{"title":"Experimenting Ensemble Machine Learning for DDoS Classification: Timely Detection of DDoS Using Large Scale Dataset","authors":"Hafiz Amaad, Hajrah Mughal","doi":"10.1109/ICACS55311.2023.10089656","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089656","url":null,"abstract":"The rapid expansion of the internet has connected the world with a single network. Every network is the victim of a hacker and can be attacked by finding its vulnerabilities. Distributed Daniel of Service (DDoS) attack overwhelms a network and restricts its user from accessing reachable resources. In this study, we aim to employ ensemble ML techniques, such as random forest, histogram-based gradient boosting, and adaptive boosting classifiers, to detect DDoS attacks using the CIC-DDoS2019 dataset. The comparative evaluation results of this study reveal that it provides a higher detection accuracy score (99.9887%) compared to the previous studies.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123049799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural Language Processing (NLP) based Extraction of Tacit Knowledge from Written Communication during Software Development","authors":"Maham Noor, Z. Rana","doi":"10.1109/ICACS55311.2023.10089779","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089779","url":null,"abstract":"Software engineering, in general, and Global Software Engineering (GSE), in particular, face challenges such as handling communication and collaboration issues and inappropriate knowledge management. It is difficult to ensure availability of right knowledge at the right time to the right person during software engineering activity. The knowledge needs to be shared across the organization but limitations of knowledge sharing tools or dispersed knowledge sharing media and improper handling of tacit knowledge makes it more challenging to share knowledge. Significant amount of communication during software engineering process takes place via emails and discussion forums. Decisions taken during planning activities are also communicated through emails. These emails and the discussions do not necessarily cover the rationale behind a decision or approach adopted. This leaves a substantial portion of shared knowledge as tacit. Mostly, due to undefined tacit knowledge handling procedures, organizations suffer with the loss of critical knowledge and information. One way to handle this loss of knowledge is to store every information in knowledge repository but this can increase the size of the knowledge repository. This paper presents a three step approach to identify tacit knowledge in the written communication such that the organizations can save the tacit knowledge for future use. The presented approach does not only extract up to 57% of tacit knowledge but also indicates that only 20% of the whole communication need to be externalized hence saving 80% capacity of the knowledge repository, if every communication was to be preserved as potential tacit knowledge.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organizing Committee ICACS 2023","authors":"","doi":"10.1109/icacs55311.2023.10089640","DOIUrl":"https://doi.org/10.1109/icacs55311.2023.10089640","url":null,"abstract":"","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116332871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Common Problems in Software Requirement Engineering Process: An Overview of Pakistani Software Industry","authors":"Sadia Khalid, Uzair Rasheed, Mishal Muneer, Wasi Haider Butt, R. Mehmood, Usman Qamar","doi":"10.1109/ICACS55311.2023.10089703","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089703","url":null,"abstract":"Requirement engineering is a major phase of software development process. A project's success mainly depends on an efficient and effective requirement engineering process. Practices have been defined to ensure successful requirement engineering of software projects. Yet the professionals face numerous issues during this phase. This paper explores the software requirement engineering practices from in the software industry of Pakistan. It highlights the common problems faced by the software professionals, as well as commonly deployed solutions and practices.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127220973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tanvir Fatima Naik Bukht, Hameedur Rahman, Ahmad Jalal
{"title":"A Novel Framework for Human Action Recognition Based on Features Fusion and Decision Tree","authors":"Tanvir Fatima Naik Bukht, Hameedur Rahman, Ahmad Jalal","doi":"10.1109/ICACS55311.2023.10089752","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089752","url":null,"abstract":"Image-based detection of human actions has recently emerged as a hot research area in the fields of computer vision and pattern recognition. It is concerned with detecting a person's actions or behavior from a static image. In this article, we are using a decision tree to develop an action recognition technique. In order to enhance the clarity of the video frames, the proposed method begins by implementing the HSI color transformation in the initial stage. Subsequently, it utilizes filters to minimize noise. The silhouette is extracted using a statistical method. We use SIFT and ORB for feature extraction. Next, using a parallel process, extract the shape and texture features needed for fusion applying name length control features. Additionally, the best high-dimensional data for classification is explored using vectors and the t-distributed stochastic neighbour embedding (t-SNE).The final step involves the features to be input into a decision tree, where they will be sorted into relevant human actions based on those final characteristics. The recognition rate of the UT interaction data used in the experimental process is 94.6%.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127992208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Pedestrians Anomaly Detection via Conditional Random Field and Deep Learning","authors":"F. Abdullah, Ahmad Jalal","doi":"10.1109/ICACS55311.2023.10089730","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089730","url":null,"abstract":"Automated video surveillance frameworks quickly distinguish surprising and basic circumstances in a packed climate that would help to pursue sufficient choices for security and crisis control. Hence, In this paper, an innovative method for automatically detect and localize anomalous objects among multi-pedestrian crowds via conditional random field and deep learning is introduced. Initially, necessary preprocessing is performed on extracted frames and then super-pixels are generated using improved watershed transform, the objects are then segmented using a conditional random field. The region of interests are localized using conditional probability and temporal association is implemented to locate the regions with a group of pedestrians and pedestrians with other objects. A deep learning feature pyramid network is then implemented to detect and categorized the objects in each region and finally, the anomalous objects are identified using Jaccard similarity. The effectiveness of proposed framework is assessed on openly accessible UCSD Ped 1 and Ped 2 datasets and it accomplishes an accuracy rate of 94.2% and 95.4% respectively. Extensive experimental data and comparative analysis show that our model outperformed current state-of-the-art models in terms of accuracy.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iram Manan, Faisal Rehman, Hana Sharif, C. Ali, Rana Rashid Ali, Amiad Liaqat
{"title":"Cyber Security Intrusion Detection Using Deep Learning Approaches, Datasets, Bot-IOT Dataset","authors":"Iram Manan, Faisal Rehman, Hana Sharif, C. Ali, Rana Rashid Ali, Amiad Liaqat","doi":"10.1109/ICACS55311.2023.10089688","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089688","url":null,"abstract":"Cyber Security is a crucial point of the current world; it is used to analyze, defend, and detect network intrusion systems. An intrusion detection system has been designed using Deep learning techniques, which helps the network user to detect malicious intentions. The dataset plays a crucial part in intrusion detection. As a result, we describe various well-known cyber datasets. Mainly we have analysed the IoT traffic-based dataset with some other datasets. We have also analyzed deep learning DL models, including Feed forward deep neural network (FDNN), deep auto-encoder, De-noising auto-encoder, deep migration, stacked de-noising auto-encoders, Replicator Neural networks, and Self-Taught Learning. We observe the effectiveness of models individually in two different types (multiclass and binary) through real-world traffic datasets, such as Bot-IoT dataset. Moreover, we evaluate the effectiveness of various methods based on the most critical key performance indicators, namely correctness, rate of false alarms and detection rate.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116207264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yaqeen Ali, M. A. Iftikhar, Qamar Abbas, Tayyab Wahab
{"title":"Automated White Matter Segmentation in MR Images Using Residual UNet","authors":"Yaqeen Ali, M. A. Iftikhar, Qamar Abbas, Tayyab Wahab","doi":"10.1109/ICACS55311.2023.10089627","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089627","url":null,"abstract":"Vascular changes in small vessels can be observed through Flair MR images called white matter hyperintensities (WMHs). WMHs are associated with cerebral small vessel disease, aging, dementia, and stroke. Quantification of WHMs is important for diagnosis, prognosis, monitoring of patients, and research studies. Manual segmentation of WHMs is a time-consuming task and is subjective to the observer. That's why we need an automated segmentation method. WHMs' segmentation is a challenging task due to their heterogeneous characteristics and coexistence with other similar-appearing structures. We proposed an architecture that uses residual blocks in a U-Net-based network to segment the WHMs from T1-weighted, Flair images of brains. In this study, we used the MICCIA White Matter Hyperintensities Challenge 2017 Dataset to train and test the proposed model. We evaluated the proposed method using the standard MWM challenge in 2017 evaluation measures and achieved better results than the state-of-the-art technique. [1]","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120954455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Activity Recognition based on Patterns Discovery for Healthcare Monitoring","authors":"M. Javeed, Ahmad Jalal","doi":"10.1109/ICACS55311.2023.10089764","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089764","url":null,"abstract":"Healthcare monitoring for humans is important due to several factors including life quality and early detection of health-related problems. Human activity patterns recognition is the most promising ways to monitor human health. Uprisings in the human activity patterns recognition has enabled researchers to recognize multiple health issues through the usage of multiple sensory devices such as motion-based wearable sensors. Irrelevant motion patterns can lead to overlook the important activity recognition in daily living. For this purpose, an early discovery of motion patterns has been proposed for activity recognition in this paper. Main objective is to support the activity detection through motion patterns and deep learning mechanism. The proposed method contains three layered architecture including pre-processing layer, features engineering layer, and classification layer. The anticipated study is investigated over an openly available dataset named Opportunity and results have shown improvement in terms of achieving higher accuracy rate of 88.57%.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127226994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Detection and Tracking Using Kalman Filter Over Aerial Images","authors":"Asifa Mehmood Qureshi, A. Jalal","doi":"10.1109/ICACS55311.2023.10089701","DOIUrl":"https://doi.org/10.1109/ICACS55311.2023.10089701","url":null,"abstract":"For intelligent transportation systems (ITSs) and planning that makes use of exact location intelligence, accurate vehicle classification, and tracking are topics that are becoming more and more vital. This paper presents a model for the detection and tracking of vehicles in roundabout aerial images. The detection is being done using a combination of blob detection and improved occlusion handling technique based on geometrical points of the vehicle model. The detected vehicles are assigned ID based on IoU matching, similarity matching, and centroid of the vehicle bounding box. The moving cars are then passed onto the tracking algorithm which implements the Kalman filter and vehicle re-identification methods. The trajectories of each detected vehicle are derived. The preciseness of the detection and tracking algorithms are 87% and 90% respectively. The experimental findings showed that the proposed detection and tracking model had consistent results for complex environments having heavy traffic flow conditions.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131474788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}