New Trends in Information and Communications Technology Applications 4th International Conference, NTICT 2020, Baghdad, Iraq, June 15, 2020, Proceedings

This book constitutes refereed proceedings of the 4th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2020, held on June 15, 2020. The NTICT conference was planned to take place in Baghdad on March 11-12, 2019, but due to the COVID-19 pandemic...

Full description

Saved in:
Bibliographic Details
Main Authors Al-Bakry, Abbas M, Al-Mamory, Safaa O, Sahib, Mouayad A, Hasan, Haitham S, Oreku, George S, Nayl, Thaker M, Al-Dhaibani, Jaafar A
Format eBook
LanguageEnglish
Published Netherlands Springer Nature 2020
Springer International Publishing AG
Springer
Edition1
SeriesCommunications in computer and information science
Subjects
Online AccessGet full text
ISBN9783030553401
303055340X
3030553396
9783030553395

Cover

Table of Contents:
  • Intro -- Preface -- Organization -- Contents -- I Computer Networks -- Latency Evaluation of an SDN Controlled by Flowvisor and Two Heterogeneous Controllers -- 1 Introduction -- 2 Flowvisor -- 3 Methodology -- 3.1 Slicing Based on Topology -- 3.2 Choosing Suitable Controller Based on Bandwidth -- 4 Results and Discussions -- 4.1 Topology Effect Results -- 4.2 Bandwidth Effect Results -- 5 Conclusions -- References -- Brain Computer Interface Enhancement Based on Stones Blind Source Separation and Naive Bayes Classifier -- 1 Introduction -- 2 Blind Source Separation (BSS) -- 3 The Proposed Classification System -- 3.1 Dataset -- 3.2 Processing and Proposed Algorithms -- 4 Experimental Results -- 5 Conclusions -- References -- Policing Based Traffic Engineering Fast ReRoute in SD-WAN Architectures: Approach Development and Investigation -- 1 Introduction -- 2 Overview of Solutions on Fast ReRoute with Load Balancing in Software-Defined Wide Area Networks -- 3 Flow-Based Model of Traffic Engineering Fast ReRoute with Support of Policing -- 4 Conditions of Link, Node, and Bandwidth Protection in Traffic Engineering Fast ReRoute with Support of Policing -- 5 Numerical Example -- 6 Conclusion -- References -- Performance Comparison Between Traditional Network and Broadcast Cognitive Radio Networks Using Idle Probability -- 1 Introduction -- 1.1 Cognitive Radio -- 1.2 Broadcast Channel -- 2 System Paradigm -- 3 Dissection of System Model Using Probability of Success -- 4 Simulation Results -- 5 Performance Evaluation for Shortest Path Tree (SPT) -- 5.1 Performance Evaluation of Multicast CRN Under the Effect of Channel Bandwidth -- 5.2 Performance Evaluation of CRN Under the Effect of Packet Size D -- 5.3 Performance Evaluation of Multicast CRN Under the Effect of Transmission Power
  • 4 The Results and Discussion -- 5 Conclusions -- References -- Author Index
  • 5.4 Performance Evaluation of Multicast CRN Under the Effect of Idle Probability -- 6 Conclusion -- References -- A Developed Cloud Security Cryptosystem Using Minhash Technique -- 1 Introduction -- 2 Related Works -- 3 Cloud Security -- 4 Hybrid Encryption Algorithms -- 5 The Proposed Cloud-Based Cryptosystem -- 5.1 Key Generated Proposed Phase: Minhash Technique -- 5.2 The Hybrid Encryption Phase -- 5.3 The Key Management Phase -- 5.4 Integrating the Proposed Cryptosystem with the Cloud Phase -- 5.5 The Hybrid Decryption Phase -- 5.6 Evaluation Phase -- 6 Conclusion -- References -- I Machine Learning Approaches -- Digitally Modulated Signal Recognition Based on Feature Extraction Optimization and Random Forest Classifier -- 1 Introduction -- 2 Feature Extraction -- 2.1 Chicken Swarm Algorithm -- 2.2 Bat Swarm Algorithm -- 3 Classifier -- 3.1 Random Forest -- 4 Proposed System -- 5 Experimental Result -- 6 Conclusion -- References -- Churners Prediction Using Relational Classifier Based on Mining the Social Network Connection Structure -- 1 Introduction -- 2 Related Works -- 3 The Proposed Churn Prediction Methodology -- 3.1 Mobile Call/Message Graph -- 3.2 Community Detection Using Non-negative Matrix Factorization (NMF) -- 3.3 Quantification of Tie Strength -- 3.4 Influence Propagation Model -- 4 Experimental Analysis and Results -- 4.1 F-Score -- 4.2 The Area Under Receiver Operating (AUC) -- 4.3 Lift Curve -- 4.4 Receiver Operating Characteristic Curve (ROC) -- 4.5 Kolmogorov-Smirnoff Statistic (KS) -- 4.6 Accuracy -- 4.7 Cost -- 4.8 Gini Coefficient -- 4.9 H-measure -- 5 Conclusion -- References -- The Impact of Rule Evaluation Metrics as a Conflict Resolution Strategy -- 1 Introduction -- 2 Background -- 2.1 Rule-Based Classifiers (RBC) -- 2.2 Motivation -- 2.3 Related Work -- 3 Rule Evaluation Metrics -- 3.1 Empirical Evaluation Metrics
  • 3.2 Statistical Evaluation Metrics -- 4 Rules Construction -- 4.1 Rule Construction Approaches -- 4.2 Naïve Bayes Classifier -- 4.3 Decision Tree J48 Classifier -- 5 Methodology -- 6 Experiments and Results -- 6.1 Experiments -- 6.2 Results -- 7 Conclusion -- References -- Parallel Genetic Algorithm for Optimizing Compiler Sequences Ordering -- 1 Introduction -- 2 Related Work -- 3 Feature Extraction Using Performance Counter -- 4 Proposed Method -- 5 Experiments -- 5.1 The Experimental Setup -- 5.2 Experimental Results -- 6 Conclusion -- References -- Using Machine Learning to Predict the Sequences of Optimization Passes -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Features Extraction Using Instruction Count -- 3.2 Build a Prediction Scheme -- 3.3 Interaction Between Optimization Passes -- 4 Experimental Results -- 5 Conclusion -- References -- A Proposed Method for Feature Extraction to Enhance Classification Algorithms Performance -- 1 Introduction -- 2 Related Works -- 3 The Proposed System -- 4 Experimental Results -- 5 Conclusions -- References -- Heart Disease Prediction System Using Optimization Techniques -- 1 Introduction -- 2 Related Work -- 3 Dataset and Metholodgy -- 3.1 Dataset -- 3.2 Mutual Information (MI) -- 3.3 Naïve Bayes -- 3.4 Logestic Regression -- 3.5 Particle Swarm Optimization (PSO) -- 3.6 Binary Particle Swarm Optimization (BPSO) -- 4 Proposed Method -- 5 Experimental Result -- 5.1 Evaluation Criteria -- 5.2 Results -- 6 Conclusion -- References -- Optimizing Energy in Cooperative Sensing Cognitive Radios -- 1 Introduction -- 2 System Model -- 2.1 Theoretical Background -- 2.2 Optimization Model -- 2.3 Simulation -- 3 Results and Discussion -- 4 Conclusion -- References -- Real-Time Sickle Cell Anemia Diagnosis Based Hardware Accelerator -- 1 Introduction -- 2 Literature Review -- 3 Methodology
  • 3.1 Data-Set -- 3.2 Augmentation Process for Training Patches -- 3.3 Principles of Convolutional Neural Networks (CNNs) -- 3.4 The Proposed Model Architecture -- 4 Hardware Implementation -- 5 Results and Discussions -- 6 Conclusion -- References -- Energy-Efficient Particle Swarm Optimization for Lifetime Coverage Prolongation in Wireless Sensor Networks -- 1 Introduction -- 2 Related Literature -- 3 Background -- 3.1 The Coverage Problem in WSNs -- 3.2 Binary Particle Swarm Optimization -- 3.3 Network Model -- 4 Coverage Problem Formulation -- 5 Distributed BPSO Algorithm for Energy-Efficient Area Coverage -- 5.1 Discovery Phase -- 5.2 Working Phase -- 6 Performance Evaluation and Analysis -- 6.1 Coverage Ratio -- 6.2 Active Sensors Ratio -- 6.3 Energy Consumption -- 6.4 Network Lifetime -- 7 Conclusions and Future Works -- References -- Iris Recognition Using Localized Zernike Features with Partial Iris Pattern -- 1 Introduction -- 2 Related Work -- 3 The Proposed System -- 3.1 Iris and Pupil Localization -- 3.2 The Partial Iris Pattern -- 3.3 Zernike Moments -- 4 Experimental Results -- 5 Conclusion -- References -- Analysis of Hollywood's Film Production Using Background Subtraction Visual Activity Index Based on Computer Vision Algorithm -- 1 Introduction -- 2 Measurement of Visual Activity -- 2.1 Measuring Shot Length -- 2.2 Visual Activity Index -- 3 Influence of Visual Activity -- 3.1 Influence of Shot Change -- 3.2 Impact of Changing ASL Values -- 3.3 Influence of Different VAI Values -- 4 More Robust Measure of Visual Activity - BGSVAI -- 5 Analysis of Hollywood's Film Production -- 6 Discussion and Conclusion -- References -- Breast Cancer Recognition by Computer Aided Based on Improved Fuzzy c-Mean and ANN -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 DWT Technique -- 3.2 PCA Technique -- 3.3 Proposed Method