A. Odeh, I. Keshta, Abobakr Aboshgifa, Eman Abdelfattah
{"title":"Privacy and Security in Mobile Health Technologies: Challenges and Concerns","authors":"A. Odeh, I. Keshta, Abobakr Aboshgifa, Eman Abdelfattah","doi":"10.1109/CCWC54503.2022.9720863","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720863","url":null,"abstract":"The high proliferation of mobile health technologies in contemporary society presents the opportunity for health professionals to collect information within the real world through mobile phones. The purpose of this research has been to establish the mobile health security and privacy issues and concerns and consequently recommend how all the security and privacy matters can adequately be addressed. This study employs a qualitative study design in which qualitative information we collected from the existing relevant secondary sources. The evidence from the findings shows that the evolution of mobile health has improved the efficiency and effectiveness of the healthcare industry but has equally created a sort of security and privacy concerns among the users. The study recommends that the current requirement for the mobile health system is to have some adequately defined architecture standards to guarantee both the security and privacy of the patients.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. RicardoManzano, N. Goel, Marzia Zaman, Rohit Joshi, Sagarika Naik
{"title":"Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks","authors":"S. RicardoManzano, N. Goel, Marzia Zaman, Rohit Joshi, Sagarika Naik","doi":"10.1109/CCWC54503.2022.9720857","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720857","url":null,"abstract":"Traditional security solutions may not be always possible in IoT systems because of the resource constraint in IoT devices. Intrusion detection in IoT systems using Machine Learning (ML) techniques can be an effective measure in combating attacks. While most researchers focus on small datasets for ease of processing and training, model generalizability and accuracy can be improved significantly by training and fine-tuning models with big datasets. In this paper we proposed, implemented and evaluated a software framework using Hadoop cluster to store big dataset and PySpark library to train anomaly detection and attack classification models for securing IoT networks. We used the bigger version of the UNSW BoT IoT public dataset to fine-tune the ML-based models. With feature engineering and hyper-parameter tuning of anomaly detection model parameters, an accuracy of 96.3 % was achieved with maximum accuracy of 99. 9% in Reconnaissance attack detection.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Udeh, D. Wanik, D. Cerrai, Derek Aguiar, E. Anagnostou
{"title":"Autoregressive Modeling of Utility Customer Outages with Deep Neural Networks","authors":"K. Udeh, D. Wanik, D. Cerrai, Derek Aguiar, E. Anagnostou","doi":"10.1109/CCWC54503.2022.9720799","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720799","url":null,"abstract":"More and more frequently, electric utility emergency response personnel are required to manage the impact of severe weather events on electric distribution networks. In the US, economic losses associated with extreme weather events are estimated between $20 billion and $55 billion annually. Spatiotemporal modeling of customer outages from weather data can mitigate the economic and personal impact of adverse weather by reducing customer downtimes and increasing customer confidence in electric utility providers during a power outage event. In this paper, we consider the problem of customer outage forecasting by integrating distributed temporal and spatial weather data with deep learning prediction models. Using weather and outage data from ten random counties across New York State, we fit separate spatiotemporal models based on long short-term memory (LSTM) and convolutional neural networks (CNN) to predict customer outages over a 48 hour forecast horizon. Specifically, we consider both autoregressive and covariate-dependent signatures of variation in the development of three model architectures that predict (a) county-level outages given county-level data, (b) county-level outages given state-level data, and (c) state-level outages given state-level data. We compare our methods against statistical approaches (ARIMA, ARIMAX and VARMAX) and a persistence-based method. The results demonstrate that our method achieves better performance over the baselines in terms of root mean square error, median absolute error, Pearson correlation, and average relative error, thus providing an effective tool for electric utility companies to prepare for adverse weather events.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Encoding method for Quantum Error Correction","authors":"Mummadi Swathi, Bhawana Rudra","doi":"10.1109/CCWC54503.2022.9720880","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720880","url":null,"abstract":"Quantum error correction plays a vital role in the Quantum information process. Nowadays, the research has been increased in quantum technology and is being applied in various applications like secure communications, finance, machine learning, drug analysis and etc. But the quantum information process is difficult compared to the classical due to the challenges in quantum technology like no-cloning theorem, decoherence, and the difficulty in quantum states measurement. Thus the error rate is high and it is not possible to build a quantum computer without an error detection and correction mechanism. In this paper, we are discussing various error correction methods and proposing a novel encoding method for quantum error correction.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amit Bhatia, Josh Robinson, Joseph M. Carmack, Scott Kuzdeba
{"title":"FPGA Implementation of Radio Frequency Neural Networks","authors":"Amit Bhatia, Josh Robinson, Joseph M. Carmack, Scott Kuzdeba","doi":"10.1109/CCWC54503.2022.9720784","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720784","url":null,"abstract":"Recent advances in Neural Network (NN) models for the Radio Frequency (RF) domain have made them a dominant force in realizing robust architectures that generalize well to novel operating conditions. While the performance of NN models when running on a Graphics Processing Unit (GPU) are generally very good, many applications require lower latency and higher throughput to be edge deployable. We have recently developed physics-driven NN models to perform Digital Signal Processing (DSP) functions for a Long Term Evolution (LTE) receiver application, demonstrating equal or better performance than their DSP equivalents. This paper discusses moving some of these NN models to Field Programmable Gate Array (FPGA) to tackle the latency and throughput goals and evaluate the performance at different quantization levels. We compare the FPGA performance results at different quantization levels with their GPU performance counterpart and discuss the path forward towards an RF edge solution.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122089447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of Solar Water Pump Storage Systems","authors":"Amirhossein Jahanfar, M. Iqbal","doi":"10.1109/CCWC54503.2022.9720912","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720912","url":null,"abstract":"Solar water pumps are the best alternative for traditional pumping systems in countries with high solar irradiation especially middle east countries which face water shortage challenges and have many remote areas. The reliability of solar-based systems relies on energy storage elements which impose a high cost to project expenses. This issue discourages gardeners and farmers from replacing their existing system with a new solar irrigation system. This research aims to size a cost-efficient solar water pump focusing on typical storage configurations to make the solar projects more practical and affordable for gardeners. In this paper, three solar water pump systems (without storage, battery storage, and water tank storage) are sized, and their advantages and disadvantages are discussed.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122214125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Hajibabaee, Masoud Malekzadeh, Mohsen Ahmadi, Maryam Heidari, Armin Esmaeilzadeh, Reyhaneh Abdolazimi, James H. Jones
{"title":"Offensive Language Detection on Social Media Based on Text Classification","authors":"P. Hajibabaee, Masoud Malekzadeh, Mohsen Ahmadi, Maryam Heidari, Armin Esmaeilzadeh, Reyhaneh Abdolazimi, James H. Jones","doi":"10.1109/CCWC54503.2022.9720804","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720804","url":null,"abstract":"There is a concerning rise of offensive language on the content generated by the crowd over various social platforms. Such language might bully or hurt the feelings of an individual or a community. Recently, the research community has investigated and developed different supervised approaches and training datasets to detect or prevent offensive monologues or dialogues automatically. In this study, we propose a model for text classification consisting of modular cleaning phase and tokenizer, three embedding methods, and eight classifiers. Our experiments shows a promising result for detection of offensive language on our dataset obtained from Twitter. Considering hyperparameter optimization, three methods of AdaBoost, SVM and MLP had highest average of F1-score on popular embedding method of TF-IDF.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-level Morphological and Stochastic Tagalog Stemming Template","authors":"G. A. Ong, Melvin A. Ballera","doi":"10.1109/CCWC54503.2022.9720873","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720873","url":null,"abstract":"Tagalog is the basis of the Philippine language, that is widely spoken throughout the majority of Philippine regions. Currently, various Filipino language morphological investigations employs a language dependent methodology that is evidently efficient. However, due to its substantial morphological traits and emergent evolution, the native language is regarded to be morpho syntactically rich. This paper proposed a stochastic and multi-level morpho-tactical system for stemming the Filipino language that can cover limited frameworks. Numerous word forms were gathered and examined to create a stochastic template. It derives morphological weights from multi-layer systems, emphasizing the importance of language-dependent and language-independent approaches. Additionally, the study incorporates unusual and novel data such as slang words, borrowed words, street jargon in “Taglish,” and colloquial phrases used in formal and informal interactions, works, and literature.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129567141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Masum, Md Jobair Hossain Faruk, H. Shahriar, Kai Qian, D. Lo, M. I. Adnan
{"title":"Ransomware Classification and Detection With Machine Learning Algorithms","authors":"Mohammad Masum, Md Jobair Hossain Faruk, H. Shahriar, Kai Qian, D. Lo, M. I. Adnan","doi":"10.1109/CCWC54503.2022.9720869","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720869","url":null,"abstract":"Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, and it may cause catastrophic damages to computer systems, data centers, web, and mobile applications across various industries and businesses. Traditional anti-ransomware systems struggle to fight against newly created sophisticated attacks. Therefore, state-of-the-art techniques like traditional and neural network-based architectures can be immensely utilized in the development of innovative ransomware solutions. In this paper, we present a feature selection-based framework with adopting different machine learning algorithms including neural network-based architectures to classify the security level for ransomware detection and prevention. We applied multiple machine learning algorithms: Decision Tree (DT), Random Forest (RF), Naïve Bayes (NB), Logistic Regression (LR) as well as Neural Network (NN)-based classifiers on a selected number of features for ransomware classification. We performed all the experiments on one ransomware dataset to evaluate our proposed framework. The experimental results demonstrate that RF classifiers outperform other methods in terms of accuracy, F -beta, and precision scores.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guillermo Sanchez-Guzman, W. Velasquez, Manuel S. Alvarez‐Alvarado
{"title":"Modeling a simulated Forest to get Burning Times of Tree Species using a Digital Twin","authors":"Guillermo Sanchez-Guzman, W. Velasquez, Manuel S. Alvarez‐Alvarado","doi":"10.1109/CCWC54503.2022.9720768","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720768","url":null,"abstract":"This paper states a digital model of a forest to analyze fire behavior using variables such as the rate of combustion and the time it takes for a species to be wholly burned. A simulation environment of a wooded area was designed that includes native species of a protected forest, where the height, diameter, and density are considered in each species to calculate the burning time. The results show combustion values approximate a natural environment, allowing a route to obtain real-time in a forest fire. The proposed model can be used to predict and prevent ignition points in forest fires.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126499395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}