{"title":"A Novel Non-Inverting Quadratic Double Switch Buck Boost Converter for Charging Lithium-ion Batteries in Electrical Vehicles","authors":"A. Mohamed, H. A. Bastawrous","doi":"10.1109/ICCA56443.2022.10039648","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039648","url":null,"abstract":"As the demand for clean energy sources increases on a large global scale, electric vehicles (EVs) are currently witnessing a huge demand to replace gas-powered vehicles. A crucial part in EVs is the battery management system, which utilizes DC-DC converters as essential parts. For this purpose, non-inverting DC-DC converters are the most desirable type. Moreover, these converters need to operate in continuous conduction mode (CCM) to minimize harmonic distortion and keep the load always fed with current. In this paper, we propose a novel design of a DC/DC quadratic non-inverting buck boost converter that has two switches and combines three different converters. A simulation model was constructed to investigate the converter performance for duty cycles from 30% to 80% in the CCM. The simulation results obtained not only revealed good performance in the desired duty cycle range but also confirmed the operation in CCM.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123180592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Hirway, Enda Fallon, Paul Connolly, Kieran Flanagan, D. Yadav
{"title":"A Deep Learning Approach for Minimizing False Negatives in Predicting Receipt Emails","authors":"C. Hirway, Enda Fallon, Paul Connolly, Kieran Flanagan, D. Yadav","doi":"10.1109/ICCA56443.2022.10039606","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039606","url":null,"abstract":"Businesses generate receipts for their customers that include information such as the products purchased, their cost, the date and time of purchase, the store id etc. After an online purchase of item/s is made, a receipt is often emailed to the buyer's email address. For this evaluation, a classified database with receipt and non-receipt emails was available. Previously, Machine Learning (ML) algorithms for determining receipt validity had been implemented on this test database. The results showed that the Random Forest technique performed better than Naive Bayes and Support Vector Machine. In this paper, a Deep Learning algorithm named Long Short-Term Memory [LSTM] is implemented and its results compared with the previous implementation. The capacity of this recurrent network to handle the exploding/vanishing gradient problem, which is a challenge when training recurrent or very deep neural networks, is one factor in its success. It was found that LSTM is more effective in terms of accuracy compared to the previous ML approach. Also, the false negative values predicted by LSTM were fewer that those predicted by the ML approach. In the classification of receipt emails, processing an email without receipt data incurs a relatively low cost, yet failing to detect a receipt email results in the loss of important data. As a result, the system needs to be tuned to minimize false negatives while permitting a wider tolerance for false positives since the cost of false negatives in this situation is substantially higher than that of false positives.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126161349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A preliminary study on interdisciplinary programming learning based on cloud computing low-code development platform","authors":"Chung-Hsiang Wang, Ko-Chiu Wu","doi":"10.1109/ICCA56443.2022.10039663","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039663","url":null,"abstract":"The application of “programming education” has become one of the future technological trends, and students with design backgrounds should also grasp this important development. In this study, the “AgilePoint NX” program course was established, and computational thinking was introduced into the course to guide students, through the image flow and low-code learning process, to carry out structured thinking and question speculation, and complete task exercises. This aims to teach design students to learn programming and computational thinking through a cloud-based low-code development platform with image processes and interdisciplinary learning processes. We conduct a comprehensive analysis and evaluate the learning effect through classroom learning observation, simple questionnaire survey, imagination scale, and other methods. Finally, the study found that in interdisciplinary programming learning, different factors lead to low learning effects of programming courses for design background students, resulting in different degrees of learning pain points and learning experiences. The power of imagination test is a tentative exploration of this research, but for the low-code development platform with fewer measurement data and biased towards procedural thinking, only predictive exploration has no significant data to show the specific impact on the programming learning process, only As a reference for interdisciplinary study.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Evolution of Cryptocurrency and Cyber Attacks","authors":"Hala Strohmier Berry","doi":"10.1109/ICCA56443.2022.10039632","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039632","url":null,"abstract":"Cryptocurrencies characteristics facilitated ran-somware attacks extorting payments in the form of Bitcoin, Mon-ero, Ethereum and others from individuals and organizations. The open cyber boarders allowed anyone to own cryptocurrency without revealing their identities. This research investigates the role of cryptocurrency in the increase of cyber attacks and creating the new phenomenon of crypto-ransomware and answer two fundamental questions: (1) Is there a correlation between the increase use of cryptocurrency and the spread of cyber attacks? And (2) Would ransomware attacks exist if cryptocurrency did not exist?.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114632396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alyazia Albreiki, Ayesha Almemari, Ahmed Shuhaiber
{"title":"Towards a global C2C Crowdsourcing Smart Shopper System: An SDLC Development Approach","authors":"Alyazia Albreiki, Ayesha Almemari, Ahmed Shuhaiber","doi":"10.1109/ICCA56443.2022.10039673","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039673","url":null,"abstract":"Recently, personal shopper businesses have gained increasing popularity through social media platforms. Many websites and social media pages offer personal shopping services; however, this is limited to a specific number of shopping agents who are available online and are trustworthy to conduct shopping transactions on behalf of the shoppers. Therefore, our goal is to satisfy the consumer's needs and help them find the needed product wherever it is located worldwide, by developing an application of crowdsourcing personal shoppers who are available and cost-effective in many countries and regions. This C2C crowdsourcing personal shopper application is the first to be developed in UAE and, to the best of our knowledge, one of the very few online business models worldwide. Our solution enables people to choose the best quality product, compare prices and save the time and effort of international physical shopping. We employed the System Development Life Cycle (SDLC) methodology to plan, analyze, model, design and implement the system. Limitations and future directions are also specified.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127607619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve Data Mining Techniques with a High-Performance Cluster","authors":"H. Fadhil, Zainab Abdulnasser, S. Mohammed","doi":"10.1109/ICCA56443.2022.10039629","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039629","url":null,"abstract":"People's reliance on computers and the computing power they provide is growing by the minute. An ever-increasing amount of data is being created each day, and the power to analyze this data requires the use of cluster computers to process and calculate data. It has been discovered that data clustering is a beneficial data mining approach. There have been a number of recent attempts to cluster data mining methods. Using a Raspberry Pi cluster, this study employs the Apriori algorithm, which is the most generally used algorithm, to extract frequent itemsets from large data sets. The fundamental aim is to build a cluster and provide data analysis capabilities based on an examination of the major clustering phases in order to illustrate the power of cluster computing and the applications of data analytics. Each Raspberry Pi uses the MPI standard and Python multiprocessing to share a large task and then coordinate their findings among a group of four or more MPICH systems at the conclusion of the processing. At the data partitioning stage, the issue of load balancing must be taken into account. According to our testing results, clustering accelerates sequential classification by a factor of 10. There is a noticeable increase in performance when there are additional processors installed. Additionally, we discovered that item count had a bigger effect on clustering performance than transaction count.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123561102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum Operation and Cost Scenarios of a Hybrid Wind/PV/Battery in a Radial Network using Firefly Algorithm and Surrogate Optimization","authors":"M. Abdelwareth, D. Riawan, Chow Chompoo-inwai","doi":"10.1109/ICCA56443.2022.10039554","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039554","url":null,"abstract":"Exploiting renewable energy resources can help decrease carbon emissions by providing a reliable solution to generate electricity and tackle the climate change dilemma. Artificial Intelligence algorithms have been used in the last two decades to optimize power system networks. In this paper, we discussed the effect of replacing the existing Diesel Generator (DG) with a wind turbine to satisfy the load in the standalone hybrid (DG, PV, Battery) radial network in Tomia Island, south-east Sulawesi, Indonesia. Loss of Power Supply Probability (LPSP) and the Coefficient of determination parameters were used as technical performance indicators. Firefly Algorithm (FF) and Surrogate Optimization technique were used to optimize the system considering the minimum costs.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130064128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Mobile Application for Blood Donation System","authors":"Muna M. Hummady","doi":"10.1109/ICCA56443.2022.10039544","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039544","url":null,"abstract":"Computers and cell phones have become more commonplace in a society in addition to the many benefits they provide in our daily lives. Internet communication (through websites and applications) has become essential as a result of the Corona pandemic and the issues it brought up. The difficulty in locating a trustworthy blood bag could result in the loss of many lives. Blood donation is crucial for patients with thalassemia, cancer patients, accident victims, and surgical procedures. To donate blood, one must research and visit a blood bank. In a time crunch, it could be challenging to choose the best donor. Because unusual blood types aren't always available at all blood banks, recipients often struggle to find the appropriate blood donor. To address the issue of a lack of blood bags, it is evident in a blood bank's inadequate management, the elimination of uncommon blood types, a lack of understanding and confidence, and the challenge of determining a specific blood group. This project aims to design and deploy a mobile application. It is advised to make use of a blood donation app that is connected to the main database that compiles and arranges information from all blood donation drives and blood banks. All necessary blood donation processes are managed and controlled by the proposed application. The front end of the application is built using JavaScript in this project (React native is used as the framework for JS), and the back end is built using Firebase as the database.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"33 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings ICCA 2022","authors":"","doi":"10.1109/icca56443.2022.10039556","DOIUrl":"https://doi.org/10.1109/icca56443.2022.10039556","url":null,"abstract":"Proceedings ICCA 2022.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117007530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daoud M. Daoud, S. El-Seoud, Fuad Alhosban, Ali Farhat
{"title":"Methods for Handling Spontaneous Health Arabic Queries using unsupervised machine learning","authors":"Daoud M. Daoud, S. El-Seoud, Fuad Alhosban, Ali Farhat","doi":"10.1109/ICCA56443.2022.10039617","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039617","url":null,"abstract":"The goal of this work is to demonstrate that using mixed sublanguage and linguistic processing techniques, is both essential and possible to create a robust NL-based systems. The merging of accurate language processing with the analysis of the sublanguage will undoubtedly improve the processing's correctness and resilience. As a proof-of-concept, we created an experimental system (HASE) to test this hypothesis. The system is a search system for Arabic documents in the health and medical domain. To study the sublanguage we employed machine learning techniques. The initial corpus consists of 40 thousands unedited queries. HASE is built on top of SOLR with the integration of Arabic linguistic processing Component. Responses are generated using IR approach. Altibby is actively deploying HASE in Jordan (the largest health content). The IR component achieves a 90% f-measure when tested with actual noisy free text.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127978614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}