You are on page 1of 54

Top Read Research

Articles of Computer
Science & Information
Technology @ 2020

International Journal of Computer Science


and Information Technology (IJCSIT)

ISSN: 0975-3826(online); 0975-4660 (Print)

http://airccse.org/journal/ijcsit.html
NEW ALGORITHMS FOR COMPUTING FIELD OF VISION OVER
2D GRIDS

Evan R.M. Debenham and Roberto Solis-Oba, The University of Western Ontario, Canada
.

ABSTRACT
The aim of this paper is to propose new algorithms for Field of Vision (FOV) computation
which improve on existing work at high resolutions. FOV refers to the set of locations that
are visible from a specific position in a scene of a computer game.

We summarize existing algorithms for FOV computation, describe their limitations, and
present new algorithms which aim to address these limitations. We first present an algorithm
which makes use of spatial data structures in a way which is new for FOV calculation. We
then present a novel technique which updates a previously calculated FOV, rather than
recalculating an FOV from scratch.

We compare our algorithms to existing FOV algorithms and show they provide substantial
improvements to running time. Our algorithms provide the largest improvement over
existing FOV algorithms at large grid sizes, thus allowing the possibility of the design of
high resolution FOV-based video games.

KEYWORDS

Field of Vision (FOV), Computer Games, Visibility Determination, Algorithms.

Full Text: https://aircconline.com/csit/papers/vol10/csit101801.pdf

6th International Conference on Computer Science, Engineering And


Applications (CSEA 2020 )
http://airccse.org/csit/V10N18.html
REFERENCES

[1] League of Legends. [Online]. Riot Games, 2020. Available:


https://na.leagueoflegends.com/en/
[2] J ung, J. (2016), “A story of fog and war”, [Online]. Available:
engineering.riotgames.com/news/story-fog-and-war [Accessed Sept. 12, 2020]
[3] Defense of the Ancients 2. [Online]. Valve Software, 2020. Available: http://blog.dota2.com
[4] Bergström, B. (2001), “FOV using recursive shadowcasting”, [Online]. Available:
www.roguebasin.com/index.php?title=FOV_using_recursive_shadowcasting [Accessed Sept.
12, 2020]
[5] Duerig, J. (2007), “Precise permissive field of view”, [Online]. Available:
http://www.roguebasin.com/index.php?title=Precise_Permissive_Field_of_View [Accessed
Sept. 12, 2020]
[6] Scherzer, D., Wimmer, M., & Purgathofer, W. (2011) “A survey of real‐time hard shadow
mapping methods”, Computer graphics forum, Vol. 30, No. 1, 169-186.
[7] Liu, N., & Pang, M. Y. (2009) “A survey of shadow rendering algorithms: Projection shadows
and shadow volumes”, 2009 Second International Workshop on Computer Science and
Engineering, Vol.1, 488-492.
[8] Moreau, P., Pharr, M., & Clarberg, P. (2019) “Dynamic many-light sampling for real-time ray
tracing”, High-Performance Graphics - Short Papers, 21-26.
[9] Theoharis, T., Papaioannou, G., & Karabassi, E. A. (2001) “The magic of the z-buffer: A
survey”, Ninth International Conference in Central Europe on Computer Graphics
Visualization and Computer Vision, 379-386.
[10] de Berg, M., Cheong, O., van Kreveld, M., & Overmars, M. (2008) “Binary space partitions:
The painter’s algorithm”, Computational Geometry: Algorithms and Applications, 259-281.
[11] Assarsson, U., & Moller, T. (2000) “Optimized view frustum culling algorithms for bounding
boxes”, Journal of Graphics Tools, 5(1), 9-22.
[12] Luebke, D., & Georges, C. (1995) “Portals and mirrors: Simple, fast evaluation of potentially
visible sets”, Proceedings of the 1995 Symposium on Interactive 3D graphics, 105-106.
[13] Jice. (2009), “Comparative study of field of view algorithms for 2D grid based worlds”,
[Online].
Available:http://www.roguebasin.com/index.php?title=Comparative_study_of_field_of_view
_algorit hms_for_2D_grid_based_worlds [Accessed Sept. 12, 2020]
[14] Debenham, E., Solis-Oba, R. (2019) “New Algorithms for Computing Field of Vision over 2D
Grids”Electronic Thesis and Dissertation Repository. 6552. The University of Western
Ontario. Available: https://ir.lib.uwo.ca/etd/6552 [Accessed Sept. 12, 2020]
[15] Ohtsuki, T. (1982, May) “Minimum dissection of rectilinear regions”, IEEE International
Symposium on Circuits and Systems, 1210-1213.
[16] Samet, H. (1984). “The quadtree and related hierarchical data structures”, ACM Computing
Surveys, 16(2), 187-260.
MINIMUM VIABLE MODEL ESTIMATES FOR MACHINE
LEARNING PROJECTS
John Hawkins, Transitional AI Research Group, Australia

ABSTRACT

Prioritization of machine learning projects requires estimates of both the potential ROI of
the business case and the technical difficulty of building a model with the required
characteristics. In this work we present a technique for estimating the minimum required
performance characteristics of a predictive model given a set of information about how it
will be used. This technique will result in robust, objective comparisons between potential
projects. The resulting estimates will allow data scientists and managers to evaluate whether
a proposed machine learning project is likely to succeed before any modelling needs to be
done. The technique has been implemented into the open source application MinViME
(Minimum Viable Model Estimator) which can be installed via the PyPI python package
management system, or downloaded directly from the GitHub repository. Available at
https://github.com/john-hawkins/MinViME.

KEYWORDS

Machine Learning, ROI Estimation, Machine Learning Metrics, Cost Sensitive Learning.

Full Text: https://aircconline.com/csit/papers/vol10/csit101803.pdf

6th International Conference on Computer Science, Engineering And


Applications (CSEA 2020 )
http://airccse.org/csit/V10N18.html
REFERENCES

[1] J. Johnson and T. Khoshgoftaar, “Medicare fraud detection using neural networks,” Journal of
Big Data, vol. 63, no. 6, 2019. [Online]. Available: https://doi.org/10.1186/ Computer Science
& Information Technology (CS & IT) 45 s40537-019-0225-0 Cited on page(s): 33

[2] C. Hennig and M. Kutlukaya, “Some thoughts about the design of loss functions,” REVSTAT
- Statistical Journal Volume, vol. 5, pp. 19–39, 04 2007. Cited on page(s): 33

[3] P. Domingos, “Metacost: A general method for making classifiers cost-sensitive,”


Proceedings of the Fifth ACM SIGKDD Int’l. Conf. on Knowledge Discovery & Data
Mining, pp. 155–164, 8 1999. Cited on page(s): 33

[4] D. D. Margineantu, “On class-probability estimates and cost-sensitive evaluation of


classifiers,” in In Workshop on Cost-Sensitive Learning at the Seventeenth International
Conference on Machine Learning (WCSL at ICML2000, 2000. Cited on page(s): 33, 34

[5] C. Elkan, “The foundations of cost-sensitive learning,” Proceedings of the Seventeenth


International Conference on Artificial Intelligence: 4-10 August 2001; Seattle, vol. 1, 05 2001.
Cited on page(s): 33, 34, 35, 40

[6] Y. Tian and W. Zhang, “Thors: An efficient approach for making classifiers cost-sensitive,”
IEEE Access, vol. 7, pp. 97 704–97 718, 2019. Cited on page(s): 33 [7] H. Fatlawi,
“Enhanced classification model for cervical cancer dataset based on cost sensitive classifier,”
08 2017. Cited on page(s): 33

[8] N. Nikolaou, N. Edakunni, M. Kull, P. Flach, and G. Brown, “Cost-sensitive boosting


algorithms: Do we really need them?” Machine Learning, vol. 104, 08 2016. Cited on page(s):
33

[9] O. Ylijoki, “Guidelines for assessing the value of a predictive algorithm: a case study,”
Journal of Marketing Analytics, vol. 6, 01 2018. Cited on page(s): 33

[10] S. Raudys and A. Jain, “Small sample size effects in statistical pattern recognition:
Recommendations for practitioners,” Pattern Analysis and Machine Intelligence, IEEE
Transactions on, vol. 13, pp. 252–264, 04 1991. Cited on page(s): 34

[11] I. E. Sanchez, “Optimal threshold estimation for binary classifiers using game theory,” ISCB
Comm J, p. 2762, 2017. [Online]. Available: https://doi.org/10.12688/f1000research.10114.3
Cited on page(s): 35

[12] A. P. Bradley, “The use of the area under the roc curve in the evaluation of machine learning
algorithms,” Pattern Recognition, vol. 30(7), pp. 1145–1159, 1997. Cited on page(s): 38
GENETIC ALGORITHM FOR EXAM TIMETABLING PROBLEM - A
SPECIFIC CASE FOR JAPANESE UNIVERSITY FINAL
PRESENTATION TIMETABLING

Jiawei LI and Tad Gonsalves, Sophia University, Japan

ABSTRACT

This paper presents a Genetic Algorithm approach to solve a specific examination


timetabling problem which is common in Japanese Universities. The model is programmed
in Excel VBA programming language, which can be run on the Microsoft Office Excel
worksheets directly. The model uses direct chromosome representation. To satisfy hard and
soft constraints, constraint-based initialization operation, constraint-based crossover
operation and penalty points system are implemented. To further improve the result quality
of the algorithm, this paper designed an improvement called initial population pre-training.
The proposed model was tested by the real data from Sophia University, Tokyo, Japan. The
model shows acceptable results, and the comparison of results proves that the initial
population pre-training approach can improve the result quality.

KEYWORDS

Examination timetabling problem, Excel VBA, Direct chromosome representation, Genetic


Algorithm Improvement.

Full Text: https://aircconline.com/csit/papers/vol10/csit101701.pdf

8th International Conference on Computational Science and


Engineering (CSE 2020)
http://airccse.org/csit/V10N17.html
REFERENCES

[1] Song, Y., Wang, F., & Chen, X. (2019). An improved genetic algorithm for numerical function
optimization. Applied Intelligence, 49(5), 1880-1902.

[2] Qu, R., Burke, E. K., McCollum, B., Merlot, L. T., & Lee, S. Y. (2009). A survey of search
methodologies and automated system development for examination timetabling. Journal of
scheduling, 12(1), 55-89.

[3] Carter, M. W., & Laporte, G. (1995, August). Recent developments in practical examination
timetabling. In International Conference on the Practice and Theory of Automated Timetabling
(pp. 1-21). Springer, Berlin, Heidelberg.

[4] Thompson, J. M., & Dowsland, K. A. (1996). Variants of simulated annealing for the
examination timetabling problem. Annals of Operations research, 63(1), 105-128.

[5] Thompson, J. M., & Dowsland, K. A. (1998). A robust simulated annealing based examination
timetabling system. Computers & Operations Research, 25(7-8), 637-648.

[6] Di Gaspero, L., & Schaerf, A. (2000, August). Tabu search techniques for examination
timetabling. In International Conference on the Practice and Theory of Automated Timetabling
(pp. 104-117). Springer, Berlin, Heidelberg.

[7] Abdullah, S., Ahmadi, S., Burke, E. K., Dror, M., & McCollum, B. (2007). A tabu-based large
neighbourhood search methodology for the capacitated examination timetabling problem.
Journal of the Operational Research Society, 58(11), 1494-1502.

[8] Azimi, Z. N. (2005). Hybrid heuristics for examination timetabling problem. Applied
Mathematics and Computation, 163(2), 705-733.

[9] Eley, M. (2006, August). Ant algorithms for the exam timetabling problem. In International
Conference on the Practice and Theory of Automated Timetabling (pp. 364-382). Springer,
Berlin, Heidelberg.

[10] Mandal, A. K., & Kahar, M. N. M. (2015, April). Solving examination timetabling problem
using partial exam assignment with great deluge algorithm. In 2015 International Conference on
Computer, Communications, and Control Technology (I4CT) (pp. 530-534). IEEE.

[11] Leite, N., Fernandes, C. M., Melicio, F., & Rosa, A. C. (2018). A cellular memetic algorithm
for the examination timetabling problem. Computers & Operations Research, 94, 118-138.

[12] Rozaimee, A., Shafee, A. N., Hadi, N. A. A., & Mohamed, M. A. (2017). A framework for
university’s final exam timetable allocation using genetic algorithm. World Applied Sciences
Journal, 35(7), 1210-1215. 12 Computer Science & Information Technology (CS & IT)

[13] Shatnawi, A., Fraiwan, M., & Al-Qahtani, H. S. (2017, February). Exam scheduling: A case
study. In 2017 Ninth International Conference on Advanced Computational Intelligence
(ICACI) (pp. 137- 142). IEEE.

[14] Dener, M., & Calp, M. H. (2019). Solving the exam scheduling problems in central exams with
genetic algorithms. arXiv preprint arXiv:1902.01360.

[15] Gozali, A. A., Kurniawan, B., Weng, W., & Fujimura, S. (2020). Solving university course
timetabling problem using localized island model genetic algorithm with dual dynamic
migration policy. IEEJ Transactions on Electrical and Electronic Engineering, 15(3), 389-400.
[16] E. Zitzler, K. Deb, and L. Thiele, “Comparison of multiobjective evolutionary algorithms:
Empirical results,” Evol. Comput., vol. 8, no. 2, pp. 173–195, Summer 2000.

[17] G. Rudolph, “Evolutionary search under partially ordered sets,” Dept. Comput. Sci./LS11,
Univ. Dortmund, Dortmund, Germany, Tech. Rep. CI-67/99, 1999.

[18] Ahn, C. W., & Ramakrishna, R. S. (2003). Elitism-based compact genetic algorithms. IEEE
Transactions on Evolutionary Computation, 7(4), 367-385.

[19] M. Schoenauer and S. Xanthakis, “Constrained GA optimization,” in Proc. Int. Conf. Genetic
Algorithms, vol. 5, 1993, pp. 573–580.

[20] Gozali, A. A., & Fujimura, S. (2019). DM-LIMGA: dual migration localized island model
genetic algorithm—a better diversity preserver island model. Evolutionary Intelligence, 12(4),
527-539.

[21] Sun, X., Chou, P., Wu, C. C., & Chen, L. R. (2019). Quality-oriented study on mapping island
model genetic algorithm onto CUDA GPU. Symmetry, 11(3), 318.
FINDING MUSIC FORMAL CONCEPTS CONSISTENT WITH
ACOUSTIC SIMILARITY

Yoshiaki Okubo, Hokkaido University, Japan

ABSTRACT

In this paper, we present a method of finding conceptual clusters of music objects based on
Formal Concept Analysis. A formal concept (FC) is defined as a pair of extent and intent
which are sets of objects and terminological attributes commonly associated with the
objects, respectively. Thus, an FC can be regarded as a conceptual cluster of similar objects
for which its similarity can clearly be stated in terms of the intent. We especially discuss
FCs in case of music objects, called music FCs. Since a music FC is based solely on
terminological information, we often find extracted FCs would not always be satisfiable
from acoustic point of view. In order to improve their quality, we additionally require our
FCs to be consistent with acoustic similarity. We design an efficient algorithm for extracting
desirable music FCs. Our experimental results for The MagnaTagATune Dataset shows
usefulness of the proposed method.

KEYWORDS

Formal concept analysis, music formal concepts, music objects, terminological similarity,
acoustic similarity.

Full Text: https://aircconline.com/csit/papers/vol10/csit101601.pdf

4th International Conference on Computer Science and Information Technology


(COMIT 2020)
http://airccse.org/csit/V10N16.html
REFERENCES

1. L. Billard ad E. Diday. Symbolic Data Analysis, Wiley, 2006.

2. S. Marsland, Machine Learning: An Algorithmic Perspective, Second Edition, CRC Press, 2015.

3. Y. V. S. Murthy and S. G. Koolagudi. Content-Based Music Information Retrieval (CB-MIR) and


Its Applications toward the Music Industry: A Review, ACM Computing Surveys, 51(3),
Article 45, 2018.

4. T. Li, M. Ogihara and G. Tzanetakis (eds.). Music Data Mining, CRC Press, 2012.

5. D. Paul and S. Kundu. A Survey of Music Recommendation Systems with a Proposed Music
Recommendation System, Emerging Technology in Modelling and Graphics, AISC-937, pp.
279 – 285, Springer, 2020.

6. Y. Song, S. Dixon and M. Pearce. A Survey of Music Recommendation Systems and Future
Perspectives, In Proc. of the 9th Int’l Symp. on Computer Music Modeling and Retrieval -
CMMR’12, pp. 395 – 410, 2012.

7. D. Lin and S. Jayarathna. Automated Playlist Generation from Personal Music Libraries, In Proc.
of 2018 IEEE Int’l Conf. on Information Reuse and Integration for Data Science, pp. 217 – 224,
2018.

8. F. M¨orchen, A. Ultsch, M. N¨ocker and C. Samm. Visual Mining in Music Collections, From
Data and Information Analysis to Knowledge Engineering, M. Spiliopoulou, R. Kruse, C.
Borgelt, A. N¨urnberger and W. Gaul (eds.), pp. 724 – 731, Springer, 2006.

9. E. Law, K. West, M. Mandel, M. Bay and J. S. Downie. Evaluation of Algorithms Using Games:
The Case of Music Tagging, In Proc. of the 10th Int’l Conf. on Music Information Retrieval -
ISMIR’09, pp. 387 – 392, 2009.

10. P. Knees and M. Schedl. A Survey of Music Similarity and Recommendation from Music
Context Data, ACM Transactions on Multimedia Computing, Communication and
Applications, 10(1), Article 2, 2013.

11. F. Pachet. Knowledge Management and Musical Metadata, In Encyclopedia of Knowledge


Management, 2005.

12. D. Wang, T. Li and M. Ogihara. Are Tags Better Than Audio Features? The Effect of Joint Use
of Tags and Audio Content Features for Artistic Style Clustering, In Proc. of the 11th Int’l
Society for Music Information Retrieval Conference - ISMIR’10, pp. 57 – 62, 2010.

13. R. Miotto and N. Orio. A Probabilistic Model to Combine Tags and Acoustic Similarity for
Music Retrieval, ACM Transactions on Information Systems, 30(2), Article 8, 2012.

14. P. Knees, T. Pohle, M. Schedl, D. Schnitzer, K. Seyerlehner and G. Widmer. Augmenting Text-
Based Music Retrieval with Audio Similarity, In Proc. of the 10th Int’l Society for Music
Information Retrieval Conference - ISMIR’09, pp. 579 – 584, 2009. 14 Computer Science &
Information Technology (CS & IT)

15. A. Ahmad and S. S. Khan. Survey of State-of-the-Art Mixed Data Clustering Algorithms, IEEE
Access, 7, pp. 31883 – 31902, 2019.

16. K. M. Ibrahim, J. Royo-Letelier, E. V. Epure, G. Peeters and G. Richard. Audio-Based


AutoTagging With Contextual Tags for Music, In Proc. of 2020 IEEE International Conference
on Acoustics, Speech and Signal Processing - ICASSP 2020, pp. 16 – 20, 2020.

17. L. Kumar A. Mitra, M. Mittal, V. Sanghvi, S. Roy and S. K. Setua. Music Tagging and
Similarity Analysis for Recommendation System, Computational Intelligence in Pattern
Recognition, AISC-999, pp 477 – 485, Springer, 2020.

18. D. Turnbull, L. Barrington and G. Lanckriet. Five Approaches to Collecting Tags for Music, In
Proc. of the 9th Int’l Society for Music Information Retrieval Conference - ISMIR’08, pp. 225 –
230, 2008.

19. B. Ganter and R. Wille. Formal Concept Analysis – Mathematical Foundations, 284 pages,
Springer, 1999.

20. B. Ganter, G. Stumme and R. Wille (Eds). Formal Concept Analysis – Foundations and
Applications, LNAI-3626, 348 pages, Springer, 2005.

21. P. Knees and M. Schedl. Music Similarity and Retrieval, Springer, 2016.

22. R. Rymon. Search through Systematic Set Enumeration, In Proc. of Int’l Conf. on Principles of
Knowledge Representation Reasoning - KR’92, pp. 539 – 550, 1992.
CONCATENATION TECHNIQUE IN CONVOLUTIONAL NEURAL NETWORKS
FOR COVID-19 DETECTION BASED ON X-RAY IMAGES

Yakoop Razzaz Hamoud Qasim, Habeb Abdulkhaleq Mohammed Hassan,


Abdulelah Abdulkhaleq Mohammed Hassan, Taiz University, Yemen

ABSTRACT

In this paper we present a Convolutional Neural Network consisting of NASNet and MobileNet in
parallel (concatenation) to classify three classes COVID-19, normal and pneumonia, depending on a
dataset of 1083 x-ray images divided into 361 images for each class. VGG16 and RESNet152-v2
models were also prepared and trained on the same dataset to compare performance of the proposed
model with their performance. After training the networks and evaluating their performance, an
overall accuracy of 96.91%for the proposed model, 92.59% for VGG16 model and 94.14% for
RESNet152. We obtained accuracy, sensitivity, specificity and precision of 99.69%, 99.07%, 100%
and 100% respectively for the proposed model related to the COVID-19 class. These results were
better than the results of other models. The conclusion, neural networks are built from models in
parallel are most effective when the data available for training are small and the features of different
classes are similar.

KEYWORDS

Deep Learning, Concatenation Technique, Convolutional Neural Networks, COVID-19, Transfer


Learning.

Full Text: https://aircconline.com/csit/papers/vol10/csit101602.pdf

4th International Conference on Computer Science and Information Technology


(COMIT 2020)
http://airccse.org/csit/V10N16.html
REFERENCES

[1] N. Zhu, D. Zhang, W. Wang, X. Li, B. Yang, J. Song, X. Zhao, B. Huang, W. Shi, R. Lu, P.
Niu, F. Zhan, X. Ma, D. Wang, W. Xu, G. Wu, G.F. Gao, W. Tan, A novel coronavirus

[2] C. Huang, Y. Wang, X. Li, L. Ren, J. Zhao, Y. Hu, L. Zhang, G. Fan, J. Xu, X. Gu, Z. Cheng,
T. Yu, J. Xia, Y. Wei, W. Wu, X. Xie, W. Yin, H. Li, M. Liu, Y. Xiao, H. Gao, L. Guo, J. Xie,
G. Wang, R. Jiang, Z. Gao, Q. Jin, J. Wang, B. Cao, Clinical features of patients infected with
2019 novel coronavirus in Wuhan, China Lancet, 395 (2020), pp. 497-506

[3] WHO Coronavirus disease. Last Accessed : 30 Jun 2020

[4] Barret Zoph, Vijay Vasudevan, Jonathon Shlens, Quoc V. Le. Learning Transferable
Architectures for Scalable Image Recognition. arXiv:1707.07012v4. 2018.

[5] Andrew G. Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias
Weyand, Marco Andreetto, Hartwing Adam. MobileNets: Efficient Convolutional Neural
Networks for Mobile Vision Application. arXiv:1704.04861v1. 2017.

[6] Mohammad Rahimzadeh, Abolfal Attar. A modified deep convolutional neural network for
detecting COVID-19 and pneumonia from X-ray images based on the concatenation of
Xception and ResNet50v2. (2020) 2020.100360.

[7] Chollet F. Xception: deep learning with depthwise separable convolution. In: proceedings pf the
IEEE conference on computer vision and pattern recognition. 2017. P. 1251-8.

[8] He K, Zhang X, Ren S, Sun J. Identity mappings in deep residual networks. In:European
conference on computer vision. Springer, 2016. p. 630-45.

[9] Harsh Panwar, P.K. Gupta, Mhammad Khubeb Siddiqui, Ruben Morales-Menendez, Vaishnavi
Singh. Application of deep learning for fast detection of COVID-19 in X-ray using nCOVnet.
(2020) 2020.109944.

[10] Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image
recognition. arXiv, 1409: p. 1556. [

11] Asif Iqbal Khan, Junaid Latief Shah, Mohammad Mudasir Bhat. CoroNet: A deep neural
network for detection and diagnosis of COVID-19 from chest x-ray images. (2020)
2020.105581. [12] Shahank Vaid, Reza Kalantar, Mohit Bhandari. Deep learning COVID-19
detection bias: accuracy through artificial intelligence. 2020. https://doi.org/10.1007/s00264-
020-04609-7.

[13] Ioannis D. Apostolopoulos, Tzani A. Mpesiana. Covid-19: Automatic detection from X-ray
images utilizing transfer learning with convolutional neural networks. 2020.
https://doi.org/10.1007/s13246- 020-00865-4.

[14] Howard AG Zhu M Chen B et al (2017)MobileNets: efficient convolutional neural networks for
mobile vision applications. arXiv preprint arXiv: 170404861.

[15] Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, et al. Going deeper with
convolutions.Boston, MA, 2015,: IEEE Conference on Computer Vision and Pattern
Recognition (CVPR); 2015. P. 1-9.

[16] Szegedy C, Ioffe S, Vanhoucke V, Alemi A. Inception-v4, inception-resnet and the impact of
residual connections on learning. 2016.
[17] Cohen JP. COVID-19 image data collection. (2020) https://github.com/ieee8023/covid-
chestxraydataset.

[18] Tawsifur Rahman, M.E.H. Chowdhury, A. Khandakar. COVID-19 Radiography database.


https://www.kaggle.com/tawsifurrahman/covid19-radiography-database .

[19] Paul Mooney. Chest X-ray Images (Pneumonia).


https://www.kaggle.com/paultimothymooney/chestxray-pneumonia . Computer Science &
Information Technology (CS & IT) 25

[20] Sumit Saha. A Comprehensive Guide to Convolutional Neural Network –the ELI5 way.
https://towordsdatascience.com/a-comprehensive-guide-to-convolutional-neural-network-the-
eli5- way-3bd2b1164a5 . Last accessed on Jun 2020.

[21] Zawn Villines. What is the relationship between pneumonia and COVID-19?.
https://www.medicalnewstoday.com/articles/pneumonia-and-covid-19#summary . last accessed
on Jun 2020.

[22] Jill Seladi-Schulman. What to Know About COVID-19 and Pneumonia .


https://www.healthline.com/health/coronavirus-pneumonia. Last accessed on Jun 2020.

[23] Sabyasachi Sahoo. Grouped Convolutiona – convolutions in parallel.


https://towordsdatascience.com/grouped-convolutions-convolutions-in-parallel-3b8cc847e851 .
Last accessed on May 2020.

[24] Sik-Ho Tsang. Review: NASNet-Neural Architecture Search Network (Image Classification).
https://medium.com/@sh.tsang/review-nasnet-neural-architecture-search-network-
imageclassification-23139ea0425d . Last accessed on APRIL 2020.

[25] Sik-Ho Tsang. Review:MobileNetv1-Depthwise Separable Convolution (Light Weight Model).


https://towardsdatascience.com/review-mobilenetv1-depthwise-separable-convolution-light-
weightmodel-a382df364b69 . Last accessed MAY 2020.

[26] Chris. What are Max Pooling, Average Pooling, Global Max Pooling and Global Average
Pooling. https://www.machinecurve.com/index.php/2020/01/30/what-are-max-pooling-average-
poolingglobal-max-pooling-and-global-average-pooling/ . Last accessed on MARCH 2020.

[27] Karen Simonyan, Andrew Zisserman. Very Deep Convolutional Networks for Large-Scale
Image Reconition. arXiv:1409.1556. 2014.

[28] Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun. Deep Residual Learning for Image
Recognition. arXiv:1512.03385. 2015.

[29] Han, Seung & Park, Gyeong & Lim, Woohyung & Kim, Myoung & Na, Jung-Im & Park, Ilwoo
& Chang, Sung. (2018). Deep neural networks show an equivalent and often superior
performance to dermatologists in onychomycosis diagnosis: Automatic construction of
onychomycosis datasets by region-based convolutional deep neural network. PLOS ONE. 13.
e0191493. 10.1371/journal.pone.0191493.
INTRUSION DETECTION IN COMPUTER SYSTEMS BY USING
ARTIFICIAL NEURAL NETWORKS WITH DEEP LEARNING
APPROACHES
Sergio Hidalgo-Espinoza, Kevin Chamorro-Cupuerán and Oscar Chang-Tortolero,
University of Yachay Tech, Ecuador

ABSTRACT

Intrusion detection into computer networks has become one of the most important issues in
cybersecurity. Attackers keep on researching and coding to discover new vulnerabilities to penetrate
information security system. In consequence computer systems must be daily upgraded using up-to-
date techniques to keep hackers at bay. This paper focuses on the design and implementation of an
intrusion detection system based on Deep Learning architectures. As a first step, a shallow network
is trained with labelled log-in [into a computer network] data taken from the Dataset CICIDS2017.
The internal behaviour of this network is carefully tracked and tuned by using plotting and exploring
codes until it reaches a functional peak in intrusion prediction accuracy. As a second step, an
autoencoder, trained with big unlabelled data, is used as a middle processor which feeds compressed
information and abstract representation to the original shallow network. It is proven that the resultant
deep architecture has a better performance than any version of the shallow network alone. The
resultant functional code scripts, written in MATLAB, represent a re-trainable system which has
been proved using real data, producing good precision and fast response.

KEYWORDS

Artificial Neural Networks, Information Security, Deep Learning, intrusion detection & hacking
attacks.

Full Text: https://aircconline.com/csit/papers/vol10/csit101501.pdf

10th International Conference on Advances in Computing and Information Technology


(ACITY 2020)
http://airccse.org/csit/V10N15.html
REFERENCES

[1] N. Garg, D. Kumar, Y. Khera, Sujay, and P. Jain, “Towards the impact ofhacking on cyber
security,”IIOAB Journal, vol. 9, pp. 61–77, 05 2018.

[2] G. Jha, “Artificial neural networks and its applications,” 01 2019.

[3] M. Mijwel, “Artificial neural networks advantages and disadvantages,” 01 2018.

[4] H. Lodish, A. Berk, C. A. Kaiser, M. Krieger, A. Bretscher, H. Ploegh,A. Amon, and M. P.


Scott,Molecular Cell Biology, 7th ed. W.H. Freemanand Company, 2013.

[5] R. Sathya and A. Abraham, “Comparison of supervised and unsupervised learning algorithms for
pattern classification,”International Journal ofAdvanced Research in Artificial Intelligence, vol.
2, no. 2, 2013.[Online]. Available: http://dx.doi.org/10.14569/IJARAI.2013.020206

[6] Y. LeCun, Y. Bengio, and G. E. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–
444, 2015. [Online]. Available:https://doi.org/10.1038/nature14539

[7] S. Albawi, T. A. Mohammed, and S. Al-Zawi, “Understanding of a convolutional neural


network,” 2017 International Conference on Engineering and Technology (ICET), Aug 2017,
pp. 1–6.

[8] R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S.


Venkatraman, “Deep learning approach for intelligent intrusion detection system,” IEEE
Access, vol. 7, pp. 41 525– 41 550, 2019.

[9] Jia, F. & Kong, L.-Z. (2017). “Intrusion Detection Algorithm Based on Convolutional Neural
Network,” Beijing LigongDaxueXuebao/Transaction of Beijing Institute of Technology. 37.
1271- 1275. 10.15918/j.tbit1001-0645.2017.12.011.

[10] McHugh, John. (2000). “Testing Intrusion Detection Systems: A Critique of the 1998 and 1999
DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory,”ACM
Trans. Inf. Syst. Secur.,3. 262-294. 10.1145/382912.382923.

[11] Biswas, Saroj. (2018). “Intrusion Detection Using Machine Learning: A Comparison Study,”
International Journal of Pure and Applied Mathematics. 118. 101-114.

[12] M. Tavallaee, E. Bagheri, W. Lu and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99
data set," 2009 IEEE Symposium on Computational Intelligence for Security and Defense
Applications, Ottawa, ON, 2009, pp. 1-6, doi: 10.1109/CISDA.2009.5356528. 12 Computer
Science & Information Technology (CS & IT)

[13] I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating anew intrusion


detection dataset and intrusion traffic characterization,”4 thInternational Conference on
Information Systems Security and Privacy (ICISSP), Portugal, Jan. 2018

[14] A. Gharib, I. Sharafaldin, A. H. Lashkari and A. A. Ghorbani, "An evaluation framework for
intrusion detection dataset", Proc. Int. Conf. Inf. Sci. Secur. (ICISS), pp. 1-6, Dec. 2016..
AN OPTIMIZED CLEANING ROBOT PATH GENERATION AND
EXECUTION SYSTEM USING CELLULAR REPRESENTATION OF
WORKSPACE
Qile He1 and Yu Sun2
1
Webber Academy, Canada, 2California State Polytechnic University, USA

ABSTRACT

Many robot applications depend on solving the Complete Coverage Path Problem (CCPP).
Specifically, robot vacuum cleaners have seen increased use in recent years, and some models offer
room mapping capability using sensors such as LiDAR. With the addition of room mapping, applied
robotic cleaning has begun to transition from random walk and heuristic path planning into an
environment-aware approach. In this paper, a novel solution for pathfinding and navigation of indoor
robot cleaners is proposed. The proposed solution plans a path from a priori cellular decomposition
of the work environment. The planned path achieves complete coverage on the map and reduces
duplicate coverage. The solution is implemented inside the ROS framework, and is validated with
Gazebo simulation. Metrics to evaluate the performance of the proposed algorithm seek to evaluate
the efficiency by speed, duplicate coverage and distance travelled.

KEYWORDS

Complete Coverage Path Planning, Mobile Robots, Graph Theory.

Full Text: https://aircconline.com/csit/papers/vol10/csit101502.pdf

10th International Conference on Advances in Computing and Information Technology


(ACITY 2020)
http://airccse.org/csit/V10N15.html
REFERENCES

[1] Robot vacuum cleaner, by T. Charles, A. Parker, S. Lau, E. Blair, A. Henginer, E. Ng, E.
DiBernardo, R. Witman, M. Stout. (2006, Jan. 26). U.S. Patent 20060020369A1 [Online].
Available:
https://assignment.uspto.gov/patent/index.html#/patent/search/resultAssignment?searchInput=2
00600 20369&id=23224-384

[2] Random motion cleaner, by D. E. Gerber, K.L Thomas. (2002, Jun. 6). U.S. Patent 6571415B2
[Online]. Available:
http://patft.uspto.gov/netacgi/nphParser?Sect1=PTO1&Sect2=HITOFF&p=1&u=/netahtml/PT
O/srchnum.html&r=1&f=G&l=50&d=P ALL&s1=6571415.PN.

[3] W. Brockman and D. Klingbiel, "Rating the Performance of Robotic Coverage Tasks,"
Proceedings of the 5th IFAC/EURON Symposium on Intelligent Autonomous Vehicles July 5-
7, 2004 Lisboa, Portugal, vol. 22, no. 6, pp. 46-57, June 1989, doi: 10.1109/2.30720.

[4] A. Elfes, "Using occupancy grids for mobile robot perception and navigation," in Computer, vol.
22, no. 6, pp. 46-57, June 1989, doi: 10.1109/2.30720.

[5] E. Gonzalez, O.Alvarez, Y.Diaz, C.Parra and C.Bustacara, "BSA: A Complete Coverage
Algorithm," Proceedings of the 2005 IEEE International Conference on Robotics and
Automation, Barcelona, Spain, 2005, pp. 2040-2044, doi: 10.1109/ROBOT.2005.1570413.

[6] A. Khan, I. Noreen, H. Ryu, N. L. Doh, and Z. Habib, “Online complete coverage path planning
using two-way proximity search,” Intel Serv Robotics 10, 229–240 (2017). doi:
10.1007/s11370-017- 0223-z

[7] J. Connors and G. Elkaim, "Analysis of a Spline Based, Obstacle Avoiding Path Planning
Algorithm," 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring, Dublin,
2007, pp. 2565-2569, doi: 10.1109/VETECS.2007.528.

[8] Yuan, R., Zhang, F., Qu, J., Li, G. and Fu, Y., "A novel obstacle avoidance method based on
multiinformation inflation map," Industrial Robot, Vol. 47 No. 2, pp. 253-265.
https://doi.org/10.1108/IR05-2019-0114

[9] Joon Seop Oh, Yoon Ho Choi, Jin Bae Park and Y. F. Zheng, "Complete coverage navigation of
cleaning robots using triangular-cell-based map," in IEEE Transactions on Industrial
Electronics, vol. 51, no. 3, pp. 718-726, June 2004, doi: 10.1109/TIE.2004.825197.

[10] R. N. De Carvalho, H. A. Vidal, P. Vieira and M. I. Ribeiro, "Complete coverage path planning
and guidance for cleaning robots," ISIE '97 Proceeding of the IEEE International Symposium
on Industrial Electronics, Guimaraes, Portugal, 1997, pp. 677-682 vol.2, doi:
10.1109/ISIE.1997.649051.

[11] T. Lee, S. Baek, Y, Choi, and S. Oh, “Smooth coverage path planning and control of mobile
robots based on high-resolution grid map representation,” Robotics and Autonomous Systems,
Vol. 59, No. 10, pp. 801-812. https://doi.org/10.1016/j.robot.2011.06.002

[12] Quigley, Morgan, et al. "ROS: an open-source Robot Operating System." ICRA workshop on
open source software. Vol. 3. No. 3.2. 2009. Computer Science & Information Technology (CS
& IT) 25

[13] Santos, Joao Machado, David Portugal, and Rui P. Rocha. "An evaluation of 2D SLAM
techniques available in robot operating system." 2013 IEEE International Symposium on
Safety, Security, and Rescue Robotics (SSRR). IEEE, 2013.

[14] Quigley, Morgan, Brian Gerkey, and William D. Smart. Programming Robots with ROS: a
practical introduction to the Robot Operating System. " O'Reilly Media, Inc.", 2015.

[15] Korf, Richard E. "Depth-first iterative-deepening: An optimal admissible tree search." Artificial
intelligence 27.1 (1985): 97-109.

[16] Jianya, Yue Yang Gong. "An efficient implementation of shortest path algorithm based on
dijkstra algorithm [j]." Journal of Wuhan Technical University of Surveying and Mapping
(Wtusm) 3.004 (1999).

[17] Project source code. https://github.com/Jackack/Turtlebot3_complete_coverage


TOWARDS A RISK ASSESSMENT MODEL FOR BIG DATA IN
CLOUD COMPUTING ENVIRONMENT
Saadia Drissi, Soukaina Elhasnaoui, Hajar Iguer, Siham Benhadou and Hicham Medromi,
Hassan II University, Morocco

ABSTRACT

Cloud computing gives a relevant and adaptable support for Big Data by the ease of use,
access to resources, low cost use of resources, and the use of strong equipment to process
big data. Cloud and big data center on developing the value of a business while reducing
capital costs.

Big data and cloud computing, both favor companies and by cause of their benefit, the use
of big data growths extremely in the cloud. With this serious increase, there are several
emerging risk security concerns. Big data has more vulnerabilities with the comparison to
classical database, as this database are stored in servers owned by the cloud provider. The
various usage of data make safety-related big data in the cloud intolerable with the
traditional security measures.

The security of big data in the cloud needs to be looked at and discussed. In this current
paper, my colleagues and me will present and discuss the risk assessment of big-data
applications in cloud computing environments and present some ideas for assessing these
risks.

KEYWORDS

Cloud computing, risk assessment, big data, security.

Full Text: https://aircconline.com/csit/papers/vol10/csit101503.pdf

10th International Conference on Advances in Computing and Information Technology


(ACITY 2020)
http://airccse.org/csit/V10N15.html
REFERENCES

[1] M. Paryasto, A. Alamsyah, and B. Rahardjo, “Big-data security management issues,” 2014 2nd
Int. Conf. Inf. Commun. Technol., pp. 59–63, 2014.

[2] Hashem, I.A.T. et al., 2014. The rise of “big data” on cloud computing: Review and open
research issues. Information Systems, 47, pp.98–115.

[3] S. Drissi, S. El hasnaoui, H. Iguer, S. Benhadou and H. Medromi,, Integration of Cloud


Computing Big Data AI and Internet of Things: Review and open research issues,
DIGITECH2019 , At: Germany, 25/ 26 April 2019.

[4] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management Auerbach,
ed.,

[5] S. Drissi, S. Benhadou and H. Medromi,"A new shared and comprehensive tool of cloud
computing security assessment", In the Proceedings of the Springer, vol: 366 , Advances in
Ubiquitous Networking, UNET 2015, Casablanca, Morocco, pp 155-167

[6] S. Drissi, S Elhasnaoui, H Iguer, S. Benhadou and H. Medromi," Security Risk Assessment of
Multicloud System Adoption: Review and Open Research Issues", In the Proceedings of the
Springer, International Conference on Big Data and Smart Digital Casablanca, Morocco,
January 2019 DOI: 10.1007/978-3-030-12048-1_37

[7] Boyd, D., & Crawford, K. (2011, September). Six provocations for big data. In A decade in
internet time: Symposium on the dynamics of the internet and society (Vol. 21). Oxford: Oxford
Internet Institute.

[8] SHAN, Y. C., Chao, L. V., ZHANG, Q. Y., & TIAN, X. Y. (2017). Research on Mechanism of
Early Warning of Health Management Based on Cloud Computing and Big Data. In
Proceedings of the 23rd International Conference on Industrial Engineering and Engineering
Management 2016 (pp. 291-294). Atlantis Press, Paris. 34 Computer Science & Information
Technology (CS & IT)

[9] Parvin Ahmadi Doval Amiri and Mina Rahbari Gavgani, 2016. A Review on Relationship and
Challenges of Cloud Computing And Big Data: Methods of Analysis and Data Transfer. Asian
Journal of Information Technology, 15: 2516-2525

[10] Chen, Min, et al. Big data: related technologies, challenges and future prospects. Heidelberg:
Springer, 2014.

[11] Demchenko, Yuri, et al. "Big security for big data: Addressing security challenges for the big
data infrastructure." Workshop on Secure Data Management. Springer, Cham, 2013.

[12] Vacca, J. R. (Ed.). (2016). Cloud Computing Security: Foundations and Challenges. CRC Press.
ch15.

[13] https://support.rackspace.com/how-to/understandingthe-cloud-computing-stack-saas-paas-iaas/

[14] Terzo, O., Ruiu, P., Bucci, E., & Xhafa, F. (2013, July). Data as a service (DaaS) for sharing
and processing of large data collections in the cloud. In Complex, Intelligent, and Software
Intensive Systems (CISIS), 2013 Seventh International Conference on (pp. 475-480). IEEE.

[15] Motahari-Nezhad, H. R., Stephenson, B., & Singhal, S. (2009). Outsourcing business to cloud
computing services: Opportunities and challenges. IEEE Internet Computing, 10(4), 1-17.
[16] Rajesh Saturi, Data as a Service (Daas) in Cloud Computing [Data-As-A-Service in the Age of
Data] Data as a Service Daas in Cloud Computing, Global Journal of Computer Science and
Technology Cloud & Distributed Volume 12 Issue 11 ,2012.

[17] MALLICK, Pradeep Kumar (ed.). Research Advances in the Integration of Big Data and Smart
Computing. IGI Global, 2015.

[18] Hazirah Bee bt Yusof Ali, Lili Marziana bt Abdullah, Systematic Literature Review of Risk
Assessment for Big Data in Cloud Computing Environment: Security, Privacy and Trust,
AICCC '18, December 21–23, 2018, Tokyo, Japan.

[19] Nabeel Zanoon, Abdullah Al-Haj, Sufian M Khwaldeh, Cloud Computing and Big Data is there
a Relation between the Two: A Study, International Journal of Applied Engineering Research
ISSN 0973-4562 Volume 12, Number 17 (2017) pp. 6970-6982

[20] D. Zong-you, Z. Wen-long, S. Yan-an, and W. Hai-tao, “The application of cloud matter
#x2014; Element in information security risk assessment,” 2017 3rd Int. Conf. Inf. Manag., pp.
218–222, 2017.

[21] S. Deng, D. Yue, X. Fu, and A. Zhou, “Security risk assessment of cyber physical power system
based on rough set and gene expression programming,” IEEE/CAA J. Autom. Sin., vol. 2, no. 4,
pp. 431–439,2015.

[22] R. Trapero, J. Luna, and N. Suri, “Quantifiably Trusting the Cloud: Putting Metrics to Work,”
IEEE Secur. Priv., vol. 14, no. 3, pp. 73–77, 2016.

[23] V. Bellandi, S. Cimato, E. Damiani, G. Gianini, and A. Zilli, “Toward economic-aware risk
assessment on the cloud,” IEEE Secur. Priv., vol. 13, no. 6, pp. 30–37, 2015.

[24] Lulu Liang, Wang Ren, Jing Song, Huaming Hu, Qiang He, and Shuo Fang, “The state of the
art of risk assessment and management for information systems,” 2013 9th Int. Conf. Inf. Assur.
Secur., pp. 66–71, 2013.

[25] V. Agrawal, “A Framework for the Information Classification in ISO 27005 Standard,” Proc. -
4th IEEE Int. Conf. Cyber Secur. Cloud Comput. CSCloud 2017 3rd IEEE Int. Conf. Scalable
Smart Cloud, SSC 2017, pp. 264– 269, 2017.

[26] A. Khosravani, “A case study analysis of risk, trust and control in cloud computing,”Conf.
(SAI), 2013, pp. 879–887, 2013.

[27] Catteddu, D., Hogben, G.: Cloud Computing Information Assurance Framework. ENISA
(2009)

[28] M. Paryasto, A. Alamsyah, and B. Rahardjo, “Big-data security management issues,” 2014 2nd
Int. Conf. Inf. Commun. Technol., pp. 59–63, 2014
DIGIPRESCRIPTION: AN INTELLIGENT SYSTEM TO ENABLE
PAPERLESS PRESCRIPTION USING MOBILE COMPUTING AND
NATURAL-LANGUAGE PROCESSING
Richard Zhang1, Mary Zhao1, Yucheng Jiang2 , Sophadeth Rithya2 and Yu Sun2
1
Irvine High School. 4321 Walnut Ave Irvine, CA 92604
2
California State Polytechnic University, Pomona, CA, 91768

ABSTRACT

Through our app, it is aimed to teach and tell the patients how to use the drug properly
taking off the chances of putting their lives in danger, especially the elderly. It is also
efficient to give patients these instructions as well as saving lots of paper. Because of the
law, every drug that is given from the pharmacy to the user includes a receipt that lists
information of, patient’s information, drug information, insurance information, directions on
taking the medicine (black box warning issued by FDA), medication details on how it
works, side effects, storage rules, and etc. These pieces of information are crucial to
patients, where it tells them how to use the drug properly, but most people would throw
these receipts away, which is a risk as well as a waste. Through using this app, the patient
can efficiently get information on how to properly use the drug. This application is also
helpful, where the user can choose to set reminders on when to eat this drug each week or
month.

KEYWORDS

Cloud computing, risk assessment, big data, security.

Full Text: https://aircconline.com/csit/papers/vol10/csit101504.pdf

10th International Conference on Advances in Computing and Information Technology


(ACITY 2020)
http://airccse.org/csit/V10N15.html
REFERENCES

[1] Lemay, Laura, and Arman Revised By-Danesh. Teach yourself web publishing with HTML 4 in
a week. Sams, 1997.

[2] Grinberg, Miguel. Flask web development: developing web applications with python. " O'Reilly
Media, Inc.", 2018.

[3] Dolgert, A., L. Gibbons, and V. Kuznetsov. "Rapid web development using AJAX and Python."
In Journal of Physics: Conference Series, vol. 119, no. 4, p. 042011. IOP Publishing, 2008.

[4] Moroney, Laurence, Moroney, and Anglin. Definitive Guide to Firebase. Apress, 2017.

[5] Moroney, Laurence. "Firebase Cloud Messaging." In The Definitive Guide to Firebase, pp. 163-
188. Apress, Berkeley, CA, 2017.

[6] Stonehem, Bill. Google Android Firebase: Learning the Basics. Vol. 1. First Rank Publishing,
2016.

[7] Spurlock, Jake. Bootstrap: Responsive Web Development. " O'Reilly Media, Inc.", 2013.

[8] Shenoy, Aravind, and Ulrich Sossou. Learning Bootstrap. Packt Publishing Ltd, 2014.

[9] Radford, Stephen. Learning Web Development with Bootstrap and AngularJS. Packt Publishing
Ltd, 2015. Computer Science & Information Technology (CS & IT) 43

[10] Ameta, Deepti, Kalpana Mudaliar, and Palak Patel. "Medication reminder and healthcare-an
android application." International Journal of Managing Public Sector Information and
Communication Technologies (IJMPICT) Vol 6 (2015).

[11] Slagle, Jason M., Jeffry S. Gordon, Christopher E. Harris, Coda L. Davison, DeMoyne K.
Culpepper, Patti Scott, and Kevin B. Johnson. "MyMediHealth–Designing a next generation
system for childcentered medication management." Journal of biomedical informatics 43, no. 5
(2010): S27-S31.

[12] Herrmann, James M., Gerald S. Indorf, and Sunway R. Wang. "Interactive medication
reminder/dispenser device." U.S. Patent 5,805,051, issued September 8, 1998.

[13] Hawley, Tarwa L., and Jon H. Kirk Jr. "Medication reminder." U.S. Patent 6,325,534, issued
December 4, 2001.
RESOLVING CODE SMELLS IN SOFTWARE PRODUCT LINE
USING REFACTORING AND REVERSE ENGINEERING
Sami Ouali, College of Applied Sciences, Ibri, Oman

ABSTRACT

Software Product Lines (SPL) are recognized as a successful approach to reuse in software
development. Its purpose is to reduce production costs. This approach allows products to be
different with respect of particular characteristics and constraints in order to cover different
markets. Software Product Line engineering is the production process in product lines. It
exploits the commonalities between software products, but also to preserve the ability to
vary the functionality between these products. Sometimes, an inappropriate implementation
of SPL during this process can conduct to code smells or code anomalies. Code smells are
considered as problems in source code which can have an impact on the quality of the
derived products of an SPL. The same problem can be present in many derived products
from an SPL due to reuse. A possible solution to this problem can be the refactoring which
can improve the internal structure of source code without altering external behavior. This
paper proposes an approach for building SPL from source code. Its purpose is to reduce
code smells in the obtained SPL using refactoring source code. Another part of the approach
consists on obtained SPL’s design based on reverse engineering.

KEYWORDS

Software Product Line, Code smells, Refactoring, Reverse Engineering.

Full Text: https://aircconline.com/csit/papers/vol10/csit101422.pdf

9th International Conference on Natural Language Processing (NLP 2020)


http://airccse.org/csit/V10N14.html
REFERENCES

[1] Rincón, L. F. et al., 2014. An ontological rule-based approach for analyzing dead and false
optional features in feature models. In Electronic Notes in Theoretical Computer Sciences, Vol.
302, pp 111– 132.

[2] Jacobson, I. et al., 1992. Object-oriented software engineering: a use case driven approach.
AddisonWesley, USA.

[3] Xue, Y., 2011. Reengineering legacy software products into software product line based on
automatic variability analysis. Proceedings of the 33rd International Conference on Software
Engineering, New York, USA, pp. 1114–1117.

[4] Ouali, S. et al., 2012. From Intentions to Software Design using an Intentional Software Product
Line Meta-Model. Proceeding of the 8th International Conference on Innovations in
Information Technology, Al Ain, UAE.

[5] Fowler, M., 1999. Refactoring: Improving the Design of Existing Code. Addison-Wesley,
Boston, MA, USA.

[6] Fernandes, E. and Figueiredo, E., 2017. Detecting Code Anomalies in Software Product Lines”.
Proceedings of 7th Brazilian Conference on Software: Theory and Practice, Maringa, Brazil, pp.
49– 55.

[7] Zhang, M. et al., 2011. Code Bad Smells: A Review of Current Knowledge. In Journal of
Software Maintenance and Evolution: Research and Practice, Wiley Online Library, pp. 179-
202.

[8] Apel, S. et al., 2013. Feature-Oriented Software Product Lines: Concepts and Implementation.
Springer.

[9] Vale, G. et al., 2014. Bad Smells in Software Product Lines: A Systematic Review. Proceedings
of the 8th Brazilian Symposium on Software Components, Architectures and Reuse (SBCARS),
Brazil, pp. 84-94.

[10] Abilio, R. et al., 2015. Detecting Code Smells in Software Product Lines-An Exploratory Study.
Proceeding of the 12th International Conference on Information Technology - New
Generations, pp. 433–438.

[11] Ouali, S. et al., 2011. Framework for evolving software product line. In International Journal of
Software Engineering & Applications, Vol. 2, No. 2, pp. 34-51.

[12] Weiss, D. M. and LAI, C. T. R., 1999. Software Product-Line Engineering: A Family-Based
Software Development Process. Addison-Wesley.

[13] Pohl, K. and Metzger, A., 2006. Software Product Line testing. In Communication of the ACM,
pp78-81.

[14] Czarnecki, K. and Eisenecker, W., 2000. Generative Programming: Methods, Tools, and
Applications. Addison-Wesley.

[15] Thiel, S. and Hein, A., 2002. Modeling and Using Product Line Variability in Automotive
Systems. In IEEE Software Vol.19, No.4, pp. 66-72.

[16] Hotta, K. et al., 2012. An Empirical Study on the Impact of Duplicate Code. Advances in
Software Engineering.

[17] Chikofsky, E. J. and Cross, J. H., 1990. Reverse engineering and design recovery: A taxonomy.
IN IEEE Software, Vol.7, pp. 13–17.

[18] Moha, N. et al., 2010. DECOR: A Method for the Specification and Detection of Code and
Design Smells. Transactions on Software Engineering, Vol. 36, No. 1, pp. 20-36.

[19] Sjoberg, D. et al., 2013. Quantifying the effect of code smells on maintenance effort. Software
Engineering IEEE Transactions, Vol. 39, No. 8, pp. 1144–1156.

[20] Van Emden, E. and Moonen, L., 2002. Java quality assurance by detecting code smells.
Proceeding Working Conf. Reverse Engineering, IEEE Computer Society Press, pp. 97—107.

[21] Marinescu, C. et al., 2005. Iplasma: An integrated platform for quality assessment of object-
oriented design. Proceedings of the 21st IEEE International Conference on Software
Maintenance, Budapest, Hungary.

[22] Liu, X. and Zhang, C., 2016. DT: a detection tool to automatically detect code smell in software
project. Proceedings of the 4th Int. Conf. Mach. Mater. Inf. Technol. Appl., vol. 71, pp. 681–
684. 306 Computer Science & Information Technology (CS & IT)

[23] Fontana, F. et al., 2012. Automatic Detection of Bad Smells in Code: An Experimental
Assessment. In Journal of Object Technology.

[24] Campbell, D. and Miller, M., 2008. Designing refactoring tools for developers. Proceedings of
the 2nd Workshop on Refactoring Tools, New York, NY, USA.

[25] De Andrade, H. S. et al., 2014. Architectural bad smells in software product lines. Proceedings
of the 1st International Conference Dependable Secur. Cloud Comput. Archit., pp. 1–6.

[26] Vale, G. and Figueiredo, E., 2015. A Method to Derive Metric Thresholds for Software Product
Lines. Proceedings 29th Brazilian Symposium on Software Engineering, pp. 110–119.

[27] Regulwar, G. B. and Tugnayat, R. M., 2012. Bad Smelling Concept in Software Refactoring.
International Proceedings of Economics Development and Research, Vol.45, pp. 56–61.

[28] Rebele, T. et al., 2016. YAGO: a Multilingual Knowledge Base from Wikipedia, Wordnet, and
Geonames. Proceeding of the 15th International Semantic Web Conference, Kobe, Japan.

[29] Demsar, J. et al., 2004. Orange: From experimental machine learning to interactive data mining.
Proceedings of the 8th European Conference on Principles and Practice of Knowledge
Discovery in Databases, Pisa, Italy.

[30] Ebrahimi, K. S. et al., 2013. Combining modality specific deep neural networks for emotion
recognition in video. Proceedings of the 15th ACM on International conference on multimodal
interaction, Sydney, Australia.
DATA DRIVEN SOFT SENSOR FOR CONDITION MONITORING OF
SAMPLE HANDLING SYSTEM (SHS)
Abhilash Pani, Jinendra Gugaliya and Mekapati Srinivas, Industrial Automation Technology Centre,
ABB, India

ABSTRACT

Gas sample is conditioned using sample handling system (SHS) to remove particulate matter
and moisture content before sending it through Continuous Emission Monitoring (CEM)
devices. The performance of SHS plays a crucial role in reliable operation of CEMs and
therefore, sensor-based condition monitoring systems (CMSs) have been developed for
SHSs. As sensor failures impact performance of CMSs, a data driven soft-sensor approach
is proposed to improve robustness of CMSs in presence of single sensor failure. The
proposed approach uses data of available sensors to estimate true value of a faulty sensor
which can be further utilized by CMSs. The proposed approach compares multiple methods
and uses support vector regression for development of soft sensors. The paper also considers
practical challenges in building those models. Further, the proposed approach is tested on
industrial data and the results show that the soft sensor values are in close match with the
actual ones.

KEYWORDS

Sample Handling System, Soft-Sensor, Variance Inflation Factor (VIF), Local Outlier
Factor (LOF), Support Vector Regression..

Full Text: https://aircconline.com/csit/papers/vol10/csit101423.pdf

9th International Conference on Natural Language Processing (NLP 2020)


http://airccse.org/csit/V10N14.html
REFERENCES

[1] J. Jahnke, Continuous Emission Monitoring. Wiley, 2000.

[2] E. Arioni, N. Bonavita and M. Paco, “Keeping an eye on emissions,” Hydrocarbon Engineering
Magazine, vol. 18, no. 10, pp. 43–49, October 2013.

[3] Y. Yang, X. Zhang, Z. Zhao, G. Wang, Y. He, Y. Wu and J. Li, "Applying Reliability Centered
Maintenance (RCM) to Sampling Subsystem in Continuous Emission Monitoring System"
IEEE Access, vol. 8, pp. 55054-55062, 2020.

[4] Swischuk, Renee C. and Douglas L. Allaire. “A Machine Learning Approach to Aircraft Sensor
Error Detection and Correction.” Journal of Computing and Information Science in
Engineering, vol. 19, pp. 1-19, 2019.

[5] A. M. T. Nasser and V. P. Pawar, "Machine learning approach for sensors validation and
clustering," 2015 International Conference on Emerging Research in Electronics, Computer
Science and Technology (ICERECT), Mandya, pp. 370-375, 2015.

[6] H.Y. Teh, A. W., Kempa-Liehrand K. Wang. “Sensor data quality: a systematic review.” Journal
of Big Data, vol. 7, pp. 1-49, 2020.

[7] R. Dunia, S. J. Qin, T. F. Edgar and T.J. McAvoy, “Use of principal component analysis for
sensor fault identification” Computers & Chemical Engineering, vol. 20, pp. S713-S718, 1996.
320 Computer Science & Information Technology (CS & IT)

[8] G. Ciarlo, E. Bonica, B. Bosio and N. Bonavita, “Assessment and Testing of Sensor Validation
Algorithms for Environmental Monitoring Applications”, Chemical Engineering Transactions,
vol. 57, pp. 331-336, Mar. 2017.

[9] D. Angelosante, M. Guerriero, G. Ciarlo and N. Bonavita, "A Sensor Fault-Resilient Framework
for Predictive Emission Monitoring Systems," 21st International Conference on Information
Fusion (FUSION), Cambridge, pp. 557-564, 2018.

[10] Villalba-Diez, J.; Schmidt, D.; Gevers, R.; Ordieres-Meré, J.; Buchwitz, M.; Wellbrock, W.
Deep Learning for Industrial Computer Vision Quality Control in the Printing Industry 4.0.
Sensors 2019, 19, 3987.

[11] Cang, W.; Yang, H. Adaptive soft sensor method based on online selective ensemble of partial
least squares for quality prediction of chemical process. Asia-Pac. J. Chem. Eng. 2019, 14,
2346.

[12] Xiong, W.; Shi, X. Soft sensor modeling with a selective updating strategy for Gaussian process
regression based on probabilistic principle component analysis. J. Frankl. Inst. 2018, 355,
5336–5349.

[13] Yu, W. A mathematical morphology based method for hierarchical clustering analysis of spatial
points on street networks. Appl. Soft Comput. 2019, 85, 105785.

[14] W. Young, G. Weckman and W. Holland, “A survey of methodologies for the treatment of
missing values within datasets: Limitations and benefits.“ , Theoretical Issues in Ergonomics
Science, vol. 12(1), pp. 5–43, 2011.

[15] Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng and Jorg Sander, "LOF: Identifying
Density-Based Local Outliers", Proc. of the 2000 ACM SIGMOD on Management of Data, pp.
93- 104, 2000.

[16] S. Shalev-Shwartz and S. Ben-David, Understanding Machine Learning: From Theory to


Algorithms. Cambridge: Cambridge University Press, 2014.

[17] H. Drucker, C. Burges,L. Kaufman, A. Smola and V. Vapnik, "Support Vector Regression
Machines", Proceedings of the 9th International Conference on Neural Information Processing
Systems (NIPS'96). MIT Press, Cambridge, MA, USA, 155–161.
EVALUATING THE IMPACT OF DIFFERENT TYPES OF
CROSSOVER AND SELECTION METHODS ON THE
CONVERGENCE OF 0/1 KNAPSACK USING GENETIC
ALGORITHM
Waleed Bin Owais, Iyad W. J. Alkhazendar and Mohammad Saleh,
Qatar University, Qatar

ABSTRACT

Genetic Algorithm is an evolutionary algorithm and a metaheuristic that was introduced to


overcome the failure of gradient based method in solving the optimization and search
problems. The purpose of this paper is to evaluate the impact on the convergence of Genetic
Algorithm vis-a‘-vis 0/1 knapsack. By keeping the number of generations and the initial
population fixed, different crossover methods like one point crossover and two-point
crossover were evaluated and juxtaposed with each other. In addition to this, the impact of
different selection methods like rank-selection, roulette wheel and tournament selection
were evaluated and compared. Our results indicate that convergence rate of combination of
one point crossover with tournament selection, with respect to 0/1 knapsack problem that we
considered, is the highest and thereby most efficient in solving 0/1 knapsack.

KEYWORDS

Genetic, Crossover, Selection, Knapsack, Roulette, Tournament, Rank, Single Point, Two
Point, Convergence

Full Text: https://aircconline.com/csit/papers/vol10/csit101101.pdf

7th International Conference on Computer Science, Engineering and Information


Technology (CSEIT 2020)
http://airccse.org/csit/V10N11.html
REFERENCES

1. A. Gad, “Introduction to optimization with genetic algorithm,” 2018.

2. D. R. Bhattacharjya, “Introduction to genetic algorithms,” 2013.

3. X. Pan and T. Zhang, “Comparison and analysis of algorithms for the 0/1 knapsack problem,” in
Journal of Physics: Conference Series, vol. 1069, no. 1. IOP Publishing, 2018, p. 012024 4. A.
Shaheen and A. Sleit, “Comparing between different approaches to solve the 0/1 knapsack
problem,” International Journal of Computer Science and Network Security (IJCSNS), vol. 16,
no. 7, p. 1, 2016

5. R. K. Yadav, H. Gupta, H. Jhingran, A. Agarwal, and A. Gupta, “An enhanced genetic algorithm
to solve 0/1 knapsack problem,” Interna- tional Journal of Computer Science and Information
Security (IJCSIS), vol. 15, no. 5, 2017.

6. D. Sapra, R. Sharma, and A. P. Agarwal, “Comparative study of metaheuristic algorithms using


knapsack problem,” in 2017 7th Interna- tional Conference on Cloud Computing, Data Science
Engineering- Confluence. IEEE, 2017, pp. 134–137.

7. H. Demirci, A. Ozcerit, H. Ekiz, and A. Kutlu, “Chaotic crossover operator on genetic algorithm,”
in Proceedings of 2nd International Conference on Information Technology, 2015.

8. T. Kellegz, B. Toklu, and J. Wilson, “Comparing efficiencies of genetic crossover operators for
one machine total weighted tardiness problem,” Applied Mathematics and Computation, vol.
199, no. 2, pp. 590–598, 2008.

9. W. Chinnasri, S. Krootjohn, and N. Sureerattanan, “Performance com- parison of genetic


algorithm’s crossover operators on university course timetabling problem,” in 2012 8th
International Conference on Comput- ing Technology and Information Management (NCM and
ICNIT), vol. 2. IEEE, 2012, pp. 781–786.

10. G. A. E.-N. A. Said, A. M. Mahmoud, and E.-S. M. El-Horbaty, “A comparative study of


metaheuristic algorithms for solving quadratic assignment problem,” arXiv preprint
arXiv:1407.4863, 2014.

11. Thada, Vikas, and Shivali Dhaka. ”Genetic Algorithm based Approach to Solve Non Fractional
(0/1) Knapsack Optimization Problem.” International Journal of Computer Applications 100.15
(2014): 21-26.

12. Guler, A., M. E. Berberler, and U. G. Nuriyev. ”A new genetic algorithm for the 0-1 knapsack
problem.” Acad Platf J Eng Sci 4.3 (2016): 9-14.

13. Changdar, Chiranjit, G. S. Mahapatra, and Rajat Kumar Pal. ”An improved genetic algorithm
based approach to solve constrained knapsack problem in fuzzy environment.” Expert Systems
with Applications 42.4 (2015): 2276-2286.

14. McCall, John. ”Genetic algorithms for modelling and optimisation.” Journal of computational
and Applied Mathematics 184.1 (2005): 205-222.

15. Ezugwu, Absalom E., et al. ”A Comparative study of meta-heuristic optimization algorithms for
0–1 knapsack problem: Some initial results.” IEEE Access 7 (2019): 43979-44001.

16. Ho, Yu-Chi, and David L. Pepyne. ”Simple explanation of the no-free-lunch theorem and its
implications.” Journal of optimization theory and applications 115.3 (2002): 549-570.
17. De Falco, Ivan, Antonio Della Cioppa, and Ernesto Tarantino. ”Mutation-based genetic
algorithm: performance evaluation.” Applied Soft Computing 1.4 (2002): 285-299.

18. Maaranen, Heikki, Kaisa Miettinen, and Marko M. M¨akel¨a. ”Quasi-random initial population
for genetic algorithms.” Computers Mathematics with Applications 47.12 (2004): 1885-1895.
A NOVEL MOBILE ECG SENSOR WITH WIRELESS POWER
TRANSMISSION FOR REMOTE HEALTH MONITORING
Jin-Chul Heo, Eun-Bin Park, Chan-Il Kim, Hee-Joon Park and Jong-Ha Lee,
Keimyung University, Korea

ABSTRACT

For electromagnetic induction wireless power transmission using an elliptical receiving coil,
we investigated changes in magnetic field distribution and power transmission efficiency
due to changes in the position of the transmitting and receiving coils. The simulation results
using the high-frequency structure simulator were compared with the actual measurement
results. It has been shown that even if the alignment between the transmitting coil and the
receiving coil is changed to some extent, the transmission efficiency on the simulator can be
maintained relatively stable. The transmission efficiency showed the maximum when the
center of the receiving coil was perfectly aligned with the center of the transmitting coil.
Although the reduction in efficiency was small when the center of the receiving coil was
within ± 10 mm from the center of the transmitting coil, it was found that the efficiency was
greatly reduced when the receiving coil deviated by more than 10 mm. Accordingly, it has
been found that even if the perfect alignment is not maintained, the performance of the
wireless power transmission system is not significantly reduced. When the center of the
receiving coil is perfectly aligned with the center of the transmitting coil, the transmission
efficiency is maximum, and even if the alignment is slightly changed, the performance of
wireless power transmission maintains a certain level. This result proposes a standardized
wireless transmission application method in the use of wireless power for implantable
sensors.

KEYWORDS

ECG, Implantable sensors, Simulation, Power transmission efficiency, Wireless power


transmission

Full Text: https://aircconline.com/csit/papers/vol10/csit101102.pdf

7th International Conference on Computer Science, Engineering and Information


Technology (CSEIT 2020)
http://airccse.org/csit/V10N11.html
REFERENCES

[1] K. Kim, B. Kim, and C. H. Lee, “Printing Flexible and Hybrid Electronics for Human Skin and
EyeInterfaced Health Monitoring Systems,” Advanced Materials, vol. 32, no. 15, 2020.

[2] Y. Chen, Y. Cheng, Y. Jie et al., “Energy harvesting and wireless power transmission by a
hybridized electromagnetic-triboelectric nanogenerator,” Energy and Environmental Science,
vol. 12, no. 9, pp. 2678-2684, 2019.

[3] Q. S. Abdullahi, R. Joshi, S. K. Podilchak et al., “Design of a wireless power transfer system for
assisted living applications,” Wireless Power Transfer, vol. 6, no. 1, pp. 41-56, 2019.

[4] Y. Ben Fadhel, S. Ktata, S. Rahmani et al., "Near-field Wireless Power Transfer is a promising
approach to Power-up Active Implants." pp. 399-404, 2020.

[5] K. Agarwal, R. Jegadeesan, Y. X. Guo et al., “Wireless Power Transfer Strategies for
Implantable Bioelectronics,” IEEE Reviews in Biomedical Engineering, vol. 10, pp. 136-161,
2017.

[6] T. Campi, S. Cruciani, F. Maradei et al., “Pacemaker Lead Coupling with an Automotive
Wireless Power Transfer System,” IEEE Transactions on Electromagnetic Compatibility, vol.
61, no. 6, pp. 1935-1943, 2019.

[7] R. Chávez-Santiago, J. Wang, and I. Balasingham, "The ultra wideband capsule endoscope." pp.
72- 78, 2013. Computer Science & Information Technology (CS & IT) 27

[8] G. Ahmed Zeeshan, R. Sundaraguru, and F. Naaz, “Wearable wireless sensor system with RF
remote activation for industrial applications,” International Journal of Recent Technology and
Engineering, vol. 8, no. 3, pp. 4716-4720, 2019.

[9] M. Wang, J. Chen, X. Cui et al., "Design and Fabrication of 5.8GHz RF Energy Harvesting
Rectifier." Wireless Power Transfer, vol. 6, on. 1, pp. 41-56, 2019.

[10] S. Suganuma, D. Hung Nguyen, Y. Nishioka et al., "The Logistics System by Rotary Wing
Unmanned Aerial Vehicle with 28GHz Microwave Power Transmission." pp. 413-416, 2019.

[11] S. Almorabeti, M. Hanaoui, M. Rifi et al., "Microstrip patch antennas at 5.8GHz for wireless
power transfer system to a MAV." ACM International Conference Proceeding Series, 2017.

[12] N. Khan, H. Matsumoto, and O. Trescases, “Wireless Electric Vehicle Charger with
Electromagnetic Coil-Based Position Correction Using Impedance and Resonant Frequency
Detection,” IEEE Transactions on Power Electronics, vol. 35, no. 8, pp. 7873-7883, 2020.

[13] S. A. Sis, and H. Akca, “Maximizing the efficiency of wireless power transfer systems with an
optimal duty cycle operation,” AEU - International Journal of Electronics and Communications,
vol. 116, 2020.

[14] K. Wang, L. Sang, Y. Zhang et al., "Optimization Design for Wireless Power Transfer System
under the Variation of Load and Coupling Coefficients." pp. 867-872, 2019.

[15] T. Ghomian, and S. Mehraeen, “Survey of energy scavenging for wearable and implantable
devices,” Energy, vol. 178, pp. 33-49, 2019.

[16] A. Koruprolu, S. Nag, R. Erfani et al., "Capacitive Wireless Power and Data Transfer for
Implantable Medical Devices." 2018 IEEE Biomedical Circuits and Systems Conference,
BioCAS 2018 - Proceedings, 2018.

[17] E. Katz, "Implantable biofuel cells operating in vivo: Providing sustainable power for
bioelectronic devices: From biofuel cells to cyborgs." Proceedings - 2015 6th IEEE
International Workshop on Advances in Sensors and Interfaces, IWASI, pp. 2-13, 2015

[18] A. W. S. Putra, M. Tanizawa, and T. Maruyama, “Optical wireless power transmission using si
photovoltaic through air, water, and skin,” IEEE Photonics Technology Letters, vol. 31, no. 2,
pp. 157-160, 2019.

[19] K. Takahashi, T. Yamada, and Y. Takemura, “Circuit parameters of a receiver coil using a
wiegand sensor for wireless power transmission,” Sensors (Switzerland), vol. 19, no. 12, 2019.

[20] K. Zhang, C. Liu, Z. H. Jiang et al., “Near-Field Wireless Power Transfer to Deep-Tissue
Implants for Biomedical Applications,” IEEE Transactions on Antennas and Propagation, vol.
68, no. 2, pp. 1098-1106, 2020.

[21] C. Xiao, K. Wei, D. Cheng et al., “Wireless charging system considering eddy current in
cardiac pacemaker shell: Theoretical modeling, experiments, and safety simulations,” IEEE
Transactions on Industrial Electronics, vol. 64, no. 5, pp. 3978-3988, 2017.

[22] B. Cheng, Y. Chatzinoff, D. Szczepanski et al., “Remote acoustic sensing as a safety


mechanism during exposure of metal implants to alternating magnetic fields,” PLoS ONE, vol.
13, no. 5, 2018.

[23] A. C. Özen, B. Silemek, T. Lottner et al., “MR safety watchdog for active catheters: Wireless
impedance control with real-time feedback,” Magnetic Resonance in Medicine, vol. 84, no. 2,
pp. 1048-1060, 2020.

[24] M. V. Tholl, A. Haeberlin, B. Meier et al., “An intracardiac flow based electromagnetic energy
harvesting mechanism for cardiac pacing,” IEEE Transactions on Biomedical Engineering, vol.
66, no. 2, pp. 530-538, 2019.

[25] D. B. Ahire, and V. J. Gond, "Wireless power transfer system for biomedical application: A
review." ICEI 2017, pp. 135-140, 2018

[26] C. Kasia, A. Appannagari, A. Joshi et al., “Safety of wireless capsule endoscopy in patients
with implantable cardiac devices,” JGH Open, vol. 4, no. 2, pp. 241-244, 2020.
USABILITY EVALUATION TO IMPROVE OPERATION INTERFACE
OF WIRELESS DEVICE: PRESSURE RANGE OF TOUCH SENSOR
Sangwoo Cho and Jong-Ha Lee, Keimyung University, South Korea

ABSTRACT

Usability evaluation of wireless device can find improvement about user convenience. This
study investigated natural finger pressure range when presses touch sensor. Fifteen adults
(Male: 10, Female: 5, Age: 26.13 ± 3.98 years) were recruited in this experiment. Subjects
carried out a usability evaluation about wireless device operation. The usability evaluation
measured finger pressure on touch sensor operation of wireless device using finger pressure
sensor. Subjects performed 1.76±0.95 times until pressing the touch sensor to complete task
(t = 3.091, p = 0.008). In comparisons between natural movement and the movement to
complete task, more finger pressure value was decreased in natural movement than the
movement to complete task (t = -2.277, p = 0.039). This study found a finger pressure
values to improve effectiveness of wireless device operation interface. Finger pressure value
was presented to induce natural movement for the use of touch sensor.

KEYWORDS

Usability Evaluation, Operation Interface, Finger Pressure Range, Wireless Device.

Full Text: https://aircconline.com/csit/papers/vol10/csit101104.pdf

7th International Conference on Computer Science, Engineering and Information


Technology (CSEIT 2020)
http://airccse.org/csit/V10N11.html
REFERENCES

[1] Choi, Jiho. Lee, Seongil. & Cho, Joo Eun, (2011) “The Usability Evaluation of Mobile Phone
Interfaces Designed for the Elderly”, Journal of the Ergonomics Society of Korea, Vol. 30, No.
1, pp265-273.

[2] Chang, Joonho. Jung, Kihyo. Lee, Wonsup & You, Heecheon (2017) “Development of usability
evaluation method using natural product-use motion”, Applied Ergonomics, Vol. 60, pp171-
182.

[3] Ahmad, Naseer. Boota, M Waqas & Masoom, A Hye, (2004) “Smart phone Application
Evaluation with Usability Testing Approach”, Journal of Software Engineering and
Applications, Vol. 7, pp1045-1054.

[4] Lee, S.heum, (1999) “Usability Testing for Developing Effective Interactive multimedia
software: Concepts, dimensions, and procedures”, Journal of Educational Technology &
society, Vol. 2, No. 2, pp1-12.

[5] Strawderman, Lesley & Koubek, Rick, (2008) “Human factors and usability in service quality
measurement”, Human Factors and Ergonomics in Manufacturing & service Industries, Vol. 18,
No. 4, pp454-463.

[6] Chang, Hsien-Tsung. Tsai, Tsai-Hsuan. Chang, Ya-Ching. & Chang, Yi-Min (2014) “Touch
Panel usability of elderly and children”, Computers in Human Behavior, Vol. 37, pp258-269.
Computer Science & Information Technology (CS & IT) 49

[7] Ocak, Nihan & Cagiltay, Kursat (2017) “Comparison of Cognitive Modeling and User
Performance Analysis for Touch Screen Mobile Interface Design”, International Journal of
Human-Computer Interaction, Vol. 33, No. 8, pp33-641.

[8] Chang, Youli. L’Yi, Sehi. Koh Kyle & Seo, jinwook (2015) “Understanding Users’ Touch
Behavior on Large Mobile Touch-Screens and Assisted Targeting by Tilting Gesture”,
CHI’15:Proceedings of The 33rd Annual ACM Conference on Human Factors in Computing
Systems, pp1499-1508.
COVID CT NET: A TRANSFER LEARNING APPROACH FOR
IDENTIFYING CORONA VIRUS FROM CT SCANS
Smaranjit Ghose and Suhrid Datta,
SRM Institute of Science and Technology, India

ABSTRACT

The pandemic of COVID-19 has been rapidly spreading across the globe since it first
surfaced in the Wuhan province of China. Several governments are forced to have
nationwide lockdowns due to the progressive increase in a daily number of cases. The
hospitals and other medical facilities are facing difficulties to cope with the overwhelming
number of patients they can provide support due to the shortage in the number of required
medical professionals and resources for meeting this demand. While the vaccine to cure this
disease is still on the way, early diagnosis of patients and putting them in quarantine has
become a cumbersome task too. In this study, we propose to build an artificial intelligence-
based system for classifying patients as COVID-19 positive or negative within a few
seconds by using their chest CT Scans. We use a transfer learning approach to build our
classifier model using a dataset obtained from openly available sources. This work is meant
to assist medical professionals in saving hours of their time for the diagnosis of the
Coronavirus using chest radiographs and not intended to be the sole way of diagnosis.

KEYWORDS

COVID-19, Deep Learning, CT Scans, Deep Convolutional Neural Networks, computer


tomography scans

Full Text: https://aircconline.com/csit/papers/vol10/csit101105.pdf

7th International Conference on Computer Science, Engineering and Information


Technology (CSEIT 2020)
http://airccse.org/csit/V10N11.html
REFERENCES

[1[ Mart ́ın Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, CraigCitro, Greg
S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, et al. Tensor-flow: Large-scale machine
learning on heterogeneous distributed systems.arXivpreprint arXiv:1603.04467, 2016.

[2] Tao Ai, Zhenlu Yang, Hongyan Hou, Chenao Zhan, Chong Chen, Wenzhi Lv, QianTao, Ziyong
Sun, and Liming Xia. Correlation of chest ct and rt-pcr testing in coronavirus disease 2019
(covid-19) in china: a report of 1014 cases.Radiology,page 200642, 2020 Computer Science &
Information Technology (CS & IT) 57

[3] Nancy J Brown and Douglas E Vaughan. Angiotensin-converting enzyme in hibitors.


Circulation, 97(14):1411–1420, 1998.

[4] Xinlei Chen, Hao Fang, Tsung-Yi Lin, Ramakrishna Vedantam, Saurabh Gupta,Piotr Doll ́ar, and
C Lawrence Zitnick. Microsoft coco captions: Data collection and evaluation server.arXiv
preprint arXiv:1504.00325, 2015

[5] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet:A large-scale
hierarchical image database. In2009 IEEE conference on computer vision and pattern
recognition, pages 248–255. Ieee, 2009.

[6] Yicheng Fang, Huangqi Zhang, Jicheng Xie, Minjie Lin, Lingjun Ying, Peipei Pang,and
Wenbin Ji. Sensitivity of chest ct for covid-19: comparison to rt-pcr.Radiology,page 200432,
2020.

[7] Ophir Gozes, Maayan Frid-Adar, Hayit Greenspan, Patrick D Browning, HuangqiZhang,
Wenbin Ji, Adam Bernheim, and Eliot Siegel. Rapid ai development cy-cle for the coronavirus
(covid-19) pandemic: Initial results for automated detec-tion & patient monitoring using deep
learning ct image analysis.arXiv preprintarXiv:2003.05037, 2020.

[8] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton.Deep learning.nature,521(7553):436–444,


2015.

[9] Yann LeCun, L ́eon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning
applied to document recognition.Proceedings of the IEEE, 86(11):2278–2324, 1998.

[10] Ming-Yen Ng, Elaine YP Lee, Jin Yang, Fangfang Yang, Xia Li, Hongxia Wang,Macy Mei-sze
Lui, Christine Shing-Yen Lo, Barry Leung, Pek-Lan Khong, et al.Imaging profile of the covid-
19 infection: radiologic findings and literature review.Radiology: Cardiothoracic Imaging,
2(1):e200034, 2020.

[11] Sinno Jialin Pan and Qiang Yang. A survey on transfer learning.IEEE Transac-tions on
knowledge and data engineering, 22(10):1345–1359, 2009.

[12] Uwe Schneider, Eros Pedroni, and Antony Lomax. The calibration of ct hounsfield units for
radiotherapy treatment planning.Physics in Medicine & Biology,41(1):111, 1996.

[13] Mingxing Tan and Quoc V Le. Efficient Net: Rethinking model scaling for convo-lutional
neural networks.arXiv preprint arXiv:1905.11946, 2019.

[14] Sasha Targ, Diogo Almeida, and Kevin Lyman. Resnet in resnet: Generalized Residual
architectures.arXiv preprint arXiv:1603.08029, 2016.
[15] Wenling Wang, Yanli Xu, Ruqin Gao, Roujian Lu, Kai Han, Guizhen Wu, andWenjie Tan.
Detection of sars-cov-2 in different types of clinical specimens.Jama,2020.

[16] Jinyu Zhao, Yichen Zhang, Xuehai He, and Pengtao Xie. Covid-ct-dataset: a ct scan dataset
about covid-19.arXiv preprint arXiv:2003.13865, 2020
DATA CONFIDENTIALITY IN P2P COMMUNICATION AND SMART
CONTRACTS OF BLOCKCHAIN IN INDUSTRY 4.0
Jan Stodt and Christoph Reich, University of Applied Sciences Furtwangen, Germany

ABSTRACT

Increased collaborative production and dynamic selection of production partners within


industry 4.0 manufacturing leads to ever-increasing automatic data exchange between
companies. Automatic and unsupervised data exchange creates new attack vectors, which
could be used by a malicious insider to leak secrets via an otherwise considered secure
channel without anyone noticing. In this paper we reflect upon approaches to prevent the
exposure of secret data via blockchain technology, while also providing auditable proof of
data exchange. We show that previous blockchain based privacy protection approaches offer
protection, but give the control of the data to (potentially not trustworthy) third parties,
which also can be considered a privacy violation. The approach taken in this paper is not
utilize centralized data storage for data. It realizes data confidentiality of P2P
communication and data processing in smart contracts of blockchains.

KEYWORDS

Blockchain, Privacy Protection, P2P Communication, Smart Contracts, Industry 4.0.

Full Text: https://aircconline.com/csit/papers/vol10/csit101001.pdf

10th International Conference on Computer Science, Engineering and Applications


(CCSEA 2020)
http://airccse.org/csit/V10N10.html
REFERENCES

[1] H. Kagermann, W. Wahlster, and J. Helbig, “Recommendations for implementing the strategic
initiative Industrie 4.0: Final report of the Industrie 4.0 Working Group,” ForschungsunionBerl.
Ger., 2013.

[2] “Short Circuit: How a Robotics Vendor Exposed Confidential Data for Major Manufacturing
Companies.” https://www.upguard.com/breaches/short-circuit-how-a-robotics-vendor-
exposedconfidential-data-for-major-manufacturing-companies (accessed Apr. 29, 2020).

[3] G. Zyskind, O. Nathan, and A. Pentland, “Enigma: Decentralized Computation Platform with
Guaranteed Privacy,” ArXiv150603471 Cs, Jun. 2015, Accessed: Oct. 09, 2018. [Online].
Available: http://arxiv.org/abs/1506.03471.

[4] F. Benhamouda, S. Halevi, and T. Halevi, “Supporting private data on Hyperledger Fabric with
secure multiparty computation,” in Cloud Engineering (IC2E), 2018 IEEE International
Conference on, 2018, pp. 357–363.

[5] D. J. Solove, “A taxonomy of privacy,” U Pa Rev, vol. 154, p. 477, 2005.

[6] X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, “Healthcare Data Gateways: Found Healthcare
Intelligence on Blockchain with Novel Privacy Risk Control,” J. Med. Syst., vol. 40, no. 10, p.
218, Aug. 2016, doi: 10.1007/s10916-016-0574-6.

[7] D. D. F. Maesa, P. Mori, and L. Ricci, “Blockchain based access control,” in IFIP International
Conference on Distributed Applications and Interoperable Systems, 2017, pp. 206–220.

[8] R. Cheng et al., “Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and


Performant Smart Contracts,” 2019 IEEE Eur. Symp. Secur. Priv. EuroSP, Jun. 2019, doi:
10.1109/eurosp.2019.00023.

[9] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The Blockchain Model of
Cryptography and Privacy-Preserving Smart Contracts,” in 2016 IEEE Symposium on Security
and Privacy (SP), May 2016, pp. 839–858, doi: 10.1109/SP.2016.55.

[10] A. Biryukov, D. Dinu, and D. Khovratovich, “Argon2: New Generation of Memory-Hard


Functions for Password Hashing and Other Applications,” in 2016 IEEE European Symposium
on Security and Privacy (EuroS P), Mar. 2016, pp. 292–302, doi: 10.1109/EuroSP.2016.31.

[11] S. Arnautov et al., “SCONE: Secure Linux Containers with Intel SGX.,” in OSDI, 2016, vol.
16, pp. 689–703. 10 Computer Science & Information Technology (CS & IT)

[12] J.-E. Ekberg, K. Kostiainen, and N. Asokan, “Trusted execution environments on mobile
devices,” in Proceedings of the 2013 ACM SIGSAC conference on Computer &
communications security, 2013, pp. 1497–1498
ROLE OF MULTIMEDIA INFORMATION RETRIEVAL IN
PROVIDING A CREDIBLE EVIDENCE FOR DIGITAL FORENSIC
INVESTIGATIONS: OPEN SOURCE INTELLIGENCE
INVESTIGATION ANALYSIS
Amr Adel1 and Brian Cusack2,
1
Whitecliffe College of Technology & Innovation, New Zealand,
2
Auckland University of Technology, New Zealand

ABSTRACT

Enhancements in technologies and shifting trends in customer behaviour have resulted in an


increase in the variety, volume, veracity and velocity of available data for conducting digital
forensic analysis. In order to conduct intelligent forensic investigation, open source
information and entity identification must be collected. Challenge of organised crimes are
now involved in drug trafficking, murder, fraud, human trafficking, and high-tech crimes.
Criminal Intelligence using Open Source Intelligence Forensic (OSINT) is established to
perform data mining and link analysis to trace terrorist activities in critical. In this paper, we
will investigate the activities done by a suspect employee. Data mining is to be performed
and link analysis as well to confirm all participating parties and contacted persons used in
the communications. The proposed solution was to identify the scope of the investigation to
limit the results, ensure that expertise and correct tools are ready to be implemented for
identifying and collecting potential evidences. This enhanced information and knowledge
achieved are of advantage in research. This form of intelligence building can significantly
support real world investigations with efficient tools. The major advantage of analysing data
links in digital forensics is that there may be case-related information included within
unrelated databases.

KEYWORDS

Open Source Intelligence, Information Retrieval,Digital Forensics, Cyber-Crimes & Data Mining.

Full Text: https://aircconline.com/csit/papers/vol10/csit101002.pdf

10th International Conference on Computer Science, Engineering and Applications


(CCSEA 2020)
http://airccse.org/csit/V10N10.html
REFERENCES

[1] Quick, D., & Choo, K. R. (2014). Google Drive: Forensic analysis of data remnants. Journal of
Network and Computer Applications, 40, 179-193.
https://www.sciencedirect.com/science/article/pii/S1084804513002051?casa_token=FmDXdV
ZX3E
YAAAAA:OPEFKx8bFOqPxT4pXlPhYmpAjf9w53y5jWv1IDq5bBolXXuRYreSnCNFG1Ao
Pakax Co-PCUmEvU

[2] Lillis, D., Becker, B., O'Sullivan, T., & Scanlon, M. (2016). Current challenges and future
research areas for digital forensic investigation. arXiv preprint arXiv:1604.03850.
https://arxiv.org/pdf/1604.03850.pdf

[3] Hitchcock, B., Le-Khac, N., & Scanlon, M. (2016) Tiered Forensic Methodology Model for
Digital Field Triage by Non-Digital Evidence Specialists. Digital Investigation, 13 (S1), 03.
https://www.sciencedirect.com/science/article/pii/S1742287616300044

[4] Cavanillas, J. M., Curry, E., & Wahlster, W. (2016). New horizons for a data-driven economy: a
roadmap for usage and exploitation of big data in Europe. Springer.
http://library.oapen.org/bitstream/id/b82b0e7e-d065-4711-ba4d-a97f974f605d/1002241.pdf [5]
Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and Challenges of Big Data
Research. Big Data Research, Vol. 2(2), 59-64.
https://www.sciencedirect.com/science/article/pii/S2214579615000076?casa_token=Fw_Lm2G
0Ae0
AAAAA:KT0ggnTS9eRevNyjiVGBZnB6kMfRrxv6bafWy7A7ltAYCY5XisEwTwqMb4UJU
VcWl5hVO5al3Q [6] Nelson, B., Phillips, A., & Steuart, C. (2016). Guide to computer
forensics and investigations: processing digital evidence. Cengage Learning. Boston, USA.
https://college.cengage.com/information_security/course360/computer_forensics_97811331348
55/eb ook/nelson98836_1435498836_02.06_chapter06.pdf

[7] Al-Dhaqm, A., Abd Razak, S., Othman, S. H., Ali, A., Ghaleb, F. A., Rosman, A. S., &Marni, N.
(2020). Database Forensic Investigation Process Models: A Review. IEEE Access, 8, 48477-
48490. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9016047

[8] Jones, J., & Etzkorn, L. (2016, March). Analysis of digital forensics live system acquisition
methods to achieve optimal evidence preservation. In SoutheastCon 2016 (pp. 1-6). IEEE.
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7506709&casa_token=6R8Ce1YnpeIAA
AAA: 6XIOK-
mh4hEFiCKkPvS6F7vz5Cnc4zDmi8bKatPI9eNXSlotTZY5b4dT79l5EG32SxuK0W3WU
QU&tag=1

[9] Kaur, M., Kaur, N., Khurana, S. (2016). A Literature Review on Cyber Forensic and its Analysis
tools. International Journal of Advanced Research in Computer and Communication
Engineering, 5(1), 23-28.

[10] Fu, X., Gao, Y., Luo, B., Du, X., &Guizani, M. (2017). Security threats to Hadoop: Data
leakage attacks and investigation. IEEE Network, 31(2), 67-71.
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7827929&casa_token=VvqwjaViqYkA
AAAA
:DQ2j3v6B9KRiiuNAH8EdTJSMxsOzEuvVX9c2M5E2410_PyLcFcCZKb6VkNtenur0LMsW
t1qbjY

[11] Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and Big Heterogeneous
Data: A Survey. Journal of Big Data, 2(1), 3. https://link.springer.com/article/10.1186/s40537-
015-0013-4

[12] Javadianasl, Y., Manaf, A. A., & Zamani, M. (2017). A practical procedure for collecting more
volatile information in live investigation of botnet attack. In Multimedia Forensics and Security
(pp. 381-414). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-319-44270-
9_17

[13] Beebe, N. (2009). Digital forensic research: The good, the bad and the unaddressed. In IFIP
International Conference on Digital Forensics (pp. 17-36). Springer, Berlin, Heidelberg.
https://link.springer.com/content/pdf/10.1007/978-3-642-04155-6_2.pdf

[14] Bellinger, G., Castro, D., & Mills, A. (2004). Data, information, knowledge, and wisdom.
https:// homepages.dcc.ufmg.br/~amendes/SistemasInformacaoTP/TextosBasicos/Data-
InformationKnowledge.pdf

[15] Ahmad, A., Hadgkiss, J., & Ruighaver, A. B. (2012). Incident response teams–Challenges in
supporting the organisational security function. Computers & Security, 31(5), 643-652.
https://www.sciencedirect.com/science/article/pii/S0167404812000624?casa_token=tDzspb2L
XloAA AAA:5PrH7ObP8JVUrjN7RZA1ocMYvF0QIfjkWRV2-
4Q6l6noeVsPF7sfYCi1ZQH2fG3HL56kQz9zEY

[16] Watt, A. C., & Slay, J. (2015). First Responders Actions to cope with Volatile Digital Evidence.
International Journal of Electronic Security and Digital Forensics, 7(4), 381.
https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2015.072182

[17] Ibrahim, N. M., Al-Nemrat, A., Jahankhani, H., & Bashroush, R. (2012). Sufficiency of
Windows Event Log as Evidence in Digital Forensics. In Global Security, Safety and
Sustainability & e- Democracy (pp. 253-262) Springer, Berlin, Heidelberg.
https://repository.uel.ac.uk/download/2a0ad15d0574a2ebc4092dd59cfa017501a051f0d102b7ce
8f76b
e817e43edd6/433298/Sufficiency%20of%20Windows%20Event%20log%20as%20Evidence%
20in% 20Digital%20Forensics2.pdf

[18] Mouhtaropoulos, A., Li, C. T., & Grobler, M. (2014). Digital forensic readiness: are we there
yet. J. Int't Com. L. & Tech., 9, 173.
https://heinonline.org/HOL/Page?handle=hein.journals/jcolate9&div=20&g_sent=1&casa_toke
n=my
k9ar5om1kAAAAA:gjGuq5t2tZjkJ0KoFQeTeb0OpR1xfCIxteukuDSXbMKFcLvPXoFp_vsHg
mYz OzPCzpHk-uRddg&collection=journals

[19] Kothari, C. R., & Garg, G. (2016). Research methodology: methods and techniques. New Delhi,
India: New Age International.

[20] Sahinoglu, M., Stockton, S., Morton, S., Barclay, R., & Eryilmaz, M. (2014). Assessing Digital
Forensics risk: A metric survey approach. In Proceedings of the SDPS 2014 Malaysia, 19th
International Conference on Transformative Science and Engineering, Business and Social
Innovation.
https://www.researchgate.net/profile/M_Sahinoglu/publication/268507819_ASSESSING
_DIGITAL_FORENSICS_RISK_A_METRIC_SURVEY_APPROACH/links/546d4ad90cf26e
95bc3 cb0a0/ASSESSING-DIGITAL-FORENSICS-RISK-A-METRIC-SURVEY-
APPROACH.pd
COMPARISON OF GNSS PATCH VERSUS GPS L1 PATCH
ANTENNA PERFORMANCE CHARACTERISTIC
Gholam Aghashirin1, Hoda S. Abdel-Aty-Zohdy1, Mohamed A. Zohdy1, Darrell Schmidt1 and Adam
Timmons2,
1
Oakland University, USA, 2McMaster University, Canada

ABSTRACT

Antenna module is a vital component of automated driving systems, it should function as


needed in dGPS, HD map correction services, and radio and navigation systems. The
proposed antenna model for GPS only patch antenna operating at 1.57542 GHz and the
GNSS patch antenna resonating at 1.5925 GHz are developed. This work presents the
design, modelling, determining passive gain of the GPS patch vs. GNSS antenna with
intended targeted applications within the automotive system. Simulation are undertaken to
evaluate the performance of the proposed GNSS antenna. Simulation conducted in FEKO
software rather than mathematical modelling. The two antennas are also compared from the
size standpoint. The goal of this paper is to test, measure and evaluate the performance of
GPS against GNSS antennas. Another emphasis of this paper is how to obtain the equivalent
amount of total passive gain in a GPS vs. that of GNSS antenna.

KEYWORDS

Differential Global Position System (dGPS), Global Navigation Satellite System (GNSS),
Globalnaya Navigazionnaya Sputnikovaya Sistema (GLONASS), Advanced Driver Assistance
Systems (ADAS), Automated Driving (AD), Modelling, comparison, measurements, analysis.

Full Text: https://aircconline.com/csit/papers/vol10/csit101002.pdf

9th International Conference on Advanced Information Technologies and Applications


(ICAITA 2020)
https://aircconline.com/csit/papers/vol10/csit100901.pdf
REFERENCES

[1] Constantine A. Balanis, Antenna Theory Analysis and Design, 2nd ed., New York: Wiley,
1997, p. 1- 3, 58-61, 73-77, 722-750, 839-871

[2] Fawwaz T. Ulaby, Fundamentals of Applied Electromagnetics, 2001 Media Edition, Prentice
Hall, p.347-354
CLASSIfiCATION OF FATIGUE IN CONSUMER-GRADE EEG USING
ENTROPIES AS FEATURES
Muhammad Azam, Derek Jacoby and Yvonne Coady, University of Victoria, Canada

ABSTRACT

Electroencephalogram (EEG) records electrical activity at different locations in the brain. It


is used to identify abnormalities and support the diagnoses of different disease conditions.
The accessibility of low-cost EEG devices has seen the analysis of this data become more
common in other research domains. In this work, we assess the performance of using
Approximate entropy, Sample entropy, and Reyni entropy as features in the classification of
fatigue from EEG data captured by a MUSE 2 headset. We test 5 classifiers: Naive Bayes,
Radial Basis Function Network, Support Vector Machine, K-Nearest Neighbor, and Best
First Decision Tree. We achieved the highest accuracy of 77.5% using the Support Vector
Machine classifier and present possible enhancements to improve this.

KEYWORDS

EEG, Electroencephalogram, Approximate entropy, Sample entropy, Reyni entropy, Fatigue


detection, Automatic classification, MUSE 2

Full Text: https://aircconline.com/csit/papers/vol10/csit100902.pdf

9th International Conference on Advanced Information Technologies and Applications


(ICAITA 2020)
https://aircconline.com/csit/papers/vol10/csit100901.pdf
REFERENCES

1. Lock, A. M., D. L. Bonetti, and A. D. K. Campbell. ”The psychological and physiological


health effects of fatigue.” Occupational medicine 68.8 (2018): 502-511.

2. Dawson, Drew, and Kathryn Reid. ”Fatigue, alcohol and performance impairment.” Nature
388.6639 (1997): 235-235.

3. Arunkumar, N., et al. ”Classification of focal and non focal EEG using entropies.” Pattern
Recognition Letters 94 (2017): 112-117.

4. Andrzejak, Ralph G., Kaspar Schindler, and Christian Rummel. ”Nonrandomness, nonlinear
dependence, and nonstationarity of electroencephalographic recordings from epilepsy patients.”
Physical Review E 86.4 (2012): 046206.

5. Srinivasan, Vairavan, Chikkannan Eswaran, and Natarajan Sriraam. ”Approximate


entropybased epileptic EEG detection using artificial neural networks.” IEEE Transactions on
information Technology in Biomedicine 11.3 (2007): 288-295.

6. Yuan, Qi, et al. ”Epileptic EEG classification based on extreme learning machine and nonlinear
features.” Epilepsy research 96.1-2 (2011): 29-38.

7. Subasi, Abdulhamit, and M. Ismail Gursoy. ”EEG signal classification using PCA, ICA, LDA
and support vector machines.” Expert systems with applications 37.12 (2010): 8659-8666.

8. Acharya, U. Rajendra, et al. ”Automated diagnosis of epileptic EEG using entropies.”


Biomedical Signal Processing and Control 7.4 (2012): 401-408.

9. Liang, Zhenhu, et al. ”EEG entropy measures in anesthesia.” Frontiers in computational


neuroscience 9 (2015): 16.

10. Gosseries, Olivia, et al. ”Automated EEG entropy measurements in coma, vegetative
state/unresponsive wakefulness syndrome and minimally conscious state.” Functional
neurology 26.1 (2011): 25. Computer Science & Information Technology (CS & IT) 25

11. Thul, Alexander, et al. ”EEG entropy measures indicate decrease of cortical information
processing in Disorders of Consciousness.” Clinical Neurophysiology 127.2 (2016): 1419-1427.

12. Rodr´ıguez-Sotelo, Jose Luis, et al. ”Automatic sleep stages classification using EEG entropy
features and unsupervised pattern analysis techniques.” Entropy 16.12 (2014): 6573-6589.

13. Huang, Kuan-Chih, et al. ”An EEG-based fatigue detection and mitigation system.” International
journal of neural systems 26.04 (2016): 1650018.

14. Zhang, Xiaoliang, et al. ”Design of a fatigue detection system for high-speed trains based on
driver vigilance using a wireless wearable EEG.” Sensors 17.3 (2017): 486.

15. The Theoretical and Applied Neuroscience Laboratory at the University of Victoria
https://www.krigolsonlab.com/

16. Krigolson, Olave E., et al. ”Choosing MUSE: Validation of a low-cost, portable EEG system for
ERP research.” Frontiers in neuroscience 11 (2017): 109.

17. Delgado-Bonal, Alfonso, and Alexander Marshak. ”Approximate entropy and sample entropy: A
comprehensive tutorial.” Entropy 21.6 (2019): 541.

18. Rish, Irina. ”An empirical study of the naive Bayes classifier.” IJCAI 2001 workshop on
empirical methods in artificial intelligence. Vol. 3. No. 22. 2001.

19. Decision Trees: A simple way to visualize a decision


https://medium.com/greyatom/decisiontrees-a-simple-way-to-visualize-a-decision-
dc506a403aeb 20. Costa, Yandre MG, Luiz S. Oliveira, and Carlos N. Silla Jr. ”An evaluation
of convolutional neural networks for music classification using spectrograms.” Applied soft
computing 52 (2017): 28-38.
INNOCROWD, A CONTRIBUTION TO AN IOT BASED
ENGINEERING PRODUCT DEVELOPMENT

Camille Salinesi1, Clotilde Rohleder 2, Asmaa Achtaich1, 3, IndraKusumah1, 2


1
CRI -Paris 1 Sorbonne University, Paris, France
2
University of Applied Science HTWG Constanz, Germany
3
Siweb – Université Mohammed 5, Rabat, Maroc

ABSTRACT

System engineering focuses on the realization of complex systems, from design all the way to
management. Meanwhile, in the era of Industry 4.0 and Internet of Things, systems are getting more
and more complex. This complexity comes from the usage of smart sub systems (e.g. smart objects,
new communication protocols, etc.) and new engineering product development processes (e.g.
through Open Innovation). These two aspects namely the IoTrelated sub system and product
development process are our main discussion topics in our research work. The creation of smart
objects such as innovative fleets of connected devices is a compelling case. Fleets of devices in
smart buildings, smart cars or smart consumer products (e.g. cameras, sensors, etc.) are confronted
with complex, dynamic, rapidly changing and resource-constrained environments. In order to align
with these context fluctuations, we develop a framework representing the dimensions for building
Self-adaptive fleets for IoT applications. The emerging product development process Open
Innovation is proven to be three time faster and ten times cheaper than conventional ones. However,
it is relatively new to the industry, and therefore, many aspects are not clearly known, starting from
the specific product requirements definition, design and engineering process (task assignment), until
quality assurance, time and cost. Therefore, acceptance of this new approach in the industry is still
limited. Research activities are mainly dealing with high and qualitative levels. Whereas methods
that supply more transparent numbers remain unlikely. The project-related risks are therefore
unclear, consequently, the Go / noGo decisions become difficult. This paper contributes ideas to
handle issues mentioned above by proposing a new integrated method, we call it InnoCrowd. This
approach, from the perspective of IoT, can be used as a base for the establishment of a related
decision support system.

KEYWORDS

Industry 4.0, Internet of Thing, Crowdsourcing, Neural Network, Decision Support System

Full Text: https://aircconline.com/csit/papers/vol10/csit101002.pdf

7th International Conference on Computer Science and Information Technology


(CoSIT 2020)
https://aircconline.com/csit/papers/vol10/csit100901.pdf
REFERENCES

[1] R. E. Allen, F. G. Fowler, H. W. Fowler, and eds, (1976) “The pocket Oxford dictionary of
current English” Oxford University Press.

[2] J. Howe, (2009) “Crowdsourcing: How the power of the crowd is driving the future of business”
New York, NY: Random House.

[3] L. Wang, Z.H. Zhou, (2016) “Cost-Saving Effect of Crowdsourcing Learning” Proceedings of
the Twety-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16).

[4] A. Brem, V. Bilgram, (2015) “The search for innovative partners in co-creation: Identifying
lead users in oscial media through netnography and crowdsourcing” Journal of Engineering and
Technology Management, Elsevier.

[5] W. Buhse, L. Reppesgard, and U. Lessmann, (2011) “Der Case Local Motors: Co-Creation and
Collaboration in der Automotive-Industrie”.

[6] S. Chatterjee, P. Khandekar, and B. Kumar, (2014) “Reimagining enterprise innovation through
crowdsourcing” WhitePaper, TCS,
http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Reimagining-
enterpriseinnovation-crowdsourcing-1114-1.pdf [access: 5.11.2016]

[7] E. Schenk and C. Guittard, (2009) “Crowdsourcing: What can be Outsourced to the Crowd, and
Why?” In Sciences de l'Homme et Societe, Strasbourg, France.

[8] A. Achtaich, N. Souissi, R. Mazo, O. Roudies, and C. Salinesi, (2018) “A DSPL Design
Framework for SASs: A Smart Building Example” EAI Endorsed Trans. Smart Cities, vol. 2,
no. 8, p. 154829.

[9] K. Pohl, G. Böckle, and F. Van Der Linden, (2005), Software Product Line Engineering.
Foundations, Principles, and Techniques, vol. 49, no. 12.

[10] J. Whittle, P. Sawyer, N. Bencomo, B. H. C. Cheng, and J.-M. Bruel,(2010) “RELAX: a


language to address uncertainty in self-adaptive systems requirement” Requir. Eng., vol. 15, no.
2, pp. 177– 196.

[11] M. Mongiello, G. Boggia, and E. Di Sciascio, (2016) “ReIOS: Reflective Architecting in the
Internet of Objects” Proc. 4th Int. Conf. Model. Eng. Softw. Dev., no. February, pp. 384–389.
Computer Science & Information Technology (CS & IT) 9

[12] P. Sawyer, R. Mazo, D. Diaz, C. Salinesi, and D. Hughes, (2012) “Constraint Programming as a
Means to Manage Configurations in Self-Adaptive Systems” Spec. Issue IEEE Comput. J.
“Dynamic Softw. Prod. Lines,” vol. 45, no. October 2015, pp. 56–63.

[13] I. Reinhartz-Berger, A. Sturm, and Y. Wand, (2011) “External Variability of Software:


Classification and Ontological Foundations” Springer, Berlin, Heidelberg, pp. 275–289.

[14] N. Niu, J. Savolainen, Z. Niu, M. Jin, and J.-R. C. Cheng, (2014) “A Systems Approach to
Product Line Requirements Reuse” IEEE Syst. J., vol. 8, no. 3, p. 827.

[15] C. Palomares, X. Franch, and C. Quer, (2014) “Requirements Reuse and Patterns: A Survey” in
nternational Working Conference on Requirements Engineering: Foundation for Software
Quality.
[16] N. Hoang Thuan, P. Antunes, D. Johnstone, H. Xuan Son, N. Hoang, and H. Xuan, (2015)
“Building an Enterprise Ontology of Business Process Crowdsourcing: A Design Science
Approach” in PACIS 2015 Proceedings, vol. 112.

[17] J.G. Polhill, (2015), "Extracting owl ontologies from agent-based-models: A netlogo
extension", Journal of Artificial Societies and Social Simulation 18

You might also like