Skip to main content
Top

ITNG 2021 18th International Conference on Information Technology-New Generations

  • 2021
  • Book

About this book

This volume represents the 18th International Conference on Information Technology - New Generations (ITNG), 2021. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia. This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.

Table of Contents

Next
  • current Page 1
  • 2
  • 3
  • 4
  • 5
  1. Frontmatter

  2. AI and Robotics

    1. Frontmatter

    2. Chapter 1. Conceptualisation of Breast Cancer Domain Using Ontology

      Reshmy Krishnan, P. C. Sherimon, Menila James
      This chapter delves into the conceptualization of the breast cancer domain using ontology, emphasizing the role of intelligent decision support systems in clinical settings. It introduces the use of ontologies to define semantic knowledge and their application in data searching strategies. The proposed system, the Breast Cancer Prediction System, leverages three ontologies—questionnaire ontology, clinical guidelines ontology, and symptom ontology—to collect patient data and predict breast cancer risk and stage. The system architecture is detailed, showcasing the use of Protégé for ontology creation and SPARQL for querying. The chapter highlights the validation of ontologies and the potential for extending standardized ontologies to improve accuracy in breast cancer prediction.
    3. Chapter 2. Traffic Light Control and Machine Learning: A Systematic Mapping Review

      Dimitrius F. Borges, Edmilson M. Moreira, Adler D. de Souza, João Paulo R. R. Leite
      The chapter delves into the growing issue of traffic congestion due to increased vehicle fleets and the limitations of fixed-time traffic lights. It focuses on the application of Machine Learning, particularly Reinforcement Learning, to adapt traffic light control systems to real-time conditions. The study conducts a systematic mapping review of 132 articles, identifying the most prominent ML models and techniques used in this domain. Key findings include the prevalence of Q-learning and the need for more real-world testing of these models. The chapter also discusses the trends and gaps in the field, suggesting a future shift towards more complex and specialized RL models.
    4. Chapter 3. Human-in-the-Loop Flight Training of a Quadcopter for Autonomous Systems

      Luke Rogers, Alex Redei
      The chapter discusses the creation of a human-in-the-loop flight training system that integrates a quadcopter drone with a 2-axis 360-degree flight simulator. The system aims to provide an immersive experience by synchronizing drone movements with the simulator's actions, using telemetry data transmitted via UDP packets. The authors address challenges such as latency, data loss, and the integration of a joystick for control. Experimental results demonstrate the system's potential, with low latency and smooth correlations between drone and simulator movements. The chapter also explores the system's applications in various fields, including drone racing, search and rescue missions, and military use.
    5. Chapter 4. COVID-19: The Importance of Artificial Intelligence and Digital Health During a Pandemic

      Maximilian Espuny, José S. da Motta Reis, Gabriel M. Monteiro Diogo, Thalita L. Reis Campos, Vitor H. de Mello Santos, Ana C. Ferreira Costa, Gildarcio S. Gonçalves, Paulo M. Tasinaffo, Luiz A. Vieira Dias, Adilson M. da Cunha, Nilo A. de Souza Sampaio, Andréia M. Rodrigues, Otávio J. de Oliveira
      The chapter 'COVID-19: The Importance of Artificial Intelligence and Digital Health During a Pandemic' examines the pivotal role of advanced technologies in addressing the COVID-19 pandemic. It begins by contextualizing the pandemic and the rapid spread of SARS-CoV-2, emphasizing the need for swift and accurate diagnosis. The text delves into how Artificial Intelligence (AI) has been instrumental in enhancing medical diagnosis through X-rays and computed tomography, predicting virus spread, and accelerating drug development. The methodology involves a literature review of 413 indexed studies, with a focus on the 20 most cited articles. The results highlight key research trends and gaps, such as the use of AI for rapid diagnosis, risk management tools, and integration of I4.0 technologies into microbiology and clinical trials. The chapter concludes by underscoring the importance of these technologies in combating the pandemic and preparing for future health crises, encouraging further research and public awareness.
    6. Chapter 5. CropWaterNeed: A Machine Learning Approach for Smart Agriculture

      Malek Fredj, Rima Grati, Khouloud Boukadi
      The chapter 'CropWaterNeed: A Machine Learning Approach for Smart Agriculture' introduces a novel method for predicting crop water needs using machine learning algorithms. It addresses the challenges of traditional farming methods by integrating smart irrigation systems and advanced technologies. The CropWaterNeed approach combines weather observations, soil parameters, and plant water needs to build a robust prediction model. The methodology involves data collection, preparation, and feature engineering, followed by model selection and evaluation. The chapter highlights the use of the XGBRegressor algorithm, which demonstrated superior performance in predicting irrigation water needs. The work is part of the PRECIMED project, aiming to optimize water management practices in agriculture. The chapter concludes with potential future research directions, including the application of deep learning techniques.
    7. Chapter 6. Machine Learning: Towards an Unified Classification Criteria

      Clara Burbano, David Reveló, Julio Mejía, Daniel Soto
      The chapter begins by discussing the surging popularity of Artificial Intelligence and Machine Learning, driven by their significant economic impact across various industries. It then delves into the definitions of AI and ML, clarifying the distinction between the two. The core of the chapter focuses on the classification of Machine Learning algorithms, exploring different criteria such as cognitive learning types (supervised, unsupervised, reinforced) and other factors influencing algorithm selection. The author presents a unified vision proposal, integrating various classification schemes into a cohesive framework. The chapter concludes with a call for future work to refine and expand this unified classification, reflecting the dynamic nature of the field.
  3. Cybersecurity I

    1. Frontmatter

    2. Chapter 7. Classification and Update Proposal for Modern Computer Worms, Based on Obfuscation

      Hernaldo Salazar, Cristian Barria
      The chapter delves into the evolution of computer worms, tracing their origins back to the early 1970s with the Creeper worm. It explores various classifications proposed over the decades, culminating in a new proposal based on obfuscation techniques. This classification is designed to enhance the detection and understanding of modern worms, addressing the increasing complexity and evasion tactics used by malware. The research methodology involves a systematic review of academic articles, highlighting the need for a hierarchical classification to combat the rapid evolution of malware. The proposed model categorizes worms by species, class, type, and evasion methods, providing a robust framework for cybersecurity professionals to combat these threats effectively.
    3. Chapter 8. Conceptual Model of Security Variables in Wi-Fi Wireless Networks: Review

      Lorena Galeazzi, Cristian Barría, Julio Hurtado
      The chapter delves into the multivariable nature of security in Wi-Fi wireless networks, emphasizing the need for a conceptual model to represent key data. It reviews standards such as ISO/IEC 27001 and NIST 800-53, best practices like CIS controls, and relevant research studies to identify essential security variables. The study employs a narrative review methodology to extract and analyze data, culminating in a Venn diagram to illustrate the relationships between variables. The chapter concludes by establishing a conceptual model comprising Management, Technical Equipment, Protection of the Communication Channel, and End Users, with a particular focus on users as the weakest link in the security chain. This comprehensive approach offers valuable insights for enhancing the security of Wi-Fi wireless networks.
    4. Chapter 9. Cybersecurity Analysis in Nodes that Work on the DICOM Protocol, a Case Study

      David Cordero, Cristian Barría
      The chapter delves into the cybersecurity analysis of nodes operating on the DICOM protocol, a standard for medical image exchange. It focuses on Chile, highlighting the critical nature of these systems in healthcare services. The study identifies active servers, analyzes their vulnerabilities, and assesses the potential impact on data integrity, confidentiality, and availability. Notably, it reveals that 22% of active servers in Chile have high-severity vulnerabilities, emphasizing the urgent need for robust cybersecurity measures to protect sensitive medical data.
    5. Chapter 10. Hybrid Security Risk Assessment Model

      Robert Banks, Jim Jones, Noha Hazzazi, Pete Garcia, Russell Zimmermann
      The chapter introduces a hybrid security risk assessment model that utilizes Bayesian Belief Networks (BBN) to quantitatively estimate the exploitability and impact of new technologies. By integrating public data from MITRE’s CAPEC tools and the NVD, the method provides a more accurate and reliable risk management system. The model is designed to be flexible, accommodating various data sources and levels of abstraction, making it a valuable tool for cybersecurity experts and risk management specialists. The chapter also discusses the limitations of existing risk estimation models and highlights the advantages of the proposed BBN approach, including its ability to handle complex, real-world scenarios and provide actionable insights for decision-makers.
    6. Chapter 11. Enriching Financial Software Requirements Concerning Privacy and Security Aspects: A Semiotics Based Approach

      Leonardo Manoel Mendes, Ferrucio de Franco Rosa, Rodrigo Bonacin
      This chapter introduces a novel method called SRAM-PS, which leverages organizational semiotics to systematically enrich financial software requirements with privacy and security aspects. The method is designed to address the complex interplay of technical, legal, organizational, and social factors involved in software development. The authors present a detailed background on requirements elicitation, secure systems development, and organizational semiotics, highlighting the gaps in current methods. The SRAM-PS method is outlined in seven steps, each designed to identify, analyze, and evaluate stakeholders' interests and problems, culminating in the generation of comprehensive security and privacy requirements. A case study demonstrates the practical application of SRAM-PS in a real-world scenario, showcasing its effectiveness and potential challenges. The chapter concludes by emphasizing the value of SRAM-PS for researchers and practitioners aiming to systematize their methods and techniques in software requirements analysis.
    7. Chapter 12. Efficient Design of Underwater Acoustic Sensor Networks Communication for Delay Sensitive Applications over Multi-hop

      Ahmed Al Guqhaiman, Oluwatobi Akanbi, Amer Aljaedi, C. Edward Chow
      This chapter delves into the critical aspects of designing efficient underwater acoustic sensor networks for delay-sensitive applications. It highlights the challenges and considerations in monitoring underwater environments, emphasizing the importance of MAC protocols and their impact on network performance. The study includes a detailed analysis of the effects of data rates, network sizes, packet sizes, and network loads on metrics such as end-to-end delay, energy consumption, packet delivery ratio, and collision rate. The authors compare different MAC protocols and underwater commercial modems, providing valuable insights into optimizing underwater communication systems for applications like oil/gas pipeline monitoring.
Next
  • current Page 1
  • 2
  • 3
  • 4
  • 5
Title
ITNG 2021 18th International Conference on Information Technology-New Generations
Editor
Dr. Shahram Latifi
Copyright Year
2021
Electronic ISBN
978-3-030-70416-2
Print ISBN
978-3-030-70415-5
DOI
https://doi.org/10.1007/978-3-030-70416-2

Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.

Premium Partner

    Image Credits
    Neuer Inhalt/© ITandMEDIA, Nagarro GmbH/© Nagarro GmbH, AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, USU GmbH/© USU GmbH, Ferrari electronic AG/© Ferrari electronic AG