{"title":"Genetic Testing of Huntington’s Disease by Facial Examination of a Mankind using AI Programs","authors":"S. Feroze, S. Nasim","doi":"10.1109/ICONICS56716.2022.10100480","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100480","url":null,"abstract":"This Genetic disorder is considered as one of the major challenges faced by Medical Sciences as it is inherited by humans from one generation to another. With an increasing number of natives of the World at a higher rate, it causes a major impact on information society socially and economically during their lifetime. The citizens of Pakistan and Indian sub continents are facing genomic disease in probably high frequency as compared to other continents. Occurrence of congenital diseases in Pakistan results in higher percentages of unusual genetic diseases especially in children. After analyzing all the current scenarios, some goals and objectives were settled in order to facilitate and give general awareness to people. The objectives of systematic review are evaluation of diagnostic accuracy of AI for the identification of genome contributions to the pathogenesis of Huntington’s disease through facial probe AI to accurately identify genetic disorders. The narrative review is performed in Ned University. In this proceeding sequence, 30 cases of both Normal and Genetically affected Patients were documented in which some certain sorts of tests were performed by using facial recognition. For this FR test, at first a combo list of information of all six emotions of a human being i.e. (Happy, Sorrow, Amazed, Fear, Anger, Revulsion) is gathered in the form of mutated images, which was then later be arranged into a pseudo-random order. Now with the help of Vision Technology we have applied some CV Techniques for the extraction of large pattern sets of features. Lastly the purpose of ML and DL techniques is to receive and compare those morphed image data from the Facial Database in order to identify each of six different emotions of HD & Normal Person. This whole procedure is conducted in real time. Hence in this way we may recognize the HD genetic disorder among the people in an efficient way. The detailed procedure is explained in the Methodology section of this narrative review. Implementation of this process will bring an amazing accountability in suppressing Genetic testing HD in clinical practice.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121544777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nadeem Sarfraz, Faisal Rehman, Hana Sharif, Salman Akram, Bilal Hassan Mughal, A. Ashfaq
{"title":"Efficient Energy Storage Systems Management in Power Plants with Artificial Intelligence and Price Control","authors":"Nadeem Sarfraz, Faisal Rehman, Hana Sharif, Salman Akram, Bilal Hassan Mughal, A. Ashfaq","doi":"10.1109/ICONICS56716.2022.10100617","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100617","url":null,"abstract":"The storage systems of energy can contribute a significant part in integration of the renewable energy resources in electrical systems. It is quite important to research methods and techniques that make power projects more profitable. In this paper managing techniques for energy efficiency are discussed along with the comprehensive study of linear programming and swarm optimization techniques. These techniques are also compared with various expert systems and current state-of-the-art E-Broker algorithms and a novel and efficient energy management technique has been purposed along with various results. Finally, this paper presents various analysis for sizing and management to enhancement profit factor of power plants.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114365702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Rehman, Emanuel Figetakis, Yahuza Bello, C. Obimbo
{"title":"Experimentation for Decentralized Resource-based Multi-pool Mining in Ethereum Blockchain","authors":"Muhammad Rehman, Emanuel Figetakis, Yahuza Bello, C. Obimbo","doi":"10.1109/ICONICS56716.2022.10100550","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100550","url":null,"abstract":"The potential of having multiple distributed applications across multiple domains such as healthcare, finance, supply chain management and many more have made blockchain very popular among both academia and industries. Blockchain provides the much-needed mechanism for decentralization of systems, where the need of trusted central authority is eliminated. Proof of Work (PoW) is heavily adopted in both Bitcoin and Ethereum based blockchain, where many miners (or mining pools) compete to mine each block generated by solving a cryptographic puzzle that uses all of the previous information of the blockchain, before tying the block to the blockchain with the nonce. Recently there is a shift in having two or more mining pools for the PoW consensus in Ethereum-based blockchain. Majority of the studies conducted for multiple mining pool techniques in the literature are verified with simulation experiments. Therefore, in this paper, we implement a testbed for Ethereum blockchain with multiple nodes that simulate two mining pools using PoW consensus in a centralized and decentralized fashion. Two miner-nodes were deployed with different computational power (in term of CPU threads) and transactions executed. We evaluate the contribution of each miner node in the blockchain system and the assignment of transactions with respect to the computational resources available.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Zunair Ahmed Khan, Muhammad Mubashir Khan, J. Arshad
{"title":"Anomaly Detection and Enterprise Security using User and Entity Behavior Analytics (UEBA)","authors":"Muhammad Zunair Ahmed Khan, Muhammad Mubashir Khan, J. Arshad","doi":"10.1109/ICONICS56716.2022.10100596","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100596","url":null,"abstract":"Digital frauds are made possible by a lack of transparency and other security flaws in a system. Consequently, it has grown to be the most pervasive problem in the world. When these frauds emerge from within businesses, they are referred to as insider threats and may lead to severe consequences. There have been various frameworks proposed to lessen this problem, however, transparency still remains a challenge. Conventionally, storing data in chronological order to prevent data manipulation is one technique to ensure traceability and security. In this paper, we present a framework based on User Entity and Behavioral Analysis (UEBA) approach to study user profiles over time and classify them as normal or aberrant. The proposed framework utilises additional information including IP addresses, location data, and the users’ organizations etc. We focus on applying data science and analytical methods to create data visualizations for analysis and anomaly identification.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"91 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Learners’ Sentiments on MOOC Forums using Natural Language Processing Techniques","authors":"Hania Marfani, Saman Hina, Huma Tabassum","doi":"10.1109/ICONICS56716.2022.10100401","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100401","url":null,"abstract":"MOOCs have gained a lot of popularity for past few years. Especially after the outbreak of Coronavirus, everyone is trying to gain some knowledge and skill while being at the comfort of home and making themselves safe. Due to sudden increase in the number of participants on MOOCs there is a need for an automated system to be able to assess the reviews and feedbacks given by the learners and find the sentiments behind their statements. This analysis will help trainers identify their shortcoming and make their courses even better. For sentiments analysis, several approaches may be used. This research aims to provide a system which will perform sentiments analysis on the novel dataset and show the comparison of lexicon-based vs transformer-based sentiment analysis models. For lexicon based, VADER was chosen and for transformer-based, state-of-the-art BERT was chosen. BERT was found to be exceptionally good with an accuracy of 84% and F1-score of 0.64.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129516786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Fahad Safdar, Hana Sharif, Faisal Rehman, Zahid Bilal, Saqlain Ahmad, Hadia Maqsood
{"title":"A Review of Recent Advances in Deep Learning for Object Detection","authors":"Muhammad Fahad Safdar, Hana Sharif, Faisal Rehman, Zahid Bilal, Saqlain Ahmad, Hadia Maqsood","doi":"10.1109/ICONICS56716.2022.10100486","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100486","url":null,"abstract":"Computer Vision has given a way for computer systems to see by way of deciphering the surrounding objects, which has been considered a crucial problem over the years. There are quite a number of techniques devised for object detection and deep learning, but most of the research has been focused on deep learning in recent years. Visual object detection covers numerous recognition pattern tasks like image classification. This article aims to review a visual analytics approach for better understanding, identifying, and cleansing object detection frameworks and the effects of some factors such as sampling strategies, feature learning, detector architectures, proposal generation, etc., on visual object detection with special reference to detection components, learning strategies, and their applications along with benchmarks.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Babar, Abeer Javed Syed, Shaarif Asim, Abdul Rafay Khan, M. A. Hai
{"title":"Development of an Algorithm based on the Optimization of space, time and resources of the warehouse using Genetic Algorithms","authors":"M. Babar, Abeer Javed Syed, Shaarif Asim, Abdul Rafay Khan, M. A. Hai","doi":"10.1109/ICONICS56716.2022.10100591","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100591","url":null,"abstract":"The warehouse is often the starting point in a supply chain. Ineffectiveness at a warehouse can cascade into the rest of the supply chain, hurting the customers' experience with the business in the long run. Warehouse Optimization System (WOS) play a crucial role in resolving a significant market issue by optimizing warehouse space and logistical procedures, documenting merchant supply and demand patterns, and making it simpler to handle goods that are about to expire, are out of stock, are broken, or have been abandoned by customers. This issue relates to space and storage in the warehouse, due to the fact that business intelligence, which may include algorithms for anticipating sales and managing warehouse capacity, may be connected to warehouse optimization systems. A case study is described in research of a warehouse optimization system, followed by a demonstration of the problem of gaps within the racks of warehouses. The algorithm solves the problem of fitting boxes with varying dimensions into racks. By using automation and careful design, warehouse optimization increases the effectiveness of how time, space, and resources are used in a warehouse, which enhances customer satisfaction.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133644229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Undergraduate Students Performance Admitted Through Two Different Admission Criterion","authors":"Syed Rafiq Ul Hoda, R. Asif","doi":"10.1109/ICONICS56716.2022.10100381","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100381","url":null,"abstract":"Data mining is the most common way of utilizing factual strategies to uncover examples and bits of knowledge inside huge datasets. Commonly, the datasets utilized for information mining are huge to the point that would require days, weeks, or months for people to peruse or dissect. Subsequently, information mining frequently includes utilizing programs, Artificial Intelligence (AI), or man-made brainpower to accomplish the work. In any case, human examiners or data set directors frequently be involved to clean and process the information, so that datasets are ready for transformation and examination. With represented information, your information stewards should be proficient in these techniques to prepare machines to uncover these experiences and supervise their outcomes to confirm they are right. This article is a fast aide and introduction to data mining. In this paper, a brief comparison of the performance of undergraduate students has been analyzed, who got admission through two different admission criterions in a public sector engineering university. This research paper aims to identify the consequence of different admission policies on the future performance of engineering students.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sani E Zehra, Areeb Shakil, Maryam Fatima, M. Munawwar, Nida Khalil
{"title":"Outlook 360 | A Practical Approach of Recruiting Talent Through Artificial Intelligence.","authors":"Sani E Zehra, Areeb Shakil, Maryam Fatima, M. Munawwar, Nida Khalil","doi":"10.1109/ICONICS56716.2022.10100460","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100460","url":null,"abstract":"Intellectual capital acquired the Position of an asset in the fourth industrial revolution. An asset that would help companies to reach their targeted tier in the 'talent war' and help them maintain their bottom lines for significant setbacks. With the unforeseen consequences of Covid-19, this asset has become one benefit that needs to be retained. It implies that staying aware of the rapidly developing techniques for recruitment and implementing talented or skilled individual is one factor that assists companies in winning the talent war: the conversation objective, a potential employee to invest significant time and energy in a digitalized world. A better-performing e-recruitment application can bring employees to apply for the job. Thus, this paper sheds light on what upgrades and progressions are necessary for AI-based e-recruitment systems to draw and attain skilled individuals and help organizations achieve their target tier out in the corporate world.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126799373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Ali, Sehrish Munawar Cheema, N. Ayub, Ammerha Naz, Zaheer Aslam
{"title":"Blockchain-based Privacy Preservation Framework for IoT-Based Information Systems","authors":"Muhammad Ali, Sehrish Munawar Cheema, N. Ayub, Ammerha Naz, Zaheer Aslam","doi":"10.1109/ICONICS56716.2022.10100449","DOIUrl":"https://doi.org/10.1109/ICONICS56716.2022.10100449","url":null,"abstract":"IoT-based systems have become an important part of our lives. We interact with these types of systems many times in a single day like smart watches, smart home systems, smart vehicle systems, and more. Mostly they perform their functionality by utilizing our data. This data is stored on a central repository mostly a cloud-based repository. This central storage mechanism has many critical data privacy issues with it. To resolve these privacy-related issues, a blockchain-based framework is proposed that stores data on distributed ledger instead of any central location. The proposed framework categorizes participants into trusted participants that are mostly data owners and the other is untrusted. It is based on two separate blockchain networks. One is the main chain that is utilized for the transactions related to data storage and the other is a side chain that is utilized for the transaction related to access policy. In this way, transactions take place on the network without any miscellaneous data or privacy threats.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133536418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}