Vai al contenuto principale della pagina

Complex, Intelligent and Software Intensive Systems : Proceedings of the 18th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2024) / / edited by Leonard Barolli



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Complex, Intelligent and Software Intensive Systems : Proceedings of the 18th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2024) / / edited by Leonard Barolli Visualizza cluster
Pubblicazione: Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Edizione: 1st ed. 2024.
Descrizione fisica: 1 online resource (537 pages)
Disciplina: 629.8
Soggetto topico: Computational intelligence
Engineering - Data processing
Dynamics
Nonlinear theories
Computational Intelligence
Data Engineering
Applied Dynamical Systems
Persona (resp. second.): BarolliLeonard
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Welcome Message of CISIS-2024 International Conference Organizers -- CISIS-2024 Organizing Committee -- CISIS-2024 Keynote Talks -- Integrating AI, Citizen-Science, Social-Media and Innovative Hardware Tech for Public Health -- Application of Artificial Intelligence and Internet of Things for Building Smart Services -- Contents -- A Systematic Review of the External Influence Factors in Multifactor Analysis and the Prediction of Carbon Credit Prices -- 1 Background and Motivation -- 2 Systematic Review Protocol -- 3 Result and Discussion -- 4 Conclusion and Future Work -- References -- Stock Market Prediction Using Social Media Sentiments -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Data Collection -- 3.2 Data Pre-processing -- 3.3 Sentiment Analysis -- 3.4 Stock Movement Prediction -- 4 Simulation Results -- 5 Conclusion -- References -- Investigation of Location Problem in Logistics Centers Using ADMM Algorithm -- 1 Introduction -- 2 Modeling -- 2.1 Problem Description -- 2.2 Model Assumptions -- 2.3 Model Building -- 3 Algorithm Solving -- 3.1 ADMM Algorithm -- 3.2 Calculation Steps -- 4 Numerical Experiments -- 4.1 Data Simulation -- 4.2 Experimental Results -- 5 Conclusion -- References -- Stock Price Prediction Based on FinBERT-LSTM Model -- 1 Introduction -- 1.1 Research Background -- 1.2 Research Status -- 1.3 Main Contributions -- 2 FinBERT-LSTM Model -- 2.1 FinBERT for Sentiment Analysis -- 2.2 LSTM for Time Series Prediction -- 3 Experimental Process -- 3.1 Experimental Data and Preprocessing -- 3.2 Fine-Tuning the FinBERT Model -- 3.3 Investor Sentiment Analysis -- 3.4 Stock Price Prediction -- 4 Experimental Results -- 4.1 Evaluating Metrics -- 4.2 Comparison of Results -- 5 Conclusion -- References.
Hyperparameter Tuning on Classical Machine Learning Models in Orthopedic Disease Prediction on Biomechanical Features -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Dataset -- 3.2 Algorithms for Classification -- 4 Experimental Results -- 4.1 The Performance with Logistic Regression -- 4.2 The Performance with KNN -- 4.3 Random Forest Classifier -- 4.4 The Performance with LightGBM -- 4.5 Comparison with Previous Studies -- 5 Conclusion -- References -- Interpreting Large-Scale Attacks Against Open-Source Medical Systems Using eXplainable AI -- 1 Introduction -- 2 Related Works -- 3 XGBoost Tree -- 4 SHAP Explainer -- 5 Experimental Evaluation -- 6 Conclusions and Future Work -- References -- Jupyter-Based Java Development Environment for Programming Education -- 1 Introduction -- 2 Related Work -- 2.1 Reasons for Using Jupyter in CS -- 2.2 Previous Research -- 3 System Design -- 3.1 Traditional X11 Server -- 3.2 System Overview -- 4 Evaluations -- 4.1 Reproducibility -- 4.2 Performance -- 5 Conclusions -- References -- A Customizable Intelligent System for Cervical Cytology Image Classifications -- 1 Introduction -- 2 Background Information and Related Works -- 2.1 Epithelial Cell Types Used in the Experiment -- 2.2 Machine Learning Shallow and Deep Models -- 3 The Proposed Method -- 4 Results -- 4.1 Data Sets Analysis -- 4.2 Performance Evaluation Metrics -- 5 Conclusions -- References -- Feature Selection Based on Ranking Metagenomic Relative Abundance for Inflammatory Bowel Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Data Description -- 3.2 Ranking Relative Abundance on Inflammatory Bowel Disease Datasets -- 3.3 Algorithms for Disease Classification -- 4 Experimental Results -- 4.1 The Number of Selected Features Affecting the Performance -- 4.2 Discussion -- 5 Conclusion -- References.
Child Abuse Behaviors Identification from Surveillance Videos -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Child Abuse Behaviors -- 3.2 Dataset -- 3.3 Building Child Abuse Behaviors Detection Model with YOLO -- 3.4 Evaluating Child Abuse Behaviors Detection Model -- 4 Experimental Results -- 4.1 Environmental Settings -- 4.2 Abuse Behavior Detection Using YOLOv5 and YOLOv8 -- 4.3 Abuse Behavior Detection Using Augmented Dataset -- 4.4 Discussion -- 5 Conclusion -- References -- A Fuzzy-Based System for Selection of Radio Access Technology in 5G Wireless Networks Considering RAT Load as a New Parameter -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Fuzzy Logic -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Assessment of WMN-CS Intelligent Simulation System for Uniform, Weibull and Chi-Square Distribution of Mesh Clients -- 1 Introduction -- 2 Related Work -- 3 Node Placement Problem in WMNs -- 4 Cuckoo Search Algorithm -- 4.1 Overview of Cuckoo Search -- 4.2 Lévy Flight -- 5 WMN-CS Simulation System -- 6 Simulation Results -- 7 Conclusions -- References -- Performance Evaluation of a Distracted Driving Detection System Considering Smoking Behavior -- 1 Introduction -- 2 Deep Neural Networks: An Overview -- 3 Intelligent Distracted Driving Detection System -- 3.1 System Model -- 3.2 Detection Targets and Classes -- 4 Evaluation Results -- 4.1 Hand Detection and Improving Detection Accuracy -- 4.2 Classification Accuracy for Different Batches -- 5 Conclusions -- References -- Trusted Computing in Advanced Cybersecurity Solutions -- 1 Introduction -- 2 Cognitive Inference for Trusted Computation -- 3 Trusted Computing Based on Feature Vectors -- 4 Trusted Computing in Data Sharing Protocols -- 5 Trusted Computing in Cloud-to-Things.
6 Security of Trusted Computing Protocols -- 7 Conclusions -- References -- DP-ACO: Differentially Private Average Consensus Optimization in Decentralized Learning -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 2 Our Proposed System for Differentially Private Average Consensus Optimization -- 3 Experiments -- 4 Conclusion -- References -- A Method for Job Management Using MPI Profiling Interface -- 1 Introduction -- 2 Problems of Job Schedulers and Their Case Study -- 2.1 Problems of Job Schedulers -- 2.2 Case Study of Gang Scheduling -- 3 The Approach Using MPI Profiling Interface -- 3.1 Overview of Our Approach -- 3.2 Monitor the Running Status of the Job -- 3.3 Obtain Properties of the Job -- 4 Architecture of Our System -- 4.1 Requirements of Our System -- 4.2 Notification of the Job Running Status -- 4.3 Notification of the Job Properties -- 4.4 Structure and Flow of Our System -- 5 Evaluation -- 5.1 Purpose of Evaluation -- 5.2 Method for Evaluation -- 5.3 Result of Evaluation -- 6 Conclusion -- References -- Early Design Mechanism for Upgrading Smart Contract Business Processes -- 1 Introduction -- 2 Related Work -- 3 Case Study: Telecom Service Center (TSC) -- 4 Research Methodology: An Early FT-Based Upgrade Design Mechanism for SC BP -- 4.1 BP Modeling -- 4.2 Deriving SC BP -- 4.3 Upgrading SC BP -- 5 Conclusion -- References -- Energy-Efficient Concurrency Control with Role and Purpose Concepts -- 1 Introduction -- 2 System Model -- 2.1 Transactions -- 2.2 Power Consumption and Computation Models of a Server -- 2.3 Significancy of Transactions -- 3 EESPO Scheduler -- 4 Evaluation -- 5 Concluding Remarks -- References -- An Architecture Proposal Using Hybrid Blockchain Applied for Supply Chain Tracking -- 1 Introduction -- 2 Work Motivation -- 3 Related Works -- 3.1 Discussion -- 4 Proposed Architecture.
4.1 Data Representation and Storage -- 4.2 Proposed Architecture -- 5 Architecture Implementation -- 5.1 Typical Use Case -- 6 Results -- 6.1 Test Case 1 - Evaluation of Response Time for Data Storage -- 6.2 Test Case 2 - Evaluation of Response Time for Data Insertion in the Hybrid Database Layer -- 6.3 Test Case 3: Performance Evaluation of the Insertion Queue for Hyperledger Fabric -- 6.4 Transparency and Security Overview -- 7 Conclusion -- References -- New Convergence Analysis of the BEER Algorithm in Decentralized Nonconvex Optimization -- 1 Introduction -- 2 Preliminaries and Assumptions -- 3 The BEER Algorithm -- 4 New Convergence Theorem for BEER -- 5 Conclusion -- References -- Fog Node Selection Algorithm in Information Flow Control -- 1 Introduction -- 2 System Model -- 2.1 CBAC Model -- 2.2 Component Degree -- 3 Information Flow Relations -- 4 Information Flow Control -- 5 Evaluation -- 6 Concluding Remarks -- References -- Implementing Deep Reinforcement Learning Algorithms on the Tennis Environment -- 1 Introduction -- 2 Literature Review -- 3 Deep RL Algorithms -- 3.1 Deep Q-Learning (DQN) -- 3.2 Cross Entropy -- 3.3 Deep Deterministic Policy Gradient -- 4 Simulation and Results -- 4.1 Implementing DQN -- 4.2 Implementing Cross Entropy -- 4.3 Implementing DDPG -- 5 Conclusion -- References -- A Survey on Cooperative Intelligent Transportation Systems (C-ITS): Opportunities and Challenges -- 1 Introduction -- 2 Challenges and Solutions -- 2.1 Wireless Communication -- 2.2 Data Privacy and Cybersecurity -- 2.3 Interoperability and Standardization -- 2.4 Public Acceptance and User Adoption -- 2.5 Sustainability and Safety -- 3 Conclusion -- References -- Conceptualizing a Digital Twin Architecture for Enhanced Control in Precast Concrete Production -- 1 Introduction -- 1.1 Digital Twins: Concept and Application -- 2 Literature Review.
3 Precast Concrete Process.
Sommario/riassunto: Software Intensive Systems are systems, which heavily interact with other systems, sensors, actuators, devices, other software systems and users. More and more domains are involved with software intensive systems, e.g. automotive, telecommunication systems, embedded systems in general, industrial automation systems and business applications. Moreover, the outcome of web services delivers a new platform for enabling software intensive systems. Complex Systems research is focused on the overall understanding of systems rather than its components. Complex Systems are very much characterized by the changing environments in which they act by their multiple internal and external interactions. They evolve and adapt through internal and external dynamic interactions. The development of Intelligent Systems and agents, which is each time more characterized by the use of ontologies and their logical foundations build a fruitful impulse for both Software Intensive Systems and Complex Systems. Recent research in the field of intelligent systems, robotics, neuroscience, artificial intelligence, and cognitive sciences are very important factor for the future development and innovation of software intensive and complex systems. The aim of the volume “Complex, Intelligent and Software Intensive Systems” is to deliver a platform of scientific interaction between the three interwoven challenging areas of research and development of future ICT-enabled applications: Software Intensive Systems, Complex systems and Intelligent Systems.
Titolo autorizzato: Complex, Intelligent, and Software Intensive Systems  Visualizza cluster
ISBN: 3-031-70011-2
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910886994303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes on Data Engineering and Communications Technologies, . 2367-4520 ; ; 87