Nahid A. Makhdoomi, T. S. Gunawan, Nur Hanani Idris, Othman Omran Khalifa, Rajandra Kumar Karupiah, Arif Bramantoro, Farah Diyana Abdul Rahman, Z. Zakaria
{"title":"Development of Scoliotic Spine Severity Detection using Deep Learning Algorithms","authors":"Nahid A. Makhdoomi, T. S. Gunawan, Nur Hanani Idris, Othman Omran Khalifa, Rajandra Kumar Karupiah, Arif Bramantoro, Farah Diyana Abdul Rahman, Z. Zakaria","doi":"10.1109/CCWC54503.2022.9720906","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720906","url":null,"abstract":"According to research conducted by Johns Hopkins' Division of Pediatric Orthopedic Surgery, around three million new instances of Scoliosis are identified each year, with the majority of cases affecting children between the ages of 10 and 12. The current method of diagnosing and treating Scoliosis, which includes spinal injections, back braces, and a variety of other types of surgery, may have resulted in inconsistencies and ineffective treatment by professionals. Other scoliosis diagnosis methods have been developed since the technology's invention. Using Convolutional Neural Network (CNN), this research will integrate an artificial intelligence-assisted method for detecting and classifying Scoliosis illness types. The software model will include an initialization phase, preprocessing the dataset, segmentation of features, performance measurement, and severity classification. The neural network used in this study is U-Net, which was developed specifically for biomedical picture segmentation. It has demonstrated reliable and accurate results, with prediction accuracy reaching 94.42%. As a result, it has been established that employing an algorithm helped by artificial intelligence provides a higher level of accuracy in detecting Scoliosis than manual diagnosis by professionals.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129479402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chol Hyun Park, Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo
{"title":"MPTCP Performance Simulation in Multiple LEO Satellite Environment","authors":"Chol Hyun Park, Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo","doi":"10.1109/CCWC54503.2022.9720772","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720772","url":null,"abstract":"Interest in satellite communication with multiple Low Earth Orbit (LEO) satellites have been growing recently. This technology offers a higher bandwidth and improved reliability since users can connect to multiple satellites simultaneously. In this environment, satellites are in constant motion; links may be added or dropped dynamically, which could have an adverse effect on TCP. Multipath TCP (MPTCP) is ideal for this environment. To confirm the utility of MPTCP in a multiple LEO satellite environment, we studied the performance of MPTCP with various configurations using Mininet simulation. We simulated the connectivity of three satellites and measured the throughput while dynamically adding or dropping the links. The results show that MPTCP performs well by utilizing all available links at any moment.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126425846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Phillipe Austria, Chol Hyun Park, Ju-Yeon Jo, Yoohwan Kim, Rahul Sundaresan, K. Pham
{"title":"BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency Subflow","authors":"Phillipe Austria, Chol Hyun Park, Ju-Yeon Jo, Yoohwan Kim, Rahul Sundaresan, K. Pham","doi":"10.1109/CCWC54503.2022.9720867","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720867","url":null,"abstract":"Multipath TCP (MPTCP) and Bottleneck Band-width and Roundtrip propagation time (BBR) are two promising technological advances developed to improve network performance. MPTCP extends TCP and allows multiple interfaces on a device to be used simultaneously. In addition, MPTCP can improve satellite base stations that face the challenge of smoothly transitioning connections as satellites orbit in the sky. BBR is a congestion control algorithm (CCA) developed by Google to improve network performance and currently being used in the large-scale services such as YouTube. In this paper we test and evaluate BBR's throughput performance when combined with MPTCP. We focus on observing the performance using connection paths with large latency differences. Results show BBR to outperform several other CCAs and suggests BBR is a good candidate to use in satellite networks. We also show having a large receiver TCP buffer is not an optimal setting when using BBR with MPTCP.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Yoohwan Kim, K. Taghva
{"title":"A Survey on Mobile Malware Detection Methods using Machine Learning","authors":"Mina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Yoohwan Kim, K. Taghva","doi":"10.1109/CCWC54503.2022.9720753","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720753","url":null,"abstract":"The prevalence of mobile devices (smartphones) along with the availability of high-speed internet access world-wide resulted in a wide variety of mobile applications that carry a large amount of confidential information. Although popular mobile operating systems such as iOS and Android constantly increase their defenses methods, data shows that the number of intrusions and attacks using mobile applications is rising continuously. Experts use techniques to detect malware before the malicious application gets installed, during the runtime or by the network traffic analysis. In this paper, we first present the information about different categories of mobile malware and threats; then, we classify the recent research methods on mobile malware traffic detection.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120925376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solutions for Closing Usage Gap in Rural Areas in West Africa","authors":"Ida Sèmévo Tognisse, Jules R. Dégila, A. Kora","doi":"10.1109/CCWC54503.2022.9720816","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720816","url":null,"abstract":"Bridging the digital gap in general, and the rural usage gap in particular, has been a significant concern for the telephony industry for years. This study examines the key factors in telephony adoption by non-subscriber in West Africa. To do this, we used a quantitative approach using the structural equation model. We collected data in two representative West African countries: Nigeria and Guinea Conakry. On a global population of 620 people, 204 did not own a mobile phone. Analysis of the data collected from this 204 non-subscriber showed that the key factors driving future technology adoption are attitude, social influence, perceived usefulness, and perceived ease of use the demographic factor of gender moderates these factors.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122959033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. DeCusatis, Patrick Peko, Jordan Irving, Maxwell Teache, Christopher Laibach, Jason Hodge
{"title":"A Framework for Open Source Intelligence Penetration Testing of Virtual Health Care Systems","authors":"C. DeCusatis, Patrick Peko, Jordan Irving, Maxwell Teache, Christopher Laibach, Jason Hodge","doi":"10.1109/CCWC54503.2022.9720785","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720785","url":null,"abstract":"There is a need for affordable, accessible ethical penetration testing methodologies in the online health care industry. In this paper, we propose and experimentally demonstrate an approach for initial ethical penetration testing of remote health care services based on free, open source tools and open systems intelligence. We develop an approach which concentrates on the most common health care vulnerabilities (social engineering attacks, network-based attacks, and website attacks) using OWASP ZAP, Nmap with Firewalk, and various other tools. Experimental results of penetration testing on a production level mental health care provider are presented. The effectiveness of different approaches is compared, and we enumerate common vulnerabilities and recommend mitigation techniques.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ajan Ahmed, Mohammad Monirujjaman Khan, Rajesh Dey, Ipseeta Nanda
{"title":"Smart Helmet with Rear View and Accident Detection System for Increased Safety","authors":"Ajan Ahmed, Mohammad Monirujjaman Khan, Rajesh Dey, Ipseeta Nanda","doi":"10.1109/CCWC54503.2022.9720833","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720833","url":null,"abstract":"This paper presents a smart helmet to show the rider his rear view using a raspberry pi camera. A speed limit indicator will help the rider stay within safe speed limits. Accident detection system is implemented by means of a heart rate sensor. In case of an accident an automated SMS will be sent to the relevant authorities using a GPS and GSM module. The heart rate sensor is also used to detect drowsiness and a vibrator alerts the rider to stay awake. A smart turn indicator warns the vehicles behind motorcycle of the rider's intention to turn. This proposed smart helmet aims to make motorcycle riding safer.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using EEG and fNIRS Signals as Polygraph","authors":"M. Khalil, Maria Ramirez, K. George","doi":"10.1109/CCWC54503.2022.9720780","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720780","url":null,"abstract":"Two different BCI techniques, electroencephalogram (EEG) and functional near-infrared spectroscopy (fNIRS) are compared for lie detection efficiency in this paper. The experimental data included are based on responses to a series of true or false questions. All participants were college students between the ages 20 and 24 years. The data from the students were collected using the g.Nautilus fNIRS-8 BCI headset, which is capable of recording both EEG and fNIRS simultaneously. After acquiring data using these BCI techniques, postprocessing was done using MATLAB/Simulink to check the performance of lie detection. Data analysis showed that both EEG and fNIRS have promise to be the new method to determine if someone is lying.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131629807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. R. Maaliw, K. Quing, A. Lagman, Bernard Ugalde, Melvin A. Ballera, Michael Angelo D. Ligayo
{"title":"Employability Prediction of Engineering Graduates Using Ensemble Classification Modeling","authors":"R. R. Maaliw, K. Quing, A. Lagman, Bernard Ugalde, Melvin A. Ballera, Michael Angelo D. Ligayo","doi":"10.1109/CCWC54503.2022.9720783","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720783","url":null,"abstract":"Higher educational institutions have a responsibility and commitment to deliver employable graduates as it impacts their well-being and the economy. This study compared the accuracy of several classification algorithms to build an ensemble prediction model capable of forecasting graduates' employability using extensive data mining techniques. Based on the evaluation metrics, an ensemble model composed of Random Forest (RF), Support Vector Machines (SVM), and Naïve Bayes (NB) achieved the highest cross-validated accuracy score of 93.33%. Association rule mining and permutation feature importance analysis from 500 graduates of the electronics engineering program of a university revealed that grit is firmly attributed to employability, including the capabilities to acquire technical skills and professional certifications. Thus, the knowledge gained can be used to develop a range of policies, initiatives, and strategies to increase students' employment prospects.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang
{"title":"Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files","authors":"Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang","doi":"10.1109/CCWC54503.2022.9720874","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720874","url":null,"abstract":"Malware detection and analysis can be a burdensome task for incident responders. As such, research has turned to machine learning to automate malware detection and malware family classification. Existing work extracts and engineers static and dynamic features from the malware sample to train classifiers. Despite promising results, such techniques assume that the analyst has access to the malware executable file. Self-deleting malware invalidates this assumption and requires analysts to find forensic evidence of malware execution for further analysis. In this paper, we present and evaluate an approach to detecting malware that executed on a Windows target and further classify the malware into its associated family to provide semantic insight. Specifically, we engineer features from the Windows prefetch file, a file system forensic artifact that archives process information. Results show that it is possible to detect the malicious artifact with 99% accuracy; furthermore, classifying the malware into a fine-grained family has comparable performance to techniques that require access to the original executable. We also provide a thorough security discussion of the proposed approach against adversarial diversity.","PeriodicalId":101590,"journal":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"127 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123575755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}