<p><span>This book presents the proceedings of the 1st International Conference on Artificial Intelligence and Computer Visions (AICV 2020), which took place in Cairo, Egypt, from April 8 to 10, 2020. This international conference, which highlighted essential research and developments in the fields
Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021) (Advances in Intelligent Systems and Computing, 1377)
â Scribed by Aboul Ella Hassanien (editor), Abdelkrim Haqiq (editor), Peter J. Tonellato (editor), Ladjel Bellatreche (editor), Sam Goundar (editor), Ahmad Taher Azar (editor), Essaid Sabir (editor), Driss Bouzidi (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 863
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book presents the 2nd International Conference on Artificial Intelligence and Computer Visions (AICV 2021) proceeding, which took place in Settat, Morocco, from June 28- to 30, 2021. AICV 2021 is organized by the Scientific Research Group in Egypt (SRGE) and the Computer, Networks, Mobility and Modeling Laboratory (IR2M), Hassan 1st University, Faculty of Sciences Techniques, Settat, Morocco. This international conference highlighted essential research and developments in the fields of artificial intelligence and computer visions. The book is divided into sections, covering the following topics: Deep Learning and Applications; Smart Grid, Internet of Things, and Mobil Applications; Machine Learning and Metaheuristics Optimization; Business Intelligence and Applications; Machine Vision, Robotics, and Speech Recognition; Advanced Machine Learning Technologies; Big Data, Digital Transformation, AI and Network Analysis; Cybersecurity; Feature Selection, Classification, and Applications.
⌠Table of Contents
Preface
Organization
Honorary Chairs
International Advisory Board
General Chairs
Conference Co-chairs
Technical Program Chairs
Track Chairs
Track 2:Â Convergence of Artificial Intelligence and Blockchain Technologies
Track 3:Â Artificial Intelligence for Communications and Networks
Publicity Chairs
International Program Committee
Local Arrangement Committee Chairs
Local Arrangement Committee Members
Contents
Deep Learning and Their Applications
COVID-19 X-rays Model Detection Using Convolution Neural Network
1 Introduction
2 Related Work
3 COVID-19 Deep Learning Detection Model
4 Datasets Collections
5 Experimental Results
6 Conclusion
References
Deep Learning Models Using Auxiliary Classifier GAN for Covid-19 Detection â A Comparative Study
1 Introduction
2 Materials and Methods Used
2.1 Brief on Data Augmentation with AC GAN
2.2 Classification Using Deep Learning Models
3 Results and Discussions
4 Conclusions
References
Feature Pyramid Network for COVID-19 Pneumonia Detection from Chest X-rays Images
1 Introduction
2 Related Work
3 Dataset and Proposed Architecture
3.1 COVID-19 Radiography Database
3.2 Proposed Architecture
4 Experimental Results
4.1 Evaluation Metrics
4.2 Results
5 Conclusion and Future Work
References
Explore the Relationship Between COVID-19 Testing Rates with the Number of Cases
1 Introduction
1.1 Background of the Study
1.2 Research Objectives
1.3 Research Questions
2 Literature Review
2.1 Age and Gender Factors
2.2 COVID-19 Preparedness and Response Status of GCC Countries
2.3 Preventive Measures
2.4 Testing Capabilities
2.5 Conceptual Framework
3 Methodology
3.1 Research Design
3.2 Information Needs
3.3 Data Collection
3.4 Data Analysis
3.5 Plan of Data Analysis
4 Findings and Discussion
5 Conclusion and Recommendations
References
Deep Learning Method for Bone Abnormality Detection Using Multi-view X-rays
1 Introduction
2 Related Work
2.1 Traditional Approaches
2.2 Studies Utilizing Deep Learning Methods
2.3 Summary and Analysis
3 Proposed Method
3.1 Preprocessing
3.2 Features Extraction and Classification
4 Experimental Results
4.1 Dataset
4.2 Evaluation Metrics
4.3 Results
5 Conclusion and Future Work
References
AÂ Deep Autoencoder Based Multi-Criteria Recommender System
1 Introduction
2 Related Work
2.1 Data Sparsity
2.2 Criteria Weights
2.3 Deep Learning-Based RSs
3 Proposed Method
3.1 Calculation of Criteria Weights
3.2 Autoencoder
4 Experimental Studies
4.1 Activation Function
4.2 Hidden Layers
4.3 Results
5 Conclusion
References
Review on Supervised and Unsupervised Deep Learning Techniques for Hyperspectral Images Classification
1 Introduction
2 Public Hyperspectral Datasets
3 Conventional Segmentation Methods
3.1 Gray Level-Based Methods
3.2 Spectral-Spatial Methods
4 Deep Learning Methods
4.1 Supervised Learning Methods for Hyperspectral Scene Classification
4.2 UnSupervised Learning Methods for Hyperspectral Scene Classification
5 Conclusions
References
The Impact of COVID-19 on E-learning: Advantages and Challenges
1 Introduction and Background
2 Literature Review
2.1 Recent Studies
3 Advantages
3.1 Cost-Effective
3.2 Time-Efficient
3.3 Learning Environment Customization
3.4 A Potential Solution to Teacher Inadequacy
3.5 Eco-friendly
3.6 No Requirement for Textbooks
4 Challenges
4.1 Shifting to E-learning
4.2 Assessments and Evaluation
4.3 Lack of Motivation and Interaction
4.4 Social Isolation
4.5 Finite to Certain Disciplines
4.6 Inaccessibility to the Computer Illiterate Populace
4.7 Accreditation and Quality Confirmation
5 Methodology
6 Study Results
6.1 E-learning Helps Them Improve Their Time Management
6.2 Does E-learning Enhance Studentsâ Perceived Knowledge?
6.3 Do You Face Any Issues While Using the E-learning Approach?
6.4 Does Face-to-Face Learn Important for Studying Practical Topics?
6.5 Which Learning Device You Prefer to Use in E-learning?
6.6 Which E-learning Applications You Prefer to Use?
6.7 Studentsâ Preference Regarding Employing Classroom Learning or E-learning?
6.8 Studentsâ Satisfaction with Using E-learning
7 Limitations
8 Conclusion
References
Commodity Image Retrieval Based on Convolutional Neural Network and Late Fusion
1 Introduction
2 Commodity Image Retrieval Framework
2.1 Model Optimization Phase
2.2 Model Optimization Phase
3 Experiment
3.1 Commodity Image Dataset
3.2 Performance Evaluation Index
3.3 Experimental Results
4 Conclusion
References
Convolutional Sliding Window Based Model and Synthetic Dataset for Fast Feature Detection
1 Introduction
2 Proposed Method
2.1 Dataset
2.2 Architecture
2.3 Training
2.4 Feature Detection
2.5 Feature Descriptor
3 Results
3.1 Feature Detection Evaluation
3.2 Descriptor and Matching
4 Conclusion and Perspective
References
Convolutional Neural Network for Fire Video Image Detection in the Thermal Power Plant
1 Introduction
2 Images of Fire in Video Inspection Process
2.1 Convolutional Neural Network (CNN)
2.2 Fire Disaster Video Image Detection Depth Degree Neural Network Structure
3 Discussing and Analyzing the Recognition Results
3.1 Experimental Conditions and Data Generation
3.2 Comparison Analysis of Training Curve and Model Performance Indicators
3.3 Experimental Results of Fire Images in Different Scenarios
3.4 Anti-interference Experiments Using Flame Motion Characteristics
4 Conclusion
References
One-Stage vs Two-Stage Deep Learning Method for Bone Abnormality Detection
1 Introduction
2 Related Work
3 Methodology
3.1 Preprocessing
3.2 Features Extraction and Classification
4 Experimental Results
4.1 Dataset
4.2 Evaluation Metrics
4.3 One-Stage Approach Results
4.4 Two-Stage Hierarchical Approach Results
5 Conclusion
References
Smart Grid, Internet of Things, and Mobil Applications
Applications of Internet of Things (IoT) in Agriculture - The Potential and Challenges in Smart Farm in Uganda
1 Introduction
2 Documented IoT Applications in Agriculture
2.1 Water Management
2.2 Soil Management
2.3 Pest Management
2.4 Smart Livestock Farming
2.5 Harvesting and Post-harvesting Management
2.6 The Finnish Experiences
3 Potentials of IoT: Designing a Smart Farm
4 Materials and Methods
4.1 Field Data
4.2 Technology Development
5 Challenges
6 Conclusion
References
The Smart Heater Based on Internet of Things
1 Introduction
2 Literature Review
3 Proposed System
3.1 Hardware Requirements
3.2 Proposed Software
4 Result and Discussion
4.1 Implementation of Smart Heater Model
4.2 Smartphone Application
5 Conclusion and Future Work
References
Combating Against Potentially Harmful Mobile Apps
1 Introduction
2 Background
3 What Are Potentially Harmful Applications (PHA)?
4 Literature Review
5 Potentially Harmful Applications Reported Cases
5.1 Backdoor
5.2 Billing Fraud
5.3 Commercial Spyware
5.4 Hostile Downloaders
5.5 Phishing
5.6 Privilege Escalation
5.7 Ransomware
5.8 Spam
5.9 Trojan
6 Methodology
7 Discussion and Future Work
References
Smart Office Model Based on Internet of Things
1 Introduction
2 Literature Review
3 Proposed System
3.1 Smart Office Network Equipment
3.2 Connection Setup
3.3 Smart Office Network Topology
3.4 Smart Office Network Architecture
4 Methodology
4.1 Implementation and Configuration Devices
5 Conclusion
References
Distribution Network Fault Location Based on Intelligent Algorithm Research
1 Introduction
2 The Fault Location Based on FTU
3 Based on BBPSO Distribution Network Fault Location
3.1 The Basic Principles of PSO and BBPSO
3.2 The Principle of BBPSO in Distribution Network Fault Location
4 Multiple Population Genetic Algorithm
4.1 The Basic Principles of GA and MPGA
4.2 The Principle of MPGA in Distribution Network Fault Location
5 Immune Algorithm (IA): Ant Colony Algorithm
5.1 The Basic Principles of ACO and IA
5.2 The Principle of IA-ACO in Distribution Network Fault Location
6 Conclusion and Future Works
References
Barriers and Challenges to Smart Grid Technology Deployment in the Kingdom of Saudi Arabia (KSA)
1 Introduction
2 Overview of a Smart Grid Network in KSA
2.1 Energy Management
2.2 Cost-Effective and Market Unbundling
3 Requirements, Challenges, and Technological Benefits for Implementation of Smart Grid
3.1 Knowledge Requirement
3.2 Standards Policies, Procedure and Skilled Workforce
3.3 Communication and Coordination Requirements
3.4 Technical and Socio-Economic Challenges
3.5 Technological Benefits
4 Data Analysis and Results
5 Conclusion
References
Mobile Device Application to Detect Dangerous Movements in Industrial Processes Through Intelligence Trough Ergonomic Analysis Using Virtual Reality
1 Introduction
2 Problem Formulation
3 Proposed Method
3.1 Azure Kinect
3.2 Display
3.3 Virtual Reality Glasses
3.4 Computer Processor Analysis
3.5 Graphics Card
3.6 Body Tracking SDK Azure Kinect Integration
3.7 Software Development Kit SDK Kinect Software
3.8 SQL Environment
3.9 Implemented Intelligent Application
3.10 Amazon AWS Sumerian
4 Experiment and Implementation
4.1 Experimental Results
5 Discussion
6 Conclusions and Future Research
References
Hybrid Approach for Improving Slotted ALOHA Based on Capture Effect and ZigZag Decoding Techniques
1 Introduction
2 Related Work
3 Problem Formulation
3.1 Proposed Approach
3.2 Analytical Model
4 Performance Parameters
4.1 Performance Parameters for Unbacklogged Packets
4.2 Performance Parameters for Backlogged Packets
5 Numerical Results
6 Conclusion
References
Finding Data Aggregation Locations in Smart Grids
1 Introduction
2 Related Works
3 The Approach
4 Simulation Results
5 Conclusion
References
IT Governance Framework and Smart Services Integration for Future Development of Dubai Infrastructure Utilizing AI and Big Data, Its Reflection on the Citizens Standard of Living
1 Introduction
2 Overview of RTA Enterprise/Corporate Systems
3 The Importance of Strategic IT Alignment for RTA
4 Conceptual Framework
5 IT Governance Principles in Smart Cities
6 ROI for ICT Smart City Investment
7 Integration of AI and Big Data in Public Service Improvement
8 Risk Assessment of IT Public Projects
9 Conclusion and Recommendations
References
Smart Computer Laboratory: IoT Based Smartphone Application
1 Introduction
2 Literature Review
3 Methodology
3.1 Hardware
3.2 Software
4 Result and Discussion
4.1 Proposed Lab Circuit
4.2 Proposed Smartphone Application
5 Conclusion and Future Works
References
Machine Learning and Metaheuristics Optimization
Pole-Placement Control of Hypothetical Loop Decoupling Design Based on Improved Grey Wolf Optimization Algorithm
1 Introduction
2 Problem Description
3 Grey Wolf Optimizer
3.1 Basic Algorithm
3.2 Improved Algorithm
4 Illustrate Examples
4.1 Basic Unimodal/Multimodal Functions Testing
4.2 Pole-Configuration Optimal Design Based on Imaginary Loop Decoupling
5 Conclusion
References
Improved Firefly Algorithm Based on Community and Migration Strategy and Its Application of PID Controller Design
1 Introduction
2 Firefly Algorithm
2.1 Basic Firefly Algorithm
2.2 Improved Firefly Algorithm
3 Comparison of Typical Evaluation Functions
3.1 Typical Test Functions
3.2 Simulation Results
4 PID Control Optimization
5 Conclusion
References
Algorithm Optimization of Short-Term Load Forecasting Model Based on Least Square Support Vector Machine
1 Introduction
2 LSSVM Model
3 Algorithms Commonly Used in LSSVM
4 PSO Algorithms
5 Genetic Algorithms
6 GWO Algorithms
7 Flow Chart of Optimization of Short-Term Load Forecasting Parameter Algorithm Based on LSSVM Model
8 Analysis of Results
9 Conclusion and Future Works
References
Hyperparameter Optimization Using Genetic Algorithms to Detect Frauds Transactions
1 Introduction
2 Related Work
3 Dataset
3.1 Dataset Description
3.2 Dataset Pre-processing
4 Proposed Solution
5 Results and Discussion
6 Conclusion and Future Work
References
Feature Selection, Classification and Applications
Gender Discrimination at Workplace: Do Artificial Intelligence (AI) and Machine Learning (ML) Have Opinions About It
1 Introduction
2 Literature Review
2.1 Women Discrimination During Recruitment for Jobs, Salary Packages, and Promotions
2.2 Discrimination in Behavior, Communication and Assigning Duties to Women
2.3 Discrimination Due to Age and Conditions of Women
2.4 Sexual Harassment at the Workplace
3 Research Methodology
4 Results and Discussion
4.1 The Nature, Types, and Severity of Women Discrimination at the Workplace
4.2 Strategies for Managing Women Discrimination at the Workplace
5 Artificial Intelligence (AI), Machine Learning (ML), and Gender Discrimination (GD)
6 Conclusion
References
Multi-way Arabic Sentiment Classification Using Genetic Algorithm and Logistic Regression
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Data Cleaning
3.2 Data Preprocessing
3.3 Feature Extraction
3.4 Feature Selection
3.5 Logistic Regression Model
4 Experimental Results
5 Conclusion
References
Classification of Galaxy Images Using Computer Vision and Artificial Neural Network Techniques: A Survey
1 Introduction
2 Data Preprocessing and Augmentation
3 Feature Extraction
4 Network Architecture
5 Performance Metrics
6 Results and Discussion
7 Conclusion and Future Work
References
FPGA Implementation of EEG Classification System for Arm and Fingers Movements Based on Particle Swarm Algorithm
1 Introduction
2 Methods
2.1 Discrete Wavelet Transform
2.2 Particle Swarm Algorithm
3 Proposed Classification System and Implementation
3.1 Classification System
3.2 Wavelet RTL Design
3.3 PSO in Microblaze
4 Results and Discussion
5 Conclusion
References
Improved Document Categorization Through Feature-Rich Combinations
Abstract
1 Introduction
2 Arabic Language Challenges
3 Resources and Tools
3.1 Datasets
3.2 Tools
4 Pre-processing Techniques Combination
5 Feature Selection Methods Combination
6 Classification Algorithms Combination
7 Conclusion
References
Point Cloud Data Reduction Algorithm Based on SIFT3D Features
1 Introduction
2 Basic Principles
2.1 Feature Point Extraction
2.2 K-Means Clustering
3 This Paper Analyzes the Point Cloud Reduction Algorithm
4 Data and Analysis
5 Conclusion
References
Matching Ontologies with Word2Vec Model Based on Cosine Similarity
1 Introduction
2 Preliminaries
2.1 Ontology and Ontology Matching
2.2 Similarity Measure
3 Methodology
3.1 Word2Vec Model
3.2 The Framework of Word2Vec Based Ontology Matching Technique
4 Experiment
5 Conclusion
References
Cyberbullying Classification Methods for Arabic: A Systematic Review
1 Introduction
2 Background
2.1 Arabic Language (AL)
2.2 Overview of Text Classification
2.3 Arabic Text Classification Challenges
2.4 Related Work
3 Research Method
3.1 Articleâs Selection Strategy
3.2 Inclusion and Exclusion Criteria
3.3 Quality Assessment
4 Results and Discussion
5 Conclusion
References
Machine Vision, Robotics, and Speech Recognition
Machine Vision for Aesthetic Quality Control of Reflective Surfaces
1 Introduction
1.1 Contribution
2 Related Work
2.1 Defect Detection
2.2 Generic Object Detectors
3 Data Acquisition
3.1 Dataset
4 Method
4.1 Pre- and Post-processing
4.2 Spatio-Temporal Compensation
5 Results
6 Discussion
7 Conclusions
References
Facial Features Detection: A Comparative Study
1 Introduction
2 Methods Overview
2.1 Discriminative Response Map Fitting
2.2 Ensemble of Regression Tree
2.3 Tasks-Constrained Deep Convolutional Network
2.4 Style Aggregated Network
2.5 Face Alignment Network
2.6 Practical Facial Landmark Detector
3 Datasets and Evaluation Metrics
3.1 Benchmark Datasets
3.2 Evaluation Criteria
4 Experimental Results
4.1 Experimental Setting
4.2 Performance Evaluation
5 Conclusion
References
Applying Mobile Intelligent API Vision Kit and Normalized Features for Face Recognition Using Live Cameras
1 Introduction and Problem
2 Literature Review
3 Artificial Intelligence in Face Detection and Recognition
3.1 Vision
3.2 Use of Artificial Intelligence in the Mobile App
4 Face Detection and Recognition System
4.1 Database Construction
4.2 Facial Feature Extraction
4.3 Face Contour Points of Each Landmark or Object
4.4 Geometrical Normalized Features
4.5 Face Recognition Method
5 Results and Discussion
6 Conclusions and Future Work
References
Improving Neural Silent Speech Interface Models by Adversarial Training
1 Introduction
2 Silent Speech Interfaces Built on Ultrasound Tongue Imaging and Neural Vocoders
3 Generative Adversarial Networks for Articulatory-to-Acoustic Mapping
4 Experimental Set-Up
4.1 Data Sets and Data Preprocessing
4.2 DNN Configuration and Training
5 Results and Discussion
6 Conclusions
References
Towards a Practical Lip-to-Speech Conversion System Using Deep Neural Networks and Mobile Application Frontend
1 Introduction
1.1 Lip-to-Speech Conversion
1.2 Deep Learning in Visual and Audio Recognition Tasks
1.3 Contributions of the Current Paper
2 Methods
2.1 Main Components of the System
2.2 Video Recording Within the Mobile Client
2.3 Processing Video Data
2.4 DNN Training Within the Application Server
3 Results and Discussion
4 Summary and Conclusions
References
Finite Element Euler-Lagrange Dynamic Modeling and Passivity Based Control of Flexible Link Robot
1 Introduction
2 Problem Formulation
3 Euler-Lagrange Dynamic Model Design
4 Passivity Based Control of the Flexible Link Robot
5 Numerical Experiment
6 Discussion
7 Conclusion
References
Analysis of Adversarial Attacks on Face Verification Systems
1 Introduction
2 Related Work
2.1 The Face Verification System
2.2 Adversarial Attacks on Face Verification Systems
3 Methodology
3.1 Fast Gradient Sign Method (FGSM) ch42Goodfellowsps2014
3.2 Projected Gradient Descent (PGD) ch42Madry2017TowardsDL
3.3 AdvFaces ch42Debayansps2019
4 Experimental Results and Discussion
4.1 Evaluation Metrics
4.2 Dataset and Preprocessing
4.3 Experimental Setup
4.4 Generation of Perturbation
4.5 The Effect of Adversary Strength () on Structural Similarity (SSIM)
4.6 Performance of FV System Under Three Types of Attacks
5 Conclusion and Future Work
References
Single-View 3D Mesh Reconstruction and Generation
1 Introduction
2 Related Work
3 Proposed Method
3.1 Overview
3.2 Mesh Reconstruction
3.3 Mesh Autoencoding
4 Experiment
4.1 Setup and Implementation Details
4.2 Results
5 Conclusion
References
Lagrangian Dynamic Model Derivation and Energy Shaping Control of Non-holonomic Unmanned Aerial Vehicles
1 Introduction
2 Kinematic and Dynamic Model of the Non-holonomic UAV
3 Energy Shaping Control of UAV
4 Numerical Experiment
5 Discussion
6 Conclusion
References
Combining BRIEF and AD for Edge-Preserved Dense Stereo Matching
1 Introduction
2 Related Work
3 The Original Algorithm
3.1 BRIEF ch45calonderspsbriefsps2010
3.2 Masking Outliers ch45kangspszhangspsbinarysps2012
4 The Proposed Hybrid Cost Function
4.1 Analysing Binary Aggregation
4.2 The Proposed Cost Computation:
5 Results
6 Conclusion
References
Brain Tumor Segmentation: AÂ Comparative Analysis
1 Introduction
2 Related Work
3 Image Preprocessing
4 Segmentation Techniques
4.1 Seeded Region Growing
4.2 Threshold-Based Segmentation
4.3 k-means Segmentation
5 Experimental and Results
5.1 Dataset
5.2 Accuracy Criteria
5.3 Results
6 Conclusion
References
Action Recognition Using WiFi Radar Signal Characteristics
1 Introduction
2 Signal Pre-processing and Action Feature Extraction
2.1 Outliers Removing and Wavelet Filtering
2.2 Motion Capture and Feature Extraction
3 Three Classifiers
3.1 BP Neural Network
3.2 Support Vector Machine
3.3 Bayesian Network
4 Experimental Results
5 Conclusion
References
Business Intelligence and Applications
Integrating BLE Beacon Technology with Intelligent Information Systems IIS for Operationsâ Performance: A Managerial Perspective
1 Introduction
2 Theoretical Background and Literature Review
2.1 Intelligent Information Systems
2.2 BLE Beacon Technology
2.3 Intelligent Systems and Beacons Technology
2.4 Beacon Technology Practices at Retail Industry
2.5 Beacon Technology Implementation in Retail Industry
3 Conceptual Dilemma of the Study
3.1 Research Questions
4 Discussion of the Proposed Model
4.1 Model Scenario of Beacons Work Mechanism
4.2 Results Discussion
5 Conclusion
6 Challenges and Limitations to Beacons Implementation
References
The Role of Business Intelligence Systems on Green Supply Chain Management: Empirical Analysis of FMCG in the UAE
1 Introduction
2 Research Problem
3 Research Questions
4 Literature Review
5 Research Methodology
5.1 Sample and Data Collection
5.2 Sampling Technique
5.3 Instrument Measures and Scale
6 Findings and Results
7 Discussion and Conclusion
8 Managerial Implications
9 Limitations and Future Research Directions
References
Information Systems Integration to Enhance Operational Customer Relationship Management in the Pharmaceutical Industry
1 Introduction
2 Background and Problem Identification
2.1 Merck â Medco, AÂ Case Study
2.2 Major Problems
2.3 Minor Problems
3 Analysis
3.1 Industrial Analysis: Porters 5 Forces
3.2 Differentiation Analysis: Generic Strategy
3.3 Value Chain Analysis
4 Proposed Solutions
4.1 Using Replication in Database
4.2 Shared Business Function
4.3 Distributed Business Process
5 Conclusion
References
RTAâs Employeesâ Perceptions Toward the Efficiency of Artificial Intelligence and Big Data Utilization in Providing Smart Services to the Residents of Dubai
1 Introduction
2 Literature Review
3 Methods
3.1 Data Collection
3.2 Sample and Population
3.3 Data Processing and Analysis
4 Results and Findings
4.1 Demographic Characteristics of the Respondents
4.2 Perceptions Toward the Efficiency of AI and Big Data Utilization in Providing Smart Services
4.3 The Association Between the Future Benefits and Justified Cost
5 Discussion
6 Concluding Remarks
References
Cybersecurity and IoT
Blockchain-Enabled Internet of Things (IoT) Platforms for Pharmaceutical and Biomedical Research
1 Introduction
2 Internet of Medical Things
3 Blockchain Technology in Healthcare Sector
4 Potential in Biomedical Research
5 Security and Privacy
6 Challenges and Future Work
7 Conclusion
References
Measuring Reliability and Validity Instruments of Technologically Driven Cognitive Intrusion Towards Work-Life Balance
1 Introduction
2 Literature on Technologically Driven Cognitive Intrusion and Work-Life Balance
3 Scale Development
3.1 Dimension 1: Work Interference with Personal Life (WIPL)
3.2 Dimension 2: Personal Life Interference with Work (PLIW)
3.3 Dimension 3: Work Personal Life Enhancement (WPLE)
4 Research Methodology
4.1 Exploratory Factor Analysis (EFA)
4.2 Confirmatory Factor Analysis (CFA)
4.3 Assessment of Reliability
4.4 Scale Reliability
4.5 SEM-Based Methods
4.6 Construct Reliability (CR)
4.7 Variance Extracted (VE)
4.8 Assessment of Validity
4.9 Discriminant Validity
4.10 Nomological Validity
5 Discussion and Conclusion
References
Analysis of Cybercrime on Social Media Platforms and Its Challenges
1 Introduction
2 Related Work
3 Methodology
3.1 Research Questions
3.2 Tools Utilized and System Configuration
3.3 Libraries Used for Analysis
3.4 Data
4 Results
5 Conclusion
References
Convolutional Autoencoder for Anomaly Detection in Crowded Scenes
1 Introduction
2 Related Work
3 Methodology
4 Experimental Results and Comparisons
5 Conclusions
References
Homomorphic Encryption
1 Introduction
2 Literature Review
2.1 Methodology 1: Conceptual Framework
2.2 Methodology 2: Review Based Work
2.3 Methodology 3: Implementation Based Work
3 Pros and Cons of Each Method
4 Selection and Justification of the Preferred Method
5 Preferred Method Detailed Comparison
6 Conclusion
References
Internet of Things Impact on the Future of Cyber Crime in 2050
1 Introduction
2 Industrial Evolution
3 Evolution of IoT
4 IoT Trends
5 IoT Cybercrimes in 2050
6 Conclusion
References
Privacy Issues of Public Wi-Fi Networks
1 Introduction
2 Related Work
3 Methodology
3.1 Setting up Public Wi-Fi
3.2 Collecting User Traffic
3.3 Analysis Collected Data
4 Experimental Result
4.1 Result of Analysis Visited Websites
4.2 Examine the Privacy Leakage
5 Discussion
6 Limitations
7 Conclusion
References
Advanced Machine Learning Technologies
Ice Detection Transmission Line Based on Improved Census Transform
1 Introduction
2 Related Work
3 Methodology
3.1 Binocular Vision System Modeling
3.2 Improvement of Stereo Matching Algorithm Based on Census Transform
4 Experimental Results
5 Conclusion
References
University Selection Model Using Machine Learning Techniques
1 Introduction
2 Literature Review
2.1 University Selection
2.2 Sentiment Analysis
2.3 Machine Learning Techniques
3 University Selection Model
4 Experimental Results
5 Conclusion and Future Work
References
Speaker Verification Using Machine Learning for Door Access Control Systems
1 Introduction
2 Related Works
3 Materials and Methods
3.1 Proposed System
3.2 Data Collection
3.3 Voice Recognition Models
4 Results and Discussion
4.1 Evaluation of Voice Recognition Models
4.2 Voice Recognition for Door Access Control System
4.3 Security Issues
5 Conclusions
References
Management of the Energy Distribution of Cogenerators Units by Genetic Algorithms
1 Introduction
2 Structure of the Energy Production System
2.1 Modeling a Cogeneration Unit
2.2 Problem Statement and Constraints
3 Optimization of Energy Flows
3.1 The Cost Function
3.2 Overview of Artificial Technique: Genetic Algorithm
4 Simulation Results
5 Conclusion
References
Theme Identification for RDF Graphs Based on LSTM Neural Reccurent Network
1 Introduction
2 Related Work
3 Methodology
3.1 The Proposed Instance Extraction Technique
3.2 Word Embedding
3.3 LSTM-RNN for Node Representation
3.4 Clustering RDF Nodes
3.5 Theme Identification
4 Experiments
4.1 Dataset Description
4.2 Results and Discussion
5 Conclusion
References
Dynamic Knowledge Capitalization in Big Data Context: Monte Carlo Tree Search Based Reinforcement Learning
1 Introduction
2 Related Work
3 Monte Carlo Tree Search
4 The Proposed Approach
5 Theoretical Study
6 Experimental Study
7 Conclusion
References
Multi-phase Adaptive Competitive Learning Neural Network for Clustering Big Datasets
1 Introduction
2 Related Work
3 The Proposed MACLNN
3.1 The Pre-processing Phase (Phase 1)
3.2 Phase 2
3.3 Phase 3
4 Experiments and Results
4.1 Datasets
4.2 Measure of Performance
5 Discussion of Results
6 Conclusion
References
Implementing Sequence to Sequence Neural Networks Using C#.Net
1 Introduction
2 Literature Review
3 Algorithm
4 Algorithm Verification
5 Experimental Results
5.1 Dataset Details
5.2 Training Details
5.3 Parallelization
5.4 Experimental Results
5.5 Testing Results
6 Conclusion
References
Media and Non-media Studentsâ Feedback and Improvement of University Teaching and the Learning Environment
1 Background
2 Related Work
2.1 Action Research
3 Research Methodology
3.1 Participants
3.2 Procedure
4 Findings
4.1 Feedback Responses
5 Discussion
6 Conclusion and Future Research
References
Big Data, Digital Transformation, AI and Network Analysis
Case Study of ERP Implementation in Ceramic Company
1 Introduction
1.1 Target Organization
1.2 Scope of Service
1.3 Selected Research Papers and Topics
1.4 Problem Identification and Analysis
1.5 Major Problems
2 Identification and Evaluation of Alternate Solutions
2.1 SAP ERP
2.2 NetSuite
2.3 Sage Intacct
3 Recommendations
3.1 Financial Module
3.2 Human Resource Module
3.3 Manufacturer Management Module
3.4 Inventory Management
3.5 Quality Management
3.6 Sales Management
3.7 Product Technology
4 ERP Implementation Plan
4.1 Hardware and Software Requirements
4.2 Customization
4.3 Integration
4.4 Data Conversion
4.5 Testing
4.6 Training
4.7 Cost
5 Module Integration
5.1 Materials Management
5.2 Sales and Distribution
5.3 Production Planning
6 Conclusion
References
A Survey of Software Development Projects
1 Introduction
1.1 E-Government
1.2 Definition of Software
2 Literature Review
2.1 Software Methodologies
2.2 Software Development Life Cycle
2.3 Software Development Method and Model
2.4 Development Projects
2.5 Software Project Characteristics
3 Conclusion and Future Work
References
The Main Catalysts for Collaborative R&D Projects in Dubai Industrial Sector
1 Introduction
2 Literature Review
3 Method
3.1 The Proposed Model
4 Conclusion
References
Digital Strategies: AÂ Systematic Literature Review
1 Introduction
2 Background and Research Method
2.1 Digital Transformation
2.2 Digital Maturity
3 Search Methodology
3.1 Data Extraction
4 Main Findings
5 Discussion
6 Conclusions
References
How Students Influence Faculty Satisfaction with Online Courses and Do the Age of Faculty Matter
1 Introduction
2 The Study Aim
3 Literature Review and Hypotheses
3.1 Faculty Satisfaction with Online Courses
3.2 Does Instructorsâ Age Moderator Instructors-Students Relationship?
3.3 Theoretical Framework
4 Methodology
4.1 Sampling Procedures
4.2 Measurement of Variables
4.3 Data Analysis
5 Analysis and Results
5.1 Demographic Profile
5.2 Descriptive Statistics
5.3 Reliability
5.4 Correlation
5.5 Regression
6 Conclusion and Future Implications
Appendix 1: The Survey Items Used [29]
References
The Nexus Between Big Data and Decision-Making: A Study of Big Data Techniques and Technologies
1 Introduction
2 Review of Literature
2.1 Nexus of Big Data and Decision-Making - Applications
3 Big Data Techniques and Technologies
3.1 Big Data Techniques
3.2 Big Data Technologies or Tools
4 Research Findings
5 Conclusion and Future Work
References
Author Index
đ SIMILAR VOLUMES
<p><span>This book provides insights into the Third International Conference on Intelligent Systems and Signal Processing (eISSP 2020) held By Electronics & Communication Engineering Department of G H Patel College of Engineering & Technology, Gujarat, India, during 28â30 December 2020. The
<span>This book gathers selected papers presented at the International Conference on Deep Learning, Computing and Intelligence (ICDCI 2021), organized by Department of Information Technology, SRM Institute of Science and Technology, Chennai, India, during January 7â8, 2021. The conference is sponsor
<div><p>This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20â21, 2021. Introducing t
<p>This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20â21, 2021. Introducing the in
<p><span>This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20â21, 2021. Introducing