{"title":"An Improved Wild Horse Optimizer for Traveling Salesman Problem","authors":"Gehad Ismail Sayed, A. Hassanien","doi":"10.1109/icci54321.2022.9756075","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756075","url":null,"abstract":"Traveling salesman problem (TSP) is well-known combinatorial optimization problems. Due to its importance in many applications such as engineering sciences, path planning, and sensor placement, many researchers have been attracted to solve this problem. In this paper, a new improved version of Wild horse optimizer (I-WHO) is proposed to boost its performance in solving global optimization and combinatorial optimization problems. To examine the performance of I-WHO, the obtained results are compared with state-of-the-art algorithms. To have an unbiased and accurate comparison, descriptive statistics such as standard deviation, mean, and Wilcoxon rank-sum test are also used. The computational result showed that I-WHO significantly outperforms other alternative algorithms.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing security based on OWASP","authors":"AbdulAzeez R. Alobaidi, Zinah N. Nuimi","doi":"10.1109/icci54321.2022.9756064","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756064","url":null,"abstract":"In recent years, the use of cloud computing is grown up due to several reasons such as economic and efficiency. The major issue faced in cloud computing is security and how to ensure files protection. The vulnerabilities in cloud computing are considered a big challenge for the end-users that are not filled yet. The main objective of this paper is to enable people to protect their services and products running on clouds by controlling threats and attacks based on the operations, experience of development, and security communities. We proposed in this paper a new model based on the security issues related to tracking tasks, ideas, and problems which can implement in various forms such as using the threats in Software Development Life Cycle (SDLC) and using control stories to make sure the identified threats are mitigated. To evaluate the performance of the proposed model, we used the execution time. For our test, we used a 654 byte file for encryption and decryption. The obtained results indicate that our model is efficient especially for the small files in encryption. Moreover, the proposed model was decrypting the file much faster than the traditional model.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117256240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noura E. Maghawry, Karim Emara, E. Shaaban, Samy S. A. Ghoniemy
{"title":"Automated intelligent online healthcare ontology Integration","authors":"Noura E. Maghawry, Karim Emara, E. Shaaban, Samy S. A. Ghoniemy","doi":"10.1109/icci54321.2022.9756070","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756070","url":null,"abstract":"Knowledge graphs have emerged as a powerful dynamic knowledge representation model for predicting hidden patterns and relationships in medical and healthcare domains for medical diagnosis and disease prediction. However, generating, constructing, and integrating knowledge graphs for this domain is still challenging research area for such heterogeneous domain. In this paper, a framework for automatic disease knowledge graph (KG) construction and intelligent ontology integration with standard human disease ontology (DO) is developed. A major component of this framework is developing an enhanced diseases' knowledge graph that is based on collecting medical facts from medical platforms and social networks, including symptoms, causes, risk factors and prevention factors. This knowledge graph represents a major base for intelligent diagnosis and disease prediction systems. The developed disease knowledge graph includes diseases' symptoms, causes, risk factors and prevention factors and integrated with DO by more than 400 diseases. The knowledge graph presented is a step not only towards building an enriched knowledge graph for professional staff and normal users. The graph is also a step towards integrating two standard ontologies human disease and symptom ontologies that are not linked or integrated till now.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116568126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Artificial Intelligence Approach for Deploying Zero Trust Architecture (ZTA)","authors":"Eslam Samy Hosney, I. T. A. Halim, A. Yousef","doi":"10.1109/icci54321.2022.9756117","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756117","url":null,"abstract":"Cybersecurity is critical in preventing infractions, maintaining digital workplace discipline, and ensuring that laws and regulations are obeyed. Zero Trust Architecture (ZTA), often known as perimeter-less security, is a novel method for designing and implementing secured IT systems. Zero trust's basic notion is “never trust, always verify,” which indicates that devices should not be trusted by default. This means that each access from or to any asset must be assessed and follow the standard guidelines of the organization. Maintaining this type of control imposes a high burden on IT security and system administrators to be able to track and validate each control and manually sustain the configuration needed. With the power of Classification Algorithms in Machine Learning, we will explore in this paper an alternative solution to save time and effort and help maintain the same security posture with less human intervention. The proposed approach utilizes the information from available security feeds and statically configured policies to enforce and maintain zero-trust network policies. By analyzing the data, it will be feasible to identify the required policies to be configured and compare them against the traditional compliance rules to auto-configure the policies. This approach aims to enhance the existing security intelligence engines with more sophisticated rules and less time and effort.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131554993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Recommender System for Arabic Content","authors":"Amani A. Al-Ajlan, Nada Alshareef","doi":"10.1109/icci54321.2022.9756112","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756112","url":null,"abstract":"On the internet, where the number of choices of products and services is growing, users need to filter items or products to make better decisions. Recommender system is a type of information filtering system designed to provide recommendations to users based on various algorithms. These algorithms forecast the most likely products that users will buy or like based on their interests. In recent years, the number of recommender systems has increased, and famous companies have employed recommender systems to assist their users in finding the products or items that are appropriate for them. Therefore, we decided to review existing studies on recommender systems for Arabic content. Because many recommender systems focus on English content, we found a few studies in the field of recommender systems that address Arabic content. We summarize these studies based on some features, including recommender system types, domain, datasets, and if the recommender system is integrated with sentiment analysis. Finally, we discuss recommender systems with Arabic content studies, and we notice that most of these studies used sentiment analysis with recommender systems to achieve high-quality recommendations.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125485880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epileptic Seizure Detection using EEG Signals","authors":"I. Khan, Mohd. Maaz Khan, Omar Farooq","doi":"10.1109/icci54321.2022.9756061","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756061","url":null,"abstract":"Epilepsy is a common neurological disorder which can be diagnosed by neurologists or physicians by using electroencephalogram or EEG signals. Since the manual examination of EEG for this purpose is very time consuming and requires trained professionals, it calls for the need of an automatic seizure detection method. In this study, time and frequency domain features are extracted from the EEG signals after preprocessing the raw EEG data and then using machine learning algorithms such as Logistic Regression, Decision Tree, Support Vector Machines, etc. to detect generalized seizures in the Temple University Hospital (TUH) corpus. A detailed account of the TUH dataset is also given. This work summarizes and compares the results of each of the algorithm trained, in terms of the performance metrics. Using the proposed approach, SVM obtained the highest accuracy of 92.7% in binary classification.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Chronic Kidney Disease(CKD) at the Initial Stage: A Novel Hybrid Feature-selection Method and Robust Data Preparation Pipeline for Different ML Techniques","authors":"Md. Taufiqul Haque Khan Tusar, Md. Touhidul Islam, Foyjul Islam Raju","doi":"10.48550/arXiv.2203.01394","DOIUrl":"https://doi.org/10.48550/arXiv.2203.01394","url":null,"abstract":"Chronic Kidney Disease (CKD) has infected almost 800 million people around the world. Around 1.7 million people die each year because of it. Detecting CKD in the initial stage is essential for saving millions of lives. Many researchers have applied distinct Machine Learning (ML) methods to detect CKD at an early stage, but detailed studies are still missing. We present a structured and thorough method for dealing with the complexities of medical data with optimal performance. Besides, this study will assist researchers in producing clear ideas on the medical data preparation pipeline. In this paper, we applied KNN Imputation to impute missing values, Local Outlier Factor to remove outliers, SMOTE to handle data imbalance, K-stratified K-fold Cross-validation to validate the ML models, and a novel hybrid feature selection method to remove redundant features. Applied algorithms in this study are Support Vector Machine, Gaussian Naive Bayes, Decision Tree, Random Forest, Logistic Regression, K-Nearest Neighbour, Gradient Boosting, Adaptive Boosting, and Extreme Gradient Boosting. Finally, the Random Forest can detect CKD with 100% accuracy without any data leakage.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115918321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}