Manar Al Bataineh, Tasneem Al Mallah, W. Mardini, Sahil Imtiyaz, Yaser M. Khamayseh, M. B. Yasin
{"title":"Four-cycles Delay-Efficient RPL-based Routing approach For IoT applications","authors":"Manar Al Bataineh, Tasneem Al Mallah, W. Mardini, Sahil Imtiyaz, Yaser M. Khamayseh, M. B. Yasin","doi":"10.1109/ICICS52457.2021.9464550","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464550","url":null,"abstract":"In wireless sensor networks (WSNs), the Routing Protocol for Low power and Lossy Networks (RPL) is praised as one of the most widely used routing protocols. In RPL, the Network is divided into a group of subgraphs. The best path can be computed by using an objective function and set of metrics. This paper proposes an enhancement for RPL by using four different cycle times to reduce the delay. This enhancement is projected to achieve better improvement if most of the nodes run in low duty cycles at the MAC layer. Cooja simulator using the Contiki 3.0 operating system is used to evaluate the performance of the proposed enhancement. The results inferred that the proposed enhanced scheme is better than the Expected Transmission Count (ETC) approach in terms of end-to-end delay. The end-to-end delay of all nodes is reduced, particularly for the nodes positioned far from the root node.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116041839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Ayyoub, Haitham Seelawi, M. Zaghlol, Hussein T. Al-Natsheh, Samer Suileman, A. Fadel, Riham Badawi, Ahmed Morsy, Ibraheem Tuffaha, M. Aljarrah
{"title":"Overview of the Mowjaz Multi-Topic Labelling Task","authors":"M. Al-Ayyoub, Haitham Seelawi, M. Zaghlol, Hussein T. Al-Natsheh, Samer Suileman, A. Fadel, Riham Badawi, Ahmed Morsy, Ibraheem Tuffaha, M. Aljarrah","doi":"10.1109/ICICS52457.2021.9464604","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464604","url":null,"abstract":"Multilabel text classification is an important task in Natural Language Processing (NLP). One use case of such a task is in categorizing news articles, where each article may belong to one or more classes. In this work, we present the ICICS2021 Mowjaz Multi-Topic Labelling Task. Given a piece of news, systems participating in this task are expected to select its topic(s). The systems are evaluated based on the F1 score measure. In total, 46 teams registered on the task’s CodaLab page. Out of them, 28 teams submitted 309 runs. The results are surprisingly high. Moreover, they are very close to each other with all teams having systems achieving F1 scores ranging between 0.7965 and 0.8567. Most of these systems used deep learning models, such as Recurrent Neural Networks (RNN), coupled with pretrained word embeddings such as BERT-based models. Few of them experimented with traditional machine learning models such as Support Vector Machine (SVM) and Naive Bayes (NB).","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115255393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Team YahyaD11 at the Mowjaz Multi-Topic Labelling Task","authors":"Yahya Daqour","doi":"10.1109/ICICS52457.2021.9464597","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464597","url":null,"abstract":"This paper focuses of my enrollment in ICICS 2021 Competition Mowjaz Multi-Topic Labelling Task using Bidirectional Gated Recurrent Unit (Bi-GRU). The model is basically used to classify articles based on their topics that are present within its content. Mowjaz’s topic are classified into ten categories and an article can be classified as under as many topics as it covers. In the evaluation, we regard the Mowjaz Multi-Topic labelling task as multi-classification task and use Unigram models to extract features to train a neural network classifier. In the result, the accuracy of my method reached 0.8232, ranking 8th .","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient FPGA Routing using Reinforcement Learning","authors":"U. Farooq, N. ul Hasan, I. Baig, Manaf Zghaibeh","doi":"10.1109/ICICS52457.2021.9464626","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464626","url":null,"abstract":"With every new generation, Field Programmable Gate Arrays (FPGAs) are getting more complex and so are their back end flow. Routing is an important step of FPGA back end flow that takes a lot of time. Making it more efficient in terms of execution time without the loss of quality is a huge challenge. In this work, we propose to use Reinforcement Learning (RL) based routing technique to make the FPGA routing faster. We use a comprehensive set of homogeneous and heterogeneous benchmarks to compare the RL-based technique with the conventional negotiated congestion driven routing technique. Experimental results reveal that for quick turn around, when compared to negotiated congestion technique, the RL-based technique gives, on average, 35% more accurate results about the final design. Moreover, for the complete routing step, the RL-based technique gives 30% speed up while giving similar quality of results.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"19 25-26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116706798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Team OmarRadi at the Mowjaz Multi-Topic Labelling Task","authors":"Omar Radi","doi":"10.1109/ICICS52457.2021.9464622","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464622","url":null,"abstract":"This paper describes the 7th winning system for the Mowjaz Multi-Topic Labelling Task [1]. The current research work discusses the models used for the experimentation that led to the proposed system and shows the models’ performances on the task’s dataset of Arabic Articles. The proposed system, which was a MLP system with a single hidden layer. It achieved an F1-Sample score of 0.8594, F1-Macro score of 0.8476, F1-Micro score of 0.8504 and an Accuracy score of 82.9 which published on the task’s website which led to rank the model as 7th in the Mowjaz Multi-Topic Labelling Task [1].","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116244797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Team MohammadHabash at Mowjaz Multi-Topic Labelling Task","authors":"Mohammad Habash","doi":"10.1109/ICICS52457.2021.9464614","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464614","url":null,"abstract":"Multi-label text classification is an important problem with the growing size of data and the difficulties in assigning a single label to each text sample because of the tendency of internet users to assign multiple labels to describe documents, emails, posts, etc. Our goal is to predict the category (topic) of an article given its text. The dataset which is used in this work contains articles from Mowjaz. Mowjaz is an Arabic topical content aggregation mobile application for news, sport, entertainment and other topics from top publishers that users can follow. This paper describes the approach to classify articles using Bi-directional Gated Recurrent Unit (Bi-GRU) with AraVec embeddings. The F1-score of this system is 0.8344 which shows a significant improvement over the baseline models.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122109672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Li, Hongtao Wang, X. Qiu, Lingchen Li, Xiaonian Wu
{"title":"Integral analysis of GRANULE and ESF block ciphers based on MILP","authors":"Jun Li, Hongtao Wang, X. Qiu, Lingchen Li, Xiaonian Wu","doi":"10.1109/ICICS52457.2021.9464620","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464620","url":null,"abstract":"The lightweight block ciphers, which have the characteristics of lightweight structure and low power consumption, are especially suitable for resource-constrained environments. Bit-based division property with Mixed Integer Linear Programming (MILP) model is constructed according to the structural characteristics of the ciphers, which gives an automatic search method for the longest 10-round integral distinguisher of GRAN-ULE and the 9-round integral distinguisher of ESF, respectively. Based on the 8-round integral distinguisher, 12-round integral attack of GRANULE is obtained by extending backward 4-round. Employing the key equivalence relation to reduce the complexity, the time complexity is about 258.17 and the data complexity is about 262.17 chosen plaintexts of GRANULE. Compared with other attack methods of current GRANULE and ESF, this is the optimal analysis result of the two ciphers on the length of distinguisher and the number of attack rounds.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125179574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secrecy Outage Performance with EH and TAS for Realistic Underlay Cognitive Radio Networks Using MIMO Systems","authors":"M. Khodeir, Saja M. Alquran","doi":"10.1109/ICICS52457.2021.9464627","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464627","url":null,"abstract":"This work studies the physical layer security performance for Multiple Input Multiple Output (MIMO) secondary nodes. The proposed model is assumed to operate in underlay Cognitive Radio Network (CRN) that contains a primary node of a single antenna with the presence of an active eavesdropper. Furthermore, Transmit Antenna Selection (TAS) scheme is applied at the secondary transmitter side which also has a suitable battery to charge the energy collected from the Radio Frequency (RF) signals broadcasted from the primary transmitter to enhance collaboratively the power and spectral efficiencies. The security performance for the secondary system is achieved where the exact closed-form phrase is derived over Nakagami-m fading channels. The mathematical results show that the security performance can be improved by increasing the number of the antennas at the source and/or the destination or by decreasing the number of the antennas at the eavesdropper. The same target can be achieved by increasing the transmit power at the source, or improving the quality of the main channel. Greater harvested energy can be obtained at the secondary transmitter by selecting proper time slot that is dedicated for energy harvesting which further improved the security performance.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125299319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Patient care classification using machine learning techniques","authors":"Shatha Melhem, Ahmad Al-Aiad, M. Al-Ayyad","doi":"10.1109/ICICS52457.2021.9464582","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464582","url":null,"abstract":"Doctors and Specialists use the lab test results of patients to classify their medical needed care into inpatient care or outpatient care, which is a time-consuming process and needs a lot of efforts from doctors to decide whether the patient needs to be in the hospital and monitored or not. In addition, the likelihood of making the wrong decision is high, thus it may endanger the patient’s life. the purpose of this study is to utilize machine learning to classify patient care into inpatient or outpatient, in order to reduce the efforts and time expanded by the doctors which reflect on the type of services provided to the patient, also this kind of studies can help in reducing the human errors that result in risks to the patient’s life and may increase the total bill of patients which led to pay significant amounts. machine-learning was utilized to build four models: Support Vector Machine, Decision Tree, Random Forest, and K-Nearest Neighbors (KNN), that could predict whether the patient should be classified as inpatient or outpatient-based on their conditions and lab test results. The best model has been chosen based on the highest accuracy, sensitivity, specificity, and precision score, and the lowest false-negative rate, and false-positive rate. (EHR) the dataset has been used which consists of patients’ laboratory test results from a private hospital in Indonesia to build these models and test them. The results show that Random Forest achieved the highest accuracy (77%), Sensitivity (65%), and Precision (72%), respectively, the model also has the lowest false-negative rate (35%), and almost the lowest false positive rate (16%).","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raghad Al-Syouf, Basheer Al-Duwairi, Ahmad Shatnawi
{"title":"Towards a Secure Web-Based Smart Homes","authors":"Raghad Al-Syouf, Basheer Al-Duwairi, Ahmad Shatnawi","doi":"10.1109/ICICS52457.2021.9464563","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464563","url":null,"abstract":"Smart-Home technology is a growing trend that allows technology to be combined into every-day living experience. However, Home automation and security threats are rated to become some of the biggest contemporary issues to tackle. Securing a smart home’s Network requires a leverage of various protocols, technologies, machines, tools, and procedures to defend data and decrease threats. In this paper, we propose a new system that will help overcome a number of attacks directed at smart home networks. The proposed system constitutes a smart-home environment, fog computing, and cloud networks, where we would apply some protocols at the base layer to support redundancy when fail-over occurs. We also apply cookie-box flow control with a very high bandwidth that aims to generate a safe 3-way handshake with a virtual web server in the fog layer to help prevent or limit DDoS SYN flooding attacks to the web-server. Besides, we conduct a query tokenization technique between the client and virtual webserver to detect any SQL injection attacks directed to the webserver. We provide the fog layer with a hash-based security system between the virtual web server and the primary one to prevent accessing sensitive data. Experimental results show that our proposed scheme produces a fully integrated security system that can protect smart-homes or any mission-critical sites by decreasing the number of attacks and malware programs that can target users while they are navigating the web.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}