2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)最新文献

筛选
英文 中文
Development of Scoliotic Spine Severity Detection using Deep Learning Algorithms 基于深度学习算法的脊柱侧凸严重程度检测的发展
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720906
Nahid A. Makhdoomi, T. S. Gunawan, Nur Hanani Idris, Othman Omran Khalifa, Rajandra Kumar Karupiah, Arif Bramantoro, Farah Diyana Abdul Rahman, Z. Zakaria
{"title":"Development of Scoliotic Spine Severity Detection using Deep Learning Algorithms","authors":"Nahid A. Makhdoomi, T. S. Gunawan, Nur Hanani Idris, Othman Omran Khalifa, Rajandra Kumar Karupiah, Arif Bramantoro, Farah Diyana Abdul Rahman, Z. Zakaria","doi":"10.1109/CCWC54503.2022.9720906","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720906","url":null,"abstract":"According to research conducted by Johns Hopkins' Division of Pediatric Orthopedic Surgery, around three million new instances of Scoliosis are identified each year, with the majority of cases affecting children between the ages of 10 and 12. The current method of diagnosing and treating Scoliosis, which includes spinal injections, back braces, and a variety of other types of surgery, may have resulted in inconsistencies and ineffective treatment by professionals. Other scoliosis diagnosis methods have been developed since the technology's invention. Using Convolutional Neural Network (CNN), this research will integrate an artificial intelligence-assisted method for detecting and classifying Scoliosis illness types. The software model will include an initialization phase, preprocessing the dataset, segmentation of features, performance measurement, and severity classification. The neural network used in this study is U-Net, which was developed specifically for biomedical picture segmentation. It has demonstrated reliable and accurate results, with prediction accuracy reaching 94.42%. As a result, it has been established that employing an algorithm helped by artificial intelligence provides a higher level of accuracy in detecting Scoliosis than manual diagnosis by professionals.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129479402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MPTCP Performance Simulation in Multiple LEO Satellite Environment 多LEO卫星环境下MPTCP性能仿真
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720772
Chol Hyun Park, Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo
{"title":"MPTCP Performance Simulation in Multiple LEO Satellite Environment","authors":"Chol Hyun Park, Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo","doi":"10.1109/CCWC54503.2022.9720772","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720772","url":null,"abstract":"Interest in satellite communication with multiple Low Earth Orbit (LEO) satellites have been growing recently. This technology offers a higher bandwidth and improved reliability since users can connect to multiple satellites simultaneously. In this environment, satellites are in constant motion; links may be added or dropped dynamically, which could have an adverse effect on TCP. Multipath TCP (MPTCP) is ideal for this environment. To confirm the utility of MPTCP in a multiple LEO satellite environment, we studied the performance of MPTCP with various configurations using Mininet simulation. We simulated the connectivity of three satellites and measured the throughput while dynamically adding or dropping the links. The results show that MPTCP performs well by utilizing all available links at any moment.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126425846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency Subflow 基于MPTCP和非对称延迟子流的BBR拥塞控制分析
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720867
Phillipe Austria, Chol Hyun Park, Ju-Yeon Jo, Yoohwan Kim, Rahul Sundaresan, K. Pham
{"title":"BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency Subflow","authors":"Phillipe Austria, Chol Hyun Park, Ju-Yeon Jo, Yoohwan Kim, Rahul Sundaresan, K. Pham","doi":"10.1109/CCWC54503.2022.9720867","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720867","url":null,"abstract":"Multipath TCP (MPTCP) and Bottleneck Band-width and Roundtrip propagation time (BBR) are two promising technological advances developed to improve network performance. MPTCP extends TCP and allows multiple interfaces on a device to be used simultaneously. In addition, MPTCP can improve satellite base stations that face the challenge of smoothly transitioning connections as satellites orbit in the sky. BBR is a congestion control algorithm (CCA) developed by Google to improve network performance and currently being used in the large-scale services such as YouTube. In this paper we test and evaluate BBR's throughput performance when combined with MPTCP. We focus on observing the performance using connection paths with large latency differences. Results show BBR to outperform several other CCAs and suggests BBR is a good candidate to use in satellite networks. We also show having a large receiver TCP buffer is not an optimal setting when using BBR with MPTCP.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Mobile Malware Detection Methods using Machine Learning 基于机器学习的移动恶意软件检测方法综述
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720753
Mina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Yoohwan Kim, K. Taghva
{"title":"A Survey on Mobile Malware Detection Methods using Machine Learning","authors":"Mina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Yoohwan Kim, K. Taghva","doi":"10.1109/CCWC54503.2022.9720753","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720753","url":null,"abstract":"The prevalence of mobile devices (smartphones) along with the availability of high-speed internet access world-wide resulted in a wide variety of mobile applications that carry a large amount of confidential information. Although popular mobile operating systems such as iOS and Android constantly increase their defenses methods, data shows that the number of intrusions and attacks using mobile applications is rising continuously. Experts use techniques to detect malware before the malicious application gets installed, during the runtime or by the network traffic analysis. In this paper, we first present the information about different categories of mobile malware and threats; then, we classify the recent research methods on mobile malware traffic detection.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120925376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Solutions for Closing Usage Gap in Rural Areas in West Africa 缩小西非农村地区使用差距的解决方案
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720816
Ida Sèmévo Tognisse, Jules R. Dégila, A. Kora
{"title":"Solutions for Closing Usage Gap in Rural Areas in West Africa","authors":"Ida Sèmévo Tognisse, Jules R. Dégila, A. Kora","doi":"10.1109/CCWC54503.2022.9720816","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720816","url":null,"abstract":"Bridging the digital gap in general, and the rural usage gap in particular, has been a significant concern for the telephony industry for years. This study examines the key factors in telephony adoption by non-subscriber in West Africa. To do this, we used a quantitative approach using the structural equation model. We collected data in two representative West African countries: Nigeria and Guinea Conakry. On a global population of 620 people, 204 did not own a mobile phone. Analysis of the data collected from this 204 non-subscriber showed that the key factors driving future technology adoption are attitude, social influence, perceived usefulness, and perceived ease of use the demographic factor of gender moderates these factors.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122959033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Open Source Intelligence Penetration Testing of Virtual Health Care Systems 虚拟医疗系统的开源智能渗透测试框架
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720785
C. DeCusatis, Patrick Peko, Jordan Irving, Maxwell Teache, Christopher Laibach, Jason Hodge
{"title":"A Framework for Open Source Intelligence Penetration Testing of Virtual Health Care Systems","authors":"C. DeCusatis, Patrick Peko, Jordan Irving, Maxwell Teache, Christopher Laibach, Jason Hodge","doi":"10.1109/CCWC54503.2022.9720785","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720785","url":null,"abstract":"There is a need for affordable, accessible ethical penetration testing methodologies in the online health care industry. In this paper, we propose and experimentally demonstrate an approach for initial ethical penetration testing of remote health care services based on free, open source tools and open systems intelligence. We develop an approach which concentrates on the most common health care vulnerabilities (social engineering attacks, network-based attacks, and website attacks) using OWASP ZAP, Nmap with Firewalk, and various other tools. Experimental results of penetration testing on a production level mental health care provider are presented. The effectiveness of different approaches is compared, and we enumerate common vulnerabilities and recommend mitigation techniques.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Helmet with Rear View and Accident Detection System for Increased Safety 带后视镜和事故检测系统的智能头盔,提高安全性
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720833
Ajan Ahmed, Mohammad Monirujjaman Khan, Rajesh Dey, Ipseeta Nanda
{"title":"Smart Helmet with Rear View and Accident Detection System for Increased Safety","authors":"Ajan Ahmed, Mohammad Monirujjaman Khan, Rajesh Dey, Ipseeta Nanda","doi":"10.1109/CCWC54503.2022.9720833","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720833","url":null,"abstract":"This paper presents a smart helmet to show the rider his rear view using a raspberry pi camera. A speed limit indicator will help the rider stay within safe speed limits. Accident detection system is implemented by means of a heart rate sensor. In case of an accident an automated SMS will be sent to the relevant authorities using a GPS and GSM module. The heart rate sensor is also used to detect drowsiness and a vibrator alerts the rider to stay awake. A smart turn indicator warns the vehicles behind motorcycle of the rider's intention to turn. This proposed smart helmet aims to make motorcycle riding safer.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using EEG and fNIRS Signals as Polygraph 利用脑电图和近红外光谱信号作为测谎仪
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720780
M. Khalil, Maria Ramirez, K. George
{"title":"Using EEG and fNIRS Signals as Polygraph","authors":"M. Khalil, Maria Ramirez, K. George","doi":"10.1109/CCWC54503.2022.9720780","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720780","url":null,"abstract":"Two different BCI techniques, electroencephalogram (EEG) and functional near-infrared spectroscopy (fNIRS) are compared for lie detection efficiency in this paper. The experimental data included are based on responses to a series of true or false questions. All participants were college students between the ages 20 and 24 years. The data from the students were collected using the g.Nautilus fNIRS-8 BCI headset, which is capable of recording both EEG and fNIRS simultaneously. After acquiring data using these BCI techniques, postprocessing was done using MATLAB/Simulink to check the performance of lie detection. Data analysis showed that both EEG and fNIRS have promise to be the new method to determine if someone is lying.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131629807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Employability Prediction of Engineering Graduates Using Ensemble Classification Modeling 基于集成分类模型的工程毕业生就业能力预测
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720783
R. R. Maaliw, K. Quing, A. Lagman, Bernard Ugalde, Melvin A. Ballera, Michael Angelo D. Ligayo
{"title":"Employability Prediction of Engineering Graduates Using Ensemble Classification Modeling","authors":"R. R. Maaliw, K. Quing, A. Lagman, Bernard Ugalde, Melvin A. Ballera, Michael Angelo D. Ligayo","doi":"10.1109/CCWC54503.2022.9720783","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720783","url":null,"abstract":"Higher educational institutions have a responsibility and commitment to deliver employable graduates as it impacts their well-being and the economy. This study compared the accuracy of several classification algorithms to build an ensemble prediction model capable of forecasting graduates' employability using extensive data mining techniques. Based on the evaluation metrics, an ensemble model composed of Random Forest (RF), Support Vector Machines (SVM), and Naïve Bayes (NB) achieved the highest cross-validated accuracy score of 93.33%. Association rule mining and permutation feature importance analysis from 500 graduates of the electronics engineering program of a university revealed that grit is firmly attributed to employability, including the capabilities to acquire technical skills and professional certifications. Thus, the knowledge gained can be used to develop a range of policies, initiatives, and strategies to increase students' employment prospects.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files 使用预取文件检测和分类自删Windows恶意软件
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2022-01-26 DOI: 10.1109/CCWC54503.2022.9720874
Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang
{"title":"Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files","authors":"Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang","doi":"10.1109/CCWC54503.2022.9720874","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720874","url":null,"abstract":"Malware detection and analysis can be a burdensome task for incident responders. As such, research has turned to machine learning to automate malware detection and malware family classification. Existing work extracts and engineers static and dynamic features from the malware sample to train classifiers. Despite promising results, such techniques assume that the analyst has access to the malware executable file. Self-deleting malware invalidates this assumption and requires analysts to find forensic evidence of malware execution for further analysis. In this paper, we present and evaluate an approach to detecting malware that executed on a Windows target and further classify the malware into its associated family to provide semantic insight. Specifically, we engineer features from the Windows prefetch file, a file system forensic artifact that archives process information. Results show that it is possible to detect the malicious artifact with 99% accuracy; furthermore, classifying the malware into a fine-grained family has comparable performance to techniques that require access to the original executable. We also provide a thorough security discussion of the proposed approach against adversarial diversity.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"127 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123575755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信