Aminah Albuainain, Jana Alansari, Samiyah Alrashidi, Wasmiyah Alqahtani, Jana Alshaya, Naya Nagy
{"title":"Experimental Implementation of Shor's Quantum Algorithm to Break RSA","authors":"Aminah Albuainain, Jana Alansari, Samiyah Alrashidi, Wasmiyah Alqahtani, Jana Alshaya, Naya Nagy","doi":"10.1109/CICN56167.2022.10008287","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008287","url":null,"abstract":"Nowadays, quantum computing is an important topic since it allows computations to be completed in a small amount of the time. The goal of using quantum computers (QC) is to solve an increasing number of problems that were previously intractable to address with traditional computing. The classical approaches work with bits, which are made up of 0s and 1s, whereas QC uses qubits. Classical computing is limited by storage capacity and speed of calculations, even when parallel computation is conducted on it. Compared to traditional methods, quantum parallelism allows the storage to be reduced exponentially with the potential of a shorter amount of time. Besides, Peter Shor's algorithm can solve the factorization problem used in RSA in polynomial time, whereas in a classical computer, factoring any big integer is intractable. The purpose of this research is to explore and implement quantum computing schemes and how Shor's algorithm can break RSA algorithms.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127182585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. R. Sarkar, Amitabha Chakrabarty, Mohammad Zahidur Rahman
{"title":"Low-End Hand Held Communication Devices in a Post-Disaster Scenario","authors":"R. R. Sarkar, Amitabha Chakrabarty, Mohammad Zahidur Rahman","doi":"10.1109/CICN56167.2022.10008328","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008328","url":null,"abstract":"Natural disasters are beyond human control. These disasters not only result in the loss of life but also in excruciating pain for survivors. One of these is damage to the communication system. In a post-disaster scenario, an alternate communication system is required to expedite rescue, relief, or other required operations. This paper presents a communication system using low-end hand-held communication devices carried by victims. This proposed system collects messages from victims, stores them, and processes them so victims can access the necessary emergency services. This Ad Hoc network disseminates data using the UDP protocol. ns-3 is used to simulate this scenario. This simulation considers throughput, goodput, and PDR as network evaluation parameters.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Threshold Effect of Dual-tone Frequency Estimation Based on Method of Interval Errors","authors":"En Yuan, Peng Liu, Bing Xu, Wenyu Zhang, Yongfen Wu, Yanqin Tang","doi":"10.1109/CICN56167.2022.10008251","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008251","url":null,"abstract":"Dual-tone signals are widely used in ranging. Dual-tone signal frequency estimation is the primary problem to be solved in its application. There is a threshold effect on the maximum likelihood estimator (MLE) for frequency estimation of dual-tone signals, and the thresholds of MUSIC and the maximum expectation (EM) algorithm are both close to the MLE. The threshold for predicting the threshold effect is of great significance to the practical application of the algorithm. In this paper, the approximate mean square error (MSE) of the MLE for dual-tone frequency estimation is derived using the method of interval errors. The simulation results show that the approximate MSE derived in this paper can well analyze and predict the threshold of MUSIC and the ME algorithm.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121130895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Syed, Abdulrahman Javaid, Asaad A. Alduais, M. H. Shullar, U. Baroudi, Mustafa Alnasser
{"title":"Enhancing Monocular Depth Estimation via Image Pre-processing Techniques","authors":"M. Syed, Abdulrahman Javaid, Asaad A. Alduais, M. H. Shullar, U. Baroudi, Mustafa Alnasser","doi":"10.1109/CICN56167.2022.10008288","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008288","url":null,"abstract":"Robots and drones are getting popular in many applications nowadays. Autonomous operations of drones and robots are highly desirable to minimize human interventions and enhance operation efficiency. However, there are several challenges that need to be overcome before robots and drones can be automated with minimum hardware requirements. Currently, robotics industry employs costly sensors such as Lidar to estimate distance between a vehicle and objects. Recent advancement in Artificial Intelligence (AI) encouraged researcher to investigate techniques to estimate the distance between vehicle and objects using monocular camera and AI. However, distance (depth) estimation using monocular camera still suffers from low accuracy rate in depth estimation. This paper aims to improve the depth estimation values through applying several image pre-processing techniques such as Nonuniform Illumination Removal, Local Adaptive Thresholding, Histogram Equalization, Adaptive Histogram Equalization, White Balance, and Homo- morphic filtering techniques.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124434712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load Frequency Control of Interconnected Power System Using Particle Swarm Optimization Based Disturbance Observer-Enhanced PI Controller","authors":"Edgar T. Zapanta, R. Santiago","doi":"10.1109/CICN56167.2022.10008353","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008353","url":null,"abstract":"Load frequency control is a vital control problem in power system operation and control. The primary purpose of load frequency control is to keep power system frequency at a nominal value and control net power interchange between power system tie-lines at predetermined limits during load variations or disturbances. One common proposed control method for load frequency control is the linear quadratic regulator (LQR) feedback controller. However, all the state variables may not always be available and measurable, limiting the application of the LQR controller. Therefore, A disturbance observer-based controller is proposed to estimate the state variables using the available measurements. The observer-controller gains are optimized by particle swarm optimization. The proposed controller has been validated in a well-known and widely used power system test case, Kundur's two-area 4-machine 11-bus power system and 10-machine IEEE 39-bus power system implemented in Matlab® and Simulink®, under different faulted conditions, and load disturbances. Furthermore, simulation results produced faster frequency control loop stabilization with minimal frequency nadir, which proved the effectiveness of the proposed controller in an interconnected power system.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122542535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ghadah Alhabib, Ghazanfar Latif, J. Alghazo, G. B. Brahim
{"title":"Seismic Structures Classification Using Novel Features from Seismic Images","authors":"Ghadah Alhabib, Ghazanfar Latif, J. Alghazo, G. B. Brahim","doi":"10.1109/CICN56167.2022.10008257","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008257","url":null,"abstract":"Seismic facies can be used as novel features to classify different classes of seismic structures. Classification of seismic structure is beneficial for mineralogy, grain size approximation, the permeability of deposition units, and the identification of areas of interest. To extract features of seismic images, the following extraction methods were used: Discrete Wavelet Transform Features, Discrete Cosine Transform Features, Discrete Fourier Transform Features, and Gabor Features. The classification methods being considered are Support Vector Machine (SVM), Random Forest (RF), Fast Decision Trees (FDT), and Naïve Bayes (NB). The proposed study uses the LANDMASS database, composed of two datasets, LANDMASS-1, with 17,667 images, and LANDMASS-2, with 4,000 images. The datasets contain seismic images of four different classes of seismic structures; Chaotic, Fault, Horizon, and Salt Dome. The outcome of this study proves that the combination of Forest Tree classification method and the Discrete Cosine Transform Features extraction method achieved the highest accuracy, which was around 94.17% - higher than that achieved considering similar methods reported in the extant literature.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131577989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dawood Behbehani, M. Rajarajan, N. Komninos, Khalid Al–Begain
{"title":"Detecting Open Banking API Security Threats Using Bayesian Attack Graphs","authors":"Dawood Behbehani, M. Rajarajan, N. Komninos, Khalid Al–Begain","doi":"10.1109/CICN56167.2022.10008365","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008365","url":null,"abstract":"Particularly amid Covid-19, enterprises' digital transformation has rapidly accelerated, making cybersecurity an even bigger challenge. Financial institutions adopt FinTech technologies to advance their service and achieve an enhanced customer experience that creates a competitive edge in the market. FinTech products utilise open banking API services to allow communication between a financial institution and a FinTech provider. However, such an integration introduces significant security concerns. Therefore, financial firms must ensure that a robust API service to protect the bank's infrastructure and its customers' information. To address this concern, we propose a Framework for Open Banking API security that utilises STRIDE model to identify security threats in FinTech integration via Open Banking API and Bayesian Attack Graphs to automate predictions of the most exploitable attack paths.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132081781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manisha Aluri, Divya sree Panchumarthi, Bhargav Boddupalli, M. Enduri, Sumana G Sree, Satish Anamalamudi
{"title":"An Empirical Study on Fake News Prediction with Machine Learning Methods","authors":"Manisha Aluri, Divya sree Panchumarthi, Bhargav Boddupalli, M. Enduri, Sumana G Sree, Satish Anamalamudi","doi":"10.1109/CICN56167.2022.10008333","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008333","url":null,"abstract":"Due to advancement in technology and distributed networking, there is huge information available on the internet. Due to this, it is possible that some users may try to post fake news through some platforms to get the financial credibility. A common user finds it difficult to differentiate the fake news in comparison with the authentic news. Due to this, a fake news can be main agenda against a particular individual, society, organization or even related to political party. To date, lot of research has been done to detect the fake news on the internet. But, most of the solutions are proposed by comparing with very few performance metrics along with limited data sets. In this work, we propose to use Decision tree, SVM, LSTM, Naive Bayes techniques to analyse and observe the behavior on different datasets. Furthermore, we compare and demonstrate the best approach through experimental analysis.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121646691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text Mining on Hospital Stay Durations and Management of Sickle Cell Disease Patients","authors":"Mohammed Gollapalli, Latifa Alabdullatif, Farah Alsuwayeh, Moodhi Aljouali, Alhanoof Alhunief, Zaina Batook","doi":"10.1109/CICN56167.2022.10008265","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008265","url":null,"abstract":"Sickle cell disease (SCD) is a genetic blood disorder characterized by clumping of red blood cells, preventing blood and oxygen from reaching all parts of the body. SCD disease is very common in Sub-Saharan Africa, the Mediterranean basin, and the eastern regions of Saudi Arabia due to high consanguineous marriage practices. Patients are frequently admitted due to the prevalence of multiple organ damage among SCD patients as a result of repeated vascular occlusion, resulting in a large amount of medical notes recorded by doctors and nurses during each clinical trial. In this study, 12 years of SCD patient de-identified data (2018–2020) were obtained officially from the hospital and experimented with in relation to SCD patient medical notes. We used a text mining framework to analyze and predict the length of stay (LoS) of SCD patients using three machine learning (ML) models: XGBoost, Decision Tree, and KNN. The most frequently occurring words were extracted from 62,847 SCD medical screening records using text mining. Furthermore, feature models were created to investigate the effect of increasing or decreasing the number of terms on model performance. The XGBoost algorithm produced the best results, with 94.3% accuracy, while the other algorithms produced results of 93.5% for Decision Tree and 90.7% for KNN. The findings suggest that predicting the length of stay of SCD patients is highly feasible, allowing for better utilization of medical personnel and resources.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Image Classification on NISQ Devices","authors":"Shuroog Al-Ogbi, Abdulrahman Ashour, Muhamad Felemban","doi":"10.1109/CICN56167.2022.10008259","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008259","url":null,"abstract":"Quantum computing is an emerging computing field that is expected to make a huge impact on several scopes of science and technology. In this paper, we investigate the role of quantum computing in image classification, as an important branch of machine learning with widely used applications in healthcare, military, and IR4.0. In particular, we systemically compare the performance of two well-known classical image classification systems, i.e., Support Vector Machine (SVM) and Convolutions Neural Network (CNN), with equivalent quantum image classification algorithms, i.e., Quantum Support Vector Machine (Q-SVM) and Quantum Convolutional Neural Network (Q-CNN). Both quantum and classical algorithms are implemented on available Noisy-Intermediate Scale Quantum (NISQ) devices using MNIST dataset. Performance of models were compared regarding accuracy and training time. The results show that classical algorithms outperform the quantum algorithms for the given tasks. However, we observe that large-scale fault-tolerant quantum computing can effectively perform image classification tasks in the future.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125870489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}