LEADER 12873nam 22006855 450 001 9910886991203321 005 20251003103239.0 010 $a3-031-70259-X 024 7 $a10.1007/978-3-031-70259-4 035 $a(MiAaPQ)EBC31652782 035 $a(Au-PeEL)EBL31652782 035 $a(CKB)34909806200041 035 $a(DE-He213)978-3-031-70259-4 035 $a(EXLCZ)9934909806200041 100 $a20240908d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Computational Collective Intelligence $e16th International Conference, ICCCI 2024, Leipzig, Germany, September 9?11, 2024, Proceedings, Part II /$fedited by Ngoc-Thanh Nguyen, Bogdan Franczyk, André Ludwig, Manuel Nunez, Jan Treur, Gottfried Vossen, Adrianna Kozierkiewicz 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (510 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2166 311 08$a3-031-70258-1 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Cybersecurity, Blockchain Technology, and Internet of Things -- Enhanced Intrusion Detection Based Hybrid Meta-heuristic Feature Selection -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Data Preparation Stage -- 3.3 Features Selection -- 3.4 Class Imbalance Processing -- 3.5 Machine Learning Algorithms -- 4 Experiment Results -- 5 Conclusion -- References -- Data Distribution-Based Change Detection Framework in SWaT Security Monitoring -- 1 Introduction -- 2 State-of-the-Art -- 2.1 K-Dimensional-Quad-Tree -- 2.2 CUmulative SUM -- 2.3 Crámer-von Mises -- 2.4 Principal Component Analysis-Change Detection -- 2.5 Kolmogorov-Smirnov WINdowing -- 2.6 One-Class Support Vector Machine -- 3 Proposed Framework and Dataset -- 3.1 Secure Water Treatment Dataset -- 3.2 Proposed Framework -- 4 Results and Discussion -- 4.1 Comparative Analysis of Change Detection Algorithms -- 4.2 Dashboards -- 5 Conclusion and Future Work -- References -- Fuzzy Rule-Based Anomaly Explanation in Micro-electromechanical Systems -- 1 Introduction -- 2 MEMS-Based Inertial Sensor -- 3 Anomaly Detection by Fuzzy Systems -- 3.1 Fuzzy Rule-Based System (FRBS) -- 3.2 Bacterial Memetic Algorithm (BMA) -- 3.3 BMA Applied on FRBS -- 3.4 Bacterial Mutation -- 3.5 Gene Transfer -- 3.6 Levenberg-Marquardt Method -- 4 Anomaly Detection by Fuzzy Systems in MEMS Based Sensor Production -- 4.1 Dataset -- 4.2 Rule Initialization by Exploiting Domain Knowledge -- 4.3 Training and Results -- 5 Conclusion -- References -- Analysis of Network Intrusion Detection and Potential Botnets Identification Using Selected Machine Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 Methedology -- 3.1 Results and Analysis of Experiments -- 4 Conclusion and Future Work -- References. 327 $aMBMD-LoRa Scalable LoRaWAN for Internet of Things: A Multi-band Multi-data Rate Approach -- 1 Introduction -- 2 Background and Related Work -- 3 System Model for LoRaWAN -- 3.1 Propagation Model -- 3.2 Simulation Model -- 4 Multi-band Muti-data Rate for LoRaWAN -- 4.1 Slim Data Rate -- 4.2 Zone-Based MBMD Implementation (MBMZ-LoRa) -- 5 Performance Evaluation -- 5.1 Network Throughput -- 5.2 Energy Consumption -- 6 Conclusion -- References -- M2M Interface for IoT Traffic Light with Computer Vision and AnyLogic PLE -- 1 Introduction -- 2 Materials and Methods -- 2.1 Tasks Related to Integrating Traffic Lights with Computer Vision and a Server Based on M2M (Machine-to-Machine) Communication -- 2.2 The Design Stage -- 2.3 Implementation Stage -- 2.4 The Testing Stage -- 3 Discussion -- 4 Conclusion -- References -- An Automated and Verbose Approach for Detecting Anomalies in Cloud Computing Platform Using Logs -- 1 Introduction -- 2 Background and Related Work -- 3 Monilog Approach -- 3.1 Vectorizing Logs -- 3.2 Detecting Anomalies -- 3.3 Consolidation and Alerting -- 4 Experimental Setup -- 4.1 Dataset -- 4.2 Anomalies -- 4.3 Models -- 4.4 Error Metrics -- 5 Evaluation -- 5.1 Precision Evaluation -- 5.2 Critical Events Forecasting -- 6 Conclusion -- 7 Lesson Learned and Future Work -- References -- Cooperative Strategies for Decision Making and Optimization -- Efficiency of Specialized Genetic Operators in Non-dominated Tournament Genetic Algorithm (NTGA2) Applied to Multi-objective Multi-skill Resource Constrained Project Scheduling Problem -- 1 Introduction -- 2 Related Work -- 2.1 Semi-specialized Operators -- 2.2 Problem Specialized Operators -- 3 Multi-skill Resource Constrained Project Scheduling Problem -- 4 Method -- 4.1 Non-dominated Tournament Genetic Algorithm -- 4.2 Specialized Genetic Operators for MS-RCPSP -- 5 Experiments. 327 $a5.1 Experimental Setup -- 5.2 Results -- 6 Summary and Future Work -- References -- Maximum Entropy Model of Synonym Selection in Post-editing Machine Translation into Kazakh Language -- 1 Introduction -- 2 Related works -- 3 Method -- 3.1 Semantic Cube Model and Algorithm Used to Correct Wrong Words -- 3.2 An Example of Choosing a High-Probability Synonym for a Wrongly Translated Kazakh Word -- 4 Experiment -- 5 Conclusion and future works -- References -- Cross-Domain Abbreviation Disambiguation on Vietnamese Clinical Texts in Online Processing -- 1 Introduction -- 2 A Cross-Domain Abbreviation Disambiguation Task on Vietnamese Clinical Texts in Online Processing -- 3 The Proposed Solution -- 3.1 Solution Details -- 3.2 The Proposed Nonparametric Self-training Method -- 3.3 The Characteristics of the Proposed Work -- 4 An Empirical Evaluation -- 4.1 Research Questions -- 4.2 Experiment Settings -- 4.3 Experimental Results and Discussions -- 5 Conclusion -- References -- Exploring the Potential of Generative Models in Promoting Local Language News Consumption -- 1 Introduction -- 2 Problem Description -- 3 The Evolutionary Trajectory of Generative Models -- 4 Related Work -- 5 Data Analysis and Preprocessing -- 6 Methods and Algorithms -- 7 Data Modelling and Training -- 8 Performance Measurement -- 9 Conclusion and Future Work -- References -- New Methodology for Attack Patterns Classification in Deep Brain Stimulation*-8pt -- 1 Introduction -- 2 Recent Works -- 3 Methodology -- 3.1 Signal Preprocessing -- 3.2 Convolutional Neural Network -- 3.3 Bidirectional Long Short-Term Memory Network -- 3.4 Convolutional Neural Network and Bidirectional Long Short-Term Memory for Different Attack Patterns Classification -- 4 Experimental Results -- 4.1 Dataset Description -- 4.2 Experiment Setup and Result Analysis -- 5 Conclusion -- References. 327 $aAn Evolutionary Algorithm and a Clustering Technique to Select Good Subsets of Test for Finite State Machines -- 1 Introduction -- 2 Description of the Problem and Methods -- 2.1 The Formalism -- 2.2 Multi-objective Genetic Algorithm -- 2.3 Cluster Algorithm -- 3 Experiments -- 4 Conclusions and Future Work -- References -- Computational Intelligence for Digital Content Understanding -- Fusing Visual and Textual Representations via Multi-layer Fusing Transformers for Vietnamese Visual Question Answering -- 1 Introduction -- 2 Related Works -- 3 Our Model -- 3.1 Language Embedding Module -- 3.2 Visual Embedding Module -- 3.3 Cross-Attention Module -- 3.4 Answer Selector -- 4 Experiments -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Experimental Settings -- 4.4 Results -- 4.5 Ablation Studies -- 5 Conclusion -- References -- Analyzing the Publicization of Drought Debates in Arizona Newspapers -- 1 Introduction -- 2 Literature Review and Methodology -- 2.1 Literature Review -- 2.2 An Instrumented Methodology -- 3 Corpora -- 4 Analysis -- 5 Conclusion -- References -- Comparison of the Effectiveness of ANN and CNN in Image Classification -- 1 Introduction -- 2 Researching the Implementation of Artificial Neural Networks -- 3 Computational Experiment Assumptions -- 4 Results of the Experiment Obtained Using ANN -- 5 Results of the Experiment Obtained Using CNN -- 6 Summary -- References -- Study Neural Model for Recognition of Ancient Turkic Orkhon Runes -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Development of a Neural Model for Recognition of Ancient Turkic Orkhon Runes -- 3.2 Researching the Signs of the Ancient Turkic Orkhon Alphabet and Forming a Dataset -- 3.3 Creating a Script to Segment Input from an Image Containing Orkhon Runes -- 4 Experiments and Results -- 5 Discussion -- 6 Conclusion -- References. 327 $aTopic Modeling with Variable Neighborhood Search -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Definition -- 3.2 Variable Neighborhood Search -- 3.3 Topic Modeling with VNS -- 4 Experiments -- 4.1 Results -- 5 Conclusion -- References -- A Neuro-Symbolic Classification Algorithm Using Neural Cell Assemblies -- 1 Introduction -- 2 Related Work -- 3 The Proposed Neuro-Symbolic System -- 3.1 A Brain-Inspired Representation -- 3.2 A (Somewhat) Equivalent Explicit Representation -- 3.3 Learning Prototypes -- 3.4 Decoding the Representations -- 3.5 Learning Rules -- 4 Case Studies -- 5 Conclusions -- References -- Transforming Challenges: Siamese-Based Vision Transformers for Robust Occluded Face Recognition -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Siamese-Based ViT for Degraded Face Recognition -- 3.2 ViT Encoder -- 3.3 Recognition Stage -- 3.4 Optimization Process -- 4 Experiments AndDiscussion -- 4.1 Datasets -- 4.2 Results and Discussion -- 5 Conclusion -- References -- Recent Methods and Algorithms in Speech Segmentation Tasks -- 1 Introduction -- 2 Standard Speech Diarization System -- 3 Methodology -- 4 Metrics -- 5 Speaker Diarization Frameworks -- 6 Main Challenges Requiring Improvement in Speaker Diarization -- 7 Conclusion -- References -- Knowledge Engineering and Application for Industry 4.0 -- Testing Usability of Different Implementations for VR Interaction Methods -- 1 Introduction -- 2 Related Works -- 3 Environment Setup -- 4 Experiment -- 5 Results -- 6 Conclusions -- References -- Retrofitting a Legacy Cutlery Washing Machine Using Computer Vision -- 1 Introduction -- 2 Related Studies -- 3 Methodology -- 3.1 Hardware Setup -- 3.2 Object Detection -- 3.3 YOLOv5 and Faster-RCNN -- 3.4 Color Image Segmentation (CIS) -- 4 Results and Discussion -- 4.1 Generalizability. 327 $a4.2 Utilization and Speed Computation. 330 $aThis two-volume set CCIS 2165-2166 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9?11, 2024. The 67 full papers included in this book were carefully reviewed and selected from 234 submissions. The main track, covering the methodology and applications of CCI, included: collective decision-making, data fusion, deep learning techniques, natural language processing, data mining and machine learning, social networks and intelligent systems, optimization, computer vision, knowledge engineering and application, as well as Internet of Things: technologies and applications. The special sessions, covering some specific topics of particular interest, included: cooperative strategies for decision making and optimization, security and reliability of information, networks and social media, anomalies detection, machine learning, deep learning, digital image processing, artificial intelligence, speech communication, IOT applications, natural language processing, innovative applications in data science. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2166 606 $aComputer networks 606 $aEducation$xData processing 606 $aApplication software 606 $aComputer vision 606 $aComputer Communication Networks 606 $aComputers and Education 606 $aComputer and Information Systems Applications 606 $aComputer Vision 615 0$aComputer networks. 615 0$aEducation$xData processing. 615 0$aApplication software. 615 0$aComputer vision. 615 14$aComputer Communication Networks. 615 24$aComputers and Education. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Vision. 676 $a006.3 702 $aNguye??n$b Ngo?c Thanh 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910886991203321 996 $aAdvances in Computational Collective Intelligence$92158878 997 $aUNINA