Digital Transformation Technology: Proceedings of ITAF 2020
- Length: 603 pages
- Edition: 1
- Language: English
- Publisher: Springer
- Publication Date: 2021-08-24
- ISBN-10: 9811622744
- ISBN-13: 9789811622748
- Sales Rank: #0 (See Top 100 Books)
This book is a collection of best-selected research papers presented at the Second World Conference on Internet of Things: Applications & Future (ITAF 2020) organized by Global Knowledge Research Foundation during 16 – 17 December 2020. It includes innovative works from researchers, leading innovators, business executives and industry professionals to examine the latest advances and applications for commercial and industrial end users across sectors within the emerging Internet of things ecosphere. It shares state-of-the-art as well as emerging topics related to Internet of things such as big data research, emerging services and analytics, Internet of things (IoT) fundamentals, electronic computation and analysis, big data for multi-discipline services, security, privacy and trust, IoT technologies and open and cloud technologies.
Preface Contents Editors and Contributors Cloud-Securiy and DT Applications Gravitational Energy; Aerospace’s Future Technology 1 Introduction 2 Gravitons 3 Gravity 3.1 “Gravity Particles” Unite All of Physics 3.2 Gravity Control 3.3 Quantum Gravity 3.4 Quantum Computing in Cosmological Evolution 3.5 The Future of Zero-Gravity Living 4 Photons; Massive Gravity 5 Microgravity 5.1 Biological Science in Microgravity 6 Extra Dimensions, Gravitons, and Tiny Black Holes 7 Artificial Gravity 8 Hypergravity 9 Planets Motion; Graviton Mass Limitation 10 Space-Time Concepts 11 Warp Drive Real 12 Space Future (Vehicle Designs) 13 Teleportation 14 Conclusion References Entropy Detection-Based Spectrum Sensing in Frequency Domain Under Noise Uncertainty for Cognitive Radios Networks 1 Introduction 2 System Model 2.1 Binary Hypothesis Testing Problem 2.2 Noise Uncertainty Model 2.3 Entropy Detection in Time Domain 2.4 Entropy Detection in Frequency Domain 3 Simulation Results 3.1 Entropy Detection Without Noise Uncertainty Effect 3.2 Comparison Between Energy Detection and Entropy Detection With/without Noise Uncertainty Effect 4 Conclusion References Detecting Semantic Social Engineering Attack in the Context of Information Security 1 Introduction 2 Related Work 2.1 Admin Side 2.2 Client-Side Solutions 3 Proposed Method 3.1 Detecting DE Authentication/Disassociation Frames 3.2 Detection Algorithm and Pseudo Code for the Proposed Method 3.3 Flow Chart of the Proposed Method 4 Results 4.1 Lab Description 4.2 Design of the Proposed Detector 4.3 Proposed Detector Efficiency 4.4 Scenario A: Evaluation of the Proposed Detection Method for User Side 4.5 Scenario B: Evaluation of the Proposed Detection Method-Admin Side 4.6 Testing 4.7 Proposed Method Comparison with Another Method 5 Conclusion References IS Risks Governance for Cloud Computing Service 1 Introduction 2 Background 3 Related Work 3.1 Concerns in Cloud Computing 3.2 Risk Assessment and Governance in Cloud Computing 3.3 Current Challenges in Cloud Computing 4 Proposed Framework 5 Conclusion References Blockchain Technology in Cloud Computing: Challenges and Open Issues 1 Introduction and Literature Review 2 Background 2.1 What is the Cloud Computing? 2.2 What is Blockchain? 3 Research Method 3.1 Systematic Review Process 3.2 Selecting Criteria 4 Analysis of Recent Studies 4.1 Medical Data Sharing 4.2 Blockchain-Based Data Sharing (BBDS) Ecosystem 4.3 ProvChain 4.4 SUNFISH Project 4.5 Block with Holding Attack (BWH) 5 Conclusion References Micro-energy Systems (MESs); Modeling and Optimal Operating Based on NSGA-II 1 Introduction 2 Mathematical Formulation 2.1 Cost Minimization Formula 3 Proposed Algorithm 4 Application to Case Study 5 Results and Discussions 6 Conclusion References Hybrid Cryptography for Cloud Security: Methodologies and Designs 1 Introduction 2 Literature Survey 3 Methodology 4 Comparison Between Proposed Models 5 Conclusions References Big Data and AI in Digital Transformation A Study of Sentiment Analysis Approaches in Short Text 1 Introduction 2 Sentiment Analysis Approaches 2.1 Flat Sentiment Analysis Approaches 2.2 Hierarchical Sentiment Analysis Methods 3 Evaluation Methods of Generated Hierarchical Structure 4 Analysis and Discussion 5 Conclusion References Teleportation; Next Leap to Outer Space 1 Introduction 2 Human Consciousness Mapping 3 Human Consciousness Teleportation to an Android 4 Human Consciousness Teleportation to an Avatar 5 Teleportation Science 6 Teleportation Transport 7 Visionaries and Teleported Humans 8 Multi-verse Teleportation 9 Human Teleportation Challenges 10 Conclusion References Practical Comparison Between the LR(1) Bottom-Up and LL(1) Top-Down Methodology 1 Introduction 2 Theoretical Comparison Between LL(1) and LR(1) 3 Parsing Strings Using Parsers 3.1 The Criteria of Parsing Strings Using PSLL(1) and PSLR(1) 3.2 The LR(1) Grammars 3.3 The LL(1) Grammars 4 Parsing Strings Using PSLR(1) 4.1 The Data Structure of the PSLR(1) Program 4.2 The Main Function Code of PSLR(1) 4.3 The Subroutine Codes of PSLR(1) 4.4 Running PSLR(1) Program 5 Parsing Strings Using PSLL(1) 5.1 The Main Function Code of PSLL(1) 5.2 The Subroutine Functions Code 5.3 Running PSLL(1) Program 6 Practical Comparison Between the PSLR(1) and PSLL(1) 7 Conclusion References A Solution for Handling Big Data Heterogeneity Problem 1 Introduction 2 Proposed Solution 2.1 Proposed Framework 2.2 Proposed Algorithms 3 Results and Discussion 4 Conclusion References Recognizing Clothing Patterns and Colors for BVI People Using Different Techniques 1 Background of Study 2 Literature Review 2.1 Apparel 3 Proposed Method 3.1 Classifying User Type 3.2 The Methods 3.3 Color Detection and Feedback 4 Experimental Results and Discussion 5 Conclusion 6 Future Work References Fuzzy Logic in Control Theory 1 Introduction 2 Control Systems 3 Fuzzy Control 4 An Application: Fuzzy Control of a Central Heating Boiler 4.1 Triangular Fuzzy Numbers 4.2 Fuzzy Control of the Boiler 5 Conclusions References Text-to-Image Synthesis: A Comparative Study 1 Introduction 2 Text-to-Image Methodologies 2.1 Baseline Generation Method 2.2 Multistage Generation 2.3 Single Stream Generator and Multiple Discriminators 2.4 Bi-directional Generation Method 2.5 Layout Image in Generation Process 2.6 Human-Inspired Generation 2.7 Others 3 Conclusion and Future Work References COVID-19 Pandemic’s Impact on E-learning Platforms: A Survey 1 Introduction 1.1 COVID-19 Pandemic 1.2 Online Learning 2 Materials and Methods 2.1 Microsoft Teams and Google Classroom 2.2 Moodle 2.3 Advanced Concept and Comprehensive Functions 2.4 High Compatibility, Low Technical Threshold, Easy to Use 2.5 Open Source and Free 2.6 Challenges 3 Discussion 4 Conclusion and Future Work References Digital Transformation in Business A Comparative Analysis of Credit Card Fraud Detection Using Machine Learning and Deep Learning Techniques 1 Introduction 2 Background 2.1 Random Forest 2.2 K-Nearest Neighbor 2.3 Logistic Regression 2.4 Deep Neural Networks (DNN) 2.5 Convolutional Neural Networks (CNN) 2.6 Synthetic Minority Oversampling Technique (SMOTE) 3 Related Work 4 Proposed Framework 4.1 Data Preparation 4.2 Training Phase 4.3 Testing Phase 4.4 Scoring Phase 5 Dataset 6 Environment Setup 7 Evaluation Criteria 8 Experiment Results 9 Results Discussion 10 Conclusion References The Mediating Role of Customer Experience Management in the Relationship Between E-Commerce and Supply Chain Management Practices 1 Introduction 2 Literature Review 2.1 Supply Chain 2.2 Supply Chain Management 2.3 Supply Chain Management Practices 2.4 E-Commerce 2.5 Customer Experience 2.6 Definition of Customer Experience 2.7 Customer Experience Management 3 Through a Literature Review, Five Research Questions Were Identified 4 Research Methodology 5 Results and Findings 5.1 Data Testing 5.2 Descriptive Analysis 5.3 Normality Testing for the Research Variables 5.4 Testing Hypotheses 6 Conclusion References Agritech Startup Ecosystem in Ukraine: Ideas and Realization 1 Introduction 2 Theoretical Background 3 Materials and Methods 4 Research Results and Discussion 4.1 Role of the Agricultural Sector in the Economic Development of Ukraine 4.2 Kray Technologies 4.3 AGRIEYE 4.4 PreAgri.com 4.5 Tradomatic 4.6 BIOsens 4.7 New Ideas and Smart Technologies 4.8 SWOT Analysis on Agritech Startup Ecosystem of Ukraine 5 Conclusion References The Role of Digital Transformation in Enhancing Business Resilience with Pandemic of COVID-19 1 Introduction 2 Literature Review 3 Phases of Business Resilience 3.1 Response 3.2 Recovery 3.3 Rethink 3.4 Survive 3.5 Thrive 4 Business Resilience Dimensions 5 Digital Transformation and Improving Business Resilience 5.1 Robotic Process Automation (RPA) 5.2 Modern Business Models 5.3 Ecosystems 5.4 Cultural Change 6 Conclusion References Bankruptcy Prediction Using Artificial Intelligence Techniques: A Survey 1 Introduction 2 Intelligent Methodologies and Smart Tools for Bankruptcy Prediction 2.1 Multiple Discriminant Analysis (MDA) 2.2 Logistic Regression (LR) 2.3 Support Vector Machine (SVM) 2.4 Decision Tree (DT) 2.5 Random Forest (RF) 2.6 Naïve Base (NB) 2.7 Artificial Neural Network (ANN) 2.8 Ensemble Classifier 2.9 Genetic Algorithm (GA) 3 The Experimental Datasets Feature 4 Analysis of the Performance Metrics of Machine Leaning Techniques for Predicting Bankruptcy 5 A Study of Machine Learning Models for Bankruptcy Prediction 6 Conclusion and Future Work References A Proposed Framework to Apply Secured Mobile Banking in Egypt 1 Introduction 2 Mobile Banking 3 Previous Studies of Mobile Banking 4 Threat Analysis 5 Proposed Model of Mobile Banking 5.1 Traditional Mobile Banking Model 5.2 Enhanced Mobile Banking Model 5.3 Model Implementation and Security Techniques 5.4 Model Testing and Results Discussion 6 Conclusion and Future Directions 6.1 Conclusion 6.2 Future Directions References Modeling a Business Intelligent System for Managing Orders to Supplier in the Retail Chain with Unified Model Language 1 Introduction 2 Modeling as a Method for Improving Information Systems, Automating Commercial Activities 3 Creating a Model of a Business Intelligent System for Managing Orders to Suppliers Using the UML Standard 3.1 Conceptual Business Model 3.2 Business Case Diagrams 3.3 Class Diagram 3.4 Sequence Diagram 3.5 State Diagram 4 Conclusion and Future Work References Forecasting in Enterprise Resource Planning (ERP) Systems: A Survey 1 Introduction 2 Forecasting in ERP 3 Discussion and Comparison 4 Conclusion and Future work References Real-Time Machine Learning-Based Framework for the Analysis of Banking Financial Data 1 Introduction 2 Related Work 3 Proposed Model 3.1 Building Up a Real-Time Analytics Framework 3.2 Using the Model for Real-Time Analysis 3.3 Improving the Model Efficiency 4 Discussion 5 Conclusion and Future Work References E-Commerce in Ukraine: Place, Range of Problems, and Prospects of Development 1 Introduction 2 Literature Review 3 Methodology 4 Research Results and Discussion 5 Conclusions References AI and IoT in Healthcare Hybrid Rough-Genetic Classification Model for IoT Heart Disease Monitoring System 1 Introduction 1.1 Problem Statement 1.2 Internet of Things 1.3 Rough Set Theory 1.4 Support Vector Machine 1.5 Genetic Algorithm 2 Previous Work 3 Proposed Model 3.1 Data Collection 3.2 Data Pre-processing 3.3 Data Optimization 3.4 Data Classification 3.5 Knowledge Extraction 4 Experiment Design 4.1 Dataset Description 4.2 Results and Comparative Study 5 Conclusion and Future Work References Diagnosis and Detection of Liver Cirrhosis Based on Image Analysis 1 Introduction 2 Materials and Methods 2.1 Image Acquisition 2.2 Methodology 2.3 Classification of Tissues as Normal/Cirrhosis 3 Experimental Results and Discussion 4 Conclusion References Breast Cancer Classification in IoT Framework 1 Introduction 1.1 Breast Cancer (BC) 1.2 Support Vector Machine (SVM) 1.3 Back Propagation Neural Network (BPNN) 1.4 Internet of Things (IoT) 2 Previous Work 3 Proposed IoT Framework for Breast Cancer Classification Model 4 Experimental Results Analysis and Discussion 4.1 Breast Cancer Dataset 4.2 SVM Results 4.3 Artificial Neural Network Backpropagation (ANN-BP) Results 4.4 Comparative Study 5 Conclusion References Comparative Study of Machine Learning Models for Onset Sepsis Prediction 1 Introduction 2 Machine Learning Models for Sepsis Prediction 3 Conclusion and Future Work References A Systematic Literature Review of DNA-Based Steganography Techniques: Research Trends, Data Sets, Methods, and Frameworks 1 Introduction 2 Related Work 3 Comparative Study 4 Discussion 5 Proposed Approach 6 Conclusion and Future Work References Forecasting COVID-19 Pandemic Using Linear Regression Model 1 Introduction 2 Related Work 3 The Proposed Model 4 Experimental Results and Discussion 4.1 Analyzing Confirmed Cases of COVID-19 from John Hopkins Dataset 4.2 Analyzing Confirmed Cases of COVID-19 from European Union Open Dataset 4.3 Analyzing the Number of Deaths 5 Conclusion References Gulf Area COVID-19 Cases Prediction Using Deep Learning 1 Introduction 2 Background 2.1 Related Work 2.2 Long Short-Term Memory (LSTM) 2.3 Quality of Life 3 The Proposed Model 3.1 Data Preparation 3.2 The Proposed LSTM Model 4 Experimental Results 5 Conclusion and Future Work References Diagnosis of Alzheimer’s Disease: Methods and Challenges 1 Introduction 2 Deep Learning Methods 2.1 Convolutional Neural Network (CNN) 2.2 Autoencoder (AE) 3 Methodology 3.1 Database 3.2 Image Preprocessing 3.3 Training Autoencoder 4 Challenges 5 Conclusion and Future Work References Sepsis Prediction Model in the Intensive Care Unit (ICU) Using Support Vector Machine (SVM) 1 Introduction 2 Medical Aspects 2.1 Intensive Care Unit 2.2 Sepsis 3 Methods 3.1 Dataset 3.2 Proposed Model for Sepsis Prediction 4 Results and Discussion 5 Conclusions and Future Work References A Hybrid Mutual Information-LASSO-Genetic Algorithm Selection Approach for Classifying Breast Cancer 1 Introduction 2 Related Work 3 The Proposed Methodology 3.1 Normalization 3.2 Feature Selection 3.3 Evaluation 4 Experimental Results 5 Conclusion References Hybrid Model for Prediction of Treatment Response in Beta-thalassemia Patients with Hepatitis C Infection 1 Introduction 2 Related Works 3 Materials and Methods 3.1 Data Source 3.2 Study Variables 3.3 Data Preprocessing 4 Results 4.1 Support Vector Machine (SVM) 4.2 Artificial Neural Network Analysis 4.3 Naïve Bayes (NB) 4.4 The Conduction of Hybrid Model 5 Performance Comparison Results 6 Conclusion and Future Work References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.