Professional Documents
Culture Documents
Articles of Computer
Science & Information
Technology @ 2020
http://airccse.org/journal/ijcsit.html
NEW ALGORITHMS FOR COMPUTING FIELD OF VISION OVER
2D GRIDS
Evan R.M. Debenham and Roberto Solis-Oba, The University of Western Ontario, Canada
.
ABSTRACT
The aim of this paper is to propose new algorithms for Field of Vision (FOV) computation
which improve on existing work at high resolutions. FOV refers to the set of locations that
are visible from a specific position in a scene of a computer game.
We summarize existing algorithms for FOV computation, describe their limitations, and
present new algorithms which aim to address these limitations. We first present an algorithm
which makes use of spatial data structures in a way which is new for FOV calculation. We
then present a novel technique which updates a previously calculated FOV, rather than
recalculating an FOV from scratch.
We compare our algorithms to existing FOV algorithms and show they provide substantial
improvements to running time. Our algorithms provide the largest improvement over
existing FOV algorithms at large grid sizes, thus allowing the possibility of the design of
high resolution FOV-based video games.
KEYWORDS
ABSTRACT
Prioritization of machine learning projects requires estimates of both the potential ROI of
the business case and the technical difficulty of building a model with the required
characteristics. In this work we present a technique for estimating the minimum required
performance characteristics of a predictive model given a set of information about how it
will be used. This technique will result in robust, objective comparisons between potential
projects. The resulting estimates will allow data scientists and managers to evaluate whether
a proposed machine learning project is likely to succeed before any modelling needs to be
done. The technique has been implemented into the open source application MinViME
(Minimum Viable Model Estimator) which can be installed via the PyPI python package
management system, or downloaded directly from the GitHub repository. Available at
https://github.com/john-hawkins/MinViME.
KEYWORDS
Machine Learning, ROI Estimation, Machine Learning Metrics, Cost Sensitive Learning.
[1] J. Johnson and T. Khoshgoftaar, “Medicare fraud detection using neural networks,” Journal of
Big Data, vol. 63, no. 6, 2019. [Online]. Available: https://doi.org/10.1186/ Computer Science
& Information Technology (CS & IT) 45 s40537-019-0225-0 Cited on page(s): 33
[2] C. Hennig and M. Kutlukaya, “Some thoughts about the design of loss functions,” REVSTAT
- Statistical Journal Volume, vol. 5, pp. 19–39, 04 2007. Cited on page(s): 33
[6] Y. Tian and W. Zhang, “Thors: An efficient approach for making classifiers cost-sensitive,”
IEEE Access, vol. 7, pp. 97 704–97 718, 2019. Cited on page(s): 33 [7] H. Fatlawi,
“Enhanced classification model for cervical cancer dataset based on cost sensitive classifier,”
08 2017. Cited on page(s): 33
[9] O. Ylijoki, “Guidelines for assessing the value of a predictive algorithm: a case study,”
Journal of Marketing Analytics, vol. 6, 01 2018. Cited on page(s): 33
[10] S. Raudys and A. Jain, “Small sample size effects in statistical pattern recognition:
Recommendations for practitioners,” Pattern Analysis and Machine Intelligence, IEEE
Transactions on, vol. 13, pp. 252–264, 04 1991. Cited on page(s): 34
[11] I. E. Sanchez, “Optimal threshold estimation for binary classifiers using game theory,” ISCB
Comm J, p. 2762, 2017. [Online]. Available: https://doi.org/10.12688/f1000research.10114.3
Cited on page(s): 35
[12] A. P. Bradley, “The use of the area under the roc curve in the evaluation of machine learning
algorithms,” Pattern Recognition, vol. 30(7), pp. 1145–1159, 1997. Cited on page(s): 38
GENETIC ALGORITHM FOR EXAM TIMETABLING PROBLEM - A
SPECIFIC CASE FOR JAPANESE UNIVERSITY FINAL
PRESENTATION TIMETABLING
ABSTRACT
KEYWORDS
[1] Song, Y., Wang, F., & Chen, X. (2019). An improved genetic algorithm for numerical function
optimization. Applied Intelligence, 49(5), 1880-1902.
[2] Qu, R., Burke, E. K., McCollum, B., Merlot, L. T., & Lee, S. Y. (2009). A survey of search
methodologies and automated system development for examination timetabling. Journal of
scheduling, 12(1), 55-89.
[3] Carter, M. W., & Laporte, G. (1995, August). Recent developments in practical examination
timetabling. In International Conference on the Practice and Theory of Automated Timetabling
(pp. 1-21). Springer, Berlin, Heidelberg.
[4] Thompson, J. M., & Dowsland, K. A. (1996). Variants of simulated annealing for the
examination timetabling problem. Annals of Operations research, 63(1), 105-128.
[5] Thompson, J. M., & Dowsland, K. A. (1998). A robust simulated annealing based examination
timetabling system. Computers & Operations Research, 25(7-8), 637-648.
[6] Di Gaspero, L., & Schaerf, A. (2000, August). Tabu search techniques for examination
timetabling. In International Conference on the Practice and Theory of Automated Timetabling
(pp. 104-117). Springer, Berlin, Heidelberg.
[7] Abdullah, S., Ahmadi, S., Burke, E. K., Dror, M., & McCollum, B. (2007). A tabu-based large
neighbourhood search methodology for the capacitated examination timetabling problem.
Journal of the Operational Research Society, 58(11), 1494-1502.
[8] Azimi, Z. N. (2005). Hybrid heuristics for examination timetabling problem. Applied
Mathematics and Computation, 163(2), 705-733.
[9] Eley, M. (2006, August). Ant algorithms for the exam timetabling problem. In International
Conference on the Practice and Theory of Automated Timetabling (pp. 364-382). Springer,
Berlin, Heidelberg.
[10] Mandal, A. K., & Kahar, M. N. M. (2015, April). Solving examination timetabling problem
using partial exam assignment with great deluge algorithm. In 2015 International Conference on
Computer, Communications, and Control Technology (I4CT) (pp. 530-534). IEEE.
[11] Leite, N., Fernandes, C. M., Melicio, F., & Rosa, A. C. (2018). A cellular memetic algorithm
for the examination timetabling problem. Computers & Operations Research, 94, 118-138.
[12] Rozaimee, A., Shafee, A. N., Hadi, N. A. A., & Mohamed, M. A. (2017). A framework for
university’s final exam timetable allocation using genetic algorithm. World Applied Sciences
Journal, 35(7), 1210-1215. 12 Computer Science & Information Technology (CS & IT)
[13] Shatnawi, A., Fraiwan, M., & Al-Qahtani, H. S. (2017, February). Exam scheduling: A case
study. In 2017 Ninth International Conference on Advanced Computational Intelligence
(ICACI) (pp. 137- 142). IEEE.
[14] Dener, M., & Calp, M. H. (2019). Solving the exam scheduling problems in central exams with
genetic algorithms. arXiv preprint arXiv:1902.01360.
[15] Gozali, A. A., Kurniawan, B., Weng, W., & Fujimura, S. (2020). Solving university course
timetabling problem using localized island model genetic algorithm with dual dynamic
migration policy. IEEJ Transactions on Electrical and Electronic Engineering, 15(3), 389-400.
[16] E. Zitzler, K. Deb, and L. Thiele, “Comparison of multiobjective evolutionary algorithms:
Empirical results,” Evol. Comput., vol. 8, no. 2, pp. 173–195, Summer 2000.
[17] G. Rudolph, “Evolutionary search under partially ordered sets,” Dept. Comput. Sci./LS11,
Univ. Dortmund, Dortmund, Germany, Tech. Rep. CI-67/99, 1999.
[18] Ahn, C. W., & Ramakrishna, R. S. (2003). Elitism-based compact genetic algorithms. IEEE
Transactions on Evolutionary Computation, 7(4), 367-385.
[19] M. Schoenauer and S. Xanthakis, “Constrained GA optimization,” in Proc. Int. Conf. Genetic
Algorithms, vol. 5, 1993, pp. 573–580.
[20] Gozali, A. A., & Fujimura, S. (2019). DM-LIMGA: dual migration localized island model
genetic algorithm—a better diversity preserver island model. Evolutionary Intelligence, 12(4),
527-539.
[21] Sun, X., Chou, P., Wu, C. C., & Chen, L. R. (2019). Quality-oriented study on mapping island
model genetic algorithm onto CUDA GPU. Symmetry, 11(3), 318.
FINDING MUSIC FORMAL CONCEPTS CONSISTENT WITH
ACOUSTIC SIMILARITY
ABSTRACT
In this paper, we present a method of finding conceptual clusters of music objects based on
Formal Concept Analysis. A formal concept (FC) is defined as a pair of extent and intent
which are sets of objects and terminological attributes commonly associated with the
objects, respectively. Thus, an FC can be regarded as a conceptual cluster of similar objects
for which its similarity can clearly be stated in terms of the intent. We especially discuss
FCs in case of music objects, called music FCs. Since a music FC is based solely on
terminological information, we often find extracted FCs would not always be satisfiable
from acoustic point of view. In order to improve their quality, we additionally require our
FCs to be consistent with acoustic similarity. We design an efficient algorithm for extracting
desirable music FCs. Our experimental results for The MagnaTagATune Dataset shows
usefulness of the proposed method.
KEYWORDS
Formal concept analysis, music formal concepts, music objects, terminological similarity,
acoustic similarity.
2. S. Marsland, Machine Learning: An Algorithmic Perspective, Second Edition, CRC Press, 2015.
4. T. Li, M. Ogihara and G. Tzanetakis (eds.). Music Data Mining, CRC Press, 2012.
5. D. Paul and S. Kundu. A Survey of Music Recommendation Systems with a Proposed Music
Recommendation System, Emerging Technology in Modelling and Graphics, AISC-937, pp.
279 – 285, Springer, 2020.
6. Y. Song, S. Dixon and M. Pearce. A Survey of Music Recommendation Systems and Future
Perspectives, In Proc. of the 9th Int’l Symp. on Computer Music Modeling and Retrieval -
CMMR’12, pp. 395 – 410, 2012.
7. D. Lin and S. Jayarathna. Automated Playlist Generation from Personal Music Libraries, In Proc.
of 2018 IEEE Int’l Conf. on Information Reuse and Integration for Data Science, pp. 217 – 224,
2018.
8. F. M¨orchen, A. Ultsch, M. N¨ocker and C. Samm. Visual Mining in Music Collections, From
Data and Information Analysis to Knowledge Engineering, M. Spiliopoulou, R. Kruse, C.
Borgelt, A. N¨urnberger and W. Gaul (eds.), pp. 724 – 731, Springer, 2006.
9. E. Law, K. West, M. Mandel, M. Bay and J. S. Downie. Evaluation of Algorithms Using Games:
The Case of Music Tagging, In Proc. of the 10th Int’l Conf. on Music Information Retrieval -
ISMIR’09, pp. 387 – 392, 2009.
10. P. Knees and M. Schedl. A Survey of Music Similarity and Recommendation from Music
Context Data, ACM Transactions on Multimedia Computing, Communication and
Applications, 10(1), Article 2, 2013.
12. D. Wang, T. Li and M. Ogihara. Are Tags Better Than Audio Features? The Effect of Joint Use
of Tags and Audio Content Features for Artistic Style Clustering, In Proc. of the 11th Int’l
Society for Music Information Retrieval Conference - ISMIR’10, pp. 57 – 62, 2010.
13. R. Miotto and N. Orio. A Probabilistic Model to Combine Tags and Acoustic Similarity for
Music Retrieval, ACM Transactions on Information Systems, 30(2), Article 8, 2012.
14. P. Knees, T. Pohle, M. Schedl, D. Schnitzer, K. Seyerlehner and G. Widmer. Augmenting Text-
Based Music Retrieval with Audio Similarity, In Proc. of the 10th Int’l Society for Music
Information Retrieval Conference - ISMIR’09, pp. 579 – 584, 2009. 14 Computer Science &
Information Technology (CS & IT)
15. A. Ahmad and S. S. Khan. Survey of State-of-the-Art Mixed Data Clustering Algorithms, IEEE
Access, 7, pp. 31883 – 31902, 2019.
17. L. Kumar A. Mitra, M. Mittal, V. Sanghvi, S. Roy and S. K. Setua. Music Tagging and
Similarity Analysis for Recommendation System, Computational Intelligence in Pattern
Recognition, AISC-999, pp 477 – 485, Springer, 2020.
18. D. Turnbull, L. Barrington and G. Lanckriet. Five Approaches to Collecting Tags for Music, In
Proc. of the 9th Int’l Society for Music Information Retrieval Conference - ISMIR’08, pp. 225 –
230, 2008.
19. B. Ganter and R. Wille. Formal Concept Analysis – Mathematical Foundations, 284 pages,
Springer, 1999.
20. B. Ganter, G. Stumme and R. Wille (Eds). Formal Concept Analysis – Foundations and
Applications, LNAI-3626, 348 pages, Springer, 2005.
21. P. Knees and M. Schedl. Music Similarity and Retrieval, Springer, 2016.
22. R. Rymon. Search through Systematic Set Enumeration, In Proc. of Int’l Conf. on Principles of
Knowledge Representation Reasoning - KR’92, pp. 539 – 550, 1992.
CONCATENATION TECHNIQUE IN CONVOLUTIONAL NEURAL NETWORKS
FOR COVID-19 DETECTION BASED ON X-RAY IMAGES
ABSTRACT
In this paper we present a Convolutional Neural Network consisting of NASNet and MobileNet in
parallel (concatenation) to classify three classes COVID-19, normal and pneumonia, depending on a
dataset of 1083 x-ray images divided into 361 images for each class. VGG16 and RESNet152-v2
models were also prepared and trained on the same dataset to compare performance of the proposed
model with their performance. After training the networks and evaluating their performance, an
overall accuracy of 96.91%for the proposed model, 92.59% for VGG16 model and 94.14% for
RESNet152. We obtained accuracy, sensitivity, specificity and precision of 99.69%, 99.07%, 100%
and 100% respectively for the proposed model related to the COVID-19 class. These results were
better than the results of other models. The conclusion, neural networks are built from models in
parallel are most effective when the data available for training are small and the features of different
classes are similar.
KEYWORDS
[1] N. Zhu, D. Zhang, W. Wang, X. Li, B. Yang, J. Song, X. Zhao, B. Huang, W. Shi, R. Lu, P.
Niu, F. Zhan, X. Ma, D. Wang, W. Xu, G. Wu, G.F. Gao, W. Tan, A novel coronavirus
[2] C. Huang, Y. Wang, X. Li, L. Ren, J. Zhao, Y. Hu, L. Zhang, G. Fan, J. Xu, X. Gu, Z. Cheng,
T. Yu, J. Xia, Y. Wei, W. Wu, X. Xie, W. Yin, H. Li, M. Liu, Y. Xiao, H. Gao, L. Guo, J. Xie,
G. Wang, R. Jiang, Z. Gao, Q. Jin, J. Wang, B. Cao, Clinical features of patients infected with
2019 novel coronavirus in Wuhan, China Lancet, 395 (2020), pp. 497-506
[4] Barret Zoph, Vijay Vasudevan, Jonathon Shlens, Quoc V. Le. Learning Transferable
Architectures for Scalable Image Recognition. arXiv:1707.07012v4. 2018.
[5] Andrew G. Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias
Weyand, Marco Andreetto, Hartwing Adam. MobileNets: Efficient Convolutional Neural
Networks for Mobile Vision Application. arXiv:1704.04861v1. 2017.
[6] Mohammad Rahimzadeh, Abolfal Attar. A modified deep convolutional neural network for
detecting COVID-19 and pneumonia from X-ray images based on the concatenation of
Xception and ResNet50v2. (2020) 2020.100360.
[7] Chollet F. Xception: deep learning with depthwise separable convolution. In: proceedings pf the
IEEE conference on computer vision and pattern recognition. 2017. P. 1251-8.
[8] He K, Zhang X, Ren S, Sun J. Identity mappings in deep residual networks. In:European
conference on computer vision. Springer, 2016. p. 630-45.
[9] Harsh Panwar, P.K. Gupta, Mhammad Khubeb Siddiqui, Ruben Morales-Menendez, Vaishnavi
Singh. Application of deep learning for fast detection of COVID-19 in X-ray using nCOVnet.
(2020) 2020.109944.
[10] Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image
recognition. arXiv, 1409: p. 1556. [
11] Asif Iqbal Khan, Junaid Latief Shah, Mohammad Mudasir Bhat. CoroNet: A deep neural
network for detection and diagnosis of COVID-19 from chest x-ray images. (2020)
2020.105581. [12] Shahank Vaid, Reza Kalantar, Mohit Bhandari. Deep learning COVID-19
detection bias: accuracy through artificial intelligence. 2020. https://doi.org/10.1007/s00264-
020-04609-7.
[13] Ioannis D. Apostolopoulos, Tzani A. Mpesiana. Covid-19: Automatic detection from X-ray
images utilizing transfer learning with convolutional neural networks. 2020.
https://doi.org/10.1007/s13246- 020-00865-4.
[14] Howard AG Zhu M Chen B et al (2017)MobileNets: efficient convolutional neural networks for
mobile vision applications. arXiv preprint arXiv: 170404861.
[15] Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, et al. Going deeper with
convolutions.Boston, MA, 2015,: IEEE Conference on Computer Vision and Pattern
Recognition (CVPR); 2015. P. 1-9.
[16] Szegedy C, Ioffe S, Vanhoucke V, Alemi A. Inception-v4, inception-resnet and the impact of
residual connections on learning. 2016.
[17] Cohen JP. COVID-19 image data collection. (2020) https://github.com/ieee8023/covid-
chestxraydataset.
[20] Sumit Saha. A Comprehensive Guide to Convolutional Neural Network –the ELI5 way.
https://towordsdatascience.com/a-comprehensive-guide-to-convolutional-neural-network-the-
eli5- way-3bd2b1164a5 . Last accessed on Jun 2020.
[21] Zawn Villines. What is the relationship between pneumonia and COVID-19?.
https://www.medicalnewstoday.com/articles/pneumonia-and-covid-19#summary . last accessed
on Jun 2020.
[24] Sik-Ho Tsang. Review: NASNet-Neural Architecture Search Network (Image Classification).
https://medium.com/@sh.tsang/review-nasnet-neural-architecture-search-network-
imageclassification-23139ea0425d . Last accessed on APRIL 2020.
[26] Chris. What are Max Pooling, Average Pooling, Global Max Pooling and Global Average
Pooling. https://www.machinecurve.com/index.php/2020/01/30/what-are-max-pooling-average-
poolingglobal-max-pooling-and-global-average-pooling/ . Last accessed on MARCH 2020.
[27] Karen Simonyan, Andrew Zisserman. Very Deep Convolutional Networks for Large-Scale
Image Reconition. arXiv:1409.1556. 2014.
[28] Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun. Deep Residual Learning for Image
Recognition. arXiv:1512.03385. 2015.
[29] Han, Seung & Park, Gyeong & Lim, Woohyung & Kim, Myoung & Na, Jung-Im & Park, Ilwoo
& Chang, Sung. (2018). Deep neural networks show an equivalent and often superior
performance to dermatologists in onychomycosis diagnosis: Automatic construction of
onychomycosis datasets by region-based convolutional deep neural network. PLOS ONE. 13.
e0191493. 10.1371/journal.pone.0191493.
INTRUSION DETECTION IN COMPUTER SYSTEMS BY USING
ARTIFICIAL NEURAL NETWORKS WITH DEEP LEARNING
APPROACHES
Sergio Hidalgo-Espinoza, Kevin Chamorro-Cupuerán and Oscar Chang-Tortolero,
University of Yachay Tech, Ecuador
ABSTRACT
Intrusion detection into computer networks has become one of the most important issues in
cybersecurity. Attackers keep on researching and coding to discover new vulnerabilities to penetrate
information security system. In consequence computer systems must be daily upgraded using up-to-
date techniques to keep hackers at bay. This paper focuses on the design and implementation of an
intrusion detection system based on Deep Learning architectures. As a first step, a shallow network
is trained with labelled log-in [into a computer network] data taken from the Dataset CICIDS2017.
The internal behaviour of this network is carefully tracked and tuned by using plotting and exploring
codes until it reaches a functional peak in intrusion prediction accuracy. As a second step, an
autoencoder, trained with big unlabelled data, is used as a middle processor which feeds compressed
information and abstract representation to the original shallow network. It is proven that the resultant
deep architecture has a better performance than any version of the shallow network alone. The
resultant functional code scripts, written in MATLAB, represent a re-trainable system which has
been proved using real data, producing good precision and fast response.
KEYWORDS
Artificial Neural Networks, Information Security, Deep Learning, intrusion detection & hacking
attacks.
[1] N. Garg, D. Kumar, Y. Khera, Sujay, and P. Jain, “Towards the impact ofhacking on cyber
security,”IIOAB Journal, vol. 9, pp. 61–77, 05 2018.
[5] R. Sathya and A. Abraham, “Comparison of supervised and unsupervised learning algorithms for
pattern classification,”International Journal ofAdvanced Research in Artificial Intelligence, vol.
2, no. 2, 2013.[Online]. Available: http://dx.doi.org/10.14569/IJARAI.2013.020206
[6] Y. LeCun, Y. Bengio, and G. E. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–
444, 2015. [Online]. Available:https://doi.org/10.1038/nature14539
[9] Jia, F. & Kong, L.-Z. (2017). “Intrusion Detection Algorithm Based on Convolutional Neural
Network,” Beijing LigongDaxueXuebao/Transaction of Beijing Institute of Technology. 37.
1271- 1275. 10.15918/j.tbit1001-0645.2017.12.011.
[10] McHugh, John. (2000). “Testing Intrusion Detection Systems: A Critique of the 1998 and 1999
DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory,”ACM
Trans. Inf. Syst. Secur.,3. 262-294. 10.1145/382912.382923.
[11] Biswas, Saroj. (2018). “Intrusion Detection Using Machine Learning: A Comparison Study,”
International Journal of Pure and Applied Mathematics. 118. 101-114.
[12] M. Tavallaee, E. Bagheri, W. Lu and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99
data set," 2009 IEEE Symposium on Computational Intelligence for Security and Defense
Applications, Ottawa, ON, 2009, pp. 1-6, doi: 10.1109/CISDA.2009.5356528. 12 Computer
Science & Information Technology (CS & IT)
[14] A. Gharib, I. Sharafaldin, A. H. Lashkari and A. A. Ghorbani, "An evaluation framework for
intrusion detection dataset", Proc. Int. Conf. Inf. Sci. Secur. (ICISS), pp. 1-6, Dec. 2016..
AN OPTIMIZED CLEANING ROBOT PATH GENERATION AND
EXECUTION SYSTEM USING CELLULAR REPRESENTATION OF
WORKSPACE
Qile He1 and Yu Sun2
1
Webber Academy, Canada, 2California State Polytechnic University, USA
ABSTRACT
Many robot applications depend on solving the Complete Coverage Path Problem (CCPP).
Specifically, robot vacuum cleaners have seen increased use in recent years, and some models offer
room mapping capability using sensors such as LiDAR. With the addition of room mapping, applied
robotic cleaning has begun to transition from random walk and heuristic path planning into an
environment-aware approach. In this paper, a novel solution for pathfinding and navigation of indoor
robot cleaners is proposed. The proposed solution plans a path from a priori cellular decomposition
of the work environment. The planned path achieves complete coverage on the map and reduces
duplicate coverage. The solution is implemented inside the ROS framework, and is validated with
Gazebo simulation. Metrics to evaluate the performance of the proposed algorithm seek to evaluate
the efficiency by speed, duplicate coverage and distance travelled.
KEYWORDS
[1] Robot vacuum cleaner, by T. Charles, A. Parker, S. Lau, E. Blair, A. Henginer, E. Ng, E.
DiBernardo, R. Witman, M. Stout. (2006, Jan. 26). U.S. Patent 20060020369A1 [Online].
Available:
https://assignment.uspto.gov/patent/index.html#/patent/search/resultAssignment?searchInput=2
00600 20369&id=23224-384
[2] Random motion cleaner, by D. E. Gerber, K.L Thomas. (2002, Jun. 6). U.S. Patent 6571415B2
[Online]. Available:
http://patft.uspto.gov/netacgi/nphParser?Sect1=PTO1&Sect2=HITOFF&p=1&u=/netahtml/PT
O/srchnum.html&r=1&f=G&l=50&d=P ALL&s1=6571415.PN.
[3] W. Brockman and D. Klingbiel, "Rating the Performance of Robotic Coverage Tasks,"
Proceedings of the 5th IFAC/EURON Symposium on Intelligent Autonomous Vehicles July 5-
7, 2004 Lisboa, Portugal, vol. 22, no. 6, pp. 46-57, June 1989, doi: 10.1109/2.30720.
[4] A. Elfes, "Using occupancy grids for mobile robot perception and navigation," in Computer, vol.
22, no. 6, pp. 46-57, June 1989, doi: 10.1109/2.30720.
[5] E. Gonzalez, O.Alvarez, Y.Diaz, C.Parra and C.Bustacara, "BSA: A Complete Coverage
Algorithm," Proceedings of the 2005 IEEE International Conference on Robotics and
Automation, Barcelona, Spain, 2005, pp. 2040-2044, doi: 10.1109/ROBOT.2005.1570413.
[6] A. Khan, I. Noreen, H. Ryu, N. L. Doh, and Z. Habib, “Online complete coverage path planning
using two-way proximity search,” Intel Serv Robotics 10, 229–240 (2017). doi:
10.1007/s11370-017- 0223-z
[7] J. Connors and G. Elkaim, "Analysis of a Spline Based, Obstacle Avoiding Path Planning
Algorithm," 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring, Dublin,
2007, pp. 2565-2569, doi: 10.1109/VETECS.2007.528.
[8] Yuan, R., Zhang, F., Qu, J., Li, G. and Fu, Y., "A novel obstacle avoidance method based on
multiinformation inflation map," Industrial Robot, Vol. 47 No. 2, pp. 253-265.
https://doi.org/10.1108/IR05-2019-0114
[9] Joon Seop Oh, Yoon Ho Choi, Jin Bae Park and Y. F. Zheng, "Complete coverage navigation of
cleaning robots using triangular-cell-based map," in IEEE Transactions on Industrial
Electronics, vol. 51, no. 3, pp. 718-726, June 2004, doi: 10.1109/TIE.2004.825197.
[10] R. N. De Carvalho, H. A. Vidal, P. Vieira and M. I. Ribeiro, "Complete coverage path planning
and guidance for cleaning robots," ISIE '97 Proceeding of the IEEE International Symposium
on Industrial Electronics, Guimaraes, Portugal, 1997, pp. 677-682 vol.2, doi:
10.1109/ISIE.1997.649051.
[11] T. Lee, S. Baek, Y, Choi, and S. Oh, “Smooth coverage path planning and control of mobile
robots based on high-resolution grid map representation,” Robotics and Autonomous Systems,
Vol. 59, No. 10, pp. 801-812. https://doi.org/10.1016/j.robot.2011.06.002
[12] Quigley, Morgan, et al. "ROS: an open-source Robot Operating System." ICRA workshop on
open source software. Vol. 3. No. 3.2. 2009. Computer Science & Information Technology (CS
& IT) 25
[13] Santos, Joao Machado, David Portugal, and Rui P. Rocha. "An evaluation of 2D SLAM
techniques available in robot operating system." 2013 IEEE International Symposium on
Safety, Security, and Rescue Robotics (SSRR). IEEE, 2013.
[14] Quigley, Morgan, Brian Gerkey, and William D. Smart. Programming Robots with ROS: a
practical introduction to the Robot Operating System. " O'Reilly Media, Inc.", 2015.
[15] Korf, Richard E. "Depth-first iterative-deepening: An optimal admissible tree search." Artificial
intelligence 27.1 (1985): 97-109.
[16] Jianya, Yue Yang Gong. "An efficient implementation of shortest path algorithm based on
dijkstra algorithm [j]." Journal of Wuhan Technical University of Surveying and Mapping
(Wtusm) 3.004 (1999).
ABSTRACT
Cloud computing gives a relevant and adaptable support for Big Data by the ease of use,
access to resources, low cost use of resources, and the use of strong equipment to process
big data. Cloud and big data center on developing the value of a business while reducing
capital costs.
Big data and cloud computing, both favor companies and by cause of their benefit, the use
of big data growths extremely in the cloud. With this serious increase, there are several
emerging risk security concerns. Big data has more vulnerabilities with the comparison to
classical database, as this database are stored in servers owned by the cloud provider. The
various usage of data make safety-related big data in the cloud intolerable with the
traditional security measures.
The security of big data in the cloud needs to be looked at and discussed. In this current
paper, my colleagues and me will present and discuss the risk assessment of big-data
applications in cloud computing environments and present some ideas for assessing these
risks.
KEYWORDS
[1] M. Paryasto, A. Alamsyah, and B. Rahardjo, “Big-data security management issues,” 2014 2nd
Int. Conf. Inf. Commun. Technol., pp. 59–63, 2014.
[2] Hashem, I.A.T. et al., 2014. The rise of “big data” on cloud computing: Review and open
research issues. Information Systems, 47, pp.98–115.
[4] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management Auerbach,
ed.,
[5] S. Drissi, S. Benhadou and H. Medromi,"A new shared and comprehensive tool of cloud
computing security assessment", In the Proceedings of the Springer, vol: 366 , Advances in
Ubiquitous Networking, UNET 2015, Casablanca, Morocco, pp 155-167
[6] S. Drissi, S Elhasnaoui, H Iguer, S. Benhadou and H. Medromi," Security Risk Assessment of
Multicloud System Adoption: Review and Open Research Issues", In the Proceedings of the
Springer, International Conference on Big Data and Smart Digital Casablanca, Morocco,
January 2019 DOI: 10.1007/978-3-030-12048-1_37
[7] Boyd, D., & Crawford, K. (2011, September). Six provocations for big data. In A decade in
internet time: Symposium on the dynamics of the internet and society (Vol. 21). Oxford: Oxford
Internet Institute.
[8] SHAN, Y. C., Chao, L. V., ZHANG, Q. Y., & TIAN, X. Y. (2017). Research on Mechanism of
Early Warning of Health Management Based on Cloud Computing and Big Data. In
Proceedings of the 23rd International Conference on Industrial Engineering and Engineering
Management 2016 (pp. 291-294). Atlantis Press, Paris. 34 Computer Science & Information
Technology (CS & IT)
[9] Parvin Ahmadi Doval Amiri and Mina Rahbari Gavgani, 2016. A Review on Relationship and
Challenges of Cloud Computing And Big Data: Methods of Analysis and Data Transfer. Asian
Journal of Information Technology, 15: 2516-2525
[10] Chen, Min, et al. Big data: related technologies, challenges and future prospects. Heidelberg:
Springer, 2014.
[11] Demchenko, Yuri, et al. "Big security for big data: Addressing security challenges for the big
data infrastructure." Workshop on Secure Data Management. Springer, Cham, 2013.
[12] Vacca, J. R. (Ed.). (2016). Cloud Computing Security: Foundations and Challenges. CRC Press.
ch15.
[13] https://support.rackspace.com/how-to/understandingthe-cloud-computing-stack-saas-paas-iaas/
[14] Terzo, O., Ruiu, P., Bucci, E., & Xhafa, F. (2013, July). Data as a service (DaaS) for sharing
and processing of large data collections in the cloud. In Complex, Intelligent, and Software
Intensive Systems (CISIS), 2013 Seventh International Conference on (pp. 475-480). IEEE.
[15] Motahari-Nezhad, H. R., Stephenson, B., & Singhal, S. (2009). Outsourcing business to cloud
computing services: Opportunities and challenges. IEEE Internet Computing, 10(4), 1-17.
[16] Rajesh Saturi, Data as a Service (Daas) in Cloud Computing [Data-As-A-Service in the Age of
Data] Data as a Service Daas in Cloud Computing, Global Journal of Computer Science and
Technology Cloud & Distributed Volume 12 Issue 11 ,2012.
[17] MALLICK, Pradeep Kumar (ed.). Research Advances in the Integration of Big Data and Smart
Computing. IGI Global, 2015.
[18] Hazirah Bee bt Yusof Ali, Lili Marziana bt Abdullah, Systematic Literature Review of Risk
Assessment for Big Data in Cloud Computing Environment: Security, Privacy and Trust,
AICCC '18, December 21–23, 2018, Tokyo, Japan.
[19] Nabeel Zanoon, Abdullah Al-Haj, Sufian M Khwaldeh, Cloud Computing and Big Data is there
a Relation between the Two: A Study, International Journal of Applied Engineering Research
ISSN 0973-4562 Volume 12, Number 17 (2017) pp. 6970-6982
[20] D. Zong-you, Z. Wen-long, S. Yan-an, and W. Hai-tao, “The application of cloud matter
#x2014; Element in information security risk assessment,” 2017 3rd Int. Conf. Inf. Manag., pp.
218–222, 2017.
[21] S. Deng, D. Yue, X. Fu, and A. Zhou, “Security risk assessment of cyber physical power system
based on rough set and gene expression programming,” IEEE/CAA J. Autom. Sin., vol. 2, no. 4,
pp. 431–439,2015.
[22] R. Trapero, J. Luna, and N. Suri, “Quantifiably Trusting the Cloud: Putting Metrics to Work,”
IEEE Secur. Priv., vol. 14, no. 3, pp. 73–77, 2016.
[23] V. Bellandi, S. Cimato, E. Damiani, G. Gianini, and A. Zilli, “Toward economic-aware risk
assessment on the cloud,” IEEE Secur. Priv., vol. 13, no. 6, pp. 30–37, 2015.
[24] Lulu Liang, Wang Ren, Jing Song, Huaming Hu, Qiang He, and Shuo Fang, “The state of the
art of risk assessment and management for information systems,” 2013 9th Int. Conf. Inf. Assur.
Secur., pp. 66–71, 2013.
[25] V. Agrawal, “A Framework for the Information Classification in ISO 27005 Standard,” Proc. -
4th IEEE Int. Conf. Cyber Secur. Cloud Comput. CSCloud 2017 3rd IEEE Int. Conf. Scalable
Smart Cloud, SSC 2017, pp. 264– 269, 2017.
[26] A. Khosravani, “A case study analysis of risk, trust and control in cloud computing,”Conf.
(SAI), 2013, pp. 879–887, 2013.
[27] Catteddu, D., Hogben, G.: Cloud Computing Information Assurance Framework. ENISA
(2009)
[28] M. Paryasto, A. Alamsyah, and B. Rahardjo, “Big-data security management issues,” 2014 2nd
Int. Conf. Inf. Commun. Technol., pp. 59–63, 2014
DIGIPRESCRIPTION: AN INTELLIGENT SYSTEM TO ENABLE
PAPERLESS PRESCRIPTION USING MOBILE COMPUTING AND
NATURAL-LANGUAGE PROCESSING
Richard Zhang1, Mary Zhao1, Yucheng Jiang2 , Sophadeth Rithya2 and Yu Sun2
1
Irvine High School. 4321 Walnut Ave Irvine, CA 92604
2
California State Polytechnic University, Pomona, CA, 91768
ABSTRACT
Through our app, it is aimed to teach and tell the patients how to use the drug properly
taking off the chances of putting their lives in danger, especially the elderly. It is also
efficient to give patients these instructions as well as saving lots of paper. Because of the
law, every drug that is given from the pharmacy to the user includes a receipt that lists
information of, patient’s information, drug information, insurance information, directions on
taking the medicine (black box warning issued by FDA), medication details on how it
works, side effects, storage rules, and etc. These pieces of information are crucial to
patients, where it tells them how to use the drug properly, but most people would throw
these receipts away, which is a risk as well as a waste. Through using this app, the patient
can efficiently get information on how to properly use the drug. This application is also
helpful, where the user can choose to set reminders on when to eat this drug each week or
month.
KEYWORDS
[1] Lemay, Laura, and Arman Revised By-Danesh. Teach yourself web publishing with HTML 4 in
a week. Sams, 1997.
[2] Grinberg, Miguel. Flask web development: developing web applications with python. " O'Reilly
Media, Inc.", 2018.
[3] Dolgert, A., L. Gibbons, and V. Kuznetsov. "Rapid web development using AJAX and Python."
In Journal of Physics: Conference Series, vol. 119, no. 4, p. 042011. IOP Publishing, 2008.
[4] Moroney, Laurence, Moroney, and Anglin. Definitive Guide to Firebase. Apress, 2017.
[5] Moroney, Laurence. "Firebase Cloud Messaging." In The Definitive Guide to Firebase, pp. 163-
188. Apress, Berkeley, CA, 2017.
[6] Stonehem, Bill. Google Android Firebase: Learning the Basics. Vol. 1. First Rank Publishing,
2016.
[7] Spurlock, Jake. Bootstrap: Responsive Web Development. " O'Reilly Media, Inc.", 2013.
[8] Shenoy, Aravind, and Ulrich Sossou. Learning Bootstrap. Packt Publishing Ltd, 2014.
[9] Radford, Stephen. Learning Web Development with Bootstrap and AngularJS. Packt Publishing
Ltd, 2015. Computer Science & Information Technology (CS & IT) 43
[10] Ameta, Deepti, Kalpana Mudaliar, and Palak Patel. "Medication reminder and healthcare-an
android application." International Journal of Managing Public Sector Information and
Communication Technologies (IJMPICT) Vol 6 (2015).
[11] Slagle, Jason M., Jeffry S. Gordon, Christopher E. Harris, Coda L. Davison, DeMoyne K.
Culpepper, Patti Scott, and Kevin B. Johnson. "MyMediHealth–Designing a next generation
system for childcentered medication management." Journal of biomedical informatics 43, no. 5
(2010): S27-S31.
[12] Herrmann, James M., Gerald S. Indorf, and Sunway R. Wang. "Interactive medication
reminder/dispenser device." U.S. Patent 5,805,051, issued September 8, 1998.
[13] Hawley, Tarwa L., and Jon H. Kirk Jr. "Medication reminder." U.S. Patent 6,325,534, issued
December 4, 2001.
RESOLVING CODE SMELLS IN SOFTWARE PRODUCT LINE
USING REFACTORING AND REVERSE ENGINEERING
Sami Ouali, College of Applied Sciences, Ibri, Oman
ABSTRACT
Software Product Lines (SPL) are recognized as a successful approach to reuse in software
development. Its purpose is to reduce production costs. This approach allows products to be
different with respect of particular characteristics and constraints in order to cover different
markets. Software Product Line engineering is the production process in product lines. It
exploits the commonalities between software products, but also to preserve the ability to
vary the functionality between these products. Sometimes, an inappropriate implementation
of SPL during this process can conduct to code smells or code anomalies. Code smells are
considered as problems in source code which can have an impact on the quality of the
derived products of an SPL. The same problem can be present in many derived products
from an SPL due to reuse. A possible solution to this problem can be the refactoring which
can improve the internal structure of source code without altering external behavior. This
paper proposes an approach for building SPL from source code. Its purpose is to reduce
code smells in the obtained SPL using refactoring source code. Another part of the approach
consists on obtained SPL’s design based on reverse engineering.
KEYWORDS
[1] Rincón, L. F. et al., 2014. An ontological rule-based approach for analyzing dead and false
optional features in feature models. In Electronic Notes in Theoretical Computer Sciences, Vol.
302, pp 111– 132.
[2] Jacobson, I. et al., 1992. Object-oriented software engineering: a use case driven approach.
AddisonWesley, USA.
[3] Xue, Y., 2011. Reengineering legacy software products into software product line based on
automatic variability analysis. Proceedings of the 33rd International Conference on Software
Engineering, New York, USA, pp. 1114–1117.
[4] Ouali, S. et al., 2012. From Intentions to Software Design using an Intentional Software Product
Line Meta-Model. Proceeding of the 8th International Conference on Innovations in
Information Technology, Al Ain, UAE.
[5] Fowler, M., 1999. Refactoring: Improving the Design of Existing Code. Addison-Wesley,
Boston, MA, USA.
[6] Fernandes, E. and Figueiredo, E., 2017. Detecting Code Anomalies in Software Product Lines”.
Proceedings of 7th Brazilian Conference on Software: Theory and Practice, Maringa, Brazil, pp.
49– 55.
[7] Zhang, M. et al., 2011. Code Bad Smells: A Review of Current Knowledge. In Journal of
Software Maintenance and Evolution: Research and Practice, Wiley Online Library, pp. 179-
202.
[8] Apel, S. et al., 2013. Feature-Oriented Software Product Lines: Concepts and Implementation.
Springer.
[9] Vale, G. et al., 2014. Bad Smells in Software Product Lines: A Systematic Review. Proceedings
of the 8th Brazilian Symposium on Software Components, Architectures and Reuse (SBCARS),
Brazil, pp. 84-94.
[10] Abilio, R. et al., 2015. Detecting Code Smells in Software Product Lines-An Exploratory Study.
Proceeding of the 12th International Conference on Information Technology - New
Generations, pp. 433–438.
[11] Ouali, S. et al., 2011. Framework for evolving software product line. In International Journal of
Software Engineering & Applications, Vol. 2, No. 2, pp. 34-51.
[12] Weiss, D. M. and LAI, C. T. R., 1999. Software Product-Line Engineering: A Family-Based
Software Development Process. Addison-Wesley.
[13] Pohl, K. and Metzger, A., 2006. Software Product Line testing. In Communication of the ACM,
pp78-81.
[14] Czarnecki, K. and Eisenecker, W., 2000. Generative Programming: Methods, Tools, and
Applications. Addison-Wesley.
[15] Thiel, S. and Hein, A., 2002. Modeling and Using Product Line Variability in Automotive
Systems. In IEEE Software Vol.19, No.4, pp. 66-72.
[16] Hotta, K. et al., 2012. An Empirical Study on the Impact of Duplicate Code. Advances in
Software Engineering.
[17] Chikofsky, E. J. and Cross, J. H., 1990. Reverse engineering and design recovery: A taxonomy.
IN IEEE Software, Vol.7, pp. 13–17.
[18] Moha, N. et al., 2010. DECOR: A Method for the Specification and Detection of Code and
Design Smells. Transactions on Software Engineering, Vol. 36, No. 1, pp. 20-36.
[19] Sjoberg, D. et al., 2013. Quantifying the effect of code smells on maintenance effort. Software
Engineering IEEE Transactions, Vol. 39, No. 8, pp. 1144–1156.
[20] Van Emden, E. and Moonen, L., 2002. Java quality assurance by detecting code smells.
Proceeding Working Conf. Reverse Engineering, IEEE Computer Society Press, pp. 97—107.
[21] Marinescu, C. et al., 2005. Iplasma: An integrated platform for quality assessment of object-
oriented design. Proceedings of the 21st IEEE International Conference on Software
Maintenance, Budapest, Hungary.
[22] Liu, X. and Zhang, C., 2016. DT: a detection tool to automatically detect code smell in software
project. Proceedings of the 4th Int. Conf. Mach. Mater. Inf. Technol. Appl., vol. 71, pp. 681–
684. 306 Computer Science & Information Technology (CS & IT)
[23] Fontana, F. et al., 2012. Automatic Detection of Bad Smells in Code: An Experimental
Assessment. In Journal of Object Technology.
[24] Campbell, D. and Miller, M., 2008. Designing refactoring tools for developers. Proceedings of
the 2nd Workshop on Refactoring Tools, New York, NY, USA.
[25] De Andrade, H. S. et al., 2014. Architectural bad smells in software product lines. Proceedings
of the 1st International Conference Dependable Secur. Cloud Comput. Archit., pp. 1–6.
[26] Vale, G. and Figueiredo, E., 2015. A Method to Derive Metric Thresholds for Software Product
Lines. Proceedings 29th Brazilian Symposium on Software Engineering, pp. 110–119.
[27] Regulwar, G. B. and Tugnayat, R. M., 2012. Bad Smelling Concept in Software Refactoring.
International Proceedings of Economics Development and Research, Vol.45, pp. 56–61.
[28] Rebele, T. et al., 2016. YAGO: a Multilingual Knowledge Base from Wikipedia, Wordnet, and
Geonames. Proceeding of the 15th International Semantic Web Conference, Kobe, Japan.
[29] Demsar, J. et al., 2004. Orange: From experimental machine learning to interactive data mining.
Proceedings of the 8th European Conference on Principles and Practice of Knowledge
Discovery in Databases, Pisa, Italy.
[30] Ebrahimi, K. S. et al., 2013. Combining modality specific deep neural networks for emotion
recognition in video. Proceedings of the 15th ACM on International conference on multimodal
interaction, Sydney, Australia.
DATA DRIVEN SOFT SENSOR FOR CONDITION MONITORING OF
SAMPLE HANDLING SYSTEM (SHS)
Abhilash Pani, Jinendra Gugaliya and Mekapati Srinivas, Industrial Automation Technology Centre,
ABB, India
ABSTRACT
Gas sample is conditioned using sample handling system (SHS) to remove particulate matter
and moisture content before sending it through Continuous Emission Monitoring (CEM)
devices. The performance of SHS plays a crucial role in reliable operation of CEMs and
therefore, sensor-based condition monitoring systems (CMSs) have been developed for
SHSs. As sensor failures impact performance of CMSs, a data driven soft-sensor approach
is proposed to improve robustness of CMSs in presence of single sensor failure. The
proposed approach uses data of available sensors to estimate true value of a faulty sensor
which can be further utilized by CMSs. The proposed approach compares multiple methods
and uses support vector regression for development of soft sensors. The paper also considers
practical challenges in building those models. Further, the proposed approach is tested on
industrial data and the results show that the soft sensor values are in close match with the
actual ones.
KEYWORDS
Sample Handling System, Soft-Sensor, Variance Inflation Factor (VIF), Local Outlier
Factor (LOF), Support Vector Regression..
[2] E. Arioni, N. Bonavita and M. Paco, “Keeping an eye on emissions,” Hydrocarbon Engineering
Magazine, vol. 18, no. 10, pp. 43–49, October 2013.
[3] Y. Yang, X. Zhang, Z. Zhao, G. Wang, Y. He, Y. Wu and J. Li, "Applying Reliability Centered
Maintenance (RCM) to Sampling Subsystem in Continuous Emission Monitoring System"
IEEE Access, vol. 8, pp. 55054-55062, 2020.
[4] Swischuk, Renee C. and Douglas L. Allaire. “A Machine Learning Approach to Aircraft Sensor
Error Detection and Correction.” Journal of Computing and Information Science in
Engineering, vol. 19, pp. 1-19, 2019.
[5] A. M. T. Nasser and V. P. Pawar, "Machine learning approach for sensors validation and
clustering," 2015 International Conference on Emerging Research in Electronics, Computer
Science and Technology (ICERECT), Mandya, pp. 370-375, 2015.
[6] H.Y. Teh, A. W., Kempa-Liehrand K. Wang. “Sensor data quality: a systematic review.” Journal
of Big Data, vol. 7, pp. 1-49, 2020.
[7] R. Dunia, S. J. Qin, T. F. Edgar and T.J. McAvoy, “Use of principal component analysis for
sensor fault identification” Computers & Chemical Engineering, vol. 20, pp. S713-S718, 1996.
320 Computer Science & Information Technology (CS & IT)
[8] G. Ciarlo, E. Bonica, B. Bosio and N. Bonavita, “Assessment and Testing of Sensor Validation
Algorithms for Environmental Monitoring Applications”, Chemical Engineering Transactions,
vol. 57, pp. 331-336, Mar. 2017.
[9] D. Angelosante, M. Guerriero, G. Ciarlo and N. Bonavita, "A Sensor Fault-Resilient Framework
for Predictive Emission Monitoring Systems," 21st International Conference on Information
Fusion (FUSION), Cambridge, pp. 557-564, 2018.
[10] Villalba-Diez, J.; Schmidt, D.; Gevers, R.; Ordieres-Meré, J.; Buchwitz, M.; Wellbrock, W.
Deep Learning for Industrial Computer Vision Quality Control in the Printing Industry 4.0.
Sensors 2019, 19, 3987.
[11] Cang, W.; Yang, H. Adaptive soft sensor method based on online selective ensemble of partial
least squares for quality prediction of chemical process. Asia-Pac. J. Chem. Eng. 2019, 14,
2346.
[12] Xiong, W.; Shi, X. Soft sensor modeling with a selective updating strategy for Gaussian process
regression based on probabilistic principle component analysis. J. Frankl. Inst. 2018, 355,
5336–5349.
[13] Yu, W. A mathematical morphology based method for hierarchical clustering analysis of spatial
points on street networks. Appl. Soft Comput. 2019, 85, 105785.
[14] W. Young, G. Weckman and W. Holland, “A survey of methodologies for the treatment of
missing values within datasets: Limitations and benefits.“ , Theoretical Issues in Ergonomics
Science, vol. 12(1), pp. 5–43, 2011.
[15] Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng and Jorg Sander, "LOF: Identifying
Density-Based Local Outliers", Proc. of the 2000 ACM SIGMOD on Management of Data, pp.
93- 104, 2000.
[17] H. Drucker, C. Burges,L. Kaufman, A. Smola and V. Vapnik, "Support Vector Regression
Machines", Proceedings of the 9th International Conference on Neural Information Processing
Systems (NIPS'96). MIT Press, Cambridge, MA, USA, 155–161.
EVALUATING THE IMPACT OF DIFFERENT TYPES OF
CROSSOVER AND SELECTION METHODS ON THE
CONVERGENCE OF 0/1 KNAPSACK USING GENETIC
ALGORITHM
Waleed Bin Owais, Iyad W. J. Alkhazendar and Mohammad Saleh,
Qatar University, Qatar
ABSTRACT
KEYWORDS
Genetic, Crossover, Selection, Knapsack, Roulette, Tournament, Rank, Single Point, Two
Point, Convergence
3. X. Pan and T. Zhang, “Comparison and analysis of algorithms for the 0/1 knapsack problem,” in
Journal of Physics: Conference Series, vol. 1069, no. 1. IOP Publishing, 2018, p. 012024 4. A.
Shaheen and A. Sleit, “Comparing between different approaches to solve the 0/1 knapsack
problem,” International Journal of Computer Science and Network Security (IJCSNS), vol. 16,
no. 7, p. 1, 2016
5. R. K. Yadav, H. Gupta, H. Jhingran, A. Agarwal, and A. Gupta, “An enhanced genetic algorithm
to solve 0/1 knapsack problem,” Interna- tional Journal of Computer Science and Information
Security (IJCSIS), vol. 15, no. 5, 2017.
7. H. Demirci, A. Ozcerit, H. Ekiz, and A. Kutlu, “Chaotic crossover operator on genetic algorithm,”
in Proceedings of 2nd International Conference on Information Technology, 2015.
8. T. Kellegz, B. Toklu, and J. Wilson, “Comparing efficiencies of genetic crossover operators for
one machine total weighted tardiness problem,” Applied Mathematics and Computation, vol.
199, no. 2, pp. 590–598, 2008.
11. Thada, Vikas, and Shivali Dhaka. ”Genetic Algorithm based Approach to Solve Non Fractional
(0/1) Knapsack Optimization Problem.” International Journal of Computer Applications 100.15
(2014): 21-26.
12. Guler, A., M. E. Berberler, and U. G. Nuriyev. ”A new genetic algorithm for the 0-1 knapsack
problem.” Acad Platf J Eng Sci 4.3 (2016): 9-14.
13. Changdar, Chiranjit, G. S. Mahapatra, and Rajat Kumar Pal. ”An improved genetic algorithm
based approach to solve constrained knapsack problem in fuzzy environment.” Expert Systems
with Applications 42.4 (2015): 2276-2286.
14. McCall, John. ”Genetic algorithms for modelling and optimisation.” Journal of computational
and Applied Mathematics 184.1 (2005): 205-222.
15. Ezugwu, Absalom E., et al. ”A Comparative study of meta-heuristic optimization algorithms for
0–1 knapsack problem: Some initial results.” IEEE Access 7 (2019): 43979-44001.
16. Ho, Yu-Chi, and David L. Pepyne. ”Simple explanation of the no-free-lunch theorem and its
implications.” Journal of optimization theory and applications 115.3 (2002): 549-570.
17. De Falco, Ivan, Antonio Della Cioppa, and Ernesto Tarantino. ”Mutation-based genetic
algorithm: performance evaluation.” Applied Soft Computing 1.4 (2002): 285-299.
18. Maaranen, Heikki, Kaisa Miettinen, and Marko M. M¨akel¨a. ”Quasi-random initial population
for genetic algorithms.” Computers Mathematics with Applications 47.12 (2004): 1885-1895.
A NOVEL MOBILE ECG SENSOR WITH WIRELESS POWER
TRANSMISSION FOR REMOTE HEALTH MONITORING
Jin-Chul Heo, Eun-Bin Park, Chan-Il Kim, Hee-Joon Park and Jong-Ha Lee,
Keimyung University, Korea
ABSTRACT
For electromagnetic induction wireless power transmission using an elliptical receiving coil,
we investigated changes in magnetic field distribution and power transmission efficiency
due to changes in the position of the transmitting and receiving coils. The simulation results
using the high-frequency structure simulator were compared with the actual measurement
results. It has been shown that even if the alignment between the transmitting coil and the
receiving coil is changed to some extent, the transmission efficiency on the simulator can be
maintained relatively stable. The transmission efficiency showed the maximum when the
center of the receiving coil was perfectly aligned with the center of the transmitting coil.
Although the reduction in efficiency was small when the center of the receiving coil was
within ± 10 mm from the center of the transmitting coil, it was found that the efficiency was
greatly reduced when the receiving coil deviated by more than 10 mm. Accordingly, it has
been found that even if the perfect alignment is not maintained, the performance of the
wireless power transmission system is not significantly reduced. When the center of the
receiving coil is perfectly aligned with the center of the transmitting coil, the transmission
efficiency is maximum, and even if the alignment is slightly changed, the performance of
wireless power transmission maintains a certain level. This result proposes a standardized
wireless transmission application method in the use of wireless power for implantable
sensors.
KEYWORDS
[1] K. Kim, B. Kim, and C. H. Lee, “Printing Flexible and Hybrid Electronics for Human Skin and
EyeInterfaced Health Monitoring Systems,” Advanced Materials, vol. 32, no. 15, 2020.
[2] Y. Chen, Y. Cheng, Y. Jie et al., “Energy harvesting and wireless power transmission by a
hybridized electromagnetic-triboelectric nanogenerator,” Energy and Environmental Science,
vol. 12, no. 9, pp. 2678-2684, 2019.
[3] Q. S. Abdullahi, R. Joshi, S. K. Podilchak et al., “Design of a wireless power transfer system for
assisted living applications,” Wireless Power Transfer, vol. 6, no. 1, pp. 41-56, 2019.
[4] Y. Ben Fadhel, S. Ktata, S. Rahmani et al., "Near-field Wireless Power Transfer is a promising
approach to Power-up Active Implants." pp. 399-404, 2020.
[5] K. Agarwal, R. Jegadeesan, Y. X. Guo et al., “Wireless Power Transfer Strategies for
Implantable Bioelectronics,” IEEE Reviews in Biomedical Engineering, vol. 10, pp. 136-161,
2017.
[6] T. Campi, S. Cruciani, F. Maradei et al., “Pacemaker Lead Coupling with an Automotive
Wireless Power Transfer System,” IEEE Transactions on Electromagnetic Compatibility, vol.
61, no. 6, pp. 1935-1943, 2019.
[7] R. Chávez-Santiago, J. Wang, and I. Balasingham, "The ultra wideband capsule endoscope." pp.
72- 78, 2013. Computer Science & Information Technology (CS & IT) 27
[8] G. Ahmed Zeeshan, R. Sundaraguru, and F. Naaz, “Wearable wireless sensor system with RF
remote activation for industrial applications,” International Journal of Recent Technology and
Engineering, vol. 8, no. 3, pp. 4716-4720, 2019.
[9] M. Wang, J. Chen, X. Cui et al., "Design and Fabrication of 5.8GHz RF Energy Harvesting
Rectifier." Wireless Power Transfer, vol. 6, on. 1, pp. 41-56, 2019.
[10] S. Suganuma, D. Hung Nguyen, Y. Nishioka et al., "The Logistics System by Rotary Wing
Unmanned Aerial Vehicle with 28GHz Microwave Power Transmission." pp. 413-416, 2019.
[11] S. Almorabeti, M. Hanaoui, M. Rifi et al., "Microstrip patch antennas at 5.8GHz for wireless
power transfer system to a MAV." ACM International Conference Proceeding Series, 2017.
[12] N. Khan, H. Matsumoto, and O. Trescases, “Wireless Electric Vehicle Charger with
Electromagnetic Coil-Based Position Correction Using Impedance and Resonant Frequency
Detection,” IEEE Transactions on Power Electronics, vol. 35, no. 8, pp. 7873-7883, 2020.
[13] S. A. Sis, and H. Akca, “Maximizing the efficiency of wireless power transfer systems with an
optimal duty cycle operation,” AEU - International Journal of Electronics and Communications,
vol. 116, 2020.
[14] K. Wang, L. Sang, Y. Zhang et al., "Optimization Design for Wireless Power Transfer System
under the Variation of Load and Coupling Coefficients." pp. 867-872, 2019.
[15] T. Ghomian, and S. Mehraeen, “Survey of energy scavenging for wearable and implantable
devices,” Energy, vol. 178, pp. 33-49, 2019.
[16] A. Koruprolu, S. Nag, R. Erfani et al., "Capacitive Wireless Power and Data Transfer for
Implantable Medical Devices." 2018 IEEE Biomedical Circuits and Systems Conference,
BioCAS 2018 - Proceedings, 2018.
[17] E. Katz, "Implantable biofuel cells operating in vivo: Providing sustainable power for
bioelectronic devices: From biofuel cells to cyborgs." Proceedings - 2015 6th IEEE
International Workshop on Advances in Sensors and Interfaces, IWASI, pp. 2-13, 2015
[18] A. W. S. Putra, M. Tanizawa, and T. Maruyama, “Optical wireless power transmission using si
photovoltaic through air, water, and skin,” IEEE Photonics Technology Letters, vol. 31, no. 2,
pp. 157-160, 2019.
[19] K. Takahashi, T. Yamada, and Y. Takemura, “Circuit parameters of a receiver coil using a
wiegand sensor for wireless power transmission,” Sensors (Switzerland), vol. 19, no. 12, 2019.
[20] K. Zhang, C. Liu, Z. H. Jiang et al., “Near-Field Wireless Power Transfer to Deep-Tissue
Implants for Biomedical Applications,” IEEE Transactions on Antennas and Propagation, vol.
68, no. 2, pp. 1098-1106, 2020.
[21] C. Xiao, K. Wei, D. Cheng et al., “Wireless charging system considering eddy current in
cardiac pacemaker shell: Theoretical modeling, experiments, and safety simulations,” IEEE
Transactions on Industrial Electronics, vol. 64, no. 5, pp. 3978-3988, 2017.
[23] A. C. Özen, B. Silemek, T. Lottner et al., “MR safety watchdog for active catheters: Wireless
impedance control with real-time feedback,” Magnetic Resonance in Medicine, vol. 84, no. 2,
pp. 1048-1060, 2020.
[24] M. V. Tholl, A. Haeberlin, B. Meier et al., “An intracardiac flow based electromagnetic energy
harvesting mechanism for cardiac pacing,” IEEE Transactions on Biomedical Engineering, vol.
66, no. 2, pp. 530-538, 2019.
[25] D. B. Ahire, and V. J. Gond, "Wireless power transfer system for biomedical application: A
review." ICEI 2017, pp. 135-140, 2018
[26] C. Kasia, A. Appannagari, A. Joshi et al., “Safety of wireless capsule endoscopy in patients
with implantable cardiac devices,” JGH Open, vol. 4, no. 2, pp. 241-244, 2020.
USABILITY EVALUATION TO IMPROVE OPERATION INTERFACE
OF WIRELESS DEVICE: PRESSURE RANGE OF TOUCH SENSOR
Sangwoo Cho and Jong-Ha Lee, Keimyung University, South Korea
ABSTRACT
Usability evaluation of wireless device can find improvement about user convenience. This
study investigated natural finger pressure range when presses touch sensor. Fifteen adults
(Male: 10, Female: 5, Age: 26.13 ± 3.98 years) were recruited in this experiment. Subjects
carried out a usability evaluation about wireless device operation. The usability evaluation
measured finger pressure on touch sensor operation of wireless device using finger pressure
sensor. Subjects performed 1.76±0.95 times until pressing the touch sensor to complete task
(t = 3.091, p = 0.008). In comparisons between natural movement and the movement to
complete task, more finger pressure value was decreased in natural movement than the
movement to complete task (t = -2.277, p = 0.039). This study found a finger pressure
values to improve effectiveness of wireless device operation interface. Finger pressure value
was presented to induce natural movement for the use of touch sensor.
KEYWORDS
[1] Choi, Jiho. Lee, Seongil. & Cho, Joo Eun, (2011) “The Usability Evaluation of Mobile Phone
Interfaces Designed for the Elderly”, Journal of the Ergonomics Society of Korea, Vol. 30, No.
1, pp265-273.
[2] Chang, Joonho. Jung, Kihyo. Lee, Wonsup & You, Heecheon (2017) “Development of usability
evaluation method using natural product-use motion”, Applied Ergonomics, Vol. 60, pp171-
182.
[3] Ahmad, Naseer. Boota, M Waqas & Masoom, A Hye, (2004) “Smart phone Application
Evaluation with Usability Testing Approach”, Journal of Software Engineering and
Applications, Vol. 7, pp1045-1054.
[4] Lee, S.heum, (1999) “Usability Testing for Developing Effective Interactive multimedia
software: Concepts, dimensions, and procedures”, Journal of Educational Technology &
society, Vol. 2, No. 2, pp1-12.
[5] Strawderman, Lesley & Koubek, Rick, (2008) “Human factors and usability in service quality
measurement”, Human Factors and Ergonomics in Manufacturing & service Industries, Vol. 18,
No. 4, pp454-463.
[6] Chang, Hsien-Tsung. Tsai, Tsai-Hsuan. Chang, Ya-Ching. & Chang, Yi-Min (2014) “Touch
Panel usability of elderly and children”, Computers in Human Behavior, Vol. 37, pp258-269.
Computer Science & Information Technology (CS & IT) 49
[7] Ocak, Nihan & Cagiltay, Kursat (2017) “Comparison of Cognitive Modeling and User
Performance Analysis for Touch Screen Mobile Interface Design”, International Journal of
Human-Computer Interaction, Vol. 33, No. 8, pp33-641.
[8] Chang, Youli. L’Yi, Sehi. Koh Kyle & Seo, jinwook (2015) “Understanding Users’ Touch
Behavior on Large Mobile Touch-Screens and Assisted Targeting by Tilting Gesture”,
CHI’15:Proceedings of The 33rd Annual ACM Conference on Human Factors in Computing
Systems, pp1499-1508.
COVID CT NET: A TRANSFER LEARNING APPROACH FOR
IDENTIFYING CORONA VIRUS FROM CT SCANS
Smaranjit Ghose and Suhrid Datta,
SRM Institute of Science and Technology, India
ABSTRACT
The pandemic of COVID-19 has been rapidly spreading across the globe since it first
surfaced in the Wuhan province of China. Several governments are forced to have
nationwide lockdowns due to the progressive increase in a daily number of cases. The
hospitals and other medical facilities are facing difficulties to cope with the overwhelming
number of patients they can provide support due to the shortage in the number of required
medical professionals and resources for meeting this demand. While the vaccine to cure this
disease is still on the way, early diagnosis of patients and putting them in quarantine has
become a cumbersome task too. In this study, we propose to build an artificial intelligence-
based system for classifying patients as COVID-19 positive or negative within a few
seconds by using their chest CT Scans. We use a transfer learning approach to build our
classifier model using a dataset obtained from openly available sources. This work is meant
to assist medical professionals in saving hours of their time for the diagnosis of the
Coronavirus using chest radiographs and not intended to be the sole way of diagnosis.
KEYWORDS
[1[ Mart ́ın Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, CraigCitro, Greg
S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, et al. Tensor-flow: Large-scale machine
learning on heterogeneous distributed systems.arXivpreprint arXiv:1603.04467, 2016.
[2] Tao Ai, Zhenlu Yang, Hongyan Hou, Chenao Zhan, Chong Chen, Wenzhi Lv, QianTao, Ziyong
Sun, and Liming Xia. Correlation of chest ct and rt-pcr testing in coronavirus disease 2019
(covid-19) in china: a report of 1014 cases.Radiology,page 200642, 2020 Computer Science &
Information Technology (CS & IT) 57
[4] Xinlei Chen, Hao Fang, Tsung-Yi Lin, Ramakrishna Vedantam, Saurabh Gupta,Piotr Doll ́ar, and
C Lawrence Zitnick. Microsoft coco captions: Data collection and evaluation server.arXiv
preprint arXiv:1504.00325, 2015
[5] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet:A large-scale
hierarchical image database. In2009 IEEE conference on computer vision and pattern
recognition, pages 248–255. Ieee, 2009.
[6] Yicheng Fang, Huangqi Zhang, Jicheng Xie, Minjie Lin, Lingjun Ying, Peipei Pang,and
Wenbin Ji. Sensitivity of chest ct for covid-19: comparison to rt-pcr.Radiology,page 200432,
2020.
[7] Ophir Gozes, Maayan Frid-Adar, Hayit Greenspan, Patrick D Browning, HuangqiZhang,
Wenbin Ji, Adam Bernheim, and Eliot Siegel. Rapid ai development cy-cle for the coronavirus
(covid-19) pandemic: Initial results for automated detec-tion & patient monitoring using deep
learning ct image analysis.arXiv preprintarXiv:2003.05037, 2020.
[9] Yann LeCun, L ́eon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning
applied to document recognition.Proceedings of the IEEE, 86(11):2278–2324, 1998.
[10] Ming-Yen Ng, Elaine YP Lee, Jin Yang, Fangfang Yang, Xia Li, Hongxia Wang,Macy Mei-sze
Lui, Christine Shing-Yen Lo, Barry Leung, Pek-Lan Khong, et al.Imaging profile of the covid-
19 infection: radiologic findings and literature review.Radiology: Cardiothoracic Imaging,
2(1):e200034, 2020.
[11] Sinno Jialin Pan and Qiang Yang. A survey on transfer learning.IEEE Transac-tions on
knowledge and data engineering, 22(10):1345–1359, 2009.
[12] Uwe Schneider, Eros Pedroni, and Antony Lomax. The calibration of ct hounsfield units for
radiotherapy treatment planning.Physics in Medicine & Biology,41(1):111, 1996.
[13] Mingxing Tan and Quoc V Le. Efficient Net: Rethinking model scaling for convo-lutional
neural networks.arXiv preprint arXiv:1905.11946, 2019.
[14] Sasha Targ, Diogo Almeida, and Kevin Lyman. Resnet in resnet: Generalized Residual
architectures.arXiv preprint arXiv:1603.08029, 2016.
[15] Wenling Wang, Yanli Xu, Ruqin Gao, Roujian Lu, Kai Han, Guizhen Wu, andWenjie Tan.
Detection of sars-cov-2 in different types of clinical specimens.Jama,2020.
[16] Jinyu Zhao, Yichen Zhang, Xuehai He, and Pengtao Xie. Covid-ct-dataset: a ct scan dataset
about covid-19.arXiv preprint arXiv:2003.13865, 2020
DATA CONFIDENTIALITY IN P2P COMMUNICATION AND SMART
CONTRACTS OF BLOCKCHAIN IN INDUSTRY 4.0
Jan Stodt and Christoph Reich, University of Applied Sciences Furtwangen, Germany
ABSTRACT
KEYWORDS
[1] H. Kagermann, W. Wahlster, and J. Helbig, “Recommendations for implementing the strategic
initiative Industrie 4.0: Final report of the Industrie 4.0 Working Group,” ForschungsunionBerl.
Ger., 2013.
[2] “Short Circuit: How a Robotics Vendor Exposed Confidential Data for Major Manufacturing
Companies.” https://www.upguard.com/breaches/short-circuit-how-a-robotics-vendor-
exposedconfidential-data-for-major-manufacturing-companies (accessed Apr. 29, 2020).
[3] G. Zyskind, O. Nathan, and A. Pentland, “Enigma: Decentralized Computation Platform with
Guaranteed Privacy,” ArXiv150603471 Cs, Jun. 2015, Accessed: Oct. 09, 2018. [Online].
Available: http://arxiv.org/abs/1506.03471.
[4] F. Benhamouda, S. Halevi, and T. Halevi, “Supporting private data on Hyperledger Fabric with
secure multiparty computation,” in Cloud Engineering (IC2E), 2018 IEEE International
Conference on, 2018, pp. 357–363.
[6] X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, “Healthcare Data Gateways: Found Healthcare
Intelligence on Blockchain with Novel Privacy Risk Control,” J. Med. Syst., vol. 40, no. 10, p.
218, Aug. 2016, doi: 10.1007/s10916-016-0574-6.
[7] D. D. F. Maesa, P. Mori, and L. Ricci, “Blockchain based access control,” in IFIP International
Conference on Distributed Applications and Interoperable Systems, 2017, pp. 206–220.
[9] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The Blockchain Model of
Cryptography and Privacy-Preserving Smart Contracts,” in 2016 IEEE Symposium on Security
and Privacy (SP), May 2016, pp. 839–858, doi: 10.1109/SP.2016.55.
[11] S. Arnautov et al., “SCONE: Secure Linux Containers with Intel SGX.,” in OSDI, 2016, vol.
16, pp. 689–703. 10 Computer Science & Information Technology (CS & IT)
[12] J.-E. Ekberg, K. Kostiainen, and N. Asokan, “Trusted execution environments on mobile
devices,” in Proceedings of the 2013 ACM SIGSAC conference on Computer &
communications security, 2013, pp. 1497–1498
ROLE OF MULTIMEDIA INFORMATION RETRIEVAL IN
PROVIDING A CREDIBLE EVIDENCE FOR DIGITAL FORENSIC
INVESTIGATIONS: OPEN SOURCE INTELLIGENCE
INVESTIGATION ANALYSIS
Amr Adel1 and Brian Cusack2,
1
Whitecliffe College of Technology & Innovation, New Zealand,
2
Auckland University of Technology, New Zealand
ABSTRACT
KEYWORDS
Open Source Intelligence, Information Retrieval,Digital Forensics, Cyber-Crimes & Data Mining.
[1] Quick, D., & Choo, K. R. (2014). Google Drive: Forensic analysis of data remnants. Journal of
Network and Computer Applications, 40, 179-193.
https://www.sciencedirect.com/science/article/pii/S1084804513002051?casa_token=FmDXdV
ZX3E
YAAAAA:OPEFKx8bFOqPxT4pXlPhYmpAjf9w53y5jWv1IDq5bBolXXuRYreSnCNFG1Ao
Pakax Co-PCUmEvU
[2] Lillis, D., Becker, B., O'Sullivan, T., & Scanlon, M. (2016). Current challenges and future
research areas for digital forensic investigation. arXiv preprint arXiv:1604.03850.
https://arxiv.org/pdf/1604.03850.pdf
[3] Hitchcock, B., Le-Khac, N., & Scanlon, M. (2016) Tiered Forensic Methodology Model for
Digital Field Triage by Non-Digital Evidence Specialists. Digital Investigation, 13 (S1), 03.
https://www.sciencedirect.com/science/article/pii/S1742287616300044
[4] Cavanillas, J. M., Curry, E., & Wahlster, W. (2016). New horizons for a data-driven economy: a
roadmap for usage and exploitation of big data in Europe. Springer.
http://library.oapen.org/bitstream/id/b82b0e7e-d065-4711-ba4d-a97f974f605d/1002241.pdf [5]
Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and Challenges of Big Data
Research. Big Data Research, Vol. 2(2), 59-64.
https://www.sciencedirect.com/science/article/pii/S2214579615000076?casa_token=Fw_Lm2G
0Ae0
AAAAA:KT0ggnTS9eRevNyjiVGBZnB6kMfRrxv6bafWy7A7ltAYCY5XisEwTwqMb4UJU
VcWl5hVO5al3Q [6] Nelson, B., Phillips, A., & Steuart, C. (2016). Guide to computer
forensics and investigations: processing digital evidence. Cengage Learning. Boston, USA.
https://college.cengage.com/information_security/course360/computer_forensics_97811331348
55/eb ook/nelson98836_1435498836_02.06_chapter06.pdf
[7] Al-Dhaqm, A., Abd Razak, S., Othman, S. H., Ali, A., Ghaleb, F. A., Rosman, A. S., &Marni, N.
(2020). Database Forensic Investigation Process Models: A Review. IEEE Access, 8, 48477-
48490. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9016047
[8] Jones, J., & Etzkorn, L. (2016, March). Analysis of digital forensics live system acquisition
methods to achieve optimal evidence preservation. In SoutheastCon 2016 (pp. 1-6). IEEE.
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7506709&casa_token=6R8Ce1YnpeIAA
AAA: 6XIOK-
mh4hEFiCKkPvS6F7vz5Cnc4zDmi8bKatPI9eNXSlotTZY5b4dT79l5EG32SxuK0W3WU
QU&tag=1
[9] Kaur, M., Kaur, N., Khurana, S. (2016). A Literature Review on Cyber Forensic and its Analysis
tools. International Journal of Advanced Research in Computer and Communication
Engineering, 5(1), 23-28.
[10] Fu, X., Gao, Y., Luo, B., Du, X., &Guizani, M. (2017). Security threats to Hadoop: Data
leakage attacks and investigation. IEEE Network, 31(2), 67-71.
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7827929&casa_token=VvqwjaViqYkA
AAAA
:DQ2j3v6B9KRiiuNAH8EdTJSMxsOzEuvVX9c2M5E2410_PyLcFcCZKb6VkNtenur0LMsW
t1qbjY
[11] Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and Big Heterogeneous
Data: A Survey. Journal of Big Data, 2(1), 3. https://link.springer.com/article/10.1186/s40537-
015-0013-4
[12] Javadianasl, Y., Manaf, A. A., & Zamani, M. (2017). A practical procedure for collecting more
volatile information in live investigation of botnet attack. In Multimedia Forensics and Security
(pp. 381-414). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-319-44270-
9_17
[13] Beebe, N. (2009). Digital forensic research: The good, the bad and the unaddressed. In IFIP
International Conference on Digital Forensics (pp. 17-36). Springer, Berlin, Heidelberg.
https://link.springer.com/content/pdf/10.1007/978-3-642-04155-6_2.pdf
[14] Bellinger, G., Castro, D., & Mills, A. (2004). Data, information, knowledge, and wisdom.
https:// homepages.dcc.ufmg.br/~amendes/SistemasInformacaoTP/TextosBasicos/Data-
InformationKnowledge.pdf
[15] Ahmad, A., Hadgkiss, J., & Ruighaver, A. B. (2012). Incident response teams–Challenges in
supporting the organisational security function. Computers & Security, 31(5), 643-652.
https://www.sciencedirect.com/science/article/pii/S0167404812000624?casa_token=tDzspb2L
XloAA AAA:5PrH7ObP8JVUrjN7RZA1ocMYvF0QIfjkWRV2-
4Q6l6noeVsPF7sfYCi1ZQH2fG3HL56kQz9zEY
[16] Watt, A. C., & Slay, J. (2015). First Responders Actions to cope with Volatile Digital Evidence.
International Journal of Electronic Security and Digital Forensics, 7(4), 381.
https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2015.072182
[17] Ibrahim, N. M., Al-Nemrat, A., Jahankhani, H., & Bashroush, R. (2012). Sufficiency of
Windows Event Log as Evidence in Digital Forensics. In Global Security, Safety and
Sustainability & e- Democracy (pp. 253-262) Springer, Berlin, Heidelberg.
https://repository.uel.ac.uk/download/2a0ad15d0574a2ebc4092dd59cfa017501a051f0d102b7ce
8f76b
e817e43edd6/433298/Sufficiency%20of%20Windows%20Event%20log%20as%20Evidence%
20in% 20Digital%20Forensics2.pdf
[18] Mouhtaropoulos, A., Li, C. T., & Grobler, M. (2014). Digital forensic readiness: are we there
yet. J. Int't Com. L. & Tech., 9, 173.
https://heinonline.org/HOL/Page?handle=hein.journals/jcolate9&div=20&g_sent=1&casa_toke
n=my
k9ar5om1kAAAAA:gjGuq5t2tZjkJ0KoFQeTeb0OpR1xfCIxteukuDSXbMKFcLvPXoFp_vsHg
mYz OzPCzpHk-uRddg&collection=journals
[19] Kothari, C. R., & Garg, G. (2016). Research methodology: methods and techniques. New Delhi,
India: New Age International.
[20] Sahinoglu, M., Stockton, S., Morton, S., Barclay, R., & Eryilmaz, M. (2014). Assessing Digital
Forensics risk: A metric survey approach. In Proceedings of the SDPS 2014 Malaysia, 19th
International Conference on Transformative Science and Engineering, Business and Social
Innovation.
https://www.researchgate.net/profile/M_Sahinoglu/publication/268507819_ASSESSING
_DIGITAL_FORENSICS_RISK_A_METRIC_SURVEY_APPROACH/links/546d4ad90cf26e
95bc3 cb0a0/ASSESSING-DIGITAL-FORENSICS-RISK-A-METRIC-SURVEY-
APPROACH.pd
COMPARISON OF GNSS PATCH VERSUS GPS L1 PATCH
ANTENNA PERFORMANCE CHARACTERISTIC
Gholam Aghashirin1, Hoda S. Abdel-Aty-Zohdy1, Mohamed A. Zohdy1, Darrell Schmidt1 and Adam
Timmons2,
1
Oakland University, USA, 2McMaster University, Canada
ABSTRACT
KEYWORDS
Differential Global Position System (dGPS), Global Navigation Satellite System (GNSS),
Globalnaya Navigazionnaya Sputnikovaya Sistema (GLONASS), Advanced Driver Assistance
Systems (ADAS), Automated Driving (AD), Modelling, comparison, measurements, analysis.
[1] Constantine A. Balanis, Antenna Theory Analysis and Design, 2nd ed., New York: Wiley,
1997, p. 1- 3, 58-61, 73-77, 722-750, 839-871
[2] Fawwaz T. Ulaby, Fundamentals of Applied Electromagnetics, 2001 Media Edition, Prentice
Hall, p.347-354
CLASSIfiCATION OF FATIGUE IN CONSUMER-GRADE EEG USING
ENTROPIES AS FEATURES
Muhammad Azam, Derek Jacoby and Yvonne Coady, University of Victoria, Canada
ABSTRACT
KEYWORDS
2. Dawson, Drew, and Kathryn Reid. ”Fatigue, alcohol and performance impairment.” Nature
388.6639 (1997): 235-235.
3. Arunkumar, N., et al. ”Classification of focal and non focal EEG using entropies.” Pattern
Recognition Letters 94 (2017): 112-117.
4. Andrzejak, Ralph G., Kaspar Schindler, and Christian Rummel. ”Nonrandomness, nonlinear
dependence, and nonstationarity of electroencephalographic recordings from epilepsy patients.”
Physical Review E 86.4 (2012): 046206.
6. Yuan, Qi, et al. ”Epileptic EEG classification based on extreme learning machine and nonlinear
features.” Epilepsy research 96.1-2 (2011): 29-38.
7. Subasi, Abdulhamit, and M. Ismail Gursoy. ”EEG signal classification using PCA, ICA, LDA
and support vector machines.” Expert systems with applications 37.12 (2010): 8659-8666.
10. Gosseries, Olivia, et al. ”Automated EEG entropy measurements in coma, vegetative
state/unresponsive wakefulness syndrome and minimally conscious state.” Functional
neurology 26.1 (2011): 25. Computer Science & Information Technology (CS & IT) 25
11. Thul, Alexander, et al. ”EEG entropy measures indicate decrease of cortical information
processing in Disorders of Consciousness.” Clinical Neurophysiology 127.2 (2016): 1419-1427.
12. Rodr´ıguez-Sotelo, Jose Luis, et al. ”Automatic sleep stages classification using EEG entropy
features and unsupervised pattern analysis techniques.” Entropy 16.12 (2014): 6573-6589.
13. Huang, Kuan-Chih, et al. ”An EEG-based fatigue detection and mitigation system.” International
journal of neural systems 26.04 (2016): 1650018.
14. Zhang, Xiaoliang, et al. ”Design of a fatigue detection system for high-speed trains based on
driver vigilance using a wireless wearable EEG.” Sensors 17.3 (2017): 486.
15. The Theoretical and Applied Neuroscience Laboratory at the University of Victoria
https://www.krigolsonlab.com/
16. Krigolson, Olave E., et al. ”Choosing MUSE: Validation of a low-cost, portable EEG system for
ERP research.” Frontiers in neuroscience 11 (2017): 109.
17. Delgado-Bonal, Alfonso, and Alexander Marshak. ”Approximate entropy and sample entropy: A
comprehensive tutorial.” Entropy 21.6 (2019): 541.
18. Rish, Irina. ”An empirical study of the naive Bayes classifier.” IJCAI 2001 workshop on
empirical methods in artificial intelligence. Vol. 3. No. 22. 2001.
ABSTRACT
System engineering focuses on the realization of complex systems, from design all the way to
management. Meanwhile, in the era of Industry 4.0 and Internet of Things, systems are getting more
and more complex. This complexity comes from the usage of smart sub systems (e.g. smart objects,
new communication protocols, etc.) and new engineering product development processes (e.g.
through Open Innovation). These two aspects namely the IoTrelated sub system and product
development process are our main discussion topics in our research work. The creation of smart
objects such as innovative fleets of connected devices is a compelling case. Fleets of devices in
smart buildings, smart cars or smart consumer products (e.g. cameras, sensors, etc.) are confronted
with complex, dynamic, rapidly changing and resource-constrained environments. In order to align
with these context fluctuations, we develop a framework representing the dimensions for building
Self-adaptive fleets for IoT applications. The emerging product development process Open
Innovation is proven to be three time faster and ten times cheaper than conventional ones. However,
it is relatively new to the industry, and therefore, many aspects are not clearly known, starting from
the specific product requirements definition, design and engineering process (task assignment), until
quality assurance, time and cost. Therefore, acceptance of this new approach in the industry is still
limited. Research activities are mainly dealing with high and qualitative levels. Whereas methods
that supply more transparent numbers remain unlikely. The project-related risks are therefore
unclear, consequently, the Go / noGo decisions become difficult. This paper contributes ideas to
handle issues mentioned above by proposing a new integrated method, we call it InnoCrowd. This
approach, from the perspective of IoT, can be used as a base for the establishment of a related
decision support system.
KEYWORDS
Industry 4.0, Internet of Thing, Crowdsourcing, Neural Network, Decision Support System
[1] R. E. Allen, F. G. Fowler, H. W. Fowler, and eds, (1976) “The pocket Oxford dictionary of
current English” Oxford University Press.
[2] J. Howe, (2009) “Crowdsourcing: How the power of the crowd is driving the future of business”
New York, NY: Random House.
[3] L. Wang, Z.H. Zhou, (2016) “Cost-Saving Effect of Crowdsourcing Learning” Proceedings of
the Twety-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16).
[4] A. Brem, V. Bilgram, (2015) “The search for innovative partners in co-creation: Identifying
lead users in oscial media through netnography and crowdsourcing” Journal of Engineering and
Technology Management, Elsevier.
[5] W. Buhse, L. Reppesgard, and U. Lessmann, (2011) “Der Case Local Motors: Co-Creation and
Collaboration in der Automotive-Industrie”.
[6] S. Chatterjee, P. Khandekar, and B. Kumar, (2014) “Reimagining enterprise innovation through
crowdsourcing” WhitePaper, TCS,
http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Reimagining-
enterpriseinnovation-crowdsourcing-1114-1.pdf [access: 5.11.2016]
[7] E. Schenk and C. Guittard, (2009) “Crowdsourcing: What can be Outsourced to the Crowd, and
Why?” In Sciences de l'Homme et Societe, Strasbourg, France.
[8] A. Achtaich, N. Souissi, R. Mazo, O. Roudies, and C. Salinesi, (2018) “A DSPL Design
Framework for SASs: A Smart Building Example” EAI Endorsed Trans. Smart Cities, vol. 2,
no. 8, p. 154829.
[9] K. Pohl, G. Böckle, and F. Van Der Linden, (2005), Software Product Line Engineering.
Foundations, Principles, and Techniques, vol. 49, no. 12.
[11] M. Mongiello, G. Boggia, and E. Di Sciascio, (2016) “ReIOS: Reflective Architecting in the
Internet of Objects” Proc. 4th Int. Conf. Model. Eng. Softw. Dev., no. February, pp. 384–389.
Computer Science & Information Technology (CS & IT) 9
[12] P. Sawyer, R. Mazo, D. Diaz, C. Salinesi, and D. Hughes, (2012) “Constraint Programming as a
Means to Manage Configurations in Self-Adaptive Systems” Spec. Issue IEEE Comput. J.
“Dynamic Softw. Prod. Lines,” vol. 45, no. October 2015, pp. 56–63.
[14] N. Niu, J. Savolainen, Z. Niu, M. Jin, and J.-R. C. Cheng, (2014) “A Systems Approach to
Product Line Requirements Reuse” IEEE Syst. J., vol. 8, no. 3, p. 827.
[15] C. Palomares, X. Franch, and C. Quer, (2014) “Requirements Reuse and Patterns: A Survey” in
nternational Working Conference on Requirements Engineering: Foundation for Software
Quality.
[16] N. Hoang Thuan, P. Antunes, D. Johnstone, H. Xuan Son, N. Hoang, and H. Xuan, (2015)
“Building an Enterprise Ontology of Business Process Crowdsourcing: A Design Science
Approach” in PACIS 2015 Proceedings, vol. 112.
[17] J.G. Polhill, (2015), "Extracting owl ontologies from agent-based-models: A netlogo
extension", Journal of Artificial Societies and Social Simulation 18