D. Dayananda, S. Vasanthapriyan, K. Chathumini, Macss Fernando
{"title":"Modeling and Simulation of Online Examinations Procedures in COVID-19 Pandemic Using Arena Software: A Case Study","authors":"D. Dayananda, S. Vasanthapriyan, K. Chathumini, Macss Fernando","doi":"10.1109/icci54321.2022.9756098","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756098","url":null,"abstract":"The outbreak of Coronavirus disease 2019 (COVID-19) has made higher education institutions around the world shift to online education. Online exams are exponentially expanding as part of this online education. Although online exams have been implemented a few decades back, there are still impacts on online evaluation methods, gaps in students' priorities, and challenges with academic dishonesty. In this study, Arena simulation is used for determining the feasibility of the framework proposed for online exams during the COVID-19 pandemic. The study investigates the implementation of online exams from three different perspectives that include students, academic staff and administrates at a state university in Sri Lanka that moved into online education and online exams amidst the COVID-19 pandemic. The framework is derived from the data collected through the mixed research method. By following a scenario-based study, the performance of the framework is simulated with Arena that determines its feasibility for real-world applications. Overall findings of this study suggest best approaches to conduct students' evaluations in online education as an alternative to coping with challenges where threats to continue academic performance.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121087733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings Publication [Title page]","authors":"","doi":"10.1109/icci54321.2022.9756089","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756089","url":null,"abstract":"","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Personalized Cancer Treatment with Machine Learning","authors":"Hanan Ahmed, S. Hamad, Howida A. Shedeed, A. Saad","doi":"10.1109/icci54321.2022.9756124","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756124","url":null,"abstract":"Cancer is a group of more than 100 diseases caused by abnormal cell growth that may spread to other parts of the body. Therefore, cancer treatment is considered one of the challenges in the medical field. According to the World Health Organization (WHO) “Cancer is the second leading cause of death worldwide; there were 9.6 million deaths in 2018”. As scientists have learned more about cancer, they have found that some mutations are commonly found in several types of cancer so cancer tumors can have thousands of genetic mutations. Because of this, cancers are categorized by the types of genetic alterations that are approved to be the driver, not only by where the tumor developed in the body and how the cancer cells look under the microscope. They also have found that certain treatments worked better for some patients than for others which means that, the response of patients with the same cancer type and same treatment plan is different. Now, cancer treatment tends to personalize medicine (also known as precision medicine), taking into account an individual's genetic profile and medical or disease history before treatment, dealing with each DNA sequence as a separate case, and analyzing its mutations which is a time and effort consuming task. Studying each patient DNA sequence requires a medical team with several working days to make a decision for the single patient which is too difficult to do with the high number of patients. So, recently the effort is exerted in replacing the human effort with artificial intelligence-based algorithms to study the DNA sequence, extract its mutations and study the various treatment effect on DNA. In this paper, a review is introduced for recent researches that use the machine and deep learning algorithms to personalize cancer treatments.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116172772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Intelligence Techniques for Classification of Eye Tumors: A Survey","authors":"E. Allam, Marco Alfonse, A. M. Salem","doi":"10.1109/icci54321.2022.9756067","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756067","url":null,"abstract":"Tumors that have migrated to other regions of the body, particularly the breast, lung, bowel, or prostate, usually develop secondary tumors in the eyes. Retinoblastoma in children and melanoma in adults are two forms of primary cancers that develop within the eye. In this paper, we review the recent works of the artificial intelligence techniques that are applied for classification of ophthalmology tumors. The researchers had proposed different diagnosis systems of eye cancer; iris tumor, iris nevus, uveal melanoma and metastatic, malignant choroidal melanoma and retinoblastoma. The techniques used in these papers can be divided into three main methodologies. The main methodology depends on the Artificial Neural Network (ANN) and deep learning; Back Propagation Neural Networks (BPNN), Radial Basis Function Networks (RBFN), Auto Encoder (AE) Neural Network, hybrid Stacked Auto Encoder (SAE) Network, Deep Belief Network (DBN),Convolutional Neural Network (CNN) and Extreme Learning Machine (ELM). The second methodology depends on the Machine Learning (ML) approaches; decision tree, Fuzzy C-Means (FCM), Alternative Fuzzy C-Mean (AFCM), Support Vector Machine (SVM) and Decision Tree classifier. The third one depends on different image processing techniques and Apriori based algorithm. The highest recognition rate is achieved by applying different image processing techniques and BPNN with 98.5% and 95%, respectively.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114586621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Twitter Sentiment Analysis on Bitcoin Price during COVID-19 with XGBoost","authors":"Eric Edgari, Jocelyn Thiojaya, N. N. Qomariyah","doi":"10.1109/icci54321.2022.9756123","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756123","url":null,"abstract":"Bitcoin have become safe-haven for people who want to invest during COVID-19 with its volatile price. Numerous factors can affect the price but recently the most popular one was due to an Elon Musk tweet. We decided to investigate our questions. Do tweets regarding Bitcoin affect its price? Can we predict Bitcoin price by analysing sentiments from twitter? For our research, we decided to analyze the impact of twitter sentiments on Bitcoin price during the COVID-19 pandemic. Using VADER sentiment analysis, we attempted to find out what is the current public sentiment regarding Bitcoin. Coupling tweet sentiment with the Bitcoin price, we pursue making a predictive model to forecast whether Bitcoin price will rise or fall. We also compare whether having twitter sentiment analysis in our model will have an advantage compared to not using. In the end, we found out that twitter sentiment analysis have an impact to Bitcoin price. We hope that our research can help people during this financial stress period.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129877166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Highly Available Internet Border Systems Survey and Reference Model","authors":"J. Minton, D. Laughlin","doi":"10.1109/icci54321.2022.9756082","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756082","url":null,"abstract":"The exponential growth of organizations connecting to the internet increases the demand and expectations for technology professionals to provide highly available (HA), adaptable, always-on internet and network connectivity services to the enterprise. The rapid adoption of prevailing technologies and initiatives such as cloud-based workloads, Artificial Intelligence (AI), Machine Learning (ML), and digital transformation are fueling the growth. Organizations rely upon hardware, software, processes, and people, which form internet border systems. Internet border systems provide internet connectivity and access to external network services and resources. Despite the enterprise's increased connectivity demands, a standards-based model, blueprint, or reference architecture for designing and deploying HA internet border systems does not exist. This paper proposes creating a standards-based, modular, and reproducible HA internet border system model. The internet border model will provide a frame of reference and enable always-on, automated, resilient, and self-recovering internet border connectivity services for enterprise networks. The reference model will assist technology professionals in planning, designing, creating, and deploying HA internet border systems for enterprise networks.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121419943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khaled M. Elshabrawy, Mayar M. Alfares, Mohammed Abdel-Megeed Salem
{"title":"Ensemble Federated Learning for Non-II D COVID-19 Detection","authors":"Khaled M. Elshabrawy, Mayar M. Alfares, Mohammed Abdel-Megeed Salem","doi":"10.1109/icci54321.2022.9756090","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756090","url":null,"abstract":"In light of the COVID-19 pandemic, the need for a chest X-ray scans classifier is crucial in order to diagnose patients and classify scans into normal, COVID-infected, and pneumonia. Federated learning was chosen for the classification as it uses a decentralized approach to train the model at the local servers belonging to each entity in various geographic locations. Therefore, information leakage that could happen from the traditional centralized approach of training is prevented, besides saving the huge cost of central storage. However, between the vast difference in the number of X-ray scans per data-silo (i.e. hospital), the dissimilar image-acquisition techniques, and the diverse morphological structures of the human chest, non-IID (non-Independent and Identically Distributed) skews are introduced in the data. In this paper, real-world datasets of COVID and pneumonia scans are used to satisfy all the non-IID data skews. An experiment was then conducted to test the effect of these skews using five federated learning algorithms, FedAvg, FedProx, FedNova, SCAFFOLD, and FedBN, under the same metrics. The obtained accuracy values are 79.5%, 76.92%, 5.57%, 79.18%, and 84.4%, respectively. In this paper, we present the different effects of non-IID skews on the training process and discuss the different federated learning variations to mitigate the data heterogeneity.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced Skin-tone Block-map Image Steganography using Integer Wavelet Transforms","authors":"Mennatallah M. Sadek, A. Khalifa, Doaa S. Khafga","doi":"10.1109/icci54321.2022.9756091","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756091","url":null,"abstract":"Steganography is the technique of hiding a confidential message in an ordinary message where the extraction of embedded information is done at its destination. Among the different carrier files formats; digital images are the most popular. This paper presents a Wavelet-based method for hiding secret information in digital images where skin areas are identified and used as a region of interest. The work presented here is an extension of a method published earlier by the authors that utilized a rule-based approach to detect skin regions. The proposed method, proposed embedding the secret data into the integer Wavelet coefficients of the approximation sub-band of the cover image. When compared to the original technique, experimental results showed a lower error percentage between skin maps detected before the embedding and during the extraction processes. This eventually increased the similarity between the original and the retrieved secret image.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126294048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent Applied Techniques for Open Dialog Generation Systems","authors":"Farida Youness, M. Madkour, A. Elsefy","doi":"10.1109/icci54321.2022.9756110","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756110","url":null,"abstract":"Dialog Generation Systems (DGS) have emerged as a critical aspect of Natural Language Processing in recent years (NLP). It enables a diverse set of relevant applications to interact with humans in a natural and intelligent way. This study provides a systematic review of open DGS techniques that have recently been used. The major goal of this study is to discuss and analyze the most widely used approaches for implementing DGS's that have been published in recent years. Also, the most popular datasets for open DGS are enumerated, and some commonly used automatic evaluating metrics are presented. As a result, the explored methods are categorized into six main categories, Reinforcement Learning (RL), Hierarchical Recurrent Encoder-Decoder (HRED), Generative Adversarial Networks (GAN), Variational Auto-Encoder (VAE), Sequence to Sequence (Seq2Seq), and Pretraining Model.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132333606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed I. Ahmed, Samy Sharf, Rafaat A. Salama, Mostafa Mekky, Mohamed A. Salama, Wael Badawy
{"title":"A Reliable Secure Architecture for Remote Wireless Controlling of Vehicle's Internal Systems based on Internet of Vehicles using RF and Wi-Fi","authors":"Ahmed I. Ahmed, Samy Sharf, Rafaat A. Salama, Mostafa Mekky, Mohamed A. Salama, Wael Badawy","doi":"10.1109/icci54321.2022.9756115","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756115","url":null,"abstract":"Internet of Vehicles is considered one of the most unprecedented outputs of the Internet of Things. No one has realized or even expected the rapidly-growing revolution regarding autonomous connected vehicles. Nowadays, Internet of Vehicles is massively progressing from Vehicular Ad-Hoc Networks as a huge futuristic research and development discipline. This paper proposes a novel reliable and secure architecture for ubiquitously controlling remote connected cars' internal systems, such as engine, doors' locks, sunroof, horn, windows' and lights' control systems. The main contribution is that the proposed architecture doesn't bypass the vehicle's original security coding, and doesn't require any electrical modifications to the vehicle's Engine Control Unit and Body Control Module wirings. The proposed architecture is composed of remotely connected embedded, software, and cloud-based platform systems. Two designs of wireless control boards based on RF and Wi-Fi are provided for enabling remote control using the original vehicle's encrypted key and mobile application. A simulation is implemented using the original vehicle's encrypted key and Android application proving matching results according to the proposed architecture. Experimental work is conducted on RF and Wi-Fi relays' control boards along with KEYDIY K909 RF encrypted key for controlling a 2013 Hyundai Elantra MD vehicle, and the studied results proved a successful and reliable remote wireless controlling of the vehicle's internal systems.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}