Yasin M.,King Saud University |
Qureshi J.A.,Mobily |
Kausar F.,Imam University |
Kim J.,Kookmin University |
Seo J.,National Security Research Institute NSRI
Peer-to-Peer Networking and Applications | Year: 2015
Recently, a tremendous advancement has been made in the field of network and communication. A usage of pervasive applications for machine-to-machine communication is increasing day by day. Digital forensic examiners are facing different type of problems. The most prominent problems among the research community are data overload, data modeling, data characterization and data presentation. This paper addresses these issues by analyzing a dataset of instant messages (IMs) over the period of 2 years and 4-months. Various patterns of interaction between target user and his/her buddies are analyzed through Social Network Analysis (SNA). The strength of relationship e.g. close, fair, temporary, etc. between each pair of users is determined by analyzing their social interaction ratio with respect to the chat frequency of overall network. The characterization of IMs is to identify the interaction between various actors from Social Network of Instant Messages (SNIM) and the prominence of certain actor within social network. Graphs and matrices are used to model and characterize the SNIM and suitable techniques are identified for computational analysis of SNIM. Centrality measures such as degree centrality, betweenness centrality and closeness centrality are taken to determine the connection of each actor with its neighbors and its influence within SNIM. ‘Vizster’ and ‘Prefuse’ are used for graphical representations and to analyze SNIM forensically. The effectiveness of ‘snowball method’ for forensic analysis of dataset graphically is also discussed. In the end the maximum number of immediate ties at step 1 of each vertex are considered to determine the most influential and significant vertices from the SNIM. Various relationship levels are defined on the basis of examiner-defined threshold to conclude the required results. © 2014, Springer Science+Business Media New York.
Taha Z.Q.,Imam University |
Farraj A.K.,Texas A&M University
Wireless Personal Communications | Year: 2013
Space-time coding can achieve transmit diversity and power gain over spatially uncoded systems without sacrificing bandwidth. There are various approaches in coding structures, including space-time block codes. A class of space-time block codes namely quasi-orthogonal space-time block codes can achieve the full rate, but the conventional decoders of these codes experience interference terms resulting from neighboring signals during signal detection. The presence of the interference terms causes an increase in the decoder complexity and a decrease in the performance gain. In this article, we propose a modification to the conventional coding/decoding scheme that will improve performance, reduce decoding complexity, and improve robustness against channel estimation errors as well. © 2012 Springer Science+Business Media, LLC.
Lemine O.M.,Imam University
Bulletin of Materials Science | Year: 2011
The effect of thermal annealing on the structure and magnetic properties of crystalline Tb/Fe multilayers has been studied using conversion electron Mössbauer spectrometry and small-angle X-ray diffraction. The growth of Tb-Fe amorphous alloy from the interface is observed with increasing annealing temperature. After annealing at 873 K, a clear total mixing of the multilayers by interdiffusion has been evidenced. The results are compared with the effect of ion irradiation in the same system. © Indian Academy of Sciences.
Al-Shabab O.A. S.,Imam University |
Baka F.H.,Imam University
International Journal of Applied Linguistics and English Literature | Year: 2015
Since a language variety contains shared variants, and since a complete correlation between author and linguistic features is rarely acquired, it is suggested that linguistic features which fall outside the correlational agreement in a variety belong to the author's First Person Domain (FPD). Advances in computerized vocabulary profiling and readability provide useful characterization of features found in Academic English (AE), but they cannot capture the full range of linguistic features in a text. A corpus of about 38 extracts and texts (111.000 words) from local and international authors is analyzed to determine interpersonal and intrapersonal variations. The results show that language variation determines the features of FPD which are crucial for author identification and that computational methods are not adequately sensitive to insure a hundred percent author identification. Therefore, epistemological author identity profile (AIP) is suggested to plot alleged texts against the socio-physical and epistemological parameters of alleging authors. © 2015, Australian International Academic Centre PTY LTD. All rights reserved.
Rouached M.,Taif University |
Rouached M.,IMAM University |
Sallay H.,IMAM University
Procedia Computer Science | Year: 2012
Traffic anomalies and attacks are commonplace in today's networks, and identifying them rapidly and accurately is critical for large network operators. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. For an intrusion detection system, it is important to detect previously known attacks with high accuracy. However, detecting previously unseen attacks is equally important in order to minimize the losses as a result of a successful intrusion. It is also equally important to detect attacks at an early stage in order to minimize their impact. To address these challenges, this paper proposes to improve the efficiency of the network intrusion detection process by including an Event Calculus based specification to detect the registered and expected behaviour of the whole network. © 2012 Published by Elsevier Ltd.
Al-Shabab O.A.S.,Imam University |
Baka F.H.,Imam University
International Journal of Applied Linguistics and English Literature | Year: 2016
In the dynamics of environmental context, the referent of a linguistic sign changes, but the sign persists as a verbal symbol. Since a technical term strictly evokes one referent, it may lack in specificity due to the ever-changing reality, resulting in homonymy, overlap, and a semantic continuum based on designating by necessity. In addition to the elements of reference theory, the criteria for technical terms postulate the user, whose authority and responsibility are necessary for the term to function as a specific designator. The centrality of the user, translator or otherwise, has hermeneutic and linguistic implications for the evolution of terminology, because it stipulates that terminological meaning and usage are dependent on the user’s conscious knowledge, a condition that leads to the recognition of a user epistemic continuum parallel to the semantic necessity continuum. Ideally, a term should be universally specific in reference, and its user should be epistemologically empowered and ethically responsible. © 2016, Australian International Academic Centre PTY LTD. All rights reserved.
Mundher M.,University of Technology Malaysia |
Muhamad D.,University of Technology Malaysia |
Rehman A.,Salman bin Abdul Aziz University |
Saba T.,Prince Sultan University |
Kausar F.,Imam University
Applied Mathematics and Information Sciences | Year: 2014
This paper presents digital images watermarking approach to sustain the ownership and true authentication. To secure intellectual belongings of images, audio and videos, watermark W is converted into a sequence of bits and in order to encrypt the watermark, sequence of size R is selected randomly. Additionally, a pseudo random number is generated to calculate pixels for selection key generation. Finally, 2-level discrete slanlet transform (DST) on the host image is applied to divide it into Red, Green and Blue channels. The results thus produced from proposed methodology exhibit robustness against the existing state of the art. Further, proposed approach effectively extract watermark in the absence of the original images. © 2014 NSP Natural Sciences Publishing Cor.
Azmi A.M.,King Saud University |
Al-Thanyyan S.,Imam University
Computer Speech and Language | Year: 2012
Automatic text summarization is an essential tool in this era of information overloading. In this paper we present an automatic extractive Arabic text summarization system where the user can cap the size of the final summary. It is a direct system where no machine learning is involved. We use a two pass algorithm where in pass one, we produce a primary summary using Rhetorical Structure Theory (RST); this is followed by the second pass where we assign a score to each of the sentences in the primary summary. These scores will help us in generating the final summary. For the final output, sentences are selected with an objective of maximizing the overall score of the summary whose size should not exceed the user selected limit. We used Rouge to evaluate our system generated summaries of various lengths against those done by a (human) news editorial professional. Experiments on sample texts show our system to outperform some of the existing Arabic summarization systems including those that require machine learning. © 2012 Elsevier Ltd. All rights reserved.
Al-Humoud S.O.,Imam University |
Mackenzie L.M.,University of Glasgow
Journal of Computers (Finland) | Year: 2013
An interesting application of wireless MANETs that is emerging with a high potential for research and development is the inter-vehicle communication where nodes collect and distribute traffic information while moving in urban areas. Broadcasting is a key component to vehicular communication with the aim of high coverage and low medium consumption. Existing broadcasting schemes, however, result in redundancy and medium contention. In this paper a broadcasting scheme with intelligent neighbourhood sensing is produced and tested in two Vehicle Ad Hoc Network (VANET) contexts. Simulation results show that our scheme reduces the amount of unneeded transmissions through the medium even under high density with high traffic loads while maintaining comparable network coverage. © 2013 ACADEMY PUBLISHER.
Taoufiki M.,Imam University
3rd International Conference on Digital Information Processing and Communications, ICDIPC 2013 | Year: 2013
In this paper, we show that the watermarking method based on sources separation can be easily detected and destroyed. Indeed, the previous method is based on a simple linear mixture between the watermarks (signatures) and the original signal (the signal to be protected) with grossly different proportions. In this paper, we propose an attack based on blind sources separation that has the ability to extract the signatures independently from the original signal using just one observed mixture. © 2013 SDIWC.