{"title":"Feasibility Study of Using Predictive LTE Connection Selection from Multi-Operator for Teleoperated Vehicles","authors":"A. M. Mohamed, Nashwa Abdelbaki, Tamer Arafa","doi":"10.1109/ICCA56443.2022.10039521","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039521","url":null,"abstract":"Service depending on good connection is growing and so its sensitivity, like Advanced Driver-Assistance System (ADAS). ADAS is the most common technological feature in the modern car, and the hope to reach a dependable anonymous car is the ultimate target. We (From end user and manufacture perspectives) are evaluating Teleoperated Driving as the most promising achievable feature to support emerging needs for traffic headache avoidance and health & safety cautions, with human to human sense & interaction proven to be better than Human to Machine in handling (Human driving vs. Machine driving). Since this whole service is depending on sensors (Already covered by different car manufactures) and connectivity (Varying in the sense of coverage and capacity). In this paper, we study the applicability of predicting the most preferable market operator within a certain area (Satisfying a previous studied criteria) to use as a primary data connection before getting into a new measurement delay. For this purpose, a long measurement period was preformed with a connection prediction reaching from 87% to 93% using variant models.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116348801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examining The Effects of Playing Difficulty and Playing Duration in Unwinnable Persuasive Games","authors":"R. G. Isnanda, P. Santosa, R. Hartanto","doi":"10.1109/ICCA56443.2022.10039586","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039586","url":null,"abstract":"Unwinnable persuasive games' persuasion strategy is to force the players to lose and use the ensuing experience to persuade them. After two decades, currently, we only know the different effects of winning and losing a persuasive game. We argue that research should start investigating how to design game loss that can positively contribute to the persuasion process. In particular, this study focuses on the effects of playing difficulty and playing duration. To force players to lose, designers can increase the playing difficulty to create an unwinnable challenge and use it to portray the severity of the issue. While there is a rationale for it, whether the increase can lead to positive outcomes has not been established with empirical evidence, especially because frustration from repeated failure might have negative impacts. In addition, longer playtime can help players become more familiar with the game. However, it is unfair to let them invest a significant time only to realize that it is unwinnable. To address the research gap, we conducted a factorial between-subject design experiment with an additional no-treatment control group. The results suggest that playing a more difficult and longer game can lead to a significantly higher donation. Based on the result, there are indeed benefits for game designers to increase playing difficulty and enable extended playtime when designing unwinnable persuasive games.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114874055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mousa Al-kfairy, Omar Al-Fandi, Mewael Alema, May Altaee
{"title":"Motivation and Hurdles for the Student Adoption of Metaverse-based Classroom: A Qualitative Study","authors":"Mousa Al-kfairy, Omar Al-Fandi, Mewael Alema, May Altaee","doi":"10.1109/ICCA56443.2022.10039672","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039672","url":null,"abstract":"Metaverse is an emerging technology that combines the virtual world and the real world, resulting in an immersive user experience. It has many applications. In this study, we inves-tigated the users' perception of the Metaverse-based classroom in the UAE by qualitatively surveying 84 higher education students. After coding the users' responses, we generated a world cloud and analyzed the user responses. A little more than a third of the surveyed users do not believe that they will benefit from using Metaverse in higher education, and they would not like to use it. Users are mainly concerned about their health conditions, security, and privacy of their information, and the students' movement may result in students losing focus (distraction). On the other hand, the learner will be motivated by the interactive nature of the Metaverse-based classroom and the education's location and time flexibility. Different practical and theoretical implications have been identified and discussed in this paper.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Advanced Deep Learning Medical Image Recognition and Diagnosis of Respiratory System Viruses","authors":"M. Tayel, Adel M. M. El Fahar, A. Fahmy","doi":"10.1109/ICCA56443.2022.10039644","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039644","url":null,"abstract":"Respiratory infections are a confusing and time-consuming task that caused recently a pandemic that affected the whole world. One of the pandemics was COVID-19 that has exposed the vulnerability of medical services across the world, particularly in underdeveloped nations. There comes a strong demand for developing new computer-assisted diagnosis tools to present cost-effective and rapid screening in locations wherein enormous traditional testing is impossible. Medical imaging becomes critical for diagnosing disease, X-rays and computed tomography (CT) scan are employed in the deep network which will be helpful in diagnosing diseases. This paper proposes a scanning model based on using a Mel Frequency Cepstral Coefficients (MFCC) features extracted from a respiratory virus CT-Scan image and then filtered by applying Gabor filter (GF). The filtered image is passed to Convolutional Neural Network (CNN) for classifying the image for the presence of a respiratory virus such as Covid, Viral Pneumonia or being a healthy normal image. The proposed system achieved a validation accuracy of 100% with an overall accuracy of 99.44%.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Digital and Cyberspace Modernization Strategy; A Possible Strategical Roadmap to Transform Traditional Military Organizations into a Smart Military through the Emerging Information Technology","authors":"Saleem Ahmed","doi":"10.1109/ICCA56443.2022.10039571","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039571","url":null,"abstract":"The report provides idea about how the military organizations could be improved for using future information technology. It provides a detail knowledge about the possible strategies that could be used by the military organizations to change their traditional work process into new advance digital process. The report will discuss about the implication of the emerging technologies in Military organizations and how the organization could adapt to these changes. The emerging technologies have the power to change “the rules of the games” whether it's about balancing the military power among security actors or balancing the competition in the market among the new entrants and existing companies. Thus, it has become important for organizations to adapt to these changes. The report will discuss about the implementation of Artificial Intelligence, Machine Learning and Blockchains in military organization and, will also provide idea about the potential challenges that military organizations are facing in adopting them. Further it will discuss about the possible strategies that military organizations could adopt to make their employees get familiar with these new technologies and get benefitted from it. The Unites States has made major improvement in their field of technology and the country is said to be the leader in the development of most of these technologies. The United State military has relied on the technological superiority for ensuring their dominance in conflict and also for underwriting their national security. China and Russia have also made improvement in the development of advance military technologies. Hence., going through this report will also provide knowledge about the implementation of emerging technologies in military organization of some countries and what are the things that other military organization should learn from them.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121677370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The intercorrelations among risk factors and trust dimensions in S-commerce: An empirical investigation from the user experience","authors":"Mousa Al-kfairy, Ahmed Shuhaiber","doi":"10.1109/ICCA56443.2022.10039563","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039563","url":null,"abstract":"With the increase in social media users, businesses are trying to benefit from the popularity and reachability of such platforms by introducing a new channel for promoting and selling their products. This study surveyed 267 social commerce consumers in the UAE to understand the impact of the perceived risks on users' trust, which is known to impact customers' purchase intention. Structural equation modeling and factor analysis were applied. The results highlighted the importance of security risks as statistically significant influencers of the users' trust. On the other hand, financial and time risks were insignificant. The study has both practical and theoretical implications discussed in the paper.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jayakanth Kunhoth, S. Al-Máadeed, M. Saleh, Younus Akbari
{"title":"Machine Learning Methods for Dysgraphia Screening with Online Handwriting Features","authors":"Jayakanth Kunhoth, S. Al-Máadeed, M. Saleh, Younus Akbari","doi":"10.1109/ICCA56443.2022.10039584","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039584","url":null,"abstract":"Dysgraphia, a major learning disorder that primarily interferes with writing skills can hinder the academic track of children unless recognized in the early stage. The diversity in the symptoms, as well as the emergence in different ages, makes the diagnosis quite an intricate task. This work proposes automated methods that can be used for the diagnosis of dysgraphia by analyzing handwriting. Particularly this work examined the effectiveness of kinematics and dynamics of handwriting for discriminating abnormal writing. Furthermore, this work focused on developing methods that utilize fewer features for classifying dysgraphic and non-dysgraphic subjects. The proposed methods are evaluated in a publicly available online handwritten dataset. Obtained results indicate that the proposed method can diagnose the existence of dysgraphia with an accuracy of 77% with a limited number of features.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130878905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marwa Kandil, M. Awad, Eiman Alotaibi, Reza Mohammadi
{"title":"Q-learning and Simulated Annealing-based Routing for Software-defined Networks","authors":"Marwa Kandil, M. Awad, Eiman Alotaibi, Reza Mohammadi","doi":"10.1109/ICCA56443.2022.10039651","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039651","url":null,"abstract":"With the increasing dependence on cloud services, the demand for high data rates has been growing exponentially. Therefore, the power-hungry data centers has been expanding to accommodate this growth with the required network services. Many Internet Service Providers (ISP) are targeting greener communication while balancing the trade-off between energy efficiency and satisfaction of quality-of-service (QoS) requirements. Software-defined networking (SDN) is a new networking paradigm that separates the network control plane from the data plane; thus, allowing the network controller to have a full overview of the network status and complete control of traffic routing. This paper investigates the application of recent developments in reinforcement learning (RL) techniques to optimize routing in Software-defined networks. Mainly, we developed a simulated annealing Q-learning (SAQL) routing algorithm that provides an optimized balance between energy consumption and QoS-requirements satisfaction in real-time for software-defined networks. The algorithm is implemented and tested on the open network operating system (ONOS) controller, which facilitates evaluation of the algorithm's performance in real networks. A comparison study between the proposed SAQL algorithm, the classical Q-learning ε-greedy exploration algorithm and traditional OSPF was carried out on two topologies. Results show that SAQL achieved around 60% less average control power than the standard OSPF and ε-greedy approaches while maintaining a relatively low latency of 0.280 ms in Nsfnet topology. Simulation results confirm that SAQL routing algorithm managed to balance the trade-off between energy-aware and QoS-aware routing.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130584018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semi-Supervised Machine Learning Applications in RAN Design: Towards Data-Driven Next Generation Cellular Networks","authors":"Ayman Gaber, Tamer Arafa, Nashwa Abdelbaki","doi":"10.1109/ICCA56443.2022.10039555","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039555","url":null,"abstract":"The explosive growth of mobile internet services and demand for data connectivity boosts the innovation and development in Radio Access Network (RAN) to define how next generation mobile networks will look like. Continuous improvement in existing RAN is crucial to meet very strict speed and latency requirements by different mobile applications with minimum investments. Exploiting the advancement in Machine Learning and AI-driven algorithms is essential to tackle these challenges in different functions within the RAN domain. In this paper we surveyed how to leverage different clustering algorithms to understand underlying community structures within RAN and what benefits those insights could bring to serve different use cases in next generation networks. Finally, the paper proposes a clustering based framework to solve RAN Tracking Area (TA) planning problem using both mobile users data and base stations geographical locations aiming to reduce network signaling overhead. Live network dataset extracted from operational mobile operator used to assess results of different popular clustering techniques. Results showed potential reduction of 20.3% in TA signaling overhead compared to a baseline of current network configuration.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anil Bas, M. O. Topal, Çağdaş Duman, Imke van Heerden
{"title":"A Brief History of Deep Learning-Based Text Generation","authors":"Anil Bas, M. O. Topal, Çağdaş Duman, Imke van Heerden","doi":"10.1109/ICCA56443.2022.10039545","DOIUrl":"https://doi.org/10.1109/ICCA56443.2022.10039545","url":null,"abstract":"A dynamic domain in Artificial Intelligence research, Natural Language Generation centres on the automatic generation of realistic text. To help navigate this vast and swiftly developing body of work, the study provides a concise overview of noteworthy stages in the history of text generation. To this end, the paper describes deep learning models for a broad audience, focusing on traditional, convolutional, recurrent and generative adversarial networks, as well as transformer architecture.","PeriodicalId":153139,"journal":{"name":"2022 International Conference on Computer and Applications (ICCA)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115116736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}