ISBN-13: 9781119798767 / Angielski / Twarda / 2022 / 500 str.
ISBN-13: 9781119798767 / Angielski / Twarda / 2022 / 500 str.
List of Contributors xvPreface xixProfile of Editors xxviiAcknowledgments xxx1 Dynamic Key-based Biometric End-User Authentication Proposal for IoT in Industry 4.0 1Subhash Mondal, Swapnoj Banerjee, Soumodipto Halder, and Diganta Sengupta1.1 Introduction 11.2 Literature Review 21.3 Proposed Framework 51.3.1 Enrolment Phase 51.3.2 Authentication Phase 71.3.2.1 Pre-processing 71.3.2.2 Minutiae Extraction and False Minutiae Removal 121.3.2.3 Key Generation from extracted Minutiae points 131.3.2.4 Encrypting the Biometric Fingerprint Image Using AES 141.4 Comparative Analysis 181.5 Conclusion 19References 192 Decision Support Methodology for Scheduling Orders in Additive Manufacturing 25Juan Jesús Tello Rodríguez and Lopez-I Fernando2.1 Introduction 252.2 The Additive Manufacturing Process 262.3 Some Background 282.4 Proposed Approach 302.4.1 A Mathematical Model for the Initial Printing Scheduling 322.4.1.1 Considerations 322.4.1.2 Sets 322.4.2 Parameters 332.4.2.1 Orders 332.4.2.2 Parts 332.4.2.3 Printing Machines 332.4.2.4 Process 332.4.3 Decision Variables 332.4.4 Optimization Criteria 332.4.5 Constrains 342.5 Results 352.5.1 Orders 352.6 Conclusions 39References 393 Significance of Consuming 5G-Built Artificial Intelligence in Smart Cities 43Y. Bevish Jinila, Cinthia Joy, J. Joshua Thomas, and S. Prayla Shyry3.1 Introduction 433.2 Background and RelatedWork 473.3 Challenges in Smart Cities 493.3.1 Data Acquisition 493.3.2 Data Analysis 503.3.3 Data Security and Privacy 503.3.4 Data Dissemination 503.4 Need for AI and Data Analytics 503.5 Applications of AI in Smart Cities 513.5.1 Road Condition Monitoring 513.5.2 Driver Behavior Monitoring 523.5.3 AI-Enabled Automatic Parking 533.5.4 Waste Management 533.5.5 Smart Governance 533.5.6 Smart Healthcare 543.5.7 Smart Grid 543.5.8 Smart Agriculture 553.6 AI-based Modeling for Smart Cities 553.6.1 Smart Cities Deployment Model 553.6.2 AI-Based Predictive Analytics 573.6.3 Pre-processing 583.6.4 Feature Selection 583.6.5 Artificial Intelligence Model 583.7 Conclusion 60References 604 Neural Network Approach to Segmentation of Economic Infrastructure Objects on High-Resolution Satellite Images 63Vladimir A. Kozub, Alexander B. Murynin, Igor S. Litvinchev, Ivan A. Matveev, and Pandian Vasant4.1 Introduction 634.2 Methodology for Constructing a Digital Terrain Model 644.3 Image Segmentation Problem 654.4 Segmentation Quality Assessment 674.5 Existing Segmentation Methods and Algorithms 684.6 Classical Methods 694.7 Neural Network Methods 724.7.1 Semantic Segmentation of Objects in Satellite Images 744.8 Segmentation with Neural Networks 764.9 Convolutional Neural Networks 794.10 Batch Normalization 834.11 Residual Blocks 844.12 Training of Neural Networks 854.13 Loss Functions 854.14 Optimization 864.15 Numerical Experiments 884.16 Description of the Training Set 884.17 Class Analysis 904.18 Augmentation 904.19 NN Architecture 924.20 Training and Results 934.21 Conclusion 97Acknowledgments 97References 975 The Impact of Data Security on the Internet of Things 101Joshua E. Chukwuere and Boitumelo Molefe5.1 Introduction 1015.2 Background of the Study 1025.3 Problem Statement 1035.4 Research Questions 1035.5 Literature Review 1035.5.1 The Data Security on IoT 1035.5.2 The Security Threats and Awareness of Data Security on IoT 1055.5.3 The DifferentWays to Assist with Keeping Your IoT Device Safer from Security Threats 1055.6 Research Methodology 1065.6.1 Population and Sampling 1065.6.2 Data Collection 1075.6.3 Reliability and Validity 1085.7 Chapter Results and Discussions 1085.7.1 The Demographic Information 1095.7.1.1 Age, Ethnic Group, and Ownership of a Smart Device 1095.7.2 Awareness of Users About Data Security of the Internet of Things 1095.7.3 The Security Threats that are Affecting the Internet of Things Devices 1115.7.3.1 The Architecture of IoT Devices 1125.7.3.2 The botnets Attack 1125.7.4 The Effects of Security Threats on IoT Devices that are Affecting Users 1125.7.4.1 The Slowness or Malfunctioning of the IoT Device 1125.7.4.2 The Trust of Users on IoT 1135.7.4.3 The Safety of Users 1135.7.4.4 The Guaranteed Duration of IoT Devices 1145.7.5 DifferentWays to Assist with Keeping IoT Smart Devices Safer from Security Threats 1145.7.5.1 The Change Default Passwords 1145.7.5.2 The Easy or Common Passwords 1145.7.5.3 On the Importance of Reading Privacy Policies 1145.7.5.4 The Bluetooth and Wi-Fi of IoT Devices 1155.7.5.5 The VPN on IoT 1155.7.5.6 The Physical Restriction 1155.7.5.7 Two-Factor Authentication 1165.7.5.8 The Biometric Authentication 1165.8 Answers to the Chapter Questions 1165.8.1 Objective 1: Awareness on Users About Data Security of Internet of Things (IoT) 1165.8.2 Objective 2: Determine the Security Threats that are Involved in the Internet of Things (IoT) 1175.8.3 Objective 3: The Effects of Security Threats on IoT Devices that are Affecting Users 1175.8.4 Objective 4: DifferentWays to Assist with Keeping IoT Devices Safer from Security Threats 1175.8.5 Other Descriptive Analysis (Mean) 1185.8.5.1 Mean 1 - Awareness on Users About Data Security on IoT 1185.8.5.2 The Effects of Security Threats on IoT Devices that are Affecting Users 1185.8.5.3 DifferentWays to Assist with Keeping an IoT Device Safer 1225.9 Chapter Recommendations 1225.10 Conclusion 122References 1246 Sustainable Renewable Energy and Waste Management on Weathering Corporate Pollution 129Choo K. Chin and Deng H. Xiang6.1 Introduction 1296.2 Literature Review 1316.2.1 Energy Efficiency 1356.2.2 Waste Minimization 1366.2.3 Water Consumption 1376.2.4 Eco-Procurement 1376.2.5 Communication 1386.2.6 Awareness 1386.2.7 Sustainable and Renewable Energy Development 1386.3 Conceptual Framework 1396.4 Conclusion 1396.4.1 Energy Efficiency 1406.4.2 Waste Minimization 1406.4.3 Water Consumption 1406.4.4 Eco-Procurement 1416.4.5 Communication 1416.4.6 Sustainable and Renewable Energy Development 141Acknowledgment 142References 1427 Adam Adaptive Optimization Method for Neural Network Models Regression in Image Recognition Tasks 147Denis Y. Nartsev, Alexander N. Gneushev, and Ivan A. Matveev7.1 Introduction 1477.2 Problem Statement 1497.3 Modifications of the Adam Optimization Method for Training a Regression Model 1517.4 Computational Experiments 1557.4.1 Model for Evaluating the Eye Image Blurring Degree 1557.4.2 Facial Rotation Angle Estimation Model 1587.5 Conclusion 160Acknowledgments 161References 1618 Application of Integer Programming in Allocating Energy Resources in Rural Africa 165Elias Munapo8.1 Introduction 1658.1.1 Applications of the QAP 1658.2 Quadratic Assignment Problem Formulation 1668.2.1 Koopmans-Beckmann Formulation 1668.3 Current Linearization Technique 1678.3.1 The General Quadratic Binary Problem 1678.3.2 Linearizing the Quadratic Binary Problem 1698.3.2.1 Variable Substitution 1698.3.2.2 Justification 1698.3.3 Number of Variables and Constraints in the Linearized Model 1708.3.4 Linearized Quadratic Binary Problem 1718.3.5 Reducing the Number of Extra Constraints in the Linear Model 1718.3.6 The General Binary Linear (BLP) Model 1718.3.6.1 Convex Quadratic Programming Model 1728.3.6.2 Transforming Binary Linear Programming (BLP) Into a Convex/Concave Quadratic Programming Problem 1728.3.6.3 Equivalence 1738.4 Algorithm 1748.4.1 Making the Model Linear 1758.5 Conclusions 176References 1769 Feasibility of Drones as the Next Step in Innovative Solution for Emerging Society 179Sadia S. Ali, Rajbir Kaur, and Haidar Abbas9.1 Introduction 1799.1.1 Technology and Business 1819.1.2 Technological Revolution of the Twenty-first Century 1819.2 An Overview of Drone Technology and Its Future Prospects in Indian Market 1829.2.1 Utilities 1839.2.1.1 Delivery 1839.2.1.2 Media/Photography 1839.2.1.3 Agriculture 1849.2.1.4 Contingency and Disaster Management Scenarios 1849.2.1.5 Civil and Military Services: Search and Rescue, Surveillance,Weather, and Traffic Monitoring, Firefighting 1859.2.2 Complexities Involved 1859.2.3 Drones in Indian Business Scenario 1869.3 Literature Review 1879.3.1 Absorption and Diffusion of New Technology 1889.3.2 Leadership for Innovation 1889.3.3 Social and Economic Environment 1899.3.4 Customer Perceptions 1909.3.5 Alliances with Other National and International Organizations 1909.3.6 Other Influencers 1919.4 Methodology 1919.5 Discussion 1939.5.1 Market Module 1959.5.2 Technology Module 1969.5.3 Commercial Module 1989.6 Conclusions 199References 20010 Designing a Distribution Network for a Soda Company: Formulation and Efficient Solution Procedure 209Isidro Soria-Arguello, Rafael Torres-Esobar, and Pandian Vasant10.1 Introduction 20910.2 New Distribution System 21110.3 The Mathematical Model to Design the Distribution Network 21410.4 Solution Technique 21610.4.1 Lagrangian Relaxation 21610.4.2 Methods for Finding the Value of Lagrange Multipliers 21610.4.3 Selecting the Solution Method 21610.4.4 Used Notation 21710.4.5 Proposed Relaxations of the Distribution Model 21810.4.5.1 Relaxation 1 21810.4.5.2 Relaxation 2 21910.4.6 Selection of the Best Lagrangian Relaxation 21910.5 Heuristic Algorithm to Restore Feasibility 22010.6 Numerical Analysis 22210.6.1 Scenario 2020 22310.6.2 Scenario 2021 22410.6.3 Scenario 2022 22510.6.4 Scenario 2023 22610.7 Conclusions 228References 22811 Machine Learning and MCDM Approach to Characterize Student Attrition in Higher Education 231Arrieta-M Luisa F and Lopez-I Fernando11.1 Introduction 23111.1.1 Background 23211.2 Proposed Approach 23311.3 Case Study 23411.3.1 Intelligent Phase 23411.3.2 Design Phase 23511.3.3 Choice Phase 23611.4 Results 23811.5 Conclusion 240References 24012 A Concise Review on Recent Optimization and Deep Learning Applications in Blockchain Technology 243Timothy Ganesan, Irraivan Elamvazuthi, Pandian Vasant, and J. Joshua Thomas12.1 Background 24312.2 Computational Optimization Frameworks 24612.3 Internet of Things (IoT) Systems 24812.4 Smart Grids Data Systems 25012.5 Supply Chain Management 25212.6 Healthcare Data Management Systems 25512.7 Outlook 257References 25813 Inventory Routing Problem with Fuzzy Demand and Deliveries with Priority 267Paulina A. Avila-Torres and Nancy M. Arratia-Martinez13.1 Introduction 26713.2 Problem Description 27013.3 Mathematical Formulation 27313.4 Computational Experiments 27513.4.1 Numerical Example 27613.4.1.1 The Inventory Routing Problem Under Certainty 27913.4.1.2 The Inventory Routing Problem Under Uncertainty in the Consumption Rate of Product 27913.5 Conclusions and FutureWork 280References 28114 Comparison of Defuzzification Methods for Project Selection 283Nancy M. Arratia-Martinez, Paulina A. Avila-Torres, and Lopez-I Fernando14.1 Introduction 28314.2 Problem Description 28614.3 Mathematical Model 28614.3.1 Sets and Parameters 28714.3.2 Decision Variables 28714.3.3 Objective Functions 28714.4 Constraints 28814.5 Methods of Defuzzification and Solution Algorithm 28914.5.1 k-Preference Method 28914.5.2 Integral Value 29114.5.3 SAUGMECON Algorithm 29114.6 Results 29214.6.1 Results of k-Preference Method 29214.6.2 Results of Integral Value Method 29514.7 Conclusions 299References 30015 Re-Identification-Based Models for Multiple Object Tracking 303Alexey D. Grigorev, Alexander N. Gneushev, and Igor S. Litvinchev15.1 Introduction 30315.2 Multiple Object Tracking Problem 30515.3 Decomposition of Tracking into Filtering and Assignment Tasks 30615.4 Cost Matrix Adjustment in Assignment Problem Based on Re-Identification with Pre-Filtering of Descriptors by Quality 31015.5 Computational Experiments 31315.6 Conclusion 315Acknowledgments 315References 316Index 319
PANDIAN VASANT is Research Associate at MERLIN Research Centre, TDTU, HCMC, Vietnam, and Editor in Chief of International Journal of Energy Optimization and Engineering (IJEOE). He holds PhD in Computational Intelligence (UNEM, Costa Rica), MSc (University Malaysia Sabah, Malaysia, Engineering Mathematics) and BSc (Hons, Second Class Upper) in Mathematics (University of Malaya, Malaysia). He has co-authored research articles in journals, conference proceedings, presentations, special issues Guest Editor, chapters and General Chair of EAI International Conference on Computer Science and Engineering in Penang, Malaysia (2016) and Bangkok, Thailand (2018).ELIAS MUNAPO, PhD, currently heads the Department of Business Statistics and Operations research at North West University-Mafikeng, South Africa. He has published 50+ articles and contributed to five chapters on industrial engineering and management texts.J. JOSHUA THOMAS is an Associate Professor at UOW Malaysia KDU Penang University College. He obtained his PhD (Intelligent Systems Techniques) from University Sains Malaysia, Penang and master's degree from Madurai Kamaraj University, India. He is working with Deep Learning algorithms, specially targeting on Graph Convolutional Neural Networks (GCNN) and Bi-directional Recurrent Neural Networks (RNN) for drug target interaction and image tagging with embedded natural language processing. His work involves experimental research with software prototypes and mathematical modelling and design.GERHARD-WILLIAM WEBER, PhD, is Professor and Chair of Marketing and Economic Engineering at Poznan University of Technology, Poland. He is also an Adjunct Professor at Department of Industrial and Systems Engineering, College of Engineering at Istinye University, Istanbul, Turkey.
1997-2024 DolnySlask.com Agencja Internetowa