𝔖 Scriptorium
✦   LIBER   ✦

📁

Computational Intelligence, Data Analytics and Applications: Selected papers from the International Conference on Computing, Intelligence and Data Analytics (ICCIDA)

✍ Scribed by Fausto Pedro García Márquez, Akhtar Jamil, Süleyman Eken, Alaa Ali Hameed


Publisher
Springer
Year
2023
Tongue
English
Leaves
610
Series
Lecture Notes in Networks and Systems, 643
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book is a compilation of accepted papers presented at the International Conference on Computing, Intelligence and Data Analytics (ICCIDA) in 2022 organized by Information Systems Engineering of the Kocaeli University, Turkey on September 16-17, 2022.

The book highlights some of the latest research advances and cutting-edge analyses of real-world problems related to Computing, Intelligence and Data Analytics and their applications in various domains. This includes state of the art models and methods used on benchmark datasets.

✦ Table of Contents


Preface
Organization
Contents
About the Editors
Priority-Based Pollution Management ITS
1 Introduction
2 Related Work
2.1 Vehicle Routing
2.2 Priority Based Routing
2.3 Research Gap
3 Our Approach
3.1 Using a Modified Dijkstra Algorithm to Create Least Polluted Routes
3.2 Assigning Priorities
4 Implementation
4.1 Modifying and Re-building the SUMO Simulator
5 Results and Limitations
5.1 Results
5.2 Limitations
6 Conclusion and Future Work
References
Autonomous Mobile Robot Mapping and Exploration of an Indoor Environment
1 Introduction
2 Related Work
3 System and Setup
3.1 System and Robot
3.2 Slam Algorithm
4 Experiments and Discussion of Findings
4.1 Experiment Environment
4.2 Discussion of Findings
5 Conclusion
References
Medical Image Transmission Using a Secure Cryptographic Approach for IoMT Applications
1 Introduction
2 Materials and Methods
2.1 Hyperchaos System
2.2 Pre-processing of Chaotic Sequences for Image Clustering
2.3 Two-dimensional Logistic-adjusted-Sine Map
2.4 Permutation Operation
2.5 Modulation and Inverse Modulation Operation
2.6 Diffusion
2.7 Proposed Algorithm for Secure Image Communication
3 Results and Discussion
3.1 Key Space
3.2 Analysis of Key Sensitivity
3.3 Differential Attack
3.4 Entropy of Information
4 Conclusion
References
Applied Decision Support System Using TOPSIS – AHP, and ICT Newhouse Indicators for Evaluation of Courses at University of Economics Ho Chi Minh City (UEH), Vietnam
1 Introduction
2 Background Research
2.1 Decision Support System
2.2 Topsis
2.3 AHP Technique
2.4 ICT Newhouse Criteria Set
3 The Proposed Model
3.1 Detail Diagram of Model Architecture
3.2 Describe the Steps in the TOPSIS-AHP Integration Proposal Model
4 Experimental Results
4.1 Experimental Configuration
4.2 Experimental Illustration of the Proposed Model
5 Conclusions
References
Assessment of Grey Wolf Optimizer and Its Variants on Benchmark Functions
1 Introduction
2 Grey Wolf Optimizer and Its Variants
2.1 Grey Wolf Optimizer
2.2 Improved Grey Wolf Optimizer
2.3 Augmented Grey Wolf Optimizer
3 Experimental Results
4 Conclusions
References
Pre-production Design of a Robotic Arm Mounted on an Unmanned Aerial Vehicle (UAV)
1 Introduction
2 System Requirements
3 Kinematic Model
4 Material Selection
5 Strength Analysis
6 Conclusions
References
Reliability of MEMS Accelerometers Embedded in Smart Mobile Devices for Robotics Applications
1 Introduction
2 Theoretical Model
3 Sensor Fault Detection and Elimination
4 Performance Tests
5 Conclusions
References
HST-Detector: A Multimodal Deep Learning System for Twitter Spam Detection
1 Introduction
2 Related Work
3 The Proposed System
3.1 Data Preprocessing
3.2 Image Filtering Model
3.3 Text Filtering Model
3.4 Heterogeneous Filtering Model
4 Implementation and Evaluation
4.1 Experimental Setup
4.2 Datasets
4.3 Evaluation Criteria and Method
4.4 Experimental Results
5 Conclusion
References
Analysis of Deep Learning Sequence Models for Short Term Load Forecasting
1 Introduction
2 Sequence Models
2.1 CNN
2.2 Recurrent Neural Networks (RNN) and LSTM
2.3 Attention Mechanism
2.4 Embedding Layer
3 The Proposed Model
3.1 Parameter Set-Up
3.2 Model Infrastructure
3.3 Metric and Loss Function
3.4 Datasets
3.5 Test Results
4 Conclusion
References
Security Issues for Banking Systems
1 Introduction
2 Information Data Base Security Governance in Banking
2.1 The Classification of the Information Assets to Be Protected in the Banking Industry
2.2 The Types of Threads Performed by Unauthorized Users
3 Information Security Awareness
4 Information Security Governance Framework
5 The Types of Threats Due to the Lack of ISG Can Be Classified as
6 Conclusion
References
Smart Autonomous Bike Hardware Safety Metrics
1 Introduction
2 Related Work
2.1 International Electrotechnical Commission (IEC 61508)
2.2 International Organization for Standardization (ISO 26262)
2.3 Safety of Smart Autonomous Bikes
3 Methodology
3.1 Motorcycle Safety Integrity Levels - MSIL
3.2 Mean Time to Failure - MTTF
3.3 Bike Safety Integrity Levels - BSIL
3.4 Core and System Management
3.5 Movement
4 Implementation
4.1 Voltage of DC Motor - Steering
4.2 Temperature of All Motors
4.3 Temperature of the Battery
5 Results
5.1 Steering
5.2 Battery
5.3 Throttle
5.4 Brakes
6 Conclusion
References
Demand Side Management Based Cost-Centric Solution for a Grid Connected Microgrid System with Pico-Hydro Storage System
1 Introduction
1.1 General Overview
1.2 Literature Review
1.3 Paper Contribution
1.4 Paper Orientation
2 Formulation of an Objective Function
2.1 Micro-grid System Active Power Generation Rate Calculation
2.2 Operating Constraint
2.3 Pumped Hydro Storage Modeling
2.4 Demand Side Management Strategy (DSM)
3 Whale Optimization Algorithm (WOA) Hybrid Approach
3.1 Looking for the Prey Phase of Exploration
3.2 Attacking Strategy Using Bubble-Net
3.3 Hybrid WOASCA
3.4 Comparison of the Hybridized WOASCA and the Issue of Electricity Consumption
4 Results and Discussions
4.1 A General Description of the Test System and Work Environment
4.2 DSM Evaluation for Load Profile Improvement with Respect to Generation Cost
4.3 Discussion on Generation Costs for Various Cases
5 Conclusion
References
Impact of Multimodal Model Complexity on Classification of Diabetic Retinopathy Level
1 Introduction
2 Background and Related Works
3 Methodology
3.1 Dataset
3.2 Models
4 Results
4.1 Single Modality Model
4.2 Multi Modality with Patient Opinion
5 Discussion
6 Conclusions
References
Secure Image Data Encryption Scheme for 5G Internet of Things Applications
1 Introduction
2 Materials and Methods
2.1 Chaotic Maps
2.2 Selection of Chaotic Maps
2.3 DNA Encoding and Decoding
2.4 Proposed Cryptographic Algorithm
3 Results and Discussion
3.1 Key Sensitivity
3.2 Histogram Analysis
3.3 Correlation Analysis
3.4 Shannon's Entropy
3.5 NPCR and UACI
4 Conclusion
References
Symptom Based Health Status Prediction via Decision Tree, KNN, XGBoost, LDA, SVM, and Random Forest
1 Introduction
2 Literature Review
3 Methodology
3.1 Decision Tree Classifier
3.2 K-Nearest Neighbors (KNN)
3.3 Extreme Gradient Boosting (XGBoost)
3.4 Support Vector Machine
3.5 Linear Discriminant Analysis
3.6 Random Forest Classifier
3.7 Dataset
4 Proposed Work
4.1 Decision Tree Classifier
4.2 K-Nearest Neighbor
4.3 XGBoost Classifier
4.4 Support Vector Classifier
4.5 Linear Discriminant Analysis
4.6 Random Forest Classifier
5 Results
6 Discussion
7 Conclusion and Future Work
References
Multiband Microstrip Elliptical Monopole Antenna Design with Mushroom-Like Loadings for DCS, 5G and Ku-Band Applications
1 Introduction
2 Antenna Design
3 Numerical Results
4 Conclusion
References
An IoT-Based Modular Avionics and Electrical System for Nanosatellite Systems
1 Introduction
2 System Overview
3 Measurement Systems
3.1 Sensor Subsystem
3.2 Backup Altimeter
4 Electrical Power Subsystem
5 Communication Subsystem
5.1 Ground Control Station
5.2 IoT-Based Station
6 Flight Software
7 Conclusions
References
Reinforcement Learning for Intrusion Detection
1 Introduction
2 Related Work
3 Deep Q-Learning
4 Methodology
4.1 Deep Reinforcement Learning Agent
4.2 NSL-KDD Dataset
4.3 Gym Environment
5 Results
5.1 Evaluation Metrics
5.2 Reinforcement Learning Model Evaluation
5.3 Reinforcement Learning Experimental Results
5.4 Performance Comparison with Relevant Work
6 Conclusion
References
Comparison of Small-Sized Deep Neural Network Models for Hyperspectral Image Classification
1 Introduction
2 Methods
2.1 Features in Hyperspectral Images and Dimension Reduction
2.2 Convolutional Neural Network
3 Simulation Results
3.1 Datasets
3.2 Evaluation Metrics
3.3 Classification Results
3.4 Comparison of the Proposed Network Models
4 Conclusions
References
Time-Sensitive Embedding for Understanding Customer Navigational Behavior in Mobile Banking
1 Introduction
2 Literature Review
3 Research Problem
4 Framework Implementation
5 Methodology
6 Experiments
7 Discussion and Future Work
References
Do Lunar Cycles Affect Bitcoin Prices?
1 Introduction
2 Related Work
3 Methodology
3.1 Business Understanding
3.2 Data Understanding
3.3 Data Preparation
4 Analyses
5 Conclusion
References
Stock Price Prediction in Response to US Dollar Exchange Rate Using Machine Learning Techniques
1 Introduction
2 Related Work
3 Data Set
4 Methodology
4.1 Artificial Neural Network (ANN)
4.2 Support Vector Machine/Regression (SVM/SVR)
4.3 Random Forest (RF)
4.4 Decision Tree (DT)
4.5 Logistic Regression (Logit)
4.6 Linear Regression (LR)
5 Model Evaluation
5.1 Regression Metrics
6 Experimental Results
7 Conclusion
8 Future Work
References
A Service of RSU Communication in Internet of Vehicles (IoV) in Urban Environment
1 Introduction
2 Related Work
3 IoV Classifications
4 IoV Architecture and Challenges
5 DSRC/WAVE Protocol Mechanism
6 Proposed Simulation Methodology
6.1 Simulation Tools
6.2 Network Model
7 Analysis of Simulation Results
8 Conclusion and Future Work
References
A Comparative Study on Subdural Brain Hemorrhage Segmentation
1 Introduction
2 Related Works
3 Methods
3.1 Mask R-CNN
3.2 Cascade R-CNN
3.3 Mask Scoring R-CNN
3.4 Hybrid Task Cascade
3.5 YOLACT
3.6 QueryInst
3.7 SCNet
4 Experimental Study
4.1 CQ500 Dataset
4.2 Performance Metrics
4.3 Results and Discussion
5 Conclusion
References
Deep Learning Based Spectrum Sensing Method for Cognitive Radio System
1 Introduction
2 Related Work
3 Problem Formulation
3.1 The Proposed Algorithm
3.2 Dataset Generation
3.3 The CNN Model
4 The Simulation Results
4.1 System Validating Using Real Spectrum
5 Conclusion
References
Colour Image Encryption Based on HACS and Knuth-Durstenfeld Algorithm
1 Introduction
2 Materials and Methods
2.1 Chaotic System
2.2 Knuth-Durstenfeld (K-D) Algorithm for Pixel Permutation
3 Encryption Process
4 Results and Discussion
4.1 Statistical Attack Analysis
5 Conclusion
References
Turkish Sign Language Recognition by Using Wearable MYO Armband
1 Introduction
2 Related Works
3 Method
3.1 Data Acquisition
3.2 Pre-processing
3.3 Feature Extraction
3.4 Feature Selection
3.5 Classification Algorithms
4 Results and Discussion
4.1 Analysis of Sliding Window Method
4.2 Analysis of Feature Extraction Methods
4.3 Analysis of Used Sensors
4.4 Analysis of Classification Algorithms
5 Conclusion
References
Effects of Different Parameters on Sleep Quality
1 Introduction
2 Related Work and Background
2.1 Stages of Sleep
2.2 Factors that May Affect Sleep
3 Methodology
3.1 Business Understanding
3.2 Data Understanding
3.3 Data Preparation
3.4 Modeling
3.5 Evaluation
4 Analyses and Evaluation
5 Conclusion
References
Predictive Maintenance on Industrial Data Using Soft Voted Ensemble Classifiers
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Dataset Description
3.2 Balancing the Dataset with Undersampling
3.3 Proposed Model
4 Results
5 Discussion
6 Conclusion and Future Work
References
Volume Forecasting in Supply Chain: A Mixed Study of Boosting and Prophet Algorithms
1 Introduction
1.1 Dataset
2 Literature Review
2.1 Order and Demand Prediction
2.2 Forecasting and Prediction with Boosting Algorithms
2.3 Novel Methods and the Logic Behind Volume Forecasting
3 Logistic Operation Needs
4 Methodology, Models and Results
4.1 Data Cleaning
4.2 Data Normalization
4.3 Modeling
4.4 Utilized Metrics and Experimental Results
5 Conclusion
6 Future Work
References
Blockchain-Based System for Traceability of Counterfeit Medicine
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 System Architecture
3.2 Proposed Algorithms
3.3 Technology Stack
4 Results and Discussion
4.1 Measurement Parameters
4.2 Result Analysis
5 Conclusion and Future Work
References
A Deep Learning Model for Breast Cancer Diagnosis Using Mammography Images Classification
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection and Pre-processing
3.2 Splitting the Breast Imaging Dataset
4 Experimental Results
4.1 Effectiveness
4.2 Efficiency
5 Discussion
6 Conclusion
References
Highly Secure and Robust Forensic System: Fordex Forensic Chain
1 Introduction
2 Blockchain Technology
3 Fordex – New Generation Forensic Document Examination System
3.1 Illustrative Example of Typical Fordex
4 Proposed Fordex Forensic Chain System
5 Conclusions
References
Enhancing Vehicle Networks Performance by Using Deep Learning Techniques for Artificial Intelligence
1 Introduction
2 Related Works
2.1 Neural Network
2.2 Convolutional Neural Network
3 Proposed System
3.1 Import Data Set
3.2 The Preliminary Stage
3.3 Valuation Stage of the Model
4 Result
5 Conclusion
References
What Drives Success in Data Science Projects: A Taxonomy of Antecedents
1 Introduction
2 Literature Review
2.1 Background of the Study
2.2 Related Studies
3 Methodology
4 Findings
5 The Proposed Taxonomy
5.1 Data Dimension
5.2 Organization Dimension
5.3 Technology Dimension
5.4 Strategy Dimension
6 Discussion and Conclusion
References
Performance Evaluation of Clustering Techniques on a Hybrid RFM-Based Scoring Framework
1 Introduction
2 Related Work
3 The Scoring – Clustering Hybrid Framework
3.1 RFMA with K-means
3.2 RFMA with Expectation Maximization
4 Experimental Set-Up
4.1 Input
4.2 Processing
4.3 Output
5 Evaluation
5.1 Clusters Allocation Evaluation
5.2 Movement Analysis
6 Discussion, Conclusion and Future Work
References
A Systematic Literature Review on Data Provenance Visualization
1 Introduction
2 Background
2.1 Systematic Literature Review
2.2 Systematic Literature Review on Data Provenance Visualization
3 Research Methodology
3.1 Research Questions
3.2 Data Sources and Search Strings
3.3 Study Selection and Data Extraction
4 Data Extraction
5 Discussion of Research Questions
5.1 RQ1: How is the Distribution of the Publications by Year?
5.2 RQ2: What was the Venue of Publications?
5.3 RQ3: Which Domains Data Provenance is Proposed/used?
5.4 RQ4: What Provenance Ontologies/standards are Used in Data Visualization?
5.5 RQ5: Which Visualization Approaches are Studied to Meet Visualization Needs?
5.6 RQ6: How is End-User Validation Handled in Studies?
6 Conclusion
References
Effects of Online Educational System on Personal Health of Students and Teachers in COVID-19 Crises
1 Introduction
2 Literature Review
3 Materials and Methods
3.1 Sample and Survey (Data Collection)
3.2 Data Analysis
4 Results and Discussion
5 Suggestions and Recommendations
6 Conclusion
References
Testing the Performance of Feature Selection Methods for Customer Churn Analysis: Case Study in B2B Business
1 Introduction
2 Methodology
3 Results and Discussion
4 Conclusion
References
Multi-agents Path Planning for a Mobile Robot in a Dynamic Warehouse Environment
1 Introduction
2 Related Work
3 Problem Definition
4 The Proposed Solution
4.1 The Method of Path Planning
4.2 Producing the Destination and Initial Points
5 The Analysis of the Result and Discussion
6 Conclusion and Future Work
References
Classification of SCADA Alarms and False Alarm Identification Using Support Vector Machine for Wind Turbine Management
1 Introduction
2 Approach
2.1 Support Vector Machine
2.2 Cross Validation
2.3 Confusion Matrix and Indicators for False Alarms
3 Case Study and Results
4 Conclusions
References
Intelligence Based Approach for Obtaining Trade-Off Solution Between Minimal Pollution and Cost of a Dynamic System
1 Introduction
2 Formulation of Fitness Function
2.1 Active Power Generation Cost Calculation of the Microgrid System
2.2 Pollution Detection Formula for the Microgrid System
2.3 Combined Economic Emission Dispatch Using PPF Method
2.4 CEED Using Fractional Programming (FP) Method
2.5 Environment Constrained Economic Dispatch (ECED)
2.6 Operating Constraints
2.7 Stochastic Modelling
3 Hybrid Grey Wolf Optimizers
4 Case Studies
4.1 Overview of the subject test systems
4.2 Descriptive Analysis on the Results Obtained for 5-Units System
4.3 Statistical Analysis on the Results Obtained Using Various Algorithms
5 Conclusions
References
Improving Classification Accuracy of Cyber Attacks in the Banking Sector
1 Introduction
2 Proposed Method
2.1 Dataset
2.2 Attack Model
2.3 KNN Workflow
3 Results of Simulation
4 Conclusion
References
Image Cryptography Using Fibonacci Bit-plane Decomposition and Quantum Chaotic Permutation
1 Introduction
2 Materials and Methods
2.1 Truncated P-Fibonacci Bit-Plane (TPFB)
2.2 Quantum Arnold Transformation (QAT)
2.3 Proposed Cryptography Structure
3 Results and Discussion
3.1 Anti-statistical Attack Ability Analysis
3.2 Anti Differential Attack Ability Analysis
4 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Computational Intelligence, Data Analyti
✍ Fausto Pedro García Márquez; Akhtar Jamil; Süleyman Eken; Alaa Ali Hameed 📂 Library 📅 2023 🏛 Springer International Publishing 🌐 English

This book is a compilation of accepted papers presented at the International Conference on Computing, Intelligence and Data Analytics (ICCIDA) in 2022 organized by Information Systems Engineering of the Kocaeli University, Turkey on September 16-17, 2022. The book highlights some of the latest re

Computational Intelligence and Data Anal
✍ Rajkumar Buyya (editor), Susanna Munoz Hernandez (editor), Ram Mohan Rao Kovvur 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the Department of Information Technology, Vasavi College of Engineering, Hyderabad, India in January 2022. ICCIDA provides an ex

Computational Intelligence and Data Anal
✍ Rajkumar Buyya (editor), Susanna Munoz Hernandez (editor), Ram Mohan Rao Kovvur 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the Department of Information Technology, Vasavi College of Engineering, Hyderabad, India in January 2022. ICCIDA provides an ex

International Conference on Intelligent
✍ Siddhartha Bhattacharyya (editor), Janmenjoy Nayak (editor), Kolla Bhanu Prakash 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book is a collection of best selected research papers presented at International Conference on Intelligent and Smart Computing in Data Analytics (ISCDA 2020), held at K L University, Guntur, Andhra Pradesh, India. The primary focus is to address issues and developments in advanced comp

Computational Intelligence Applications
✍ Vijayan Sugumaran, Arun Kumar Sangaiah, Arunkumar Thangavelu 📂 Library 📅 2017 🏛 Auerbach Publications;CRC Press 🌐 English

<P>There are a number of books on computational intelligence (CI), but they tend to cover a broad range of CI paradigms and algorithms rather than provide an in-depth exploration in learning and adaptive mechanisms. This book sets its focus on CI based architectures, modeling, case studies and appli

Advances in Computational Intelligence a
✍ Manolo Dulva Hina, Amar Ramdane-Cherif, Rafik Zitouni, Assia Soukane 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book presents select papers from the 2nd EAI International Conference on Computational Intelligence and Communications (CICom 2021). The papers reveal recent advances in the broader domains of Computational Intelligence including (1) automation, control, and intelligent transportation