1.

Record Nr.

UNINA9910886991203321

Titolo

Advances in Computational Collective Intelligence : 16th International Conference, ICCCI 2024, Leipzig, Germany, September 9–11, 2024, Proceedings, Part II / / edited by Ngoc-Thanh Nguyen, Bogdan Franczyk, André Ludwig, Manuel Nunez, Jan Treur, Gottfried Vossen, Adrianna Kozierkiewicz

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024

ISBN

3-031-70259-X

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (510 pages)

Collana

Communications in Computer and Information Science, , 1865-0937 ; ; 2166

Disciplina

006.3

Soggetti

Computer networks

Education - Data processing

Application software

Computer vision

Computer Communication Networks

Computers and Education

Computer and Information Systems Applications

Computer Vision

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Cybersecurity, Blockchain Technology, and Internet of Things -- Enhanced Intrusion Detection Based Hybrid Meta-heuristic Feature Selection -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Data Preparation Stage -- 3.3 Features Selection -- 3.4 Class Imbalance Processing -- 3.5 Machine Learning Algorithms -- 4 Experiment Results -- 5 Conclusion -- References -- Data Distribution-Based Change Detection Framework in SWaT Security Monitoring -- 1 Introduction -- 2 State-of-the-Art -- 2.1 K-Dimensional-Quad-Tree -- 2.2 CUmulative SUM -- 2.3 Crámer-von Mises -- 2.4 Principal Component Analysis-Change Detection -- 2.5 Kolmogorov-Smirnov WINdowing -- 2.6 One-Class Support Vector



Machine -- 3 Proposed Framework and Dataset -- 3.1 Secure Water Treatment Dataset -- 3.2 Proposed Framework -- 4 Results and Discussion -- 4.1 Comparative Analysis of Change Detection Algorithms -- 4.2 Dashboards -- 5 Conclusion and Future Work -- References -- Fuzzy Rule-Based Anomaly Explanation in Micro-electromechanical Systems -- 1 Introduction -- 2 MEMS-Based Inertial Sensor -- 3 Anomaly Detection by Fuzzy Systems -- 3.1 Fuzzy Rule-Based System (FRBS) -- 3.2 Bacterial Memetic Algorithm (BMA) -- 3.3 BMA Applied on FRBS -- 3.4 Bacterial Mutation -- 3.5 Gene Transfer -- 3.6 Levenberg-Marquardt Method -- 4 Anomaly Detection by Fuzzy Systems in MEMS Based Sensor Production -- 4.1 Dataset -- 4.2 Rule Initialization by Exploiting Domain Knowledge -- 4.3 Training and Results -- 5 Conclusion -- References -- Analysis of Network Intrusion Detection and Potential Botnets Identification Using Selected Machine Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 Methedology -- 3.1 Results and Analysis of Experiments -- 4 Conclusion and Future Work -- References.

MBMD-LoRa Scalable LoRaWAN for Internet of Things: A Multi-band Multi-data Rate Approach -- 1 Introduction -- 2 Background and Related Work -- 3 System Model for LoRaWAN -- 3.1 Propagation Model -- 3.2 Simulation Model -- 4 Multi-band Muti-data Rate for LoRaWAN -- 4.1 Slim Data Rate -- 4.2 Zone-Based MBMD Implementation (MBMZ-LoRa) -- 5 Performance Evaluation -- 5.1 Network Throughput -- 5.2 Energy Consumption -- 6 Conclusion -- References -- M2M Interface for IoT Traffic Light with Computer Vision and AnyLogic PLE -- 1 Introduction -- 2 Materials and Methods -- 2.1 Tasks Related to Integrating Traffic Lights with Computer Vision and a Server Based on M2M (Machine-to-Machine) Communication -- 2.2 The Design Stage -- 2.3 Implementation Stage -- 2.4 The Testing Stage -- 3 Discussion -- 4 Conclusion -- References -- An Automated and Verbose Approach for Detecting Anomalies in Cloud Computing Platform Using Logs -- 1 Introduction -- 2 Background and Related Work -- 3 Monilog Approach -- 3.1 Vectorizing Logs -- 3.2 Detecting Anomalies -- 3.3 Consolidation and Alerting -- 4 Experimental Setup -- 4.1 Dataset -- 4.2 Anomalies -- 4.3 Models -- 4.4 Error Metrics -- 5 Evaluation -- 5.1 Precision Evaluation -- 5.2 Critical Events Forecasting -- 6 Conclusion -- 7 Lesson Learned and Future Work -- References -- Cooperative Strategies for Decision Making and Optimization -- Efficiency of Specialized Genetic Operators in Non-dominated Tournament Genetic Algorithm (NTGA2) Applied to Multi-objective Multi-skill Resource Constrained Project Scheduling Problem -- 1 Introduction -- 2 Related Work -- 2.1 Semi-specialized Operators -- 2.2 Problem Specialized Operators -- 3 Multi-skill Resource Constrained Project Scheduling Problem -- 4 Method -- 4.1 Non-dominated Tournament Genetic Algorithm -- 4.2 Specialized Genetic Operators for MS-RCPSP -- 5 Experiments.

5.1 Experimental Setup -- 5.2 Results -- 6 Summary and Future Work -- References -- Maximum Entropy Model of Synonym Selection in Post-editing Machine Translation into Kazakh Language -- 1 Introduction -- 2 Related works -- 3 Method -- 3.1 Semantic Cube Model and Algorithm Used to Correct Wrong Words -- 3.2 An Example of Choosing a High-Probability Synonym for a Wrongly Translated Kazakh Word -- 4 Experiment -- 5 Conclusion and future works -- References -- Cross-Domain Abbreviation Disambiguation on Vietnamese Clinical Texts in Online Processing -- 1 Introduction -- 2 A Cross-Domain Abbreviation Disambiguation Task on Vietnamese Clinical Texts in Online Processing -- 3 The Proposed Solution -- 3.1 Solution Details -- 3.2 The Proposed Nonparametric Self-training



Method -- 3.3 The Characteristics of the Proposed Work -- 4 An Empirical Evaluation -- 4.1 Research Questions -- 4.2 Experiment Settings -- 4.3 Experimental Results and Discussions -- 5 Conclusion -- References -- Exploring the Potential of Generative Models in Promoting Local Language News Consumption -- 1 Introduction -- 2 Problem Description -- 3 The Evolutionary Trajectory of Generative Models -- 4 Related Work -- 5 Data Analysis and Preprocessing -- 6 Methods and Algorithms -- 7 Data Modelling and Training -- 8 Performance Measurement -- 9 Conclusion and Future Work -- References -- New Methodology for Attack Patterns Classification in Deep Brain Stimulation*-8pt -- 1 Introduction -- 2 Recent Works -- 3 Methodology -- 3.1 Signal Preprocessing -- 3.2 Convolutional Neural Network -- 3.3 Bidirectional Long Short-Term Memory Network -- 3.4 Convolutional Neural Network and Bidirectional Long Short-Term Memory for Different Attack Patterns Classification -- 4 Experimental Results -- 4.1 Dataset Description -- 4.2 Experiment Setup and Result Analysis -- 5 Conclusion -- References.

An Evolutionary Algorithm and a Clustering Technique to Select Good Subsets of Test for Finite State Machines -- 1 Introduction -- 2 Description of the Problem and Methods -- 2.1 The Formalism -- 2.2 Multi-objective Genetic Algorithm -- 2.3 Cluster Algorithm -- 3 Experiments -- 4 Conclusions and Future Work -- References -- Computational Intelligence for Digital Content Understanding -- Fusing Visual and Textual Representations via Multi-layer Fusing Transformers for Vietnamese Visual Question Answering -- 1 Introduction -- 2 Related Works -- 3 Our Model -- 3.1 Language Embedding Module -- 3.2 Visual Embedding Module -- 3.3 Cross-Attention Module -- 3.4 Answer Selector -- 4 Experiments -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Experimental Settings -- 4.4 Results -- 4.5 Ablation Studies -- 5 Conclusion -- References -- Analyzing the Publicization of Drought Debates in Arizona Newspapers -- 1 Introduction -- 2 Literature Review and Methodology -- 2.1 Literature Review -- 2.2 An Instrumented Methodology -- 3 Corpora -- 4 Analysis -- 5 Conclusion -- References -- Comparison of the Effectiveness of ANN and CNN in Image Classification -- 1 Introduction -- 2 Researching the Implementation of Artificial Neural Networks -- 3 Computational Experiment Assumptions -- 4 Results of the Experiment Obtained Using ANN -- 5 Results of the Experiment Obtained Using CNN -- 6 Summary -- References -- Study Neural Model for Recognition of Ancient Turkic Orkhon Runes -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Development of a Neural Model for Recognition of Ancient Turkic Orkhon Runes -- 3.2 Researching the Signs of the Ancient Turkic Orkhon Alphabet and Forming a Dataset -- 3.3 Creating a Script to Segment Input from an Image Containing Orkhon Runes -- 4 Experiments and Results -- 5 Discussion -- 6 Conclusion -- References.

Topic Modeling with Variable Neighborhood Search -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Definition -- 3.2 Variable Neighborhood Search -- 3.3 Topic Modeling with VNS -- 4 Experiments -- 4.1 Results -- 5 Conclusion -- References -- A Neuro-Symbolic Classification Algorithm Using Neural Cell Assemblies -- 1 Introduction -- 2 Related Work -- 3 The Proposed Neuro-Symbolic System -- 3.1 A Brain-Inspired Representation -- 3.2 A (Somewhat) Equivalent Explicit Representation -- 3.3 Learning Prototypes -- 3.4 Decoding the Representations -- 3.5 Learning Rules -- 4 Case Studies -- 5 Conclusions -- References -- Transforming Challenges: Siamese-Based Vision Transformers for Robust Occluded Face Recognition -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1



Siamese-Based ViT for Degraded Face Recognition -- 3.2 ViT Encoder -- 3.3 Recognition Stage -- 3.4 Optimization Process -- 4 Experiments AndDiscussion -- 4.1 Datasets -- 4.2 Results and Discussion -- 5 Conclusion -- References -- Recent Methods and Algorithms in Speech Segmentation Tasks -- 1 Introduction -- 2 Standard Speech Diarization System -- 3 Methodology -- 4 Metrics -- 5 Speaker Diarization Frameworks -- 6 Main Challenges Requiring Improvement in Speaker Diarization -- 7 Conclusion -- References -- Knowledge Engineering and Application for Industry 4.0 -- Testing Usability of Different Implementations for VR Interaction Methods -- 1 Introduction -- 2 Related Works -- 3 Environment Setup -- 4 Experiment -- 5 Results -- 6 Conclusions -- References -- Retrofitting a Legacy Cutlery Washing Machine Using Computer Vision -- 1 Introduction -- 2 Related Studies -- 3 Methodology -- 3.1 Hardware Setup -- 3.2 Object Detection -- 3.3 YOLOv5 and Faster-RCNN -- 3.4 Color Image Segmentation (CIS) -- 4 Results and Discussion -- 4.1 Generalizability.

4.2 Utilization and Speed Computation.

Sommario/riassunto

This two-volume set CCIS 2165-2166 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9–11, 2024. The 67 full papers included in this book were carefully reviewed and selected from 234 submissions. The main track, covering the methodology and applications of CCI, included: collective decision-making, data fusion, deep learning techniques, natural language processing, data mining and machine learning, social networks and intelligent systems, optimization, computer vision, knowledge engineering and application, as well as Internet of Things: technologies and applications. The special sessions, covering some specific topics of particular interest, included: cooperative strategies for decision making and optimization, security and reliability of information, networks and social media, anomalies detection, machine learning, deep learning, digital image processing, artificial intelligence, speech communication, IOT applications, natural language processing, innovative applications in data science.