4th International Conference on Artificial Intelligence and Applied Mathematics in Engineering : Icaiame 2022

Bibliographic Details
Main Author: Hemanth, D. Jude
Other Authors: Guvenc, Ugur, Kose, Utku, Yigit, Tuncay
Format: Book
Language:English
Published: Cham : Springer International Publishing AG, 2023
Edition:1st ed
Series:Engineering Cyber-Physical Systems and Critical Infrastructures Series
Table of Contents:
  • Intro
  • Foreword
  • Preface
  • International Conference on Artificial Intelligence and Applied Mathematics in Engineering 2022
  • General Committees
  • Scientific Committee
  • Keynote Speaks
  • Acknowledgement
  • Contents
  • Sentiment Analysis in Turkish Using Transformer-Based Deep Learning Models
  • 1 Introduction
  • 2 Related Works
  • 3 Methods
  • 3.1 Data Sets
  • 3.2 Machine Learning Models
  • 3.3 Deep Learning Models
  • 4 Evaluation
  • 5 Results and Discussion
  • 6 Conclusion
  • References
  • Mathematical Modeling of an Antenna Device Based on a T-Shaped Waveguide of the Microwave Range
  • 1 Introduction
  • 2 Obtaining RP with the Required Parameters
  • 3 Determination of the Amplitude Distribution of the Antenna
  • 4 Conclusion and Recommendation
  • References
  • Higher-Order and Stable Numerical Scheme for Nonlinear Diffusion System via Compact Finite Difference and Adaptive Step-Size Runge-Kutta Methods
  • 1 Introduction
  • 2 Numerical Methods
  • 2.1 Spatial Discretization
  • 2.2 Temporal Discretization
  • 2.3 Applications to Brusselator Model
  • 3 Numerical Simulations
  • 4 Conclusion
  • References
  • Explainable Artificial Intelligence (XAI) for Deep Learning Based Intrusion Detection Systems
  • 1 Introduction
  • 2 Related Works
  • 3 Preliminaries About the DL Algorithm and Explainable AI (XAI) Approaches in the Study
  • 3.1 Deep Learning Architectures in the Development of IDS Models
  • 3.2 The Explainer AI (XAI) Approaches Used in the Study
  • 4 DL Based IDS Models and Dataset
  • 5 Explanations of IDS and WAF Models
  • 6 Conclusions and Future Work
  • References
  • A Color Channel Based Analysis on Image Tessellation
  • 1 Introduction
  • 2 Related Works
  • 3 Method
  • 3.1 Direct Image Tessellation
  • 3.2 Superposition of RGB Channels After Triangulation and Coloring
  • 3.3 Coloring After Superposition of Triangulated RGB Channels
  • 1 Introduction
  • 2 Background
  • 3 Implementation of the LDirP Algorithm with TensorFlow
  • 4 Experimental Results
  • 5 Conclusion
  • References
  • Ensuring the Invariance of Object Images to Linear Movements for Their Recognition
  • 1 Introduction
  • 2 Problem Statement
  • 3 Comparative Analysis
  • 4 Problem Solving
  • 5 Conclusion
  • References
  • AI-Based Network Security Anomaly Prediction and Detection in Future Network
  • 1 Introduction
  • 2 Intrusion Detection
  • 3 Algorithms and Methodologies Used in AI-Based Anomaly Detection
  • 3.1 AI Based Network Traffic Flows Classification
  • 4 Evaluation Methods for Grading Efficiency of Anomaly Detection Models
  • 4.1 Reflects the Proportion of Anomalies
  • 5 Conclusions and Future Work
  • References
  • Mathematical Modeling of the Antenna Devices of the Microwave Range
  • 1 Introduction
  • 2 Formulation of the Problem
  • 3 Approach to Mathematical Modeling of the Electromagnetic Field of Radiative Apertures
  • 4 Some Results of Modeling the Electromagnetic Field of a Radiant Aperture and Their Analysis
  • 5 Conclusion and Recommendation
  • References
  • Design and Simulation of the Miniaturized Dual-Band Monopole Antenna for RFID Applications
  • 1 Introduction
  • 2 Concept and Design
  • 3 Results and Discussion
  • 4 Conclusion
  • References
  • Exploring the Driven Service Quality Dimensions for Higher Education Based on MCDM Analysis
  • 1 Introduction
  • 2 Pythagorean Fuzzy SWARA
  • 3 Weighting the Service Dimensions
  • 4 Conclusion
  • References
  • Deep Learning-Based Traffic Light Classification with Model Parameter Selection
  • 1 Introduction
  • 2 Proposal Architecture
  • 2.1 Color Space
  • 2.2 Image Resizing
  • 2.3 Data Augmentation
  • 2.4 Layer Information
  • 3 Experiments and Results
  • 3.1 Dataset
  • 3.2 Hyperparameter Tuning
  • 4 Conclusions
  • References
  • 2.2 Cyber Attacks by Critical Infrastructure Types
  • 2.3 Policy Determination for the Protection of Critical Infrastructures
  • 3 Cyber Terrorism and Cyber Attacks on Critical Infrastructure
  • 3.1 Logical Bomb
  • 3.2 Sony Online Entertainment
  • 3.3 Sven JASCHAn's Virus
  • 3.4 The Oldsmar Attack
  • 3.5 Titan Rain Attacks
  • 3.6 Hannaford Bros Attacks
  • 3.7 2013 Singapore Cyber Attacks
  • 3.8 OpIsrael Attacks
  • 3.9 Estonia Cyber Attacks
  • 3.10 Shady RAT Attacks
  • 3.11 Shamoon Virus
  • 3.12 Attack on the Ukrainian Power Grid
  • 3.13 Stuxnet Attack
  • 4 Conclusions
  • References
  • Secure Data Dissemination in Ad-Hoc Networks by Means of Blockchain
  • 1 Introduction
  • 1.1 VANETs
  • 1.2 FANETs
  • 2 Related Works
  • 2.1 Block-Chain Approaches
  • 2.2 Agent Based Communication
  • 2.3 Agent Based Communication
  • 3 Proposed Model
  • 3.1 Block-Chain Structure
  • 3.2 Block-Chain Structure
  • 3.3 The SDDB Model
  • 4 Conclusion
  • 5 Future Studies
  • References
  • Battery Charge and Health Evaluation for Defective UPS Batteries via Machine Learning Methods
  • 1 Introduction
  • 2 Related Works
  • 3 Method and Material
  • 3.1 Developed Data Acquisition Card
  • 3.2 Machine Learning Regression Methods
  • 4 Discussion and Results
  • 4.1 SOC Estimation
  • 4.2 SOH Estimation
  • 4.3 Remaining Discharge Time Estimation
  • 5 Conclusions and Future Work
  • References
  • Covid-19: Automatic Detection from X-Ray Images Using Attention Mechanisms
  • 1 Introduction
  • 2 Related Work
  • 3 Dataset
  • 4 Methodology
  • 4.1 Baseline
  • 4.2 Attention Mechanism
  • 5 Experiments
  • 5.1 Evaluation Metrics
  • 5.2 Experiments
  • 6 Conclusion
  • References
  • Lexicon Construction for Fake News Detection
  • 1 Introduction
  • 2 Literature Review
  • 3 Data and Methodology
  • 3.1 Data Collection and Preparation
  • 3.2 Methodology
  • 4 Results and Evaluation
  • 5 Conclusions
  • 3.4 Point Selection and Coloring Techniques Used
  • 4 Results
  • 5 Future Work
  • References
  • Modeling of Shear Strength of Basalt Fiber Reinforced Clay (BFRC) Soil Using Artificial Neural Network (ANN)
  • 1 Introduction
  • 2 Material and Method
  • 2.1 Dataset
  • 2.2 ANN
  • 3 Results and Discussion
  • 4 Conclusion
  • References
  • Change of the Internet with Blockchain and Metaverse Technologies
  • 1 Introduction
  • 2 Big Data Privacy
  • 3 Web 1.0, Web 2.0, Web 3.0
  • 3.1 Web 1.0
  • 3.2 Web 2.0
  • 3.3 Web 3.0
  • 4 Blockchain
  • 4.1 Consensus in Distributed Systems and Blockchain
  • 4.2 Decentralized Protocols
  • 5 Data Monarchy (Server), Data Democracy (P2P Networks)
  • 6 Metaverse
  • 6.1 As a Metaverse, Live Forever
  • 7 Conclusion
  • References
  • A Language-Free Hate Speech Identification on Code-mixed Conversational Tweets
  • 1 Introduction
  • 2 Dataset Description
  • 3 Proposed System Description
  • 3.1 Data Cleaning
  • 3.2 Script Normalization
  • 3.3 Classification Model
  • 4 Results and Discussion
  • 5 Conclusion and Future Work
  • References
  • Decision Trees in Causal Inference
  • 1 Introduction
  • 2 Methods
  • 2.1 Framework and Overview of Causal Effect
  • 2.2 Estimation of Propensity Score
  • 2.3 Propensity Score Matching
  • 3 Simulation Study
  • 4 Simulation Results
  • 5 Conclusion
  • References
  • The Resilience of Unmanned Aerial Vehicles to Cyberattacks and Assessment of Potential Threats
  • 1 Introduction
  • 2 Examining UAV Architecture
  • 2.1 UAV Segment
  • 2.2 Communication Segment
  • 3 Attack Vectors and Potential Risk Assessments
  • 3.1 Flying Ad-Hoc Network (FANET)
  • 3.2 Global Position System (GPS)
  • 3.3 Communication
  • 3.4 Ground Control Station (GCS) and Autopilot
  • 4 UAV Attack Assessment
  • 5 Conclusions and Future Work
  • References
  • TensorFlow Based Feature Extraction Using the Local Directional Patterns
  • Investigation of Biomedical Named Entity Recognition Methods
  • 1 Introduction
  • 2 Related Works, Methods, and Datasets
  • 2.1 Dictionary Based Methods
  • 2.2 Rule Based Methods
  • 2.3 Machine Learning Methods
  • 2.4 Deep Learning Methods
  • 2.5 Deep Contextualized Embeddings
  • 2.6 Annotated Datasets for Biomedical NER
  • 3 Experimental Study
  • 3.1 Dataset
  • 3.2 Pre-Processing
  • 3.3 Experimental Settings
  • 4 Discussion and Results
  • 5 Conclusion and Future Work
  • References
  • Numerical Solutions of Hantavirus Infection Model by Means of the Bernstein Polynomials
  • 1 Introduction
  • 2 Method of Solution
  • 3 Error Estimation Method
  • 4 Numerical Results and Discussion
  • 5 Conclusion
  • References
  • Instance Segmentation of Handwritten Text on Historical Document Images Using Deep Learning Approaches
  • 1 Introduction
  • 2 Related Works
  • 3 Dataset Description
  • 3.1 Data Collection
  • 3.2 Challenges
  • 3.3 Preprocessing
  • 4 Models
  • 4.1 U-Net
  • 4.2 Deeplab3
  • 4.3 Mask-R-CNN
  • 5 Training Protocol
  • 5.1 Loss Function
  • 5.2 Postprocessing
  • 6 Experimental Results
  • 6.1 Metrics
  • 6.2 Models Comparison
  • 7 Conclusion
  • References
  • Synthetic Signal Generation Using Time Series Clustering and Conditional Generative Adversarial Network
  • 1 Introduction
  • 2 Method
  • 3 Results and Discussion
  • 4 Conclusion
  • References
  • Transfer Learning Based Flat Tire Detection by Using RGB Images
  • 1 Introduction
  • 2 Dataset
  • 3 Method
  • 3.1 Deep Learning
  • 3.2 Convolutional Neural Networks (CNNs)
  • 3.3 Transfer Learning
  • 3.4 Evaluation Metrics
  • 4 Experimental Results
  • 5 Conclusion
  • References
  • Cyber Threats and Critical Infrastructures in the Era of Cyber Terrorism
  • 1 Introduction
  • 2 Related Works
  • 2.1 General Evaluation of the Studies on the Protection of Critical Infrastructures from Cyber Attacks in Türkiye
  • References