ebook img

16th International Conference on Information Technology-New Generations (ITNG 2019) PDF

611 Pages·2019·22.874 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview 16th International Conference on Information Technology-New Generations (ITNG 2019)

Advances in Intelligent Systems and Computing 800 Shahram Latifi Editor 16th International Conference on Information Technology-New Generations (ITNG 2019) Advances in Intelligent Systems and Computing Volume 800 Serieseditors JanuszKacprzyk,SystemsResearchInstitute,PolishAcademyofSciences,Warsaw,Poland e-mail:[email protected] Theseries“AdvancesinIntelligentSystemsandComputing”containspublicationsontheory, applications,anddesignmethodsofIntelligentSystemsandIntelligentComputing.Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolu- tionarycomputingandthefusionoftheseparadigms,socialintelligence,ambientintelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems,PerceptionandVision,DNAandimmunebasedsystems,self-organizingandadaptive systems, e-Learning and teaching, human-centered and human-centric computing, recom- mender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis,knowledgemanagement,intelligentagents,intelligentdecisionmakingandsupport, intelligentnetworksecurity,trustmanagement,interactiveentertainment,Webintelligenceand multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedingsofimportantconferences,symposiaandcongresses.Theycoversignificantrecent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. Thispermitsarapidandbroaddisseminationofresearchresults. **Indexing:ThebooksofthisseriesaresubmittedtoISIProceedings,EI-Compendex, DBLP,SCOPUS,GoogleScholarandSpringerlink** AdvisoryBoard Chairman NikhilR.Pal,IndianStatisticalInstitute,Kolkata,India e-mail:[email protected] Members RafaelBelloPerez,FacultyofMathematics,PhysicsandComputing,UniversidadCentraldeLasVillas, SantaClara,Cuba e-mail:[email protected] EmilioS.Corchado,UniversityofSalamanca,Salamanca,Spain [email protected] HaniHagras,SchoolofComputerScience&ElectronicEngineering,UniversityofEssex,Colchester, UK e-mail:[email protected] László T. Kóczy, Department of Information Technology, Faculty of Engineering Sciences, Gyo˝r, Hungary e-mail:[email protected] VladikKreinovich,DepartmentofComputerScience,UniversityofTexasatElPaso,ElPaso,TX,USA e-mail:[email protected] Chin-TengLin,DepartmentofElectricalEngineering,NationalChiaoTungUniversity,Hsinchu,Taiwan e-mail:[email protected] JieLu,FacultyofEngineeringandInformationTechnology,UniversityofTechnologySydney,Sydney, NSW,Australia e-mail:[email protected] PatriciaMelin,GraduateProgramofComputerScience,TijuanaInstituteofTechnology,Tijuana,Mexico e-mail:[email protected] Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil e-mail:[email protected] Ngoc Thanh Nguyen, Faculty of Computer Science and Management, Wrocław University of Technology,Wrocław,Poland e-mail:[email protected] Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong,Shatin,HongKong e-mail:[email protected] Moreinformationaboutthisseriesathttp://www.springer.com/series/11156 Shahram Latifi Editor 16th International Conference on Information Technology-New Generations (ITNG 2019) 123 Editor ShahramLatifi DepartmentofElectricalandComputerEngineering UniversityofNevada LasVegas,NV,USA ISSN2194-5357 ISSN2194-5365 (electronic) AdvancesinIntelligentSystemsandComputing ISBN978-3-030-14069-4 ISBN978-3-030-14070-0 (eBook) https://doi.org/10.1007/978-3-030-14070-0 ©SpringerNatureSwitzerlandAG2019 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,broadcasting,reproduction onmicrofilmsorinanyotherphysicalway,andtransmissionorinformationstorageandretrieval,electronicadaptation, computersoftware,orbysimilarordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublicationdoesnot imply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelawsand regulationsandthereforefreeforgeneraluse. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditorsgive awarranty,expressorimplied,withrespecttothematerialcontainedhereinorforanyerrorsoromissionsthatmay havebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsinpublishedmapsandinstitutional affiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG. Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Contents PartI Cybersecurity 1 FastModularSquaringwithAVX512IFMA............................... 3 NirDruckerandShayGueron 2 PasswordSecurityinOrganizations:UserAttitudesandBehaviorsRegarding PasswordStrength ..................................................... 9 TahaniAlmehmadiandFahadAlsolami 3 DetectingandPreventingFileAlterationsintheCloudUsingaDistributed CollaborativeApproach ................................................ 15 JoséAntonioCárdenas-HaroandMauriceDawsonJr. 4 ComparingBlackRidgeTransportAccessControl(TAC),BrainWaves AuthenticationTechnologyandSecureSocketsLayerVisibility Appliance(SSL-VA).................................................... 19 HosseinZare,MohammadJ.Zare,PeterOlsen,andMojganAzadi 5 Comparing Cellphones, Global Positioning Systems (GPSs), Email andNetworkandCyber-Forensics ....................................... 29 HosseinZare,PeterOlsen,MohammadJ.Zare,andMojganAzadi 6 MakingAESGreatAgain:TheForthcomingVectorizedAESInstruction .... 37 NirDrucker,ShayGueron,andVladKrasnov 7 OntoCexp:AProposalforConceptualFormalizationofCriminal Expressions ........................................................... 43 RicardoResendede Mendonça,Ferruciode FrancoRosa, AntonioCarlosTheophiloCostaJr.,RodrigoBonacin,andMarioJino 8 AnInstrumentforMeasuringPrivacyinIoTEnvironments ................ 49 BrunoLopes,DiegoRobertoGonçalvesdePontes,andSergioDonizettiZorzo 9 ForensicAnalysisofLinkedIn’sDesktopApplicationonWindows10OS..... 57 SamanBashir,HaiderAbbas,NarmeenShafqat,WaseemIqbal, andKashifSaleem 10 AnalysisofWindowsOS’sFragmentedFileCarvingTechniques: ASystematicLiteratureReview ......................................... 63 NoorUlAinAli,WaseemIqbal,andNarmeenShafqat 11 Cybersecurity Certification: Certified Information Systems Security Professional(CISSP) ................................................... 69 PingWangandHubertD’Cruze v vi Contents 12 DiscoveringStudentInterestandTalentinGraduateCybersecurity Education ............................................................. 77 SherriAufmanandPingWang 13 TheMiraiBotnetandtheImportanceofIoTDeviceSecurity ............... 85 AlexanderG.Eustis 14 TheStudyoftheEffectivenessoftheSecureSoftwareDevelopmentLife-Cycle ModelsinITProjectManagement ....................................... 91 SanioraR.DuclervilandJing-ChiouLiou 15 FightingAgainstMoneyLaundering:ASystematicMapping ............... 97 BrunoLuizKreutzBarroso,FábioMangueira,andMethaniasColaçoJúnior 16 SmartLock:AccessControlThroughSmartContracts andSmartProperty .................................................... 105 MauricioXavierZaparoli,AdlerDinizdeSouza, andAndreHenriquedeOliveiraMonteiro 17 BiometricSystem:SecurityChallengesandSolutions ...................... 111 BayanAlzahraniandFahadAlsolami 18 AccessControlsinInternetofThingstoAvoidMaliciousActivity............ 119 YenumulaB.Reddy 19 AnalyzingD-WaveQuantumMacroAssemblerSecurity.................... 125 HeshamH.Alsaadi,MontherAldwairi,andEva-MarieMuller-Stuler PartII SoftwareTesting 20 ASystematicReviewBasedonEarnedValueManagementandQuality ...... 135 ChristopherdeSouzaLimaFranciscoandAdlerDinizdeSouza 21 UrgentandEmergencyCare:AnAcademicApplicationSystem CaseStudy ............................................................ 143 DanielaAmericadaSilva,FabioKfouri,SamaraCardosodosSantos, LuizHenriqueCoura,WilsonCristoni,GildarcioSousaGoncalves, LeonardoGuimaraesdosSantos,JoseCrisostomoOzorioJunior, BresleiMaxReisdaFonseca,JeanCarlosLourencoCosta,JulianaPasquini, AlexandreNascimento,JohnnyMarques,LuizAlbertoVieiraDias, AdilsonMarquesdaCunha,PauloMarceloTasinaffo,BeatrizPerondi, AnnaMiethke-Morais,AmandaCardosoMontal,SolangeReginaGiglioliFusco, andThiagoSakamoto 22 Decentralizing Rehabilitation: Using Blockchain to Store Exoskeletons’ Movement............................................................. 153 DanielaAmericadaSilva,ClaudioAugustoSilveiraLelis,LuizHenriqueCoura, SamaraCardosodosSantos,LeticiaYanaguya,JoseCrisostomoOzorioJunior, IsaiasdaSilvaTiburcio,GildarcioSousaGoncalves, BresleiMaxReisdaFonseca,AlexandreNascimento,JohnnyCardosoMarques, LuizAlbertoVieiraDias,AdilsonMarquesdaCunha,PauloMarceloTasinaffo, ThaisTavaresTerranova,MarcelSimis,PedroClaudioGonsalesdeCastro, andLinamaraRizzoBattistella 23 Analysis and Comparison of Frameworks Supporting Formal System DevelopmentbasedonModelsofComputation ............................ 161 AugustoY.Horita,RicardoBonna,andDenisS.Loubach Contents vii 24 SubsumptioninMutationTesting:AnAutomatedModelBasedonGenetic Algorithm............................................................. 169 MariaCristinaTenório,RobertaVilhenaVieiraLopes,JoseanaFechine, TarsisMarinho,andEvandroCosta 25 SocialPerceptionsAboutAdoptingSmartphoneApplicationsintheContext ofCollaborativeSecurity ............................................... 177 Mateusde Oliveira,AdrianaPrestMattedi,andRodrigoDuarteSeabra 26 AnExperienceReportfromtheMigrationofLegacySoftwareSystemsto MicroserviceBasedArchitecture ........................................ 183 HugoHenriqueS.daSilva,GlaucodeF.Carneiro,andMiguelP.Monteiro 27 Using Symbolic Dates of the Linear Logic to Verify Performance RequirementsinSOAModels ........................................... 191 KêniaSantosdeOliveiraandStéphaneJulia PartIII DataMiningandBigDataAnalytics 28 ABigDataExperimenttoAssesstheEffectivenessofDeepLearning NeuralNetworksintheMiningofSustainableAspects oftheHotelsClientsOpinions........................................... 201 ThiagodeOliveiraLima,MethaniasColaçoJúnior,KleberH.deJ.Prado, andAdalbertodosS.Júnior 29 HandlingImbalancedTimeSeriesThroughEnsembleofClassifiers: AMulti-classApproachforSolarFlareForecasting........................ 209 SérgioLuisirDíscolaJunior,JoséRobertoCecatto,MárcioMerinoFernandes, andMarcelaXavierRibeiro 30 FaultDiagnosticsforMultivariateNon-normalProcesses................... 215 DenwickMunjeri,MaliAbdollahain,andNadeeraGunaratne 31 Business Intelligence: Determination of Customers Satisfaction withtheDetectionofFacialExpression................................... 221 FaribaRezaeiArefi,FatemehSaghafi,andMasoudRezaei 32 DataIntegrityModelforEnvironmentalSensing .......................... 229 DanielT.Siegel,LeanneD.Keeley,PoorvaP.Shelke,AndreeaCotoranu, andMattGanis 33 AnalyzingtheSimilarity-BasedClusterabilityoftheVerticesinaComplex Network .............................................................. 237 MdAtiqurRahmanandNatarajanMeghanathan 34 RUM++:ALogMiningApproachtoClassifyUsersBased onDataProfile ........................................................ 245 HeltonFrancodeSousa,LeandroGuarinodeVasconcelos, andLaercioA.Baldochi 35 SmartFoodSecuritySystemUsingIoTandBigDataAnalytics ............. 253 Sazia Parvin, Sitalakshmi Venkatraman, Tony de Souza-Daw, Kiran Fahd, JoannaJackson,SamuelKaspi,NicolaCooley,KashifSaleem, andAmjadGawanmeh 36 MakingMusicComposingEasierforAmateurs:AHybridMachineLearning Approach ............................................................. 259 JiamingXu viii Contents PartIV HighPerformanceComputingArchitectures 37 AGeneratorandCorrectorofParametricQuestionsinHardCopy.......... 269 FranciscodeAssisZampirolli,FernandoTeubl,andValérioRamosBatista 38 STEMEducationEnrichmentinNYC.................................... 277 FangyangShen,JanineRoccosalvo,JunZhang,YangYi,YanqingJi, KendraGuo,AhmetMeteKok,andYiHan 39 Humanoid Soccer Player and Educational Robotic: Development an ArchitecturetoConnecttheDynamixelAX-12AServoMotorfromROBOTIS totheRaspberryPi3B.................................................. 283 GilmarCorreiaJeronimo,PauloEduardoBertolucciConsoni, RodrigoLuisFialhoGonçalves,WagnerTanakaBotelho, andMariadasGraçasBrunoMarietto 40 EffectiveDataPlacementtoReduceCacheThrashinginLastLevelCache ... 291 WilliamRossandByeongKilLee PartV GPUComputing 41 Data Imputation with an Improved Robust and Sparse Fuzzy K-Means Algorithm............................................................. 299 ConnorScully-Allison,RuiWu,SergiuM.Dascalu,LeeBarford, andFrederickC.HarrisJr. 42 RandomizedBenchmarkingofQuantumGatesonaGPU .................. 307 SyedZawad,FengYan,RuiWu,LeeBarford,andFrederickC.HarrisJr. 43 AMemoryLayoutforDynamicallyRoutedCapsuleLayers................. 317 DanielA.Lopez,RuiWu,LeeBarford,andFrederickC.HarrisJr. 44 ImageProcessingUsingMultipleGPUsonWebcamImageStreams ......... 325 HannahMunoz,SergiuM.Dascalu,RuiWu,LeeBarford, andFrederickC.HarrisJr. 45 ACUDAAlgorithmforTwo-DimensionalDetrendedFluctuationAnalysis ... 333 VanessaCristinaOliveiradeSouza,ReinaldoRobertoRosa, andArcilanTrevenzoliAssireu 46 AGraphicalProcessingUnitAcceleratedNORmaltoAnythingAlgorithm forHighDimensionalMultivariateSimulation ............................ 339 XiangLi,A.GrantSchissler,RuiWu,LeeBarford,andFrederickC.HarrisJr. 47 AGPU-BasedSmith-WatermanApproachforGenomeEditing ............. 347 LuayAlawneh,MohammadShehab,MahmoudAl-Ayyoub,andYaserJararweh Part VI Biostatistical Analysis, Wavelet Analysis, and Verified Numerical Computations 48 TheSMp(xory;PXmin,Xmax,ML,p1,p2,Max)aProbabilisticDistribution, oraProbabilityDensityFunctionofaRandomVariableX ................. 355 TermanFrometa-Castillo 49 Application of the Multi-Dimensional Hierarchical Mixture Model toCross-DisorderGenome-WideAssociationStudies....................... 361 TakahiroOtani,JoNishino,RyoEmoto,andShigeyukiMatsui Contents ix 50 AModel-BasedFrameworkforVoxelandRegionLevelInferences inNeuroimagingDisease-AssociationStudies ............................. 367 RyoEmoto,AtsushiKawaguchi,TakahiroOtani,andShigeyukiMatsui 51 GaitFeatureExtractionUsingDyadicWaveletTransformandStructural SimilarityforGaitRecognition.......................................... 373 HajimeOmuraandTeruyaMinamoto 52 AutomaticDetectionofEarlyGastricCancerfromEndoscopicImages UsingFastDiscreteCurveletTransformandWaveletTransform ModulusMaxima...................................................... 379 YuyaTanaka,KoheiWatarai,andTeruyaMinamoto PartVII WorkshoponNextGenerationInfrastructures:Health,Automotive, Mobility 53 An In Vivo Experimental Assessment of BTrans: An Agile Business TransformationMethodology ........................................... 387 AdrianoM.S.LimaandMethaniasColaçoJúnior 54 Multi-Agent Based Water Distribution and Underground Pipe Health MonitoringSystemUsingIoT ........................................... 395 LakshmiKanthanNarayananandSureshSankaranarayanan 55 EffectsofTCPTransferBuffersandCongestionAvoidanceAlgorithms ontheEnd-to-EndThroughputofTCP-over-TCPTunnels ................. 401 RussellHarkanson,YoohwanKim,Ju-YeonJo,andKhanhPham 56 TheRelationshipbetweenIntersectionTrafficControlandMutualExclusion Algorithm............................................................. 409 SungHoonParkandYongCheolSeo 57 StayAlive:AMobileApplicationfortheCardiopulmonaryResuscitation ProcessAccordingtotheAdvancedCardiovascularLifeSupportProtocol ... 417 JulioDidierMaciel,RodrigoDuarteSeabra, andRodrigoMaximianoAntunesdeAlmeida 58 TowardsaReusableFrameworkforGeneratingHealthInformation Systems............................................................... 423 AndréMagnoCostadeAraújo,ValériaCesárioTimes,andMarcusUrbanoSilva 59 Use of Eigenvector Centrality to Rank the Vertices in a Disease-Disease Network .............................................................. 429 MdAtiqurRahman,MahzabinAkhter,andNatarajanMeghanathan PartVIII MobileCommunications 60 Evaluating the Usability of the Siri Virtual Assistant on Mobile Devices withEmphasisonBrazilianElderlyUsers ................................ 437 ThiagoSilvaChiaradia,RodrigoDuarteSeabra,andAdrianaPrestMattedi 61 A Study on the Usability of Facebook on Mobile Devices with Emphasis onBrazilianElderlyUsers .............................................. 443 AnnaBeatrizDiasMorais,RodrigoDuarteSeabra,andAdrianaPrestMattedi 62 ASurveyontheNeedsofVisuallyImpairedUsersandRequirementsfora VirtualAssistantinAmbientAssistedLiving.............................. 449 JulianaDamasioOliveiraandRafaelH.Bordini

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.