{"title":"Deep Learning Approach for Credit Card Fraud Detection","authors":"Aya Abd El Naby, Ezz El-Din Hemdan, A. El-Sayed","doi":"10.1109/ICEEM52022.2021.9480639","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480639","url":null,"abstract":"As technology evolves rapidly, the world is using credit cards instead of cash in its everyday lives, opening up a new way for fraudulent people to abuse them. Credit card fraud losses reached approximately $28.65 billion in 2019, according to Nilsson’s report, and global card fraud is expected to reach around $32.96 billion by 2023. Providers should therefore develop an efficient model to detect and prevent fraud early. In this paper, we used deep learning techniques as an effective way to detect fraudsters in credit card transactions. Therefore, we present a model for predicting legitimate transactions or fraud on Kaggle's credit card dataset. The proposed model is OSCNN (Over Sampling with Convolution Neural Network) which is based on over-sampling preprocessing and CNN (convolution neural network). The MLP (Multi-layer perceptron) was also applied to the dataset. Comparing the MLP-OSCNN results, they proved that the proposed model achieved better results with 98% accuracy.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125427642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting of the American Digital Economy Using ARIMA Model","authors":"A. N. K. Alfarra, Ahmed M. Hagag","doi":"10.1109/ICEEM52022.2021.9480641","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480641","url":null,"abstract":"This paper forecasts the digital economy trends during a COVID-19 pandemic in the world. Considered the USA one of the world's largest economies and has recently been shifting almost completely to digital economies. Therefore, this paper used the auto-regressive integrated moving average (ARIMA) model and the gross domestic product (GDP) for the USA over the period 1960-2019. As we arrive at the peak of the COVID-19 pandemic, one of the most squeezing questions confronting us is: what is the likely effect of the ongoing emergency on the digital economy development rate? The results have been shown first that the GDP growth for both years 2020 and 2021 is approximately 6% for the USA. Second, we conclude that the COVID-19 pandemic cannot influence the countries that depend on technology and the digital economy. Thus, technology is playing a very significant role in our daily life and nations’ economies.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Doaa Abo Hussien, Nirmeen A. El-Bahnasawy, A. El-Sisi, A. El-Sayed
{"title":"Mobility Swapping Optimization with Location-Aware Fog Positioning Algorithm (LAFPA)","authors":"Doaa Abo Hussien, Nirmeen A. El-Bahnasawy, A. El-Sisi, A. El-Sayed","doi":"10.1109/ICEEM52022.2021.9480651","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480651","url":null,"abstract":"Developing technologies such as the Internet of Things (IoT) is part of the elegant health care world that needs cognizant of latency computation for requests processing in authentic time. IoT system data created are typically handled via a cloud infrastructure due to on-call applications and the ability to scale the computing in the cloud model. However, processing IoT applications on a cloud-only basis is not an efficient suggestion for certain IoT applications, specifically health care appliances. Fog computing exists amid cloud and IoT appliances to fix this trouble. These fog systems are close to the users and are capable of data computing, flexible communication, and local storage rather than cloud storage. Fog provides faster response and higher quality services. Fog handling can therefore be deemed the ablest option to enable elegant health care IoT to enhance efficient and safe services to many IoT smart health care users. Mobility one of the crucial arguments in running IoT elegant health care applications in the fog computing world. Several studies have recently emerged to address device mobility in diversity from cutting-edge research areas, including fog computing and cloudlets. This paper proposes a comprehensive assessment from the literature on fog computing technologies in the arena of IoT healthcare techniques and mobility crucial argues. Besides a Location-Aware Fog Positioning Algorithm (LAFPA) that maintains the connection between the mobile end-user and the ideal fog node. It provides latency by 40% to 50% below the other algorithms of distribution suggested fog nodes, faster application response resources, and enhances system performance in real-time.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"36 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120814135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Of Grid Clustering Based TEEN Protocol for Cognitive Radio Wireless Sensor Networks","authors":"Yasmeen Zaied, W. Saad, M. Shokair","doi":"10.1109/ICEEM52022.2021.9480632","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480632","url":null,"abstract":"With the increasing in wireless communication applications, the Cognitive Radio (CR) ability enhances the efficiency of WSN for wireless transmission. In this paper, the purpose is an energy-efficient routing protocol for Cognitive Radio Wireless Sensor Network (CRWSN). It is based on the Threshold sensitive Energy Efficient sensor Network (TEEN) routing protocol. This paper also aims at the Grid Clustering-based TEEN protocol (GCTEEN) to enhancement the network energy consumption and the network lifetime. MATLAB will be beneficial for appreciating the output of the proposed method. The Simulation findings offered and discussed that GCTEEN has a longer network lifetime, high energy-efficient, increases in throughput, and reduces the delay compared to the TEEN protocol.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130811956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Yossry, Mamdouh El-Sayed, A. Yahia, Mostafa A. El-Aasser, Nasr Gad
{"title":"Hybrid-Shape Dielectric Resonator Antennas for Multiband Applications","authors":"A. Yossry, Mamdouh El-Sayed, A. Yahia, Mostafa A. El-Aasser, Nasr Gad","doi":"10.1109/ICEEM52022.2021.9480387","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480387","url":null,"abstract":"A design of multiband hybrid-shape dielectric resonator antenna (DRA) is presented. In this design the dielectric resonator material (DR) is fed by 50Ω rectangular microstrip line arranged on top of a substrate. The antenna uses the defected ground structure (DGS) technique. Results are obtained using electromagnetic simulator to study the impedance bandwidth, radiation pattern, return loss and antenna gain. This proposed antenna is simulated obtaining four bands (4.04-8.016), (9.7-10.6), (11.48-12.48) and (14.16-15.16) GHz for S11 ≤ -10 dB, with resonated frequencies (4.6, 7.4, 10.2, 12.2, and 14.48) GHz and provides impedance bandwidth of (55.6%, 8.6%, 8.1%, and 6.9%) which can be employed in multiband applications, like WLAN, sub-6 GHz, X-band, and Ku-band.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aida A. Nasr, Nirmeen A. El-Bahnasawy, A. El-Sayed
{"title":"Straight-Line: A new global path planning algorithm for Mobile Robot","authors":"Aida A. Nasr, Nirmeen A. El-Bahnasawy, A. El-Sayed","doi":"10.1109/ICEEM52022.2021.9480376","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480376","url":null,"abstract":"Today most organizations use mobile robots for many purposes and to perform difficult and repetitive tasks. Robots are used to transport goods from one place to another within factories and warehouses. It is also used to provide different services in government and private institutions, as it can interact with people and help them to obtain different services with high quality and very quickly without any trouble. For the robot performs its functions better, it needs a path planning algorithm to avoid obstacles and works faster. Therefore, we develop a new algorithm called straight line algorithm. The new algorithm can get the optimal path with shortest length in low running time. The new algorithm searches for the optimal solution in the critical region firstly. This way capable of finding the shortest path faster. We evaluate straight-line algorithm with Genetic algorithm GA. We find that the new algorithm outperforms better than the GA in terms, distance, speed, and running time.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133713810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heba Hassan, E. E. Hemdan, W. El-shafai, M. Shokair, F. El-Samie
{"title":"An Efficient Intrusion Detection System for SDN using Convolutional Neural Network","authors":"Heba Hassan, E. E. Hemdan, W. El-shafai, M. Shokair, F. El-Samie","doi":"10.1109/ICEEM52022.2021.9480383","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480383","url":null,"abstract":"With the accelerated development of computer network utilization and the enormous growth of the number of applications running on top of networks, network security has become more significant. Intrusion Detection Systems (IDS) are considered as essential tools that can be utilized to protect computer networks and information systems. Software-Defined Network (SDN) architecture is used to provide network monitoring and observation of functions. Generally, an IDS is developed to observe the regular traffic to the SDN in order to maintain a high level of security. This paper introduces an efficient IDS using Convolutional Neural Network (CNN). This IDS is applied on a new attack-specific SDN dataset called InSDN. The proposed IDS is compared in performance with different machine-learning-based systems such as Decision Tree Classifier (CART), Logistic Regression (LR), Support Vector Machine (SVM), Naïve Bayes (NB), Random Forest (RF) classifier, and AdaBoost (AB) classifier.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video Integrity Verification based on Blockchain","authors":"Randa Kamal, E. E. Hemdan, N. El-Fishway","doi":"10.1109/ICEEM52022.2021.9480653","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480653","url":null,"abstract":"with the existence of the new revolution of software techniques, tampering with the videos became easier than ever. For retaining the integrity of the captured scenes, novel methods are required. Blockchain is now one of the most interesting integrity verification techniques. Blockchain provides trust among the participant nodes; \"users\" without the need of a trusted third party. In this paper, we propose a new blockchain-based framework for integrity verification of videos. In the proposed framework, the scene is captured and hashed in its original state and the captured frame; \"video frame\" is stored as a reference frame. The hash value, frame name, and timestamp of the capturing time are stored in a CSV file. The genesis block of a permissioned blockchain is created with this data. Other frames are captured for the same scene every predefined period and hashed. If the new hash value is identical to the reference hash, then the new frame is deleted to preserve storage space, and the metadata of the frame is stored in the same CSV file. If the hash values are not identical, then the name of the frame is changed to the timestamp of the capturing time, the frame then is propagated to all participant nodes, an email is sent to a predefined mail to take the appropriate action, and finally, a new block will be created with the new metadata. The proposed system ensures the integrity of the captured videos, ease to use and robustness.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative analysis of MQTT and IoT application protocols","authors":"Marwa O Al Enany, H. Harb, G. Attiya","doi":"10.1109/ICEEM52022.2021.9480384","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480384","url":null,"abstract":"Choosing the appropriate IoT protocol for a certain application was and still a critical issue for IoT applications, as protocols vary in behavior in different applications and under different network status. IoT application protocols have a recent focus of attention especially those protocols for the low-powered IoT applications and constrained devices. A brief survey of IoT layers and applied protocols for each layer and their applications were presented, besides, a detailed survey of IoT protocols with a presentation of the main researches that have been done to evaluate their performance. As a use case for this comparative study, the MQTT protocol was chosen because of its simplicity and its publish /subscribe model to be evaluated and compared against other application protocols.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wafaa A. Shalaby, W. Saad, M. Shokair, M. Dessouky, F. E. El-Samie
{"title":"COVID-19 Diagnosis Using X-ray Images Based on Convolutional Neural Networks","authors":"Wafaa A. Shalaby, W. Saad, M. Shokair, M. Dessouky, F. E. El-Samie","doi":"10.1109/ICEEM52022.2021.9480659","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480659","url":null,"abstract":"Coronavirus (COVID-19) is considered as a viral disease that is caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Spreading of COVID-19 will continue to affect health and economics. Chest X-ray and CT imaging techniques are crucial for infected patients in the battle with COVID-19. Recently, Convolutional Neural Network has been considered as a type of deep learning tools, and it can be used for detecting diseases such as COVID-19. This paper introduces an efficient architecture for COVID-19 diagnosis from an X-ray dataset. The proposed architecture starts with image pre-processing using lung segmentation and image resizing. Deep feature extraction is performed using the proposed CNN model and different pre-trained models. The classification process is performed using either a Support Vector Machine (SVM) or a Softmax classifier. Simulation results prove that the proposed model can classify COVID-19 images with high accuracies of 98.7% and 98.5% for SVM and Softmax classifiers, respectively. The performance metrics are the processing time, system complexity, accuracy, sensitivity, confusion matrix, F1 score, precision, Receiver Operating Characteristic (ROC) curve, and specificity.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}