4th International Conference on Artificial Intelligence and Applied Mathematics in Engineering : Icaiame 2022
Main Author: | |
---|---|
Other Authors: | , , |
Format: | Book |
Language: | English |
Published: |
Cham :
Springer International Publishing AG,
2023
|
Edition: | 1st ed |
Series: | Engineering Cyber-Physical Systems and Critical Infrastructures Series
|
Table of Contents:
- Intro
- Foreword
- Preface
- International Conference on Artificial Intelligence and Applied Mathematics in Engineering 2022
- General Committees
- Scientific Committee
- Keynote Speaks
- Acknowledgement
- Contents
- Sentiment Analysis in Turkish Using Transformer-Based Deep Learning Models
- 1 Introduction
- 2 Related Works
- 3 Methods
- 3.1 Data Sets
- 3.2 Machine Learning Models
- 3.3 Deep Learning Models
- 4 Evaluation
- 5 Results and Discussion
- 6 Conclusion
- References
- Mathematical Modeling of an Antenna Device Based on a T-Shaped Waveguide of the Microwave Range
- 1 Introduction
- 2 Obtaining RP with the Required Parameters
- 3 Determination of the Amplitude Distribution of the Antenna
- 4 Conclusion and Recommendation
- References
- Higher-Order and Stable Numerical Scheme for Nonlinear Diffusion System via Compact Finite Difference and Adaptive Step-Size Runge-Kutta Methods
- 1 Introduction
- 2 Numerical Methods
- 2.1 Spatial Discretization
- 2.2 Temporal Discretization
- 2.3 Applications to Brusselator Model
- 3 Numerical Simulations
- 4 Conclusion
- References
- Explainable Artificial Intelligence (XAI) for Deep Learning Based Intrusion Detection Systems
- 1 Introduction
- 2 Related Works
- 3 Preliminaries About the DL Algorithm and Explainable AI (XAI) Approaches in the Study
- 3.1 Deep Learning Architectures in the Development of IDS Models
- 3.2 The Explainer AI (XAI) Approaches Used in the Study
- 4 DL Based IDS Models and Dataset
- 5 Explanations of IDS and WAF Models
- 6 Conclusions and Future Work
- References
- A Color Channel Based Analysis on Image Tessellation
- 1 Introduction
- 2 Related Works
- 3 Method
- 3.1 Direct Image Tessellation
- 3.2 Superposition of RGB Channels After Triangulation and Coloring
- 3.3 Coloring After Superposition of Triangulated RGB Channels
- 1 Introduction
- 2 Background
- 3 Implementation of the LDirP Algorithm with TensorFlow
- 4 Experimental Results
- 5 Conclusion
- References
- Ensuring the Invariance of Object Images to Linear Movements for Their Recognition
- 1 Introduction
- 2 Problem Statement
- 3 Comparative Analysis
- 4 Problem Solving
- 5 Conclusion
- References
- AI-Based Network Security Anomaly Prediction and Detection in Future Network
- 1 Introduction
- 2 Intrusion Detection
- 3 Algorithms and Methodologies Used in AI-Based Anomaly Detection
- 3.1 AI Based Network Traffic Flows Classification
- 4 Evaluation Methods for Grading Efficiency of Anomaly Detection Models
- 4.1 Reflects the Proportion of Anomalies
- 5 Conclusions and Future Work
- References
- Mathematical Modeling of the Antenna Devices of the Microwave Range
- 1 Introduction
- 2 Formulation of the Problem
- 3 Approach to Mathematical Modeling of the Electromagnetic Field of Radiative Apertures
- 4 Some Results of Modeling the Electromagnetic Field of a Radiant Aperture and Their Analysis
- 5 Conclusion and Recommendation
- References
- Design and Simulation of the Miniaturized Dual-Band Monopole Antenna for RFID Applications
- 1 Introduction
- 2 Concept and Design
- 3 Results and Discussion
- 4 Conclusion
- References
- Exploring the Driven Service Quality Dimensions for Higher Education Based on MCDM Analysis
- 1 Introduction
- 2 Pythagorean Fuzzy SWARA
- 3 Weighting the Service Dimensions
- 4 Conclusion
- References
- Deep Learning-Based Traffic Light Classification with Model Parameter Selection
- 1 Introduction
- 2 Proposal Architecture
- 2.1 Color Space
- 2.2 Image Resizing
- 2.3 Data Augmentation
- 2.4 Layer Information
- 3 Experiments and Results
- 3.1 Dataset
- 3.2 Hyperparameter Tuning
- 4 Conclusions
- References
- 2.2 Cyber Attacks by Critical Infrastructure Types
- 2.3 Policy Determination for the Protection of Critical Infrastructures
- 3 Cyber Terrorism and Cyber Attacks on Critical Infrastructure
- 3.1 Logical Bomb
- 3.2 Sony Online Entertainment
- 3.3 Sven JASCHAn's Virus
- 3.4 The Oldsmar Attack
- 3.5 Titan Rain Attacks
- 3.6 Hannaford Bros Attacks
- 3.7 2013 Singapore Cyber Attacks
- 3.8 OpIsrael Attacks
- 3.9 Estonia Cyber Attacks
- 3.10 Shady RAT Attacks
- 3.11 Shamoon Virus
- 3.12 Attack on the Ukrainian Power Grid
- 3.13 Stuxnet Attack
- 4 Conclusions
- References
- Secure Data Dissemination in Ad-Hoc Networks by Means of Blockchain
- 1 Introduction
- 1.1 VANETs
- 1.2 FANETs
- 2 Related Works
- 2.1 Block-Chain Approaches
- 2.2 Agent Based Communication
- 2.3 Agent Based Communication
- 3 Proposed Model
- 3.1 Block-Chain Structure
- 3.2 Block-Chain Structure
- 3.3 The SDDB Model
- 4 Conclusion
- 5 Future Studies
- References
- Battery Charge and Health Evaluation for Defective UPS Batteries via Machine Learning Methods
- 1 Introduction
- 2 Related Works
- 3 Method and Material
- 3.1 Developed Data Acquisition Card
- 3.2 Machine Learning Regression Methods
- 4 Discussion and Results
- 4.1 SOC Estimation
- 4.2 SOH Estimation
- 4.3 Remaining Discharge Time Estimation
- 5 Conclusions and Future Work
- References
- Covid-19: Automatic Detection from X-Ray Images Using Attention Mechanisms
- 1 Introduction
- 2 Related Work
- 3 Dataset
- 4 Methodology
- 4.1 Baseline
- 4.2 Attention Mechanism
- 5 Experiments
- 5.1 Evaluation Metrics
- 5.2 Experiments
- 6 Conclusion
- References
- Lexicon Construction for Fake News Detection
- 1 Introduction
- 2 Literature Review
- 3 Data and Methodology
- 3.1 Data Collection and Preparation
- 3.2 Methodology
- 4 Results and Evaluation
- 5 Conclusions
- 3.4 Point Selection and Coloring Techniques Used
- 4 Results
- 5 Future Work
- References
- Modeling of Shear Strength of Basalt Fiber Reinforced Clay (BFRC) Soil Using Artificial Neural Network (ANN)
- 1 Introduction
- 2 Material and Method
- 2.1 Dataset
- 2.2 ANN
- 3 Results and Discussion
- 4 Conclusion
- References
- Change of the Internet with Blockchain and Metaverse Technologies
- 1 Introduction
- 2 Big Data Privacy
- 3 Web 1.0, Web 2.0, Web 3.0
- 3.1 Web 1.0
- 3.2 Web 2.0
- 3.3 Web 3.0
- 4 Blockchain
- 4.1 Consensus in Distributed Systems and Blockchain
- 4.2 Decentralized Protocols
- 5 Data Monarchy (Server), Data Democracy (P2P Networks)
- 6 Metaverse
- 6.1 As a Metaverse, Live Forever
- 7 Conclusion
- References
- A Language-Free Hate Speech Identification on Code-mixed Conversational Tweets
- 1 Introduction
- 2 Dataset Description
- 3 Proposed System Description
- 3.1 Data Cleaning
- 3.2 Script Normalization
- 3.3 Classification Model
- 4 Results and Discussion
- 5 Conclusion and Future Work
- References
- Decision Trees in Causal Inference
- 1 Introduction
- 2 Methods
- 2.1 Framework and Overview of Causal Effect
- 2.2 Estimation of Propensity Score
- 2.3 Propensity Score Matching
- 3 Simulation Study
- 4 Simulation Results
- 5 Conclusion
- References
- The Resilience of Unmanned Aerial Vehicles to Cyberattacks and Assessment of Potential Threats
- 1 Introduction
- 2 Examining UAV Architecture
- 2.1 UAV Segment
- 2.2 Communication Segment
- 3 Attack Vectors and Potential Risk Assessments
- 3.1 Flying Ad-Hoc Network (FANET)
- 3.2 Global Position System (GPS)
- 3.3 Communication
- 3.4 Ground Control Station (GCS) and Autopilot
- 4 UAV Attack Assessment
- 5 Conclusions and Future Work
- References
- TensorFlow Based Feature Extraction Using the Local Directional Patterns
- Investigation of Biomedical Named Entity Recognition Methods
- 1 Introduction
- 2 Related Works, Methods, and Datasets
- 2.1 Dictionary Based Methods
- 2.2 Rule Based Methods
- 2.3 Machine Learning Methods
- 2.4 Deep Learning Methods
- 2.5 Deep Contextualized Embeddings
- 2.6 Annotated Datasets for Biomedical NER
- 3 Experimental Study
- 3.1 Dataset
- 3.2 Pre-Processing
- 3.3 Experimental Settings
- 4 Discussion and Results
- 5 Conclusion and Future Work
- References
- Numerical Solutions of Hantavirus Infection Model by Means of the Bernstein Polynomials
- 1 Introduction
- 2 Method of Solution
- 3 Error Estimation Method
- 4 Numerical Results and Discussion
- 5 Conclusion
- References
- Instance Segmentation of Handwritten Text on Historical Document Images Using Deep Learning Approaches
- 1 Introduction
- 2 Related Works
- 3 Dataset Description
- 3.1 Data Collection
- 3.2 Challenges
- 3.3 Preprocessing
- 4 Models
- 4.1 U-Net
- 4.2 Deeplab3
- 4.3 Mask-R-CNN
- 5 Training Protocol
- 5.1 Loss Function
- 5.2 Postprocessing
- 6 Experimental Results
- 6.1 Metrics
- 6.2 Models Comparison
- 7 Conclusion
- References
- Synthetic Signal Generation Using Time Series Clustering and Conditional Generative Adversarial Network
- 1 Introduction
- 2 Method
- 3 Results and Discussion
- 4 Conclusion
- References
- Transfer Learning Based Flat Tire Detection by Using RGB Images
- 1 Introduction
- 2 Dataset
- 3 Method
- 3.1 Deep Learning
- 3.2 Convolutional Neural Networks (CNNs)
- 3.3 Transfer Learning
- 3.4 Evaluation Metrics
- 4 Experimental Results
- 5 Conclusion
- References
- Cyber Threats and Critical Infrastructures in the Era of Cyber Terrorism
- 1 Introduction
- 2 Related Works
- 2.1 General Evaluation of the Studies on the Protection of Critical Infrastructures from Cyber Attacks in Türkiye
- References