Hadeel T. El Kassabi, M. Serhani, A. Navaz, S. Ouhbi
{"title":"Federated Patient Similarity Network for Data-Driven Diagnosis of COVID-19 Patients","authors":"Hadeel T. El Kassabi, M. Serhani, A. Navaz, S. Ouhbi","doi":"10.1109/AICCSA53542.2021.9686875","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686875","url":null,"abstract":"Sensitive patient data is generated from a variety of sources and then transferred to a cloud for processing. Therefore, it is exposed to security and privacy and may lead to an increase in communication costs. Edge computing will ease computing pressure through distributed computational capabilities while improving security and privacy. In this paper, we propose a Federated PSN (FPSN) model where the model is moved directly to the edge to minimize computation and communication costs. PSN has been applied as a successful approach in categorizing and diagnosing patients based on similarities against some clinical and non-clinical features. Our proposed model distributes processing at each edge node, then fuses the constructed PSN matrices at the cloud premises, which significantly reduce the model’s training and inference time and ensures quick model updates with the local client/nodes. In this paper, we propose: (i) an algorithm to evaluate patient’s data similarity at the edge; and (ii) an algorithm to implement the federated similarity network fusion at the Cloud. We conducted a set of experiments to evaluate our FPSN model against other machine learning algorithms using a COVID-19 dataset. The results obtained prove that the FPSN model accuracy is higher than the distributed PSNs at various edges and higher than the accuracies of other classification models.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133239299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of Alaryngeal Speech using Generative Adversarial Network (GAN)","authors":"M. Huq","doi":"10.1109/AICCSA53542.2021.9686759","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686759","url":null,"abstract":"Whispered speech is defined as a type of spoken communication in which the vocal cords do not vibrate and as a result no periodic glottal excitement occurs in the vocal cord. As a result of absence of pitch the voice of a person loses expressiveness and naturalness.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trajectory-based Modeling for Fraud Detection and Analytics: Foundation and Design","authors":"L. Karim, A. Boulmakoul","doi":"10.1109/AICCSA53542.2021.9686920","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686920","url":null,"abstract":"The trajectory concept is immersed in various socio-technical systems. Certainly, moving object data intended for location-based services is predominant, due to availability of spatiotemporal location data provided by current devices such as mobile devices, GPS devices, RFID and various sensors. This work examines the use of our trajectories meta-model given in previous works to detect and monitor frauds, from the point of view of trajectories semantic aspects. Modeling of frauds by trajectories gives meaning to the sequence of events that made it possible to detect them and to recognize the situations of their occurrence. The semantic dimension qualifies a fraud trajectory as a story that has both meaning and intention, described by episodes of semantic events related to the creation of the fraud, to its dynamic and to its ending. Fraud analytics will benefit from trajectory analytics for both big data ecosystems and spatiotemporal data mining algorithms and practices. Finally, we propose the architecture and structure of the software components that make up the proposed software system. The software design is based on the reactive manifesto and federates graph-oriented NoSQL databases and graph-based data science processing.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Change detection in optical remote sensing images using shearlet transform and convolutional neural networks","authors":"Emna Brahim, S. Bouzidi, W. Barhoumi","doi":"10.1109/AICCSA53542.2021.9686924","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686924","url":null,"abstract":"In this study, an effective method used to examine the changes of two optical images captured by Landsat satellite is presented. The proposed method is based on two main parts: A preprocessing step where Shearlet Transform is applied to get a smoother rendering followed by a classification process using Convolutional Neural Network (CNN) to change detection.The proposed method out performed the state-of-the-art methods with an accuracy out of 99,32%.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Orgsanisation Committee","authors":"","doi":"10.1109/aiccsa53542.2021.9686906","DOIUrl":"https://doi.org/10.1109/aiccsa53542.2021.9686906","url":null,"abstract":"","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124517225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the AICCSA 2021 Program Chairs","authors":"","doi":"10.1109/aiccsa53542.2021.9686845","DOIUrl":"https://doi.org/10.1109/aiccsa53542.2021.9686845","url":null,"abstract":"","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SUBLμME: Secure Blockchain as a Service and Microservices-based Framework for IoT Environments","authors":"D. Hasan, Maha Driss","doi":"10.1109/AICCSA53542.2021.9686757","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686757","url":null,"abstract":"IoT applications have extended new concepts to smart technologies in different vital sectors such as healthcare, education, agriculture, energy management and control, etc. IoT aims to interconnect several intelligent devices over the Internet to control, store, exchange, and analyze collected data. However, the main problem in IoT environments is that they present numerous potential vulnerabilities that can be the origin of security attacks. In this context, this paper proposes a novel framework, named SUBLμME, which stands for SecUre BLockchain as a service and μservices-based fraMework for IoT Environments. This framework integrates BaaS and microservices technologies that have the predominant characteristic of offering reusable and reconfigurable security features implemented as independent services that can be reused for multiple IoT applications. SUBLμME is implemented and validated by a simulated smart home environment. The results of the simulation experiments showed that SUBLμME brings several security improvements in terms of performance, data integrity, data packages’ validation, access control, and efficient and secure data transmission and storage.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Exact Algorithm for A Multi-Period Inventory Routing Problem with Lateral Transshipment","authors":"M. Sakhri, Mounir Tlili, O. Korbaa","doi":"10.1109/AICCSA53542.2021.9686909","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686909","url":null,"abstract":"For better supply chain management, it is necessary to think about better managing its cost sources. Inventory is considered the most important element of the supply chain that generates the different logistics costs, mainly the inventory holding cost and the transportation cost. One of the most widely used models to jointly solve these two problems is the Inventory Routing Problem (IRP), which will be the focus of this study. The proposed model in this work deals with a two-tier supply network. The first level contains the supplier with a single vehicle to serve a set of customers with a deterministic and periodic demand that are located at the second level. Our work consists in studying the effect of the increase of the replenishment lead time on the different logistic costs. In addition, we introduced the Lateral Transshipment (LT) technique as an option for inventory transfer if it is economical. New mathematical models corresponding to the above-mentioned problems have been developed and solved by an exact method. The obtained results show that the variation of the replenishment lead time leads to an increase of the different logistics costs and that LT can improve the total network cost and balance the customers' inventory level.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122775512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability and Threat Analysis of UAVs","authors":"Burak Tufekci, Cihan Tunc","doi":"10.1109/AICCSA53542.2021.9686826","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686826","url":null,"abstract":"The usage and application areas of Unmanned Aerial Vehicles (UAVs) are increasing such as military services, live streaming events, aerial photography, agriculture, firefighting, product delivery, asset inspections, and so on owing to bringing along the many benefits with it. According to Federal Aviation Administration (FAA), 865,660 drones (or UAVs) are registered and of these, 340,247 are commercial drones, 521,819 are recreational drones, 3,594 are paper registrations [1] .","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128630873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Engineering in Next Generation Networks","authors":"","doi":"10.1109/aiccsa53542.2021.9686771","DOIUrl":"https://doi.org/10.1109/aiccsa53542.2021.9686771","url":null,"abstract":"","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129923498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}