{"title":"A Review of Deep Learning-Based Detection Methods for Tuberculosis","authors":"Ding Zeyu, R. Yaakob, A. Azman","doi":"10.1109/ICOCO56118.2022.10031813","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031813","url":null,"abstract":"Tuberculosis (TB) causes exceptionally high mortality rates, and early identification of TB is the key to saving patients. Deep learning techniques have proven to be an essential tool to assist radiologists in detecting abnormalities and multiple diseases. This study categorizes and analyzes deep learning-based techniques for TB diagnosis. Available public datasets are presented, and each method’s performance is compared comprehensively for the use of future researchers. Finally, we explore the challenges of detecting TB using deep learning algorithms and the future research prospects in this field.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Anif A. A. Bakar, P. Ker, S. G. H. Tang, H. J. Lee, Biddatul Syirat Zainal
{"title":"Classification of Unhealthy Chicken based on Chromaticity of the Comb","authors":"Mohd Anif A. A. Bakar, P. Ker, S. G. H. Tang, H. J. Lee, Biddatul Syirat Zainal","doi":"10.1109/ICOCO56118.2022.10031812","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031812","url":null,"abstract":"Human observation and laboratory tests are the traditional method for identifying bacteria- or virus-infected chicken, but these methods may result in late detection. Major disease outbreaks may occur, leading to significant economic loss and threatening human health. Therefore, this paper reports on the utilization of a supervised machine learning algorithm to provide early detection of bacteria- or virus-infected chickens based on their comb’s colour feature. Current work utilizes a well-established, International Commission on Illumination (CIE) XYZ colour space to investigate the change in the colour of the infected and healthy chicken comb. A logistic regression model was developed and proposed to classify the chickens, and the performance of the model was revealed. The chromaticity analysis shows that the comb chromaticity of the infected chicken was changing from the red to green part, based on the x chromaticity value. The performance of the proposed model indicates that this algorithm can classify between infected and healthy chickens with 100% sensitivity and 83% specificity. This work has demonstrated a new feature that can serve as an indicator for detecting bacteriaor virus-infected chickens, and contributes to the development of modern technology in agriculture applications.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hydrocarbon Flow Metering Prediction using MLP and LSTM Neural Networks","authors":"Desmond Goh Kai Hong, S. B. Hisham, N. Yahya","doi":"10.1109/ICOCO56118.2022.10031800","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031800","url":null,"abstract":"Accuracy and integrity of metering data are required for commercial purposes and as a commitment between suppliers and customers. One of the important variables to monitor hydrocarbon metering is volumetric flow measurements, where measurement errors may significantly impact the operator. This project aims to develop a neural network-based algorithm to predict flow measurement patterns using onshore metering data. After pre-processing and statistical analysis, the metering data is used to train models using Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) networks. Both models were trained and tested with different combination of input variables and several hyperparametric settings. The best MLP model was trained using Pressure, Temperature and 15 Time-shifted Flow as input variables, yielding a Mean Absolute Percentage Error (MAPE) of 0.96%. Furthermore, two versions of LSTM models-Time-Series LSTM and Single-layer LSTM - are also trained and tested, giving satisfactory performance with Flow variable as the input. Time-Series LSTM model has a better performance with an MAPE of 0.47%.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123464038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nor Azimah Khalid, Nadhirah Mohammad Anuar, N. M. Noor
{"title":"An Adaptive Method For Selecting Cluster Head Using Analytical Hierarchy Process(Ahp)","authors":"Nor Azimah Khalid, Nadhirah Mohammad Anuar, N. M. Noor","doi":"10.1109/ICOCO56118.2022.10031954","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031954","url":null,"abstract":"Nowadays, Wireless Sensor Network had made a major contribution to surveillance, target tracking and healthcare. Due to the nature of its complex functions in sensing and monitoring the environment at a diverse area, energy efficiency is one of the primary objectives that need to be considered to prolong the network lifetime. Cluster based is one the most common use and suitable protocol in enhancing energy efficiency in WSN. However, an efficient cluster head (CH) selection mechanism is still needed to ensure that the most appropriate CH is selected. Selecting CH based on single criteria could lead to inappropriate decision. Thus, a holistic view of the CH considering multiple criteria is more promising. Four criteria were considered for the CH selection in our approach; number of neighbour nodes (NNN), residual energy (RE), initial energy (IE) and distance of nodes to base station (DTBS). In this paper, we demonstrate that the use of Analytic Hierarchy Process (AHP) helps in CH selection better and we managed to identify the distance as the important criteria in the selection of CH.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125285481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Ibrahim, R. Razali, Saiful Adli Ismail, Iman Hakimi Khairil Azhar, Fiza Abdul Rahim, Ahmad Muzafaraidil Ahmad Azilan
{"title":"A Review of Machine Learning Botnet Detection Techniques based on Network Traffic Log","authors":"Z. Ibrahim, R. Razali, Saiful Adli Ismail, Iman Hakimi Khairil Azhar, Fiza Abdul Rahim, Ahmad Muzafaraidil Ahmad Azilan","doi":"10.1109/ICOCO56118.2022.10031803","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031803","url":null,"abstract":"Cyber-attacks are a common issue in this modern era because of the introduction of high-speed networks and the use of new technologies like Internet of Things (IoT) devices, which fuel the rapid expansion of cyber-attack. One of the common cyber-attacks is botnet attacks. Hackers use botnet attacks to exploit newly discovered vulnerabilities in order to conduct intensive scraping, distributed denial of service (DDoS) attacks, and other large-scale cybercrime. With their adaptable and dynamic character, botnets work with a botmaster to plan their activities, modify their codes, and update the bots regularly to avoid detection. Researchers use numerous techniques to detect the botnet. However, botmasters nowadays have improved due to avoiding security in detection. As the communication can leave traces that allow researchers to detect the botnet’s existence, this paper will review 15 related works on botnet detection that utilize machine learning to predict the botnet communication with the command-and-control (C&C or C2) center based on the network traffic log. This paper summarizes the related works based on the dataset, environment, botnet type, features employed, and machine learning techniques.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128560544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamad Haidil Bin Idris, Mohamad Johan Ahmad Khiri, N. Jali, N. Annuar
{"title":"Internet Of Things Smart Food Bank System","authors":"Mohamad Haidil Bin Idris, Mohamad Johan Ahmad Khiri, N. Jali, N. Annuar","doi":"10.1109/ICOCO56118.2022.10031964","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031964","url":null,"abstract":"A food bank is a charitable initiative that aims to distribute donated food to those in need. It is based on the concept of trust, where only those in need will take the food that they need. However, there are instances where those that are not supposed to be the recipient take the food that is in the food bank. This is because some of the food banks have no dedicated personnel to monitor the transaction. Another limitation of the current food bank implementation is that beneficiaries of the foodbank cannot request necessary food items that they really need; hence their choices are limited to what is being donated. Therefore, we demonstrate the feasibility of developing an automated prototype based on the Internet of Things and a mobile app to ensure the person taking the food is verified, and recipients of the system can request food items they need from the food bank.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120952518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection of Data in Edge and Cloud Computing","authors":"M. Ati, Reem Al Bostami","doi":"10.1109/ICOCO56118.2022.10031744","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031744","url":null,"abstract":"The massive growth of IoT and the rise of inventions in this field have led people to depend heavily on those technologies. This change has directed users to place their data, whether it is confidential or not, in specific storage known as the cloud. Cloud Computing enables users to save their data in the cloud. When IoT devices started generating large amounts of data, known as Big Data, the cloud couldn’t handle them due to its limited bandwidth and resources, so storing the data was moved to the endpoints of the network replacing cloud computing with edge computing. Edge computing allows users to store the data at the edge of the network. This is a promising technology now as it provides the best features of real-time and parallel processing and content perception. However, just like cloud computing the security of edge computing has risen a lot of concerns. Cloud security and Edge security have the most crucial concepts that gather data to process. Several security frameworks for cloud and edge computing have been discussed and invented. In our paper, we discuss the different challenges and solutions to said frameworks. We also compare the old and new frameworks of security according to their security encryption methods, confidentiality handling of data, and splitting of data through the packets.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of IoT and Blockchain in Smart Agriculture: Architectures and Challenges","authors":"Mohamed Rawidean Mohd Kassim","doi":"10.1109/ICOCO56118.2022.10031697","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031697","url":null,"abstract":"Internet of Things (IoT) technologies have created a big revolution in the ICT industries. It’s has penetrated in almost all sectors including healthcare, manufacturing, education, agriculture, etc. However, there are many challenges facing the IoT implementations due to its centralized server/client model. Many of the technologies in IoT is based on centralized model which introduce a new set of technical limitations to manage them. These includes traffic congestion when the server couldn’t support the large number of request from clients and when the server is down, client request cannot be met. Shifting IoT systems into the decentralized systems is one of the potential solution and Blockchain is the best option for decentralization. Blockchain technology decentralizes computation and management processes and can solve many IoT issues including security. A generalized IoT-based Blockchain architecture for Smart Agriculture application is proposed. Furthermore, the opportunities and challenges based on this architecture is discussed in detail.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127481620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noor Latiffah Adam, Khairunnisa Mohamed Rashdan, H. M. Hanum, N. Kamal
{"title":"Child Growth Indicator Web App","authors":"Noor Latiffah Adam, Khairunnisa Mohamed Rashdan, H. M. Hanum, N. Kamal","doi":"10.1109/ICOCO56118.2022.10032039","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10032039","url":null,"abstract":"Monitoring a child’s growth is important when the nerve tissue starts to grow and mature, as it is the most vulnerable stage. If the delay in childhood development was not identified early enough for early intervention and the lack of parental knowledge, it will affect the child’s development. In this research, we want to inspect the child’s growth using the rule-based technique. Next, we want to design and develop a web application to identify the child’s growth indicator based on the standard growth chart. The agile software development life cycle has been chosen as the framework to guide the processes involved in application development. The proposed app should be able to provide the growth indicator of the child using their z-scores based on the standard growth chart by the World Health Organization (WHO).","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy And Congestion Awareness Traffic Scheduling In Hybrid Software-Defined Network","authors":"C. Lim, S. C. Tan, N. Q. Baderulhisham","doi":"10.1109/ICOCO56118.2022.10032016","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10032016","url":null,"abstract":"The term “Hybrid Software-Defined Network” (HSDN) refers to a network that includes both traditional networking devices and Software Defined Networking (SDN) devices. The segregation of the control and data planes in SDN tools that enables centralized control of SDN traffic. Traffic scheduling in H-SDN can be handled through the centralized controller to alleviate traffic congestion. Traffic scheduling that includes flow splitting provides flexibility for traffic flow in order to reduce overload on the network. The network’s energy efficiency is critical for cost and energy savings. As a result, the energy consumption of a traffic flow should be considered during traffic scheduling. As a result, the goals of this paper are twofold: First, identify the research challenges in hybrid SDN energy and congestion traffic scheduling. Second, we will discuss future research directions for energy and congested-aware traffic scheduling in Hybrid SDN.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134621116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}