1.

Record Nr.

UNINA9910857789103321

Autore

Saeed Faisal

Titolo

Advances in Intelligent Computing Techniques and Applications : Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, Volume 2 / / edited by Faisal Saeed, Fathey Mohammed, Yousef Fazea

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024

ISBN

3-031-59707-9

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (332 pages)

Collana

Lecture Notes on Data Engineering and Communications Technologies, , 2367-4520 ; ; 211

Altri autori (Persone)

MohammedFathey

FazeaYousef

Disciplina

620.00285

Soggetti

Engineering - Data processing

Biomedical engineering

Medical informatics

Computational intelligence

Data Engineering

Biomedical Engineering and Bioengineering

Health Informatics

Computational Intelligence

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Preface -- Organization -- Contents -- Software Bug Severity Prediction Using Convolutional Neural Network and BiLSTM Models -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 3.1 Data Set -- 3.2 Preprocessing of Summary Features -- 3.3 Word Tokenization -- 3.4 Stop Words Removal -- 3.5 Stemming -- 4 Proposed Models -- 4.1 Convolutional Neural Network (CNN) -- 4.2 A Bidirectional Long Short-Term Memory (BiLSTM) -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- Facial Wash Products Recommendation System: Profile User-Based Using Fuzzy Analytical Hierarchy Process Approach -- 1 Introduction -- 2 Materials and Methods -- 3 Results -- 4 Recommendation System Design and Development -- 5 Conclusion -- References -- Securing



Data in IoT-RFID-Based Systems Using Lightweight Cryptography Algorithm -- 1 Introduction -- 2 RFID Technology -- 2.1 RFID-Based System Components -- 3 RFID Security -- 3.1 Security Requirements for IoT-Based RFID System -- 4 Works Related to Securing RFID-Based Systems -- 5 The Proposed IoT-RFID Lightweight Security Framework(I-RFLSF) -- 5.1 Two-Level Registration Phase -- 5.2 Two-Level Authentication Phase -- 5.3 Secure Data Transmission Phase -- 6 Analysis -- 7 Conclusion -- References -- Employee Mental Workload Classification in Industrial Workplaces: A Machine Learning Approach -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 3.1 Dataset Description -- 3.2 Data Preparation -- 3.3 Data Exploration -- 3.4 Modelling Using Supervised Machine Learning -- 3.5 Evaluation -- 4 Results and Analysis -- 5 Discussion and Conclusion -- References -- A Conceptual Framework for Malay-English Code-Switched Neural Machine Translation -- 1 Introduction -- 2 Literature Review -- 2.1 Code-Switching -- 2.2 Neural Machine Translation -- 2.3 Code-Switching in NMT: Challenges.

3 Theoretical Framework -- 3.1 Data Preparation -- 3.2 Model Development -- 3.3 Performance Evaluation -- 4 Conclusion -- References -- Mobile Device Influence on SDN Controller Performance in IoT-Managed Software-Defined Wireless Networks -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Network Model -- 3.2 Analyses of SDN Controller Overhead -- 4 Performance Evaluation and Simulation Setup -- 4.1 Simulation Setup -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- Matrix Profile Unleashed: A Solution to IoT Data Redundancy Challenges -- 1 Introduction -- 2 Matrix Profile Overview -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References -- Plants Monitoring API to Detect Tomato Leaf Diseases Using Deep-Learning Algorithms -- 1 Introduction -- 2 Related Works -- 3 CNN Model Development -- 3.1 Data Collection -- 3.2 Model Architecture Selection -- 3.3 Model Evaluation and Visualization -- 4 Deployment Strategy -- 5 Evaluation and Testing -- 6 Results Discussion -- 7 Limitations and Challenges -- 8 Conclusion -- References -- Sentiment Analysis and Innovative Recommender System: Enhancing Goodreads Book Discovery Using Hybrid Collaborative and Content Based Filtering -- 1 Introduction -- 2 Literature Review -- 2.1 Sentiment Analysis -- 2.2 Recommender Systems -- 3 Materials and Methods -- 3.1 Business Understanding -- 3.2 Data Understanding -- 3.3 Data Preparation -- 3.4 Sentiment Analysis Visualization -- 4 Modelling -- 5 Evaluation -- 6 Results and Analysis -- 7 Discussion -- 8 Conclusion -- References -- Comparative Analysis of Topic Modeling Algorithms Based on Arabic News Documents -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 TF-IDF -- 3.2 Latent Semantic Indexing -- 3.3 Latent Dirichlet Allocation -- 3.4 Non-negative Matrix Factorization -- 3.5 BERTopic.

4 Methodologies and Experiment -- 4.1 DataSet Description -- 4.2 Data Preprocessing -- 4.3 Comparative Analysis -- 5 Results and Discussion -- 6 Conclusion -- References -- Air Pollution Prediction Using Long Short-Term Memory Variants -- 1 Introduction -- 2 Related Works -- 3 Research Method -- 3.1 Data Collection -- 3.2 Data Preparation -- 3.3 Sliding Window -- 3.4 Hold-Out Validation -- 3.5 Long Short-Term Memory -- 3.6 Bidirectional Long Short-Term Memory -- 3.7 Stacked Long Short-Term Memory -- 3.8 Model Evaluation -- 3.9 Prediction -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Analysis to Develop a Dimensionality Reduction Model for Classifying Intrusion Detection Systems -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Classification Algorithms -- 4 Results -- 5 Conclusion -- References



-- Revolutionizing Airline Customer Satisfaction Analysis with Machine Learning Techniques -- 1 Introduction -- 2 Methodology -- 2.1 Data Retrieval -- 2.2 Exploratory Data Analysis (EDA) -- 2.3 Data Preprocessing -- 2.4 Data Performance Measurement -- 2.5 Proposed Machine Learning Models -- 2.6 Model Training and Evaluation -- 3 Results and Discussion -- 3.1 Experimental Environment -- 3.2 Exploratory Data Analysis (EDA) -- 3.3 Performance Metrics of All Models -- 3.4 Discussion -- 4 Conclusion -- References -- Android Malware Detection Using Machine Learning Technique -- 1 Introduction -- 2 Methodology -- 2.1 Feature Engineering -- 3 Implementation -- 3.1 Back-end Output and Code Snippets -- 3.2 Screenshot the Interface -- 4 Conclusions -- References -- An Ensemble Machine Learning Approach for Predicting Flood Based on Meteorological and Topographical Features: A Comparative Study in Kalu Ganga River Basin, Sri Lanka -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion.

4.1 Outlier Detection -- 4.2 Feature Selection -- 4.3 Machine Learning Models -- 5 Conclusion -- References -- A Review of IoT Applications in Smart Environments: From Smart Cities to Military Integration -- 1 Introduction -- 2 Smart City Applications -- 2.1 Smart Homes -- 2.2 Smart Parking Lots -- 2.3 Vehicular Traffic -- 2.4 Surveillance Systems -- 3 Smart Environmental applications -- 3.1 Weather and Water Systems -- 3.2 Smart Energy and Smart Grids -- 3.3 Environmental Pollution -- 3.4 Health Applications -- 4 Procurement Applications -- 5 Livestock Applications -- 5.1 Chickens -- 5.2 Cattle -- 6 Military Applications -- 7 Conclusion -- References -- Utilizing Deep Learning Technique for Arabic Image Captioning -- 1 Introduction -- 2 Arabic Image Captioning (AIC) Model -- 3 Results and Discussion -- 3.1 Experimental Settings -- 3.2 Obtained Results -- 4 Conclusion -- References -- Performance Analysis of Textured Contact Lens IRIS Detection Based on Manual Feature Engineering -- 1 Introduction -- 2 Existing Publicly Databases -- 3 Performance Evaluation Metrics -- 4 Existing CLIDs Based Hand-Crafted Feature Extraction -- 4.1 CLIDs-Based Spatial Domain -- 4.2 CLIDs-Based Transform Domain -- 5 Comparison of CLIDs Techniques -- 6 Conclusion -- References -- Proposed Model for QCNN-Based Sentimental Short Sentences Classification -- 1 Introduction -- 2 Background and Related Work -- 2.1 Quantum Computing -- 2.2 Quantum Machine Learning -- 2.3 Quantum Convolutional Neural Network -- 2.4 Related Work -- 3 Proposed Model -- 4 Conclusion and Future Work -- References -- An Anomaly Intrusion Detection Systems in IoT Based on Autoencoder: A Review -- 1 Introduction -- 2 Background of Autoencoder -- 3 Studies Characteristic and Discussion -- 3.1 Deep Autoencoder -- 3.2 Sparse Autoencoder -- 3.3 Variational Autoencoder -- 3.4 Combining Approaches.

3.5 Technique Used -- 3.6 Datasets Used -- 4 Recommendations and Future Direction -- 5 Conclusion -- References -- Comparative Analysis of ResNet50, and VGG16 Architectures for Counterfeit Logo Identification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 Addressing Data Imbalance -- 3.4 Feature Selection -- 3.5 Applied Models -- 4 Results and Discussion -- 4.1 Performance of the ResNet50 -- 4.2 Performance of the VGG16 -- 4.3 Comparative Analysis -- 5 Conclusion -- References -- Assessing the Prioritization of Key Influencing Factors for Industrial IoT Readiness in SMEs -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Possible Influencing Factors for Industrial IoT Readiness in SMEs -- 5 Findings from Data Analysis -- 6 Conclusion -- References -- A Real-Time



Hand Gesture Recognition Based on Media-Pipe and Support Vector Machine -- 1 Introduction -- 2 Methodology -- 2.1 Hand Model -- 2.2 Hand Gesture Recognition -- 2.3 Dataset -- 2.4 Image Processing -- 2.5 Feature Extraction -- 2.6 Support Vector Machine (SVM) -- 2.7 Visual Processing Algorithm -- 3 Results and Discussion -- 4 Conclusion -- References -- The Era of Industry 5.0: An Overview of Technologies, Applications, and Challenges -- 1 Introduction -- 2 Enabling Industry 5.0 Technologies -- 3 Applications of Industry 5.0 -- 4 Challenges in Industry 5.0 and Future Directions -- 5 Conclusion -- References -- Overview of Cybersecurity Trends in Jordan's Financial Sector -- 1 Introduction -- 2 Background -- 2.1 The Digital Transformation of the Financial Sector in Jordan -- 2.2 Cybersecurity in the Financial Sector of Jordan -- 2.3 Regulatory Compliance in Jordan -- 2.4 Mobile and Fintech Applications in Jordan -- 3 Conclusion and Future Works -- Appendix -- References.

Hybrid Filter Feature Selection for Improving Cancer Classification in High-Dimensional Microarray Data.

Sommario/riassunto

This book presents the papers included in the proceedings of the 7th International Conference of Reliable Information and Communication Technology 2023 (IRICT 2023) that was held in Pulai Springs Resorts, Johor, Malaysia on 27-28, December 2023. IRICT 2023 is organized by the Yemeni Scientists Research Group (YSRG) and Big Data Center in Universiti Teknologi Malaysia (Malaysia) in collaboration with Association for Information Systems – Malaysia Chapter (MyAIS) and College of Engineering, IT and Environment at Charles Darwin University (Australia). IRICT2023 is a forum for the presentation of technological advances in the field of Information and Communication Technology. The main theme of the conference is “Advances in Intelligent Computing Techniques and Applications”. The book discusses several research topics such as Health Informatics, Artificial Intelligence, Soft Computing, Data Science, Big Data Analytics, Internet of Things (IoT), Intelligent Communication Systems, Cyber Security, and Information System. These papers were presented in three parallel sessions during the two days.