{"title":"Progression towards an e-Management Centralized Blood Donation System in Saudi Arabia","authors":"Fawaz D. Alharbi","doi":"10.1109/AECT47998.2020.9194178","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194178","url":null,"abstract":"Current healthcare systems rely on blood donation to save lives. Voluntary blood donation is the main source of blood supply in many countries. However, blood donors face barriers to donating such as time constraints and the long times required to complete registration and donor health questionnaires. Thus, this paper analyses the blood donor cycle and proposes information technology solutions. Based on the analysis, a Central Blood Donation Management System (CBDMS) is proposed with interconnected systems. The proposed system is among the first e-management systems for blood donation management in Saudi Arabia. Major components of CBDMS are explained to show the various functions of the system. The implementation of CBDMS can reduce the time required for blood donation by decreasing the information collected from the donors. The system can also improve the efficiency of the blood donation management system by linking various systems and importing information from different sites. It can also reduce blood donation errors and reduce the number of deferral blood donors.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sharqa Hameed, Sakeena Javaid, Sheeraz Ahmed, N. Javaid
{"title":"Sharing Mechanism of Intelligent Vehicles Trust Points based on Blockchain for Vehicular Networks","authors":"Sharqa Hameed, Sakeena Javaid, Sheeraz Ahmed, N. Javaid","doi":"10.1109/AECT47998.2020.9194208","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194208","url":null,"abstract":"Nowadays, there exists strong need to enable the Intelligent Vehicle (IV) communication for applications such as safety messaging, traffic monitoring and many other internet access purposes. In this work, we have introduced an Intelligent Vehicle Trust Points (IVTPs) sharing mechanism between vehicle to vehicle, vehicle to infrastructure and vehicle to roadside units. Existing models have already embeded Blockchain (BC), which is valuable for many purposes like security in different data transmission circumstances. However, our proposed scheme uses this BC feature along with IVTPs to ensure the trustworthiness in the communication environment. Performance of our proposed system is evaluated on the basis of IVs’ processing time, which are totally based on IVTPs. Our proposed system is efficient as compared to existing one which handles less number of vehicles at intersection point where IVTPs are shared between moving vehicles in a scalable architecture.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"754 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salahuddin Shaikh, Liu Changan, Maaz Rasheed Malik
{"title":"Attribute Rule performance in Data Mining for Software Deformity Prophecy Datasets Models","authors":"Salahuddin Shaikh, Liu Changan, Maaz Rasheed Malik","doi":"10.1109/AECT47998.2020.9194187","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194187","url":null,"abstract":"In recently, all the developers, programmer and software engineers, they are working specially on software component and software testing to compete the software technology in the world. For this competition, they are using different kind of sources to analysis the software reliability and importance. Nowadays Data mining is one of source, which is used in software for overcome the problem of software fault which occur during the software test and its analysis. This kind of problem leads software deformity prophecy in software. In this research paper, we are also trying to overcome the software deformity prophecy problem with the help of our proposed solution called ONER rule attribute. We have used REPOSITORY datasets models, these datasets models are defected and non-defected datasets models. Our analysis class of interest is defected models. In our research, we have analyzed the efficiency of our proposed solution methods. The experiments results showed that using of ONER with discretize, have improved the efficiency of correctly classified instances in all. Using percentage split and training datasets with ONER discretize rule attribute have improved correctly classified in all datasets models. The analysis of positive accuracy f-measure is also increased in percentage split during the use of ONER with discretize but in some datasets models, the training data and cross validation is better with use of ONER rule attribute. The area under curve (ROC) in both scenarios using ONER rule attribute and discretize with ONER rule attribute is almost same or equal with each other.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125447294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arwa Alzammam, H. Binsalleeh, Basil AsSadhan, K. Kyriakopoulos, S. Lambotharan
{"title":"Comparative Analysis on Imbalanced Multi-class Classification for Malware Samples using CNN","authors":"Arwa Alzammam, H. Binsalleeh, Basil AsSadhan, K. Kyriakopoulos, S. Lambotharan","doi":"10.1109/AECT47998.2020.9194155","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194155","url":null,"abstract":"Malware is considered as one of the main actors in cyber attacks. The number of unique malware samples is constantly on the rise; however, the ratio of benign software still greatly outnumbers malware samples. In machine learning, such datasets are known as imbalanced, where the majority class label greatly dominates over others. In this paper, we present a comparative analysis and evaluation of some of the proposed techniques in the literature in order to address the problem of classifying imbalanced multi-class malware datasets. More specifically, we use Convolutional Neural Network (CNN) as a classification algorithm to study the effect of imbalanced datasets on deep learning approaches. These experiments are conducted on three publicly available imbalanced datasets. Our performance analysis demonstrates that methods such as cost sensitive learning, oversampling and cross validation have positive effects on the model classification performance, albeit in varying degrees. Meanwhile others like using pre-trained models require more special parameter settings. However, best practices may change in accordance with the problem domain.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130527726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. T. Kiyani, A. Lasebae, Kamran Ali, Masood Ur-Rehman
{"title":"Secure Online Banking With Biometrics","authors":"A. T. Kiyani, A. Lasebae, Kamran Ali, Masood Ur-Rehman","doi":"10.1109/AECT47998.2020.9194214","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194214","url":null,"abstract":"Online banking is a substantial part of daily routine of large enterprise businesses and individual users for making transactions. However, security in online banking is a major dilemma owing to the vulnerable authentication schemes. Online banking employs conventional methods of Username and Passwords for authenticating the user. However, these techniques only verify the passwords and not the end user who requests the services for which only legitimate person is privileged to use. Using these vulnerabilities of online banking, intruders tend to masquerade legitimate user for unauthorized access to the system. This paper presents three-factor authentication scheme, which includes username/password, familiar random images and fingerprint data of user in order to make user-authentication more secure. Subsequently, Match on Card technique is proposed to ensure the confidentiality and integrity of biometric data of user since the reference feature set of user once store in credit card would not be permitted to move out and matching is performed on the credit card itself. In addition, the concept of familiar random images is used in order to enhance the security, as humans are believed to have remarkable visual remembering capability in comparison to words. The results show that the incorporation of three-factor authentication in online banking application resists the intruder to illicitly use banking services of any authorized user. The proposed biometric online banking system tends to assist in lessening the cybercrime rate of online banking and tends to escalate the user confidence in using banking services online.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahwish Amjad, Hira Zahid, S. Zafar, Tariq Mahmood
{"title":"A Novel Deep Learning Framework for Intrusion Detection System","authors":"Mahwish Amjad, Hira Zahid, S. Zafar, Tariq Mahmood","doi":"10.1109/AECT47998.2020.9194224","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194224","url":null,"abstract":"Rapid increase of network devices have brought several complexities in today’s network data. Deep learning algorithms provides better solution for analyzing complex network data. Several deep learning algorithms have been proposed by researchers for identifying either known or unknown intrusions present in network traffic. But, in real time, incoming network traffic might encounter with known or unknown intrusions. Presence of unknown intrusions in network traffic arises a need to bring a framework that can identify both known and unknown network traffic intrusions. This paper is an attempt to bring a novel deep learning framework that can identify both known or unknown attacks with maximum 82% accuracy. Also, the particular category of known attack will be revealed via proposed framework. Proposed framework is a novel integration of two well known deep learning algorithms autoencoder and LSTM that brings an effective intrusion detection system. We believe that deployment of proposed framework in real time network will bring improvement in the security of future internet.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126609954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fatma Anwar, Omneya Attallah, Nagia M. Ghanem, M. Ismail
{"title":"Automatic Breast Cancer Classification from Histopathological Images","authors":"Fatma Anwar, Omneya Attallah, Nagia M. Ghanem, M. Ismail","doi":"10.1109/AECT47998.2020.9194194","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194194","url":null,"abstract":"Breast cancer (BC) is a common health problem of major significance, as it is the most widely kind of cancer among women which leads to morbidity and mortality. Pathological diagnosis is considered as the golden standard of BC detection. However, the investigation of histopathology images is a challenging task. Automatic diagnosis of BC could lower the death rate by constructing a computer aided diagnosis (CAD) system capable of accurately diagnosing BC and reducing the time consumed by pathologists during examinations. This paper presents a CAD system to classify BC to benign and malignant. The proposed CAD method consists of 4 stages; image pre-processing, feature extraction and fusion, feature reduction, and classification. The CAD is based on fusion features extracted with ResNet Deep Convolution Neural Network (DCNN) with features of wavelets packet decomposition (WPD) and histograms of oriented gradient (HOG). Next, the feature data were reduced by utilizing principle component analysis (PCA). Finally, the reduced features are used to train different individual classifiers. Results show that the highest accuracy of 97.1% is achieved. The results were compared with recent related CAD systems. The comparison showed that the proposed CAD system is capable of accurately classifying BC to benign and malignant compared to other work. Thus, it can be used to help medical experiments in investigation procedures.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Handono, Indarzah Masbatim Putra, Ikhsan Shobari, Ismet Isnaini, K. Kurnianto
{"title":"Smart Detection and Acquisition Design Of Ultrasonic Scanner For Inservice Inspection On Research Reactor","authors":"K. Handono, Indarzah Masbatim Putra, Ikhsan Shobari, Ismet Isnaini, K. Kurnianto","doi":"10.1109/AECT47998.2020.9194167","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194167","url":null,"abstract":"A risk analysis and smart detection of the ultrasonic scanner for inservice inspection on Research Reactor has been conducted. The hardware ultrasonic scanner has been installed and tested. This paper consists of the risk analysis design and the smart acquisition system. Risk assessment of tool installation and operation has been carried out as part of the system. The results indicate moderate and low risk, which means the tool can be operated. The results of the test in the reactor tank that the ultrasonic scanner system can work well and safely for inservice inspection.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Usama Arshad, Sakeena Javaid, Sheeraz Ahmed, Beenish Seemab, N. Javaid
{"title":"A Futuristic Blockchain based Vehicular Network Architecture and Trust Management System","authors":"Usama Arshad, Sakeena Javaid, Sheeraz Ahmed, Beenish Seemab, N. Javaid","doi":"10.1109/AECT47998.2020.9194160","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194160","url":null,"abstract":"In a complex network of smart vehicles, some issues arise related to security, privacy, selfishness of nodes and node failures. We have proposed an architecture of vehicular network in a smart city based on blockchain. Some scenarios and design principles are also provided. Contrary to prior architectures of vehicular networks, our proposed model provides robustness, scalability, adaptability, trust management as well as privacy and security. It eliminates the issue of selfish nodes and malicious nodes. Unlike other vehicular architectures, it also takes into account the passengers’ medical facilities and fault tolerance. In case of any failure of sensors or nodes, system will effectively tackle it. Both big data storage and fast computation are not possible on vehicles end. This can be handled by moving these processes to static nodes and data center. Malicious behaviour of nodes is handled using trust values and incentives mechanism in order to motivate nodes to work effectively while assigning penalty for selfish nodes.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drive-By Road Condition Assessment Using Internet of Things Technology","authors":"M. A. Raheem, M. El-Melegy","doi":"10.1109/aect47998.2020.9194190","DOIUrl":"https://doi.org/10.1109/aect47998.2020.9194190","url":null,"abstract":"In this paper, we present a fully automated road assessment methods using cellular based internet of things platforms. The vibration data recorded from accelerometer sensor attached to a moving car is transmitted over the internet via cellular network to the monitoring server. At the monitoring server side, the vibration signal is used to calculate the international roughness index as a measure of the road surface roughness and its values are visualized on the road map for different road segments. Also, the possibility of using smartphone with built in accelerometer is investigated and its performance is compared with other proposed platforms.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}