Advanced Machine Learning Technologies and Applications: Proceedings of AMLTA 2021 [1 ed.]
3030697169, 9783030697167
This book presents the refereed proceedings of the 6th International Conference on Advanced Machine Learning Technologie
275
74
12MB
English
Pages 1164
[1144]
Year 2021
Report DMCA / Copyright
DOWNLOAD PDF FILE
Table of contents :
Preface
Organization
Honorary Chairs
General Chair
Co-chair
International Advisory Board
Program Chairs
Publicity Chairs
Technical Program Committee
Local Arrangement Chairs
Contents
Artificial Intelligence Against COVID-19
Living with COVID-19: A Data Mining Approach for Social Media Learning
1 Introduction
2 Previous Work
3 Classifiers and Accuracy Measurements
4 The Proposed Algorithm
4.1 The Dataset
4.2 Preprocessing
4.3 Classification
5 Experimental Results
5.1 Classification of the Dataset Without Feature Selection
5.2 Classification of the Dataset with Feature Selection
5.3 Enhancing Classifiers Accuracies
6 Conclusions and Future Work
References
LWCOV: LightWeight Deep Convolutional Neural Network for COVID-19 Detection
1 Introduction
2 Related Work
3 The Topology of the Proposed LWCOV Model
3.1 Dataset Collection and Preparation
3.2 Convolution Layer
3.3 ReLU Nonlinearity
3.4 Overlapping Pooling
3.5 Dropout
4 Experimental Results and Discussion
5 Conclusion and Future Work
References
COVID-19 Patient Chest X-Rays: Automatic Detection Using Deep Learning
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Data Augmentation
3.2 Image Enhancement
3.3 Segmentation
3.4 Deep Learning Proposed Model
4 Experiment and Results
4.1 Dataset
4.2 Results
4.3 Visualization
5 Discussion
6 Conclusion and Future Work
References
Detection of COVID-19 from Chest X-Ray Images Using Deep Neural Network with Fine-Tuning Approach
1 Introduction
2 Methodology
2.1 Dataset
2.2 Data Pre-processing
2.3 Convolutional Neural Network (CNN)
2.4 Optimization
2.5 Proposed Approach
2.6 Performance Metrics
3 Experimental Results
3.1 Results
4 Conclusion
References
A Deep Learning Solution Framework for Awareness, Diagnosing and Predicting COVID-19
1 Introduction
2 Stage One (Awareness Stage)
3 Stage Two (Chest X Ray-Diagnose)
3.1 The Proposed Dataset
3.2 Model Architecture and Results
4 Stage Three (COVID-19 Predictor Forecast Model)
4.1 Model Flow and Architecture
4.2 Data Preprocessing
4.3 The Network Hyperparameters
4.4 Countries Test and Results
5 Conclusion
References
COVID-19 Outbreak Learning Prediction Based on Swarm Intelligence Model “Chaotic Fruit Fly Algorithm Followed by Activation Function”
1 Introduction
2 A Literature Review
3 Methodologies and Algorithms
3.1 Chaotic Fruit Fly Optimization (CFFO) Algorithm:
4 Results and Discussions
4.1 Results for CFFO with Sigmoid Function
5 Conclusions and Future work
References
Impact of COVID-19 Pandemic on Diet Prediction and Patient Health Based on Support Vector Machine
1 Introduction
2 Background
3 Methodologies
4 Experimental Results: Discussion and Analysis
4.1 Dataset Description and Experiments Setup
4.2 Experiments Scenarios
5 Conclusions
References
WhatsApp as a Source of E-Learning During Corona Virus Pandemic
1 Introduction
2 Literature Review
3 The Problem Statement
4 Results
5 Discussion and Conclusion
References
Deep Learning Technology and Applications
Text Classification of Arabic Text: Deep Learning in ANLP
1 Introduction
1.1 Aim of the Study
1.2 Research Questions
2 Literature Review
3 Methodology
3.1 Methods
3.2 Data Collection
3.3 Data Analysis
3.4 Expected Outcome
3.5 The Resource Required to Conduct This Research
3.6 Timeline of This Research
4 Conclusion and Future Work
References
Arabic Text Generation: Deep Learning for Poetry Synthesis
1 Introduction
1.1 Experiment Approach
1.2 Technology
2 Related Work
2.1 Word Embedding and Text Generation
2.2 Keywords Inspiration and Expansion
3 Methodology
3.1 Dataset
3.2 Preprocessing
3.3 Sub-Dataset
4 Experiment
4.1 Words Expansion
4.2 Models
4.3 Training
4.4 Path Selection
4.5 Evaluation
5 Conclusion and Future Work
References
Deep Learning Classification Methods for Brain-Computer Interface: An Overview
1 Introduction
2 Deep Neural Networks
3 Deep Learning Approaches for BCI Systems
3.1 Convolutional Neural Networks
3.2 LSTM Neural Network
3.3 Hybrid Network Architectures
4 Deep Learning Platform for BCI Systems
5 Conclusions
References
Solar PV Power Forecasting Approach Based on Hybrid Deep Neural Network
1 Introduction
2 Methodology
2.1 Model of CNN
2.2 Model of LSTM
2.3 Model of CNN-LSTM Hybrid
2.4 Model of Hybrid Deep Neural Network (HDNN)
2.5 Input Layers and Convolutional Layers
2.6 Pooling Layer
3 Simulation Result and Discussion
4 Conclusions
References
Panoramic Radiographic X-Ray Image Tooth Root Segmentation Based on LeNet-5 Networks
1 Introduction
2 Method
2.1 Problem Definition
2.2 Convolutional Neural Network (CNN)
2.3 Image Patches as Input
3 Data Analysis and Preprocessing
3.1 Data Analysis
3.2 Image Processing
4 Experimental Results
5 Conclusion
References
YOLO V3 and YOLO V4 for Masses Detection in Mammograms with ResNet and Inception for Masses Classification
1 Introduction
2 Related Work
3 Methodology
3.1 Datasets
3.2 Phase I: Mammograms Preprocessing
3.3 Phase II: Masses Detection
3.4 Phase III: Masses Classification
4 Experimental Results
4.1 Detection Results
4.2 Classification Results
5 Conclusion
References
Classification of Date Fruits in a Controlled Environment Using Convolutional Neural Networks
1 Introduction
2 Background
2.1 Neural Networks
2.2 Deep Learning
2.3 Convolutional Neural Network Architecture
3 Related Work
4 Methodology
4.1 Dataset Creation
4.2 Pre-processing the Dataset
4.3 Model Development
5 Results
5.1 Dataset
5.2 Models' Performance
6 Conclusion
References
Spoken Arabic Digits Recognition System Using Convolutional Neural Network
1 Introduction
2 Related Work
3 The Convolution Neural Networks
3.1 The Network Architecture
3.2 The Convolution Layer
3.3 The Pooling Layer
4 The Fully Connected Layer
5 Experimental Setup
5.1 Spoken Arabic Digits Dataset
5.2 Proposed Solution
6 Results and Discussion
7 Conclusion and Future Work
References
Machine Learning and Applications
A Holistic Neural Networks Classification for Wangiri Fraud Detection in Telecommunications Regulatory Authorities
1 Introduction
2 Literature Review
3 Problem Statement
4 Methodology
5 Experiment
6 Conclusion
References
An Enhanced Image Fusion Model Based on Fuzzy Transform for 3D Imaging Applications
1 Introduction
2 Related Work
3 The Proposed Image Fusion Model
3.1 Image Registration
3.2 F-Transform
3.3 Image Fusion
3.4 Applying SIFT on the Fused Image
3.5 SURF Descriptor Orientation Assignment
3.6 3D Image Reconstruction from 2D Image
4 Experimental Results
5 Conclusion
References
Genetic K-Means Adaption Algorithm for Clustering Stakeholders in System Requirements
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Data Preparation
3.2 The Clustering Problem
3.3 Distance Measure for Stakeholders' Preferences
4 GKA-RE Technique
4.1 Representation and Renumbering
4.2 Crossover and Mutation
4.3 Fitness Functions
4.4 Selection and K-Means Operator (KMO)
5 Experimental Results
6 Conclusion and Future Work
References
Study of Iterative Learning Control Algorithm in Tourism Management IoT Platform Application
1 Introduction
2 Methodology
3 System Implementation and Verification
4 Conclusion and Future Works
References
The Importance of Discretization Methods in Machine Learning Applications: A Case Study of Predicting ICU Mortality
1 Introduction
2 Methods
2.1 Data Description
2.2 Data Pre-processing
2.3 Discretization Methods
2.4 Classification Methods
2.5 Model Tuning
2.6 Performance Evaluation Metrics
3 Results
3.1 Classification Performance Using Continuous Variables
3.2 Classification Performance Using Parametric Discretization Methods
3.3 Classification Performance Using Non-parametric Discretization Methods
4 Conclusions
References
Job Candidate Rank Approach Using Machine Learning Techniques
1 Introduction
2 Sentiment Analysis
3 Job Recruiting
4 The Proposed Job Candidate Rank Approach
4.1 Sentiment Data Set and Text Processing Phase
4.2 Features Selection Phase
4.3 WordNet Expansion and Focus Group
4.4 Machine Learning Classifiers
5 Experimental Results
6 Conclusion and Future Work
References
Internet of Things Healthcare Systems
A Proactive Decision-Driven Architecture for Information-Aware Internet-of-Things Applications
1 Introduction
2 The Proposed Architecture
2.1 Proactive Congestion-Aware Admission Control Module
2.2 The Proposed Adaptive Priority-Driven Information-Centric Scheduling Module
3 Performance Evaluation
4 Conclusion
References
An Enhanced Object Tracking Algorithm Based on Augmented Reality Markup Language (ARML) for Medical Engineering
1 Introduction
2 Literature Survey
3 Methodology
3.1 Metadata Definition and Clarifying
3.2 Registration and Display
4 Experimental Results
5 Conclusions
References
Business Excellence in Enhancing Global Competitive Advantage in Healthcare Sector of UAE
1 Introduction
1.1 Research Problem
1.2 Significance of the Study
2 Literature Review
3 Research Approach
4 Research Methodology
4.1 Ethical Consideration
4.2 Data Analysis
5 Findings and Discussion
5.1 Demographic Characteristics of Participants
5.2 Results of Statements of the Study
5.3 Reliability Analysis
5.4 Correlation - Pearson Correlation Coefficient
5.5 Chi-Square Tests
5.6 Regression Analysis
5.7 Discussion
6 Conclusion
References
On the Viability of Entropy for Improving Fault Tolerance and Load Balancing in Grid Computing
1 Introduction
2 Related Work
3 Methodology
3.1 Distributed R-tree (DR-tree)
3.2 Entropy Estimation
3.3 Fault Tolerance
3.4 Load Balance
3.5 Threshold Device
4 Experimental Results
5 Conclusions
References
Applying Machine Learning for Securing Data Storage Using Random DNA Sequences and Pseudo-Random Sequence Generators
1 Introduction
1.1 Big Data Features
1.2 Analytical Challenges
2 Previous Work
3 The Methodology
3.1 Data Encryption Algorithm
3.2 Data Decryption Algorithm
3.3 PRNG Algorithm
3.4 Writing DNA Sequence to File
3.5 Reading DNA Sequence from File
4 Conclusions and Future Work
References
Classifications, Clustering and Predictions
Classifying Audio Music Genres Using a Multilayer Sequential Model
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Preprocessing with Anaconda Toolkit
3.2 Preparing GTZAN Dataset
4 Experiment
4.1 Implementing NN for Music Genre Classification
5 Conclusion and Future Work
References
Classifying Audio Music Genres Using CNN and RNN
1 Introduction
2 Methodology
3 Experiment
3.1 Implementing CNN with Max-Pooling for Music Genre Classification
3.2 Implementing RNN with LSTM for Music Genre Classification
3.3 Models Summary
4 Conclusion and Future Work
References
Predicting the Intention to Use Social Media Sites: A Hybrid SEM - Machine Learning Approach
1 Introduction
2 Research Model and Hypotheses Development
2.1 Perceived Playfulness (PP)
2.2 Social Influence (SI)
2.3 TAM Constructs
3 Research Methodology
3.1 Context and Subjects
3.2 Study Instrument
3.3 Pre-test of the Questionnaire
4 Findings and Discussion
4.1 Data Analysis
4.2 Measurement Model Assessment
4.3 Hypotheses Testing and Coefficient of Determination
4.4 Hypotheses Testing Using Machine Learning Algorithms
5 Conclusion
References
Starting Behavior Analysis of Pure Electric Bus Based on K-means Clustering
1 Introduction
2 Sample Data Selection
2.1 Original Data Processing
2.2 Selection of Starting Segments for Pure Electric Buses
3 Starting Behavior Segment Analysis
3.1 Definition of Starting Segment Characteristic Parameters
4 Cluster Analysis of Starting Segments
4.1 K-means Clustering
4.2 Model Building
5 Build the Driving Start Evaluation Model
6 Conclusions and Future Work
References
Critical Features Selection of Training Model for Intrusion Detection System
1 Introduction
2 Methods
2.1 Two-Class Neural Network
2.2 Two-Class Locally-Deep Support Vector Machine
2.3 Two-Class Averaged Perceptron
3 Result and Discussion
3.1 Two-Class Neural Network
3.2 Two-Class Locally-Deep Support Vector Machine
3.3 Two-Class Averaged Perceptron
3.4 Discussion
4 Conclusion and Future Work
References
Dynamic Distributed Clustering Approach Directed to Patient-Centric Healthcare System
1 Introduction
2 Related Work
3 The Proposed Clustering Framework
4 Experimental Results
5 Conclusions
References
Semantic and Arabic Text/Speech Analysis
Semantic Graph Representation and Evaluation for Generated Image Annotations
1 Introduction
2 Related Work
3 Graph-Based Generation and Evaluation for Image Annotations
3.1 Graph Generator Module
3.2 Graph Evaluation Module
4 Experimental Study
4.1 Dataset and Experimental Setup
4.2 Experiments and Results
5 Conclusion
References
Analysis of Arabic Songs: Abdel ElHalim as a Case Study
1 Introduction
2 Data Collection
3 Experimental Analysis
3.1 Study Frequency of Songs
3.2 Composers and Lyricists
4 Conclusion and Future Work
References
Semantic Word Segmenting Technique Based on Artificial Bee Colony Algorithm
1 Introduction
2 An Introduction to the Overall Structure of Chinese Word Segmentation
2.1 The Preprocessing of Chinese Word Segmentation Module
2.2 A Single Objective Discrete Optimization Model with Lexical Semantic Information
3 Optimized Artificial Bee Colony Algorithm
4 Experiments
4.1 Experimental Data and Algorithm Configuration
4.2 Validation Test of Word Segmentation Method Based on Optimized Artificial Bee Colony Algorithm
5 Conclusions
References
Sentiment Analysis in Dialectal Arabic: A Systematic Review
1 Introduction
2 Sentiments Analysis of Arabic Dialects
3 Methodology
3.1 Methods
4 Results and Discussion
4.1 Techniques Used
4.2 Arabic Dialect Studies
4.3 Dataset Source
5 Conclusion
References
Sentiment Analysis of Colloquial Arabic Tweets with Emojis
1 Introduction
2 Previous Work
3 Methedology
3.1 Dataset
3.2 Machine Learning Algorithms
3.3 Feature Selection
3.4 Training and Testing Approach
4 Experimental Results
4.1 Sentiment Classification Training Accuracy
4.2 Tuning Sentiment Analysis Classifier Hyper-parameters
4.3 Sentiment Classification Test Accuracy
5 Sample Predictions
6 Low-Rating Sentiment Polarity Testing
7 Bigram-Based Word Embedding
8 Conclusion
References
Arabic Multi-label Text Classification of News Articles
1 Introduction
2 Literature Review
3 Dataset
4 Proposed Classification Systems
4.1 Classical Classifiers
4.2 Deep Learning Classifiers
4.3 Proposed Deep Learning Models
5 Experimental Results and Discussion
5.1 MLC Using Deep Learning Classifiers
5.2 CNN Predictions
6 Conclusion
References
About the Arabic Media Language: Interfere with Controversy and Dialogue
1 Reading Hypothesis
2 Reading Issues
3 Reading Problems
4 Reading Methodology
5 Organization and Function
6 Media as a Field
7 Cultural Forms
8 Meaning Reactions
9 Media and Language Representations
10 Building of Meaning
11 Language Practice Network
12 Formulate Awareness
13 In Language Development
14 In Linguistic Performance
15 Language and Communication
16 Conclusion
References
Improving the Deaf and Hard of Hearing Internet Accessibility: JSL, Text-into-Sign Language Translator for Arabic
1 Introduction
2 Literature Review
2.1 D/HoH and Educational Challenges
3 Research Model and Study Hypotheses
4 Methodology
4.1 JSL Web Browser
4.2 Sampling
5 Findings
5.1 Measurement-Model Validation
6 Conclusion and Future Work
References
A Proposed Framework for Building Semantic Search Engine with Map-Reduce
1 Introduction
2 Related Works
3 Ontology Based Semantic Search Engine
4 MapReduce
5 Proposed Framework
5.1 User Interface
5.2 Storage
5.3 Indexing
5.4 Query Processing
5.5 Result Formatter
6 Conclusion
References
Event Detection Based on Semantic Terms from Social Data Stream
1 Introduction
2 General Framework for Event Detection Systems
3 Related Work
4 Proposed Approach
4.1 Tweets Crawling Module
4.2 Online Incremental Clustering Module
4.3 Event Detected Search Module
5 Experiment Results and Evaluation
5.1 Dataset
5.2 Approach Evaluation
6 Conclusion
References
Advanced Smart Technologies
Study of Smart Lifting 3D Garage Design Based on the Low-Cost PLC Control System
1 Introduction
2 Smart Lifting 3D Garage Structural Action Design
2.1 Vertical Structure Design of the 3D Garage
2.2 PLC System Design
3 The System Hardware Connection
4 Motor Control Principle
5 Control System Program
6 The Man-Machine Interface Design
7 The Simulation Verification and Discussion
8 Conclusion and Future Works
References
Low-Cost Based on Smart Trash Can Bag Changing System
1 Introduction
2 Methodology
3 Design of Photoelectric Sensor Module
4 Overall Realization
5 Algorithm and Programming for Controlling Motor Forward and Reverse
6 Conclusion and Future Works
References
Understanding Institutional Open Innovation Capabilities Through Advanced Technologies, Culture and Structure
1 Introduction
2 Literature review
2.1 Institutional Infrastructure Capability: Culture
2.2 Institutional Infrastructure Capability: Structure
2.3 Institutional Infrastructure Capability: Advanced Technologies (AI and Machine Learning)
3 Findings
4 Limitations and Future Research Opportunities
5 Conclusion
References
Study of the Degree of Automation of High-Tech Smart Factory: Taiwan 12” Semiconductor Factory Case Study
1 Introduction
2 Literature Review
3 Research Method
4 Results and Discussion
5 Conclusion
References
Smart Vision of School Classroom
1 Introduction
1.1 Significance and Novelty of the Study
1.2 Research Framework
2 Literature Review
2.1 VR History
2.2 VR Definition
2.3 Immersion in VR
2.4 VR Systems
2.5 Hardware Development
2.6 Software Development
3 VR Tools
3.1 Cave
3.2 HMD
3.3 Oculus Rift
4 VR Applications
5 VR in Education
6 Importance of VR in Teaching and Learning
7 Advantages of Using VR
8 Disadvantages of Using VR
9 Discussion
9.1 Future Vision
9.2 Effect on Society
9.3 Cultural Effects
9.4 Workforce Effects
9.5 Challenges Faced by VR
9.6 Suggestions to Enhance Integrating VR into Education
10 Conclusion and Future Work
References
A Grid-Based DAP Placement Approach for Smart Grids
1 Introduction
2 Related Works
3 Problem Description
4 Grid-Based DAP Placement Algorithm
5 Simulation
6 Conclusion
References
The Acceptance of Social Media Sites: An Empirical Study Using PLS-SEM and ML Approaches
1 Introduction
2 Research Model and Hypotheses Development
2.1 Social Influence (SI)
2.2 TAM Constructs
3 Research Methodology
3.1 Context and Subjects
3.2 Study Instrument
3.3 Pre-test of the Questionnaire
4 Findings and Discussion
4.1 Data Analysis
4.2 Measurement Model Assessment
4.3 Hypotheses Testing and Coefficient of Determination
4.4 Hypotheses Testing Using Machine Learning Algorithms
5 Conclusion
References
Service Time Analysis of Go-Back-N ARQ Protocol
1 Introduction
2 Sliding Window Protocols
2.1 Go-Back-N ARQ Protocol
2.2 Selective Repeat ARQ Protocol
3 Mathematical Model Assumptions
4 Service Time Distribution of GBN ARQ Protocol
4.1 First and Second Moments of Service Time Distribution
5 Conclusion
References
The Four Streams of Decision Making Approaches: Brief Summary and Discussion
1 Introduction
2 Decision Making Approaches the Definition
2.1 Rationality Approaches
2.2 Heuristics Approaches
2.3 Intuition Approaches
2.4 Naturalistic Approaches
3 The Four Decision-Making Approaches What and When?
4 The Heuristics Decision Making Approaches
5 The Heuristics and Biases Approach
6 The Fast and Frugal Heuristics Approach
7 The Naturalistic Decision Making Approach
8 Conclusion
References
The Effects of Subjective Norm on the Intention to Use Social Media Networks: An Exploratory Study Using PLS-SEM and Machine Learning Approach
1 Introduction
2 Research Model and Hypotheses Development
2.1 Subjective Norm (SN)
2.2 TAM Constructs
3 Method
3.1 Sampling and Context
3.2 Instrument
4 Results and Discussion
4.1 Data Analysis
4.2 Measurement Model Assessment
4.3 Test of the Structural Model Using SEM-PLS
4.4 Test of the Structural Model Using ML
5 Conclusion and Discussion
References
Towards Improvements on Multi-tenant RDBMS Migration in the Cloud Environment
1 Introduction
2 Related Research Work
3 The Proposed Multi-tenant Database Management System (MT DBMS)
3.1 Multi-tenant Database Management (MT-DBM) Layer
3.2 Multi-tenant Database Layer
4 The Proposed Multi-tenant Migration Strategy
5 The Experimental Results
6 Conclusions and Future Work
References
An Efficient Approach for Query Processing of Incomplete High Dimensional Data Streams
1 Introduction
2 Related Works
3 The Proposed IHDQ Algorithm
4 Experimental Evaluation
5 Results and Analysis
5.1 Clustering Results
5.2 Query Performance Results
6 Conclusion
References
User Awareness of Privacy, Reporting System and Cyberbullying on Facebook
1 Introduction
2 Related Work
2.1 Online Privacy and Facebook Usage
2.2 Cyberbullying
2.3 Facebook Reporting System
3 Methodology
3.1 Research Questions and Hypothesis
3.2 Procedure
3.3 Participants
3.4 Measures
4 Results and Discussion
4.1 Analysis of Facebook Usage Data
4.2 Analysis of Facebook Privacy Data
4.3 Analysis of Facebook Reporting System Data
4.4 Analysis of Cyberbullying Data
4.5 Statistical Analysis
5 Conclusion
Appendix A
References
Software-Defined Networks Towards Big Data: A Survey
1 Introduction
2 SDN Contribution to Big Data
2.1 Big Data Caching
2.2 Energy Consumption in Data Centers
2.3 Big Data Networks
2.4 SDN Employment in Data Center Applications
2.5 SDN-Native Big Data Applications
3 Big Data Contribution to SDNs
3.1 Secure Controller Management
3.2 Prediction of Security Attacks
3.3 Traffic Monitoring
4 Conclusion
References
System Performance of Outband D2D Gateway for Wireless Sensor Networks
1 Introduction
2 System Model
2.1 System Model
2.2 Radio Resource and Channel Model
2.3 SINR and Throughput Calculations
2.4 WSN Throughput
3 Problem Formulation
4 Auction Algorithms for Resource Allocation
5 Simulation Results and Discussion
6 Conclusions
References
Unmanned Aerial Vehicles and Control Systems
Dynamic Integral PID Sliding Mode Attitude-Position Control of Unmanned Aerial Vehicles
1 Introduction
2 Problem Formulation
3 Dynamic Integral PID Controller Design
3.1 Position Controller Design
3.2 Attitude Controller Design
4 Numerical Experiment
4.1 Experiment 1
4.2 Experiment 2
5 Discussion
6 Conclusion
References
Robust Decentralized Asynchronous Control of Unmanned Aerial Vehicles Swarm with Fast Convergence Switching Topology
1 Introduction
2 Problem Formulation
3 Robust Decentralized Asynchronous Control of UAVs Swarm
4 Numerical Experiment
5 Discussion
6 Conclusion
References
Pitch Angle Adaptive PI Controller Based on Heuristics Optimization Algorithms
1 Introduction
2 Modeling of Wind Turbine
3 Adaptive PI Pitch Angle Contoller
3.1 Validaton of the Adaptive PI Controller
4 Optimization Algorithms
4.1 Harmony Search Algorithm HSA
4.2 Genetic Algorithm GA
4.3 Teaching Learning Based Optimization TLBO
4.4 HSA Hybrid GA
4.5 HSA Hybrid TLBO
5 Case Studies and Results
5.1 First Case Study
5.2 Second Case Study
5.3 Third Case Study
5.4 Fourth Case Study
6 Contribution
7 Conclusion
References
Design of Leakage Current Monitoring System for Low Voltage Power Grid Based on NB-IoT
1 Introduction
2 System Design Scheme and Components Selection
2.1 Overall Scheme of the System
2.2 Selection of Main Components
3 Design of Hardware Circuit
3.1 Power Supply Circuit
3.2 Current Acquisition Circuit
3.3 Processor Control Circuit
3.4 Communication Module Circuit
4 Software Design and Cloud Platform Construction
4.1 Realization of Software
4.2 Cloud Platform Construction
5 Function Debugging
5.1 Simulated Leakage Current
5.2 Comprehensive Testing
6 Conclusion
References
Study of Multi-unit UAV in the Optimal Global Scheduling of High Voltage Tower Management Application
1 Introduction
2 Methodology of GOS
3 Experiment and Application Analysis for Multi-unit UAV Application in Power Grids and Towers Detection
4 Conclusion and Future Works
References
Interleaved DC/DC Boost Converter for Hybrid Electric and Electrical Vehicles
1 Introduction
2 Design of Interleaved DC/DC Boost Converter
2.1 Components Required for Design
2.2 Inductor Design
3 Simulation Results
4 Conclusion
References
Modeling and Control of a Pantograph Mechanism Interacting with the Environment
1 Introduction
2 System Description
3 Experimental Setup
4 Mathematical Modeling
4.1 Direct Kinematics
4.2 Inverse Kinematics
4.3 Dynamic Analysis
5 Model Implementation in MATLAB
6 Control Technique
7 Results and Discussion
8 Conclusion
References
Research on the Welding System of Soft Pack Power Battery Tabs Based on Laser Sensor
1 Introduction
2 System Overall Scheme Design
3 Principles and Methods of System Detection
3.1 Working Principle
3.2 Data Preprocessing
3.3 Data Fitting Processing
4 Testing and Analysis
4.1 Detection Process
4.2 Experimental Data and Data Processing
5 Conclusion
References
A Comprehensive Survey on Vehicular Ad Hoc Networks (VANET)
1 Introduction
2 Architecture
3 Dedicated Short Range Communication (DSRC)
3.1 DSRC PHY/MAC Layer
3.2 DSRC MAC Sublayer Extension
3.3 DSRC Network Layer
4 Congestion Control Approaches
4.1 Safety Messages
4.2 Performance Metrics
4.3 Transmission Parameters
4.4 Proactive Approach
4.5 Reactive Approach
4.6 Hybrid Approach
5 Routing Protocols
5.1 Topology-Based Routing Protocol
5.2 Location-Based Routing Protocol
5.3 Sequence Control
5.4 Attacks
6 Challenges and Open Issues
6.1 Technical Challenges
6.2 Non-technical Challenges
7 Conclusion
References
Intelligent Systems and Applications
An Empirical Evaluation of the Credibility, Trust Perceptions, and Compatibility with Cloud-Based Services: The Case of Higher Education in Malaysia
1 Introduction and Literature Review
1.1 Hypotheses Development
2 Methodology
2.1 Measurements and Survey Instrument Development
2.2 Sample Size and Sampling Procedure
3 Findings
3.1 Descriptive Statistics
3.2 Measurement Model Assessment
3.3 Structural Model Evaluation and Hypotheses Testing
4 Discussion
4.1 Relationship BI → CComputADP
4.2 Relationship ATT → BI
4.3 Relationship PERTRT → ATT
4.4 Relationships PERCRD → ATT and PERTRT
4.5 Relationship APPCOM → BI
5 Conclusion, Implications, Limitations, and Future Work
References
A Distributed Artificial Intelligence Framework to Evolve Infrastructure Resilience in Telecommunications Sector
1 Introduction
1.1 Contribution
2 Literature Review
3 Overview of Telecommunications Infrastructure Resilience via Decentralized AI
4 The Data Revolution Through a Comparison Between Resilience and Revisited Definition
4.1 Resilience Classic Notion
4.2 Risk-Aware Energy Distributed Model
4.3 Resilience Management System’s Update
5 Improving Resilience Through Edge Intelligence and Distributed Power Storage
6 Conclusion
References
Hybrid Cryptographic Approach to Safeguard Cloud Computing Services: A Survey
1 Introduction
2 Literature Survey
3 Methodology
4 Experimental Results and Analysis
5 Conclusions and Future Work
References
Salient Object Detection Using Spatially Weighted Multiple Contrast Cues
1 Introduction
2 The Proposed Approach
2.1 Preprocessing
2.2 Interest Regions Connectivity
2.3 Global Contrast
2.4 Optimized Center-Biased Weighted Map
2.5 Refinement and Final Saliency Map
3 Experiments and Discussion
3.1 Qualitative Evaluation
3.2 Quantitative Evaluation
4 Conclusion
References
EgyHealth System: A Mobile Healthcare System Application with Android and Cloud Computing
1 Introduction
2 Related Work
3 Methods and Design
3.1 Software
3.2 Research Methods
3.3 EgyHealth System Flowchart
3.4 Model Architecture
3.5 EgyHealth Cloud Computing
3.6 EgyHealth Users
3.7 EgyHealth Mobile Application
3.8 Healthcare Mobile System Implementation
4 EgyHealth System Security
5 Results and Analysis
6 Conclusion
References
Research on the Impact of Product Attributes on Online Reputation of Goods Based on the EML
1 Introduction
2 Analysis of the Influence Mechanism of Online Reputation of Goods
2.1 Product Attribute
2.2 The Elaboration Likelihood Model
3 Model
3.1 Publisher Comment Publisher’s Opinion Weight
3.2 Importance of Attributes and Emotional Preference of Product Attributes
3.3 Calculate the Popularity of Goods
3.4 Construction of Online Reputation Model for Goods
4 Experimental and Data Analysis
4.1 Data Collection
4.2 Result Analysis
5 Conclusion
References
Techno-Economic Optimization of Power Distribution Networks Reconfiguration Using Sunflower Optimizer
1 Introduction
2 Problem Formulation
2.1 Power Flow Analysis
2.2 Objective Function
2.3 Constraints
3 Optimization Methodology
3.1 Sunflower Optimizer
3.2 Implementation of SFO to Distribution Network Reconfiguration Problem
4 Test Systems Description, Simulation Results, and Discussions
4.1 Test Systems Description
4.2 Simulation Results and Discussion
5 Comparison with Other Optimization Methods
6 Conclusions
References
Predicting Customer Churn in the Internet Service Provider Industry of Developing Nations: A Single, Explanatory Case Study of Trinidad and Tobago
1 Introduction
2 Literature Review
3 Methodology
3.1 Decision Tree
3.2 Logistic Regression
3.3 Support Vector Machine (SVM)
3.4 Pearson Correlation
3.5 Performance Measures
4 Experiment Results and Discussion
4.1 Dataset
4.2 Data Pre-processing
4.3 Results and Discussion
5 Conclusion
References
Analysis of Risks Assessment in Multi Software Projects Development Environment Using Classification Techniques
1 Introduction
2 Literature Review
3 Research Experiment
3.1 The Relationships Between Risk Features and Risk Level
3.2 Identify Top Risks Across Simultaneous Multi-projects
4 Conclusion and Future Works
References
Research on Pre-view Method of Safety Level of Cascading Trip for Power Grid
1 Introduction
2 Expression Form of Grid Cascading Trip
3 Analysis Model of Grid Safety Level for Cascading Trip
4 The Solution to the Calculation Model of Safety Level
5 Case Analysis
6 Conclusion
References
A Novel Evidential Reasoning Approach for Multiple Attribute Decision Making Considering Reliability
1 Introduction
2 Preliminaries
2.1 The ER Approach
2.2 Entropy
3 An ER Based MADA Method Concerning Reliability
3.1 The Drawback of ER
3.2 The Reliability and Its Measure
3.3 The Proposed MADA Model
4 Illustrative Example and Analyzing
5 Conclusions
References
Overview of Network Security Situation Awareness Based on Big Data
1 Introduction
2 Network Security Situation Awareness
2.1 Problems in Traditional Network Security
2.2 Network Security Situation Awareness Based on Big Data
3 Network Security Situation Awareness Architecture
3.1 Data Acquisition and Preprocessing
3.2 Data Mining Analysis
3.3 Visualization of the Security Situation
3.4 Traceability
3.5 Safety Equipment Linkage Feedback
4 Difficulties in Situation Awareness Research
4.1 Large Data Processing and Analysis Precision of Anomaly Attack
4.2 Visualization and Collaboration of Situation Awareness
5 Conclusion
References
Security Analysis of a Multi-server-Based e-Healthcare Scheme
1 Introduction
2 Review of Barman et al.’s Scheme
2.1 Registration Phase
2.2 Login and Key-Establishment Phase
3 Analysis of the Barman et al.’s Scheme
3.1 Adversarial Model
3.2 Known Session Specific Temporary Information Attack
3.3 Leakage of the Session Key
3.4 Man-In-The-Middle Attack
4 Conclusion and Future Work
References
Evaluation of Compatibility of Cloud-based Applications, Credibility, and Trust Perceptions on the Adoption of Cloud Technology: A Review
1 Introduction
2 Literature Review
2.1 Summary Background on Cloud Computing
2.2 Hypotheses Development
3 Conclusion
References
Optimizations and Evolutionary Algorithm
Improved Parallel Bat Algorithm Based on a Communication Strategy
1 Introduction
2 Bat-Inspired Algorithm
3 Parallel Bat Algorithm Based on a Communication Strategy
4 Experimental Results
5 Conclusion
References
Research on Task Scheduling Algorithm of Cloud Computing Based on Bilateral Selection
1 Introduction
2 Data Pre-processing
3 The Task Scheduling Model Based on Bilateral Selection
3.1 The Task Scheduling Process Based on Bilateral Selection
3.2 The Selection Mechanism of Resource Node Response
3.3 The Selection Mechanism of Task Node
4 The Task Scheduling Algorithm of Cloud Computing Based on Bilateral Selection
5 Numerical Results
6 Conclusion
References
A Multi-objective Pigeon-Inspired Optimization Algorithm Based on Decomposition
1 Introduction
2 Basic Pigeon-Inspired Optimization
3 The Proposed Algorithm
4 Experimental Studies
5 Conclusions
References
An Improvement R2 Indicator for Many-Objective Optimization
1 Introduction
2 Proposed Methods
2.1 The Updated Strategy Based on the Improvement R2 Indicator
2.2 Multi-search Strategy Based on Decomposition
2.3 Steps of the Proposed Algorithm
3 Experimental Results and Discussion
4 Conclusions
References
Optimizing Ontology Alignments Through Evolutionary Algorithm with Adaptive Selection Strategy
1 Introduction
2 Related Concepts
2.1 Ontology Matching System
2.2 Similarity Measures
2.3 Alignment Evaluation
3 Ontology Meta-matching Based on Improved EA
3.1 Optimization Model
3.2 Improved Evolution Algorithm
4 Experimental Results and Analysis
5 Conclusion
References
An Interactive Multi-Objective Ontology Matching Technique
1 Introduction
2 Related Definition
2.1 Ontology Matching
2.2 Meta-matching
3 Interactive Multi-Objective Ontology Matching Technique (IMOOM)
3.1 Approximate Evaluation Function
3.2 The Operators of IMOOM
4 Experimental Results and Analysis
4.1 Experiments Configuration
4.2 Results and Analysis
5 Conclusion
References
Matching Ontologies Through Evolutionary Algorithm with Context-Based Reasoning
1 Introduction
2 Preliminaries
2.1 Ontology and Ontology Matching
2.2 Similarity Measures
2.3 Alignment Evaluation Metrics According to Reference Alignment
3 Evolutionary Algorithm with Context-Based Reasoning
3.1 Chromosome Encoding
3.2 Fitness Function
3.3 Evolutionary Operators
4 Experiments
4.1 Experiment Setup
4.2 Results and Analysis
5 Conclusions and Future Work
References
A Solution for Cascade Hydropower Station Reservoirs Optimal Operation Based on Improved Bat Algorithm
1 Introduction
2 Reservoir Power Generation Operation Problem
3 Improve Bat Algorithm (IBA)
3.1 Standard Bat Algorithm
3.2 Implementing IBA
3.3 The Main Steps of the IBA
4 Cascade Hydropower Station Reservoirs Optimal Operation
5 Conclusion
References
Optimal Operation of Reservoir Power Generation Based on Improved Grey Wolf Algorithm
1 Introduction
2 Reservoir Power Generation Optimization Operation Model
2.1 Objective Function
2.2 Restrictive Condition
3 The Wolf Algorithm
3.1 Predation Behavior of Gray Wolf Groups
3.2 A Mathematical Model of the Grey Wolf Algorithm
3.3 Improved Grey Wolf Algorithm
4 Experimental Data
4.1 Test on Standard Function
4.2 Application in Reservoir Power Generation
5 Conclusions
References
Threshold Image Segmentation for Non-uniform Illumination Using Otsu Optimization Approach
1 Introduction
2 Otsu Algorithm
2.1 Improved Otsu Algorithm
2.2 Algorithm Steps
3 Experimental Results and Analysis
4 Conclusion and Future Works
References
Context-Based Zero Database Watermarking Scheme Based on Evolutionary Mechanism
1 Introduction
2 Literature Review: Integrity Checking-Based Watermarking
3 Content Integrity Solution for Ubiquitous Database Accessing
4 Experimental Results
5 Conclusions
References
Data Acquisition, Ontology, Software Engineering
A Novel Particle Filtering Data Acquisition Algorithm Integrating Random Time-lag and Packet Loss Compensation
1 Introduction
2 Related Work
3 Data Acquisition in WSNs
4 The Time Delay Measurement Design Algorithm
4.1 Time Delay Measurement and Correction of the Sensor Network
4.2 Design of Correction Methods for Data Estimation
4.3 Particle Filter and Its Improved Algorithm Analysis
5 Experimental Results and Analysis
6 Conclusion
References
Argumentation Based Ontology Alignment Extraction
1 Introduction
2 Ontology and Ontology Alignment Extraction
2.1 Ontology
2.2 Ontology Alignment Extraction
3 AF-Based Ontology Alignment Extracting
4 Experiment
4.1 Experimental Configuration
4.2 Experimental Result and Analysis
5 Conclusions
References
Resource-Constrained Project Scheduling of Cloud Platform Based on Column Generation Algorithm
1 Introduction
2 Summary of Relevant Work
3 Problem Description
4 Integer Linear Scheduling Definition
5 Scheduling Algorithm Based on Column Generation
5.1 Master Problem
5.2 Sub-problems
6 Experimental Results and Analysis
7 Conclusion
References
Global Exponential Stabilization for a Class of Nonlinear Singular Systems with Sector Actuator
1 Introduction
2 Problem Formulation and Main Result
3 An Illustrative Example
4 Conclusion and Future Works
References
FPGA Design and Implementation of a Self-Visual Acuity Test System
1 Introduction
2 System Overview
3 Hardware Implementation of Intelligent Vision Test
3.1 VGA Display Module
3.2 Nixie Tube Module
4 Experimental Results
5 Conclusion
References
A Virtual Menu Using Gesture Recognition for 3D Object Manipulation in Mixed Reality
1 Introduction
2 Related Work
3 Methodology
3.1 Gesture States
3.2 Coordinate Transformation
3.3 Menu Design
4 Experiment
4.1 Participants
4.2 Experimental Design
4.3 Experimental Results
4.4 Discussion
5 Conclusion
References
Feedback Vocal Rehabilitation Software Applied to Mobile Devices for Maximum Phonation Time
1 Introduction
2 Related Work
2.1 The Mechanism of Breathing During Speech
2.2 Mechanism Theory of Speech Production
2.3 The Effect of Abnormal Breathing on Vocalization
3 Research Method
3.1 Research Structure
3.2 Research Experiment
3.3 Voice Mechanism
4 Experimental Results and Analyses
5 Conclusion
References
Study of Data Repetitive Record Cleaning Technology of MES System in High-Tech Process
1 Introduction
2 Methodology
3 System Implementation and Verification
4 Conclusion and Future Works
References
Intelligent Systems
Restraining Strategy of Photovoltaic Power Fluctuation Based on Hybrid Energy Storage System
1 Introduction
2 Structure of a Hybrid Storage System
3 Control Strategy
4 Optimization Configuration of Hybrid Energy Strage System Capacity
4.1 Capacity of Battery
4.2 Capacity of Super Capacitor
5 Simulation and Analysis
6 Conclusion
References
Combining BRIEF and AD for Edge-Preserved Dense Stereo Matching
1 Introduction
2 Related Work
3 The Original Algorithm
3.1 BRIEF [3]
3.2 Masking Outliers [12]
4 The Proposed Hybrid Cost Function
4.1 Analysing Binary Aggregation
4.2 The Proposed Cost Computation
5 Results
6 Conclusion
References
Design of Turbo Codes for CubeSats
1 Introduction
2 Literature Review
3 Background
3.1 Turbo Encoder Components
3.2 Decoder
4 Methodology
4.1 Encoder Constraint Length
4.2 Interleaver Function
4.3 Message Length
4.4 Number of Iterations
4.5 Punctured Turbo Code
5 Results and Discussion
5.1 Constraint Length = 3
5.2 Constraint Length = 4
5.3 Constraint Length = 5
5.4 Modeling Results
5.5 Punctured Turbo Code
5.6 Turbo Encoder Selected Design
6 Conclusions
References
Design and Implementation of a Web-DNA-Based Security Provider Using Python
1 Introduction
2 Related Work
3 The Proposed Work
3.1 The Algorithms Details
3.2 Website Structure
4 Results and Discussion
5 Conclusions and Future Work
References
Author Index