Intelligent Computing: Proceedings of the 2020 Computing Conference, Volume 3 [1st ed.] 9783030522421, 9783030522438

This book focuses on the core areas of computing and their applications in the real world. Presenting papers from the Co

774 81 81MB

English Pages XI, 721 [732] Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

Intelligent Computing: Proceedings of the 2020 Computing Conference, Volume 3 [1st ed.]
 9783030522421, 9783030522438

Table of contents :
Front Matter ....Pages i-xi
Preventing Neural Network Weight Stealing via Network Obfuscation (Kálmán Szentannai, Jalal Al-Afandi, András Horváth)....Pages 1-11
Applications of Z-Numbers and Neural Networks in Engineering (Raheleh Jafari, Sina Razvarz, Alexander Gegov)....Pages 12-25
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum (Jan Sher Khan, Ahsen Tahir, Jawad Ahmad, Syed Aziz Shah, Qammer H. Abbasi, Gordon Russell et al.)....Pages 26-36
Adaptive Blending Units: Trainable Activation Functions for Deep Neural Networks (Leon René Sütfeld, Flemming Brieger, Holger Finger, Sonja Füllhase, Gordon Pipa)....Pages 37-50
Application of Neural Networks to Characterization of Chemical Sensors (Mahmoud Zaki Iskandarani)....Pages 51-60
Application of Machine Learning in Deception Detection (Owolafe Otasowie)....Pages 61-76
A New Approach to Estimate the Discharge Coefficient in Sharp-Crested Rectangular Side Orifices Using Gene Expression Programming (Hossein Bonakdari, Bahram Gharabaghi, Isa Ebtehaj, Ali Sharifi)....Pages 77-96
DiaTTroD: A Logical Agent Diagnostic Test for Tropical Diseases (Sandra Mae W. Famador, Tardi Tjahjadi)....Pages 97-115
A Weighted Combination Method of Multiple K-Nearest Neighbor Classifiers for EEG-Based Cognitive Task Classification (Abduljalil Mohamed, Amer Mohamed, Yasir Mustafa)....Pages 116-131
Detection and Localization of Breast Tumor in 2D Using Microwave Imaging (Abdelfettah Miraoui, Lotfi Merad Sidi, Mohamed Meriah)....Pages 132-141
Regression Analysis of Brain Biomechanics Under Uniaxial Deformation (O. Abuomar, F. Patterson, R. K. Prabhu)....Pages 142-149
Exudate-Based Classification for Detection of Severity of Diabetic Macula Edema (Nandana Prabhu, Deepak Bhoir, Nita Shanbhag, Uma Rao)....Pages 150-160
Analysis and Detection of Brain Tumor Using U-Net-Based Deep Learning (Vibhu Garg, Madhur Bansal, A. Sanjana, Mayank Dave)....Pages 161-173
Implementation of Deep Neural Networks in Facial Emotion Perception in Patients Suffering from Depressive Disorder: Promising Tool in the Diagnostic Process and Treatment Evaluation (Krzysztof Michalik, Katarzyna Kucharska)....Pages 174-184
Invisibility and Fidelity Vector Map Watermarking Based on Linear Cellular Automata Transform (Saleh Al-Ardhi, Vijey Thayananthan, Abdullah Basuhail)....Pages 185-197
Implementing Variable Power Transmission Patterns for Authentication Purposes (Hosam Alamleh, Ali Abdullah S. Alqahtani, Dalia Alamleh)....Pages 198-203
SADDLE: Secure Aerial Data Delivery with Lightweight Encryption (Anthony Demeri, William Diehl, Ahmad Salman)....Pages 204-223
Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical Devices (Robert Heras, Alexander Perez-Pons)....Pages 224-243
Enhanced Security Using Elasticsearch and Machine Learning (Ovidiu Negoita, Mihai Carabas)....Pages 244-254
Memory Incentive Provenance (MIP) to Secure the Wireless Sensor Data Stream (Mohammad Amanul Islam)....Pages 255-277
Tightly Close It, Robustly Secure It: Key-Based Lightweight Process for Propping up Encryption Techniques (Muhammed Jassem Al-Muhammed, Ahmad Al-Daraiseh, Raed Abuzitar)....Pages 278-301
Statistical Analysis to Optimize the Generation of Cryptographic Keys from Physical Unclonable Functions (Bertrand Cambou, Mohammad Mohammadi, Christopher Philabaum, Duane Booher)....Pages 302-321
Towards an Intelligent Intrusion Detection System: A Proposed Framework (Raghda Fawzey Hriez, Ali Hadi, Jalal Omer Atoum)....Pages 322-335
LockChain Technology as One Source of Truth for Cyber, Information Security and Privacy (Yuri Bobbert, Nese Ozkanli)....Pages 336-347
Introduction of a Hybrid Monitor for Cyber-Physical Systems (J. Ceasar Aguma, Bruce McMillin, Amelia Regan)....Pages 348-360
Software Implementation of a SRAM PUF-Based Password Manager (Sareh Assiri, Bertrand Cambou, D. Duane Booher, Mohammad Mohammadinodoushan)....Pages 361-379
Contactless Palm Vein Authentication Security Technique for Better Adoption of e-Commerce in Developing Countries (Sunday Alabi, Martin White, Natalia Beloff)....Pages 380-390
LightGBM Algorithm for Malware Detection (Mouhammd Al-kasassbeh, Mohammad A. Abbadi, Ahmed M. Al-Bustanji)....Pages 391-403
Exploiting Linearity in White-Box AES with Differential Computation Analysis (Jakub Klemsa, Martin Novotný)....Pages 404-419
Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction (Meng Huang, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao)....Pages 420-430
Windows 10 Hibernation File Forensics (Ahmad Ghafarian, Deniz Keskin)....Pages 431-445
Behavior and Biometrics Based Masquerade Detection Mobile Application (Pranieth Chandrasekara, Hasini Abeywardana, Sammani Rajapaksha, Sanjeevan Parameshwaran, Kavinga Yapa Abeywardana)....Pages 446-458
Spoofed/Unintentional Fingerprint Detection Using Behavioral Biometric Features (Ammar S. Salman, Odai S. Salman)....Pages 459-470
Enabling Paratransit and TNC Services with Blockchain Based Smart Contracts (Amari N. Lewis, Amelia C. Regan)....Pages 471-481
A Review of Cyber Security Issues in Hospitality Industry (Neda Shabani, Arslan Munir)....Pages 482-493
Extended Protocol Using Keyless Encryption Based on Memristors (Yuxuan Zhu, Bertrand Cambou, David Hely, Sareh Assiri)....Pages 494-510
Recommendations for Effective Security Assurance of Software-Dependent Systems (Jason Jaskolka)....Pages 511-531
On Generating Cancelable Biometric Templates Using Visual Secret Sharing ( Manisha, Nitin Kumar)....Pages 532-544
An Integrated Safe and Secure Approach for Authentication and Secret Key Establishment in Automotive Cyber-Physical Systems (Naresh Kumar Giri, Arslan Munir, Joonho Kong)....Pages 545-559
How Many Clusters? An Entropic Approach to Hierarchical Cluster Analysis (Sergei Koltcov, Vera Ignatenko, Sergei Pashakhin)....Pages 560-569
Analysis of Structural Liveness and Boundedness in Weighted Free-Choice Net Based on Circuit Flow Values (Yojiro Harie, Katsumi Wasaki)....Pages 570-580
Classification of a Pedestrian’s Behaviour Using Dual Deep Neural Networks (James Spooner, Madeline Cheah, Vasile Palade, Stratis Kanarachos, Alireza Daneshkhah)....Pages 581-597
Towards Porting Astrophysics Visual Analytics Services in the European Open Science Cloud (Eva Sciacca, Fabio Vitello, Ugo Becciani, Cristobal Bordiu, Filomena Bufano, Antonio Calanducci et al.)....Pages 598-606
Computer Graphics-Based Analysis of Anterior Cruciate Ligament in a Partially Replaced Knee (Ahmed Imran)....Pages 607-612
An Assessment Algorithm for Evaluating Students Satisfaction in e-Learning Environments: A Case Study (M. Caramihai, Irina Severin, Ana Maria Bogatu)....Pages 613-621
The Use of New Technologies in the Organization of the Educational Process (Y. A. Daineko, N. T. Duzbayev, K. B. Kozhaly, M. T. Ipalakova, Zh. M. Bekaulova, N. Zh. Nalgozhina et al.)....Pages 622-627
Design and Implementation of Cryptocurrency Price Prediction System (Milena Karova, Ivaylo Penev, Daniel Marinov)....Pages 628-643
Strategic Behavior Discovery of Multi-agent Systems Based on Deep Learning Technique (Boris Morose, Sabina Aledort, Gal Zaidman)....Pages 644-651
Development of Prediction Methods for Taxi Order Service on the Basis of Intellectual Data Analysis (N. A. Andriyanov)....Pages 652-664
Discourse Analysis on Learning Theories and AI (Rosemary Papa, Karen Moran Jackson, Ric Brown, David Jackson)....Pages 665-672
False Asymptotic Instability Behavior at Iterated Functions with Lyapunov Stability in Nonlinear Time Series (Charles Roberto Telles)....Pages 673-693
The Influence of Methodological Tools on the Diagnosed Level of Intellectual Competence in Older Adolescents (Sipovskaya Yana Ivanovna)....Pages 694-701
The Automated Solar Activity Prediction System (ASAP) Update Based on Optimization of a Machine Learning Approach (Ali K. Abed, Rami Qahwaji)....Pages 702-717
Correction to: Towards Porting Astrophysics Visual Analytics Services in the European Open Science Cloud (Eva Sciacca, Fabio Vitello, Ugo Becciani, Cristobal Bordiu, Filomena Bufano, Antonio Calanducci et al.)....Pages C1-C1
Back Matter ....Pages 719-721

Polecaj historie