) for retrieving data is select. In order to secure the retrieved data, this paper uses the hidden processing scheme (HPS).HPS breaks down the execution of user query into five phases to protect data. This data is identical to the select statement's physical execution. The model is based on the axiom that better results can be obtained by havi...Show More
British Airways (BA) became a victim of a unique form of a URL Redirect Attack after a breach was suspected to have happened over a period of 15 days. This is not uncommon, as a lot of companies take a backseat approach when it comes to cybersecurity. Consequently, the research into the lack of cybersecurity measures in place is just as alarming as the aftermath of an attack. So much so, that BA's...Show More
In the UAE, like in many countries, robotics and AI are primarily addressed within existing legal frameworks, which are adapted to encompass emerging technologies. While UAE law does not provide legal personhood to robots or AI systems, it addresses various aspects related to their use, operation, and liability. Recently, the Dubai Digital Government released its standards, which demand that artif...Show More
The Electronic Transactions and Trust Services Law No. 46 of 2021 in the United Arab Emirates (UAE) does not explicitly mention artificial intelligence (AI), yet it significantly influences the legal landscape in the context of AI. This research explores the implications of the law, focusing on the legal nature of contracts formed through AI. The study adopts a multifaceted approach, addressing fo...Show More
The research provides a comprehensive review of generative architectures built upon the Variational Autoencoder (VAE) paradigm, emphasizing their capacity to delineate latent structures inherent to input datasets. Beginning with a foundational understanding of autoencoders, the paper progresses to discuss advancements and augmentations in the domain. The Variational Autoencoder introduces a pivota...Show More

How Machine Learning Can Help Developers

Meenal Dugar

Publication Year: 2023,Page(s):1 - 6
Within Change Request (CR) mechanisms, the urgency of a CR, or its severity level, plays a pivotal role in strategizing software upkeep tasks, signaling the immediacy of CR resolution. Today, determining this severity mostly rests on human judgment, heavily influenced by the expertise of the CR reporter. Our study shares initial insights from research that seeks to estimate CR severity by examinin...Show More
the safety of people's lives and their properties is greatly threatened by fire, a common and highly disastrous incident. Consequently, fire and surrounding tools detection are significant for safety examination, and an early warning may help people efficiently decrease losses. Utilizing temperature sensors, smoke detectors, thermal cameras, and other traditional fire detection techniques has appa...Show More
Distributed denial of service (DDoS) attacks pose a significant threat to network-based service providers. The utilization of numerous compromised devices by attackers to launch these attacks adds a layer of complexity to their management. This complexity can further escalate when multiple attackers collaborate to target a single victim. Moreover, the proficiency required for attackers to execute ...Show More
This paper presents a real-time embedded system hardware design for irrigation of flowerpots. The embedded system uses a ESP32 as the hardware for this system, uses the FreeRTOS as the real time operating system and uses the IoT IFTTT platform to send warning messages to the user. The proposed embedded system controls the amount of water a plant needs based on its soil moisture levels. The system ...Show More
Data discretization is a very significant pre-process step that has a great impact on the predictive performance of several machine learning algorithms. This step aims to convert continuous attribute with large number of real values into a finite set of intervals with minimum data loss. Several techniques have been proposed to accomplish this task, without a proof which one is better with respect ...Show More
This study aimed to identify the extent to which Sultan Qaboos University's libraries accredited green computing through employees' awareness and practice of green computing. The study relied on the quantitative descriptive approach to achieving its objectives. A questionnaire was used to collect data from the study community, and 42 staff members from 82 of the study community's total sample part...Show More
This paper draws on actual attempts being made to develop and implement ethical frameworks and discusses AI regulatory approaches of two countries (United Arab Emirates and New Zealand) and provides recommendations for organizations developing their own AI ethics policies. These recommendations aim to address key ethical considerations related to the adoption and implementation of AI tools, includ...Show More
This paper proposes a method to enhance service delivery to pilgrims during one of the most important mega events - Hajj - by identifying optimal routes and cost-effective transportation methods for fulfilling the needs of guests during their stay in holy cities. The problem falls under the Capacitated Vehicle Routing Problem (CVRP) category, aiming to optimize fleet allocation while considering c...Show More
Cloud computing is a rapidly advancing technology, primarily propelled by virtualization and the availability of cost-effective pay-as-you-go services. Nonetheless, a significant challenge in this field revolves around evaluating different cloud resource usage models and the capability of cloud systems while adhering to Quality-of-Service limitations. Real-world experiments are often impractical a...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

58888- ACIT, 2023 (PRT)