Vai al contenuto principale della pagina
| Titolo: |
Innovations in Bio-Inspired Computing and Applications : Proceedings of the 11th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2020) held during December 16-18, 2020 / / edited by Ajith Abraham, Hideyasu Sasaki, Ricardo Rios, Niketa Gandhi, Umang Singh, Kun Ma
|
| Pubblicazione: | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Edizione: | 1st ed. 2021. |
| Descrizione fisica: | 1 online resource (573 pages) |
| Disciplina: | 006 |
| Soggetto topico: | Computational intelligence |
| Artificial intelligence | |
| Computational Intelligence | |
| Artificial Intelligence | |
| Persona (resp. second.): | AbrahamAjith <1968-> |
| Nota di contenuto: | Intro -- Preface -- IBICA - WICT 2020 Organization -- General Chairs -- Program Chairs -- Publication Chairs -- Publicity Chairs -- International Program Committee -- Contents -- A Comparative Analysis of DNA Protein Synthesis for Solving Optimization Problems: A Novel Nature-Inspired Algorithm -- 1 Introduction -- 2 Related Works -- 3 Main Optimization Algorithms -- 3.1 Particle Swarm Optimization (PSO) -- 3.2 Cuckoos Optimization Algorithm (COA) -- 3.3 Whale Optimization Algorithm (WOA) -- 3.4 Lion Optimization Algorithm (LOA) -- 4 Lion-AYAD Optimization Algorithm (Lion-AYAD) -- 5 Results -- 6 Discussion and Conclusion -- References -- An Evolutionary Approach for Solving the Minimum Volume Ellipsoid Estimator Problem -- 1 Introduction -- 2 Computing MVE Using GA -- 2.1 A GA Approach to the MVE Estimator Problem -- 3 Computational Results -- 3.1 Apply GA to Randomly Generated Points -- 3.2 Apply GA to Real-World Datasets -- 4 Conclusion -- References -- A Novel Clustering Based Undersampling Algorithm for Imbalanced Data Sets Using Artificial Bee Colony Algorithm -- 1 Introduction -- 2 Proposed Method -- 2.1 Elbow Method for Determining Number of Clusters -- 2.2 Artificial Bee Colony Algorithm -- 2.3 Clustering Using Artificial Bee Colony Algorithm -- 2.4 Undersampling Approach Using ABC Clustering -- 3 Experimental Framework -- 4 Results and Discussions -- 5 Conclusions -- References -- Flower Pollination Algorithm in Optimization of Interval Type-2 Fuzzy for Telemedical Problem -- 1 Introduction -- 2 The Proposed Framework -- 3 Flower Pollination Algorithm (FPA) -- 4 Interval Type-2 Fuzzy Logic (IT2FL) -- 4.1 Interval Type-2 Fuzzy Set (IT2FS) -- 4.2 Interval Type-2 Fuzzy Logic (IT2FL) -- 5 FPA-Optimization of IT2FL for Telemedical Monitoring and Prediction of Cardiac Patients -- 6 Results and Discussion -- 7 Conclusion -- References. |
| A Hybrid Trust Probability Based C-ACO Model for Large Software Defined Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Security and Node Integrity -- 3.2 Trust Probability Based WSN Routing -- 4 Experimental Results -- 5 Conclusion -- References -- Novel Routing-Scheduling Problem for Home Health Care Network -- 1 Introduction -- 2 Literature Review -- 3 Problem Definition and Mathematical Formulation -- 3.1 Assumptions of Mathematical Model -- 3.2 Notations -- 3.3 Proposed Mathematical Model -- 3.4 Linearization of the Nonlinear Constraint -- 4 Solution Methodology -- 5 Conclusion and Future Works -- References -- A Data-Driven Dynamic Discretization Framework to Solve Combinatorial Problems Using Continuous Metaheuristics -- 1 Introduction -- 2 Swarm Intelligence Algorithms -- 2.1 Machine Learning and Swarm Intelligence Algorithms -- 3 Q-Learning -- 3.1 Q-Learning in Metaheuristics -- 4 A Data-Driven Dynamic Discretization Framework -- 5 Sine Cosine Algorithm (SCA) -- 6 A New Metaheuristic: Binary Q-Sine Cosine Algorithm -- 7 Experimental Results -- 8 Conclusion -- References -- Minimizing Tardiness in Stochastic Flexible Job Shop Problem -- 1 Introduction and Literature Review -- 2 Problem Description -- 2.1 Model Formulation -- 2.2 Simulation-Based Optimization Approach -- 3 Experiments -- 4 Conclusions and Future Research -- References -- Classification of Metabolic Pathways Using Machine Learning Techniques -- 1 Introduction -- 2 Background -- 3 Materials and Methods -- 3.1 Data Collection -- 3.2 Machine Learning Techniques -- 3.3 Training and Testing -- 3.4 Performance Evaluation of Classifiers -- 4 Results and Discussion -- 4.1 Effectiveness of Classifier with Respect to Six Cancer Dataset -- 4.2 Effectiveness of Classifier with Respect to Six Viral Infection Dataset -- 4.3 Effectiveness of the Methodology. | |
| 5 Conclusion -- References -- Cooperative Slotted ALOHA with ZigZag Decoding and a Pricing Mechanism -- 1 Introduction -- 2 Related Work -- 3 SA-ZD Overview -- 4 Formulation of the Team Problem -- 4.1 Performance Evaluation -- 5 Numerical Results and Discussions -- 6 Conclusion and Perspectives -- References -- Grey Wolf Optimization Model for the Best Mean-Variance Based Stock Portfolio Selection -- 1 Introduction -- 2 Self-organizing Map -- 3 Grey Wolf Optimization Algorithm -- 4 Simulation(Numerical) Experiment -- 5 Conclusion and Main Results -- References -- Modelling and Performance Evaluation of IoT Network During the COVID-19 Pandemic -- 1 Introduction and Motivation -- 2 Model Scenario -- 3 Markov Model -- 4 Performance Evaluation -- 4.1 Performance Metrics of COVID-19 Network -- 4.2 Performance Metrics of Consumer Network -- 5 Numerical Results -- 6 Conclusion and Perspectives -- References -- Meta-heuristic Based Multi Objective Supply Chain Model for the Oil Industry in Conditions of Uncertainty -- 1 Introduction -- 2 Literature Review -- 3 Model Description -- 4 Proposed Mathematical Model -- 4.1 Sets -- 4.2 Parameter -- 4.3 Decision Variable -- 4.4 Constraint -- 5 Robust Model -- 6 Solution Method -- 7 Numerical Examples -- 7.1 The Results of the PSO Algorithm in Single-objective Mode In Normal and Robust Model -- 7.2 The Results of the MOPSO Algorithm in Multi-objective Mode in Normal and Robust Model -- 8 Conclusion -- References -- Effective Machine Learning Approaches for Credit Card Fraud Detection -- 1 Introduction -- 2 Explanation of the Dataset -- 3 Methodology -- 4 Different Classification Models for Credit Card Fraud Detection -- 4.1 Performance of RF Classifier -- 4.2 Performance of AdaBoost -- 4.3 Performance of CatBoost -- 5 Conclusion -- References. | |
| Scheduling Activities of Smart Phone and Smart Watch Based on Optimal Pattern Model (SA-OPM) -- 1 Introduction -- 2 Main Concept -- 2.1 Big Data Analysis (BDA) -- 2.2 Types of Sensors Related to Smart Phone and Smart Watch -- 2.3 Biometric Features -- 2.4 Deterministic Selection Algorithms -- 2.5 Optimization -- 2.6 Association Pattern -- 2.7 gSpan -- 3 Design (SA-OPM) Model -- 4 Experience and Results -- 5 Conclusion and Future Work -- References -- Literature Survey: Application of Machine Learning Techniques on Static Sign Language Recognition -- 1 Introduction -- 2 Literature Survey -- 2.1 Support Vector Machines (SVM) -- 2.2 Convolutional Neural Network (CNN) -- 3 Discussion -- 4 Conclusion -- References -- EECT: Energy Efficient Clustering Technique Using Node Probability in Ad-Hoc Network -- 1 Introduction -- 1.1 MANET -- 1.2 Energy Efficient Routing -- 1.3 Clustering -- 2 Literature Review -- 3 Proposed System -- 3.1 Methodology -- 3.2 Proposed Algorithm -- 4 Result Analysis -- 4.1 Packet Delivery Ratio -- 4.2 Energy Consumption -- 4.3 Network Throughput -- 5 Conclusion -- References -- A System to Detect the Faces in Unconstrained Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Learning -- 3.2 Cropping Face Region -- 4 Feature Extraction -- 4.1 Normalized Pixel Distinction Function -- 4.2 Histogram of Oriented Gradients (HOG) -- 5 Dimensionality Reduction -- 5.1 PCA -- 6 Experimentation -- 7 Conclusion -- References -- Machine Learning for Intrusion Detection: Design and Implementation of an IDS Based on Artificial Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Result and Discussion -- 5 Conclusion -- References -- Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge -- 1 Introduction -- 2 Optimized Link State Routing Protocol -- 2.1 OLSR Control Traffic. | |
| 2.2 Multi-Point Relays Selection -- 3 Wormhole Attacks in OLSR -- 4 Related Works -- 5 Wormhole Detection Algorithm -- 6 Simulation Model -- 7 Conclusion -- References -- Analysis of Socio-cognitive Skills Among 90's and 2k's Generations Using Machine Learning Techniques -- 1 Introduction -- 2 Materials and Methods -- 2.1 Design and Participants -- 2.2 Parameters Used for Prediction -- 2.3 Data Collection -- 2.4 Data Preprocessing -- 2.5 Naïve Bayes -- 3 Results and Discussion -- 3.1 Chi-Square Test -- 4 Conclusions -- References -- Particulate Matter Forecasting Using Neural Networks: A Case Study of Delhi -- 1 Introduction -- 2 Study Area -- 2.1 Selection of Hotspots -- 2.2 Datasets -- 3 Materials and Methods -- 3.1 Data Pre-processing -- 3.2 Data Normalization -- 3.3 Prediction of PM10 Concentration -- 3.4 Sensitivity Analysis -- 4 Results and Discussion -- 5 Conclusions -- References -- Security Challenges of Blockchain -- 1 Introduction -- 2 Overview of Blockchain Technology -- 2.1 Block Structure -- 2.2 Digital Signature -- 2.3 Consensus Protocol -- 3 From of Attacks on Blockchain and Mechanisms of Protection -- 3.1 51 Percent -- 3.2 Eclipse -- 3.3 Selfish Mining -- 3.4 Distributed Denial of Service -- 4 Privacy-Preserving Solutions for Blockchain -- 4.1 Mixing -- 4.2 Anonymous -- 5 Discussion and Conclusion -- References -- Blockchain Transforming Cyber-Attacks: Healthcare Industry -- 1 Introduction -- 2 Background of Study -- 2.1 Blockchain Innovation (Technology) -- 2.2 Blockchain Healthcare Application -- 3 Related Work/Literature Survey -- 4 Concept of Cyber-Attacks -- 4.1 Kinds of Cyber Security Threats -- 5 Discussion -- 6 Possible Use Cases on How Blockchain is Transforming Cyber-Attacks -- 7 Conclusion -- References -- Effectiveness of Ensemble Machine Learning Algorithms in Weather Forecasting of Bangladesh -- 1 Introduction. | |
| 2 Methodology. | |
| Sommario/riassunto: | This book highlights recent research on bio-inspired computing and its various innovative applications in information and communication technologies. It presents 51 high-quality papers from the 11th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2020) and 10th World Congress on Information and Communication Technologies (WICT 2020), which was held online during December 16–18, 2019. As a premier conference, IBICA–WICT brings together researchers, engineers and practitioners whose work involves bio-inspired computing, computational intelligence and their applications in information security, real-world contexts, etc. Including contributions by authors from 25 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering. |
| Titolo autorizzato: | Innovations in Bio-Inspired Computing and Applications ![]() |
| ISBN: | 3-030-73603-2 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910484122303321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |