Skip to main content
Top

ITNG 2022 19th International Conference on Information Technology-New Generations

  • 2022
  • Book

About this book

This volume represents the 19th International Conference on Information Technology - New Generations (ITNG), 2022. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, and service award. . This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.

Table of Contents

Next
  • 1
  • current Page 2
  • 3
Previous
  1. Cybersecurity

    1. Frontmatter

    2. Chapter 17. Gesturing with Smart Wearables: An Alternate Way to User Authentication

      Khandaker Abir Rahman, Avishek Mukherjee, Kristina Mullen
      This chapter delves into the innovative use of smart wearable gestures for user authentication, leveraging motion sensors in devices like smartwatches. It discusses the viability of using gesture recognition methods for security purposes, focusing on the advantages of user-created gestures over predetermined ones. The authors present a standalone authentication system that can be used across multiple devices, showcasing its resilience to spoof attacks. The chapter details the data collection process, pre-processing methods, and experimental results, demonstrating the system's effectiveness in distinguishing between different gesture patterns. The research highlights the potential for enhancing security through unique hand gestures, offering a promising future for wearable technology in authentication.
    3. Chapter 18. Software Optimization of Rijndael for Modern x86-64 Platforms

      Nir Drucker, Shay Gueron
      The chapter delves into the optimization of the Rijndael 256-bit block cipher for modern x86-64 platforms, focusing on the use of new vector AES-NI instructions. It provides a detailed background on the Advanced Encryption Standard (AES) and its significance in various applications. The authors present their implementation of Rijndael 256 in Electronic CodeBook (ECB) and Counter (CTR) modes, measuring performance on different CPUs with varying microarchitectures. The results show that the optimized implementation achieves a throughput of 0.27 cycles per byte (C/B) on modern processors, comparable to the performance of the standard 128-bit block size AES. The chapter also discusses the implications of block size on security and the potential benefits of a 256-bit block cipher in cloud-scale applications. The authors conclude by highlighting the importance of considering specific processor characteristics and compiler behavior in achieving optimal performance.
    4. Chapter 19. Cybersecurity Ethics Education: A Curriculum Proposal

      Ping Wang
      The chapter addresses the critical need for qualified cybersecurity professionals in a digitally connected world facing increasing cyber threats. It highlights the ethical dilemmas and challenges in the field, emphasizing the lack of guidance on cybersecurity ethics. The core of the chapter is a detailed curriculum proposal for a cybersecurity ethics course, mapped to the NICE Cybersecurity Workforce Framework and CAE-CDE designation program. The proposal includes learning outcomes, topics, and assessment methods. Additionally, it underscores the importance of mentoring in student success, outlining a comprehensive mentoring model that includes ethical guidance. The chapter concludes with potential future research directions, making it a valuable resource for educators and professionals seeking to enhance cybersecurity education.
    5. Chapter 20. Performance Evaluation of Online Website Safeguarding Tools Against Phishing Attacks; a Comparative Assessment

      Rama Al-Share, Fatima Abu-Akleek, Ahmed S. Shatnawi, Eyad Taqieddin
      The chapter delves into the critical issue of phishing attacks, focusing on the OWASP's broken authentication vulnerability. It explores the various types of phishing attacks, including vishing and smishing, and their severe impacts on both individuals and organizations. The study evaluates six prominent online website safeguarding tools using a rigorous evaluation procedure and two datasets of legitimate and malicious URLs. The performance of these tools is compared based on metrics such as precision, recall, F1-score, and accuracy. The results highlight the strengths and weaknesses of each tool, providing valuable insights into their effectiveness in combating phishing attacks. This detailed analysis offers a comprehensive overview of the current state of online website safeguarding tools and their role in protecting against phishing threats.
  2. Blockchain Technology

    1. Frontmatter

    2. Chapter 21. Blockchain Based Trust for the Internet of Things: A Review

      Dina Shehada, Maryam Amour, Suadad Muammar, Amjad Gawanmeh
      This chapter delves into the challenges of trust and security in IoT systems, highlighting the potential of Blockchain technology to address these issues. It explores various Blockchain-based trust management solutions, categorizing them based on security functions, suitability to IoT environments, feasibility, main features, and limitations. The chapter also presents a taxonomy to assess these solutions, providing a side-by-side comparison of state-of-the-art methods. This detailed analysis offers valuable insights into the integration of Blockchain technology within IoT, arousing interest in exploring the full chapter for a deeper understanding of these innovative solutions.
    3. Chapter 22. The Use of Blockchain Technology in Electronic Health Record Management: An Analysis of State of the Art and Practice

      Henrique Couto, André Araújo, Rendrikson Soares, Gabriel Rodrigues
      The chapter delves into the transformative impact of Blockchain technology on Electronic Health Record (EHR) management within the healthcare sector. It begins by discussing the digital transformation of healthcare through information and communication technologies, emphasizing the need for secure and interoperable data solutions. The study analyzes the state of the art in Blockchain technology applications, focusing on data modeling, storage, interoperability, and visualization. It also examines practical industry solutions that leverage Blockchain to enhance data security, traceability, and access control. The chapter concludes with a discussion on the future directions and potential advancements in this field, providing valuable insights for healthcare professionals and data management experts.
    4. Chapter 23. Blockchain for Security and Privacy of Healthcare Systems: A Protocol for Systematic Literature Review

      Saadia Azemour, Meryeme Ayache, Hanane El Bakkali, Amjad Gawanmeh
      The chapter outlines a systematic literature review protocol to assess the security and privacy challenges of blockchain technology in healthcare. It follows the PRISMA-P 2015 guidelines and includes a detailed search strategy, inclusion/exclusion criteria, and data extraction methods. The study aims to gather knowledge on blockchain's impact on healthcare security and privacy, identify limitations and challenges, and propose future research directions. The protocol ensures transparency, clarity, and future reproducibility, making it a valuable resource for researchers and healthcare IT specialists.
    5. Chapter 24. Single Sign-On (SSO) Fingerprint Authentication Using Blockchain

      Abhijeet Thakurdesai, Marian Sorin Nistor, Doina Bein, Stefan Pickl, Wolfgang Bein
      The chapter delves into the concept of Single Sign-On (SSO) and its integration with blockchain technology for secure fingerprint authentication. It begins by discussing the limitations of traditional centralized authentication systems and the vulnerabilities they present. The authors then introduce the benefits of using blockchain for authentication, such as data tamper resistance, decentralization, and high concurrency. The core of the chapter focuses on the implementation of a web application that uses Ethereum for user management and authentication. The application employs fingerprint images as biometric data, with a similarity score threshold for successful authentication. The backend of the application is built using Springboot and communicates with the Ethereum network through smart contracts. The frontend supports user registration and authentication, demonstrating the potential of blockchain to enhance security in biometric-based authentication systems. The chapter concludes with a discussion on future directions and potential improvements, such as implementing microservices architecture and enterprise blockchain solutions.
  3. Health Informatics

    1. Frontmatter

    2. Chapter 25. A Detection Method for Early-Stage Colorectal Cancer Using Dual-Tree Complex Wavelet Packet Transform

      Daigo Takano, Teruya Minamoto
      The chapter introduces a groundbreaking method for detecting early-stage colorectal cancer using Dual-Tree Complex Wavelet Packet Transform (2D-CWPT) and Principal Component Analysis (PCA). Unlike traditional methods that require extensive labeled data, this approach leverages the directional selectivity of 2D-CWPT to extract features from endoscopic images effectively. The method involves preprocessing endoscopic images, applying 2D-CWPT to capture high-frequency components, and using PCA to diagnose cancer based on the first principal component values. The authors demonstrate the method's effectiveness through preliminary and comparison experiments, highlighting its superior accuracy compared to existing methods. The chapter concludes by discussing the method's limitations and suggesting future directions for improving the detection of early-stage colorectal cancer.
    3. Chapter 26. Visualizing 3D Human Organs for Medical Training

      Joshua Chen, Paul J. Cuaresma, Jennifer S. Chen, Fangyang Shen, Yun Tian
      The chapter delves into the application of 3D visualization techniques for medical training, specifically focusing on the recognition of human organs by health science students. It compares the effectiveness of 3D models against traditional 2D images, highlighting the potential advantages of 3D visualizations in enhancing learning outcomes and confidence levels among medical trainees. The study employs a controlled experiment using 3D models of human organs visualized with Blender software, and surveys health science students to evaluate their accuracy and confidence in identifying these models. The results indicate that 3D models are generally more recognizable and can potentially replace 2D images as primary learning tools in medical education. The chapter concludes with recommendations for further improving 3D visualizations and suggests future research directions.
    4. Chapter 27. An Information Management System for the COVID-19 Pandemic Using Blockchain

      Marcelo Alexandre M. da Conceicao, Oswaldo S. C. Neto, Andre B. Baccarin, Luan H. S. Dantas, Joao P. S. Mendes, Vinicius P. Lippi, Gildarcio S. Gonçalves, Adilson M. Da Cunha, Luiz A. Vieira Dias, Johnny C. Marques, Paulo M. Tasinaffo
      The chapter details the development of an Information Management System for COVID-19 by students at ITA, leveraging Blockchain, Big Data, and other emerging technologies. The project, named STEPES-BD, was designed to monitor patients and manage data sharing between healthcare stakeholders. It involved the use of a 3-tier architecture, RESTful APIs, and databases like MySQL and BigchainDB to ensure data interoperability and immutability. The project was conducted remotely using the Scrum Framework, demonstrating the feasibility of interdisciplinary problem-based learning and the practical application of advanced technologies in a real-world scenario.
    5. Chapter 28. Machine Learning for Classification of Cancer Dataset for Gene Mutation Based Treatment

      Jai Santosh Mandava, Abhishek Verma, Fulya Kocaman, Marian Sorin Nistor, Doina Bein, Stefan Pickl
      The chapter discusses the significant impact of gene mutations on cancer treatment and the potential of machine learning to automate and enhance the classification of cancer datasets. It provides a comprehensive overview of the historical context and current practices in cancer treatment, focusing on the use of gene mutation-based treatments. The authors present a proposed system architecture that leverages machine learning algorithms to classify genetic variations, significantly reducing the time and effort required for manual analysis. The chapter also includes a detailed comparison of various machine learning classification algorithms and their performance metrics. The experimental results show promising accuracy levels, highlighting the potential of machine learning to revolutionize cancer diagnosis and treatment. The conclusion emphasizes the need for further research to improve model accuracy and expand the dataset to achieve real-world applicability.
  4. Machine Learning

    1. Frontmatter

    2. Chapter 29. Performance Comparison Between Deep Learning and Machine Learning Models for Gene Mutation-Based Text Classification of Cancer

      Fulya Kocaman, Stefan Pickl, Doina Bein, Marian Sorin Nistor
      The chapter delves into the critical issue of cancer diagnosis and treatment, focusing on the role of gene mutation-based text classification. It introduces the use of deep learning models such as Embedding Layer and Bidirectional LSTM, as well as machine learning classifiers like Random Forest and Stacking Classifiers, to analyze genetic mutations from clinical text. The study employs advanced techniques like BERT text augmentation to enhance data quality and model performance. The results highlight the challenges and potential of these methods in improving cancer diagnosis and personalized medicine. The paper concludes with a call for further research into pre-trained word embeddings and combining text analysis with medical image processing.
    3. Chapter 30. Stock Backtesting Engine Using Pairs Trading

      Rahul Chauhan, Marian Sorin Nistor, Doina Bein, Stefan Pickl, Wolfgang Bein
      The chapter introduces a Stock Backtesting Engine designed to test historical data using pairs trading strategy, a popular method in statistical arbitrage. Pairs trading involves finding stocks with similar historical price behaviors and betting on their convergence. The engine identifies cointegrated pairs using statistical methods, runs backtesting algorithms, and provides detailed analysis and visualization of trade effectiveness. The system architecture, including modules for data collection, pair finding, backtesting, and analysis, is explained. The chapter highlights the importance of cointegration tests, such as the Engle-Granger method, and demonstrates the engine's capabilities with real-world examples. Results from backtesting eight major companies are presented, showcasing the engine's potential to enhance trading strategies. The chapter concludes with limitations and future work, suggesting improvements like machine learning integration and web service conversion.
    4. Chapter 31. Classifying Sincerity Using Machine Learning

      Rachana Chittari, Marian Sorin Nistor, Doina Bein, Stefan Pickl, Abhishek Verma
      The chapter delves into the challenge of classifying sincere and insincere questions on online forums, highlighting the limitations of human review systems. It explores various machine learning techniques, including traditional algorithms like Naïve Bayes and Support Vector Machines, and deep learning models like Recurrent Neural Networks and Long Short-Term Memory networks. The author presents a detailed methodology for preprocessing text data, feature extraction using word embeddings, and training a bidirectional LSTM model. The results and future improvements are discussed, making the chapter a valuable resource for those interested in applying machine learning to natural language processing tasks.
    5. Chapter 32. Recommendation System Using MixPMF

      Rohit Gund, James Andro-Vasko, Doina Bein, Wolfgang Bein
      The chapter introduces a novel recommendation system using MixPMF, a hybrid model that integrates Probabilistic Matrix Factorization (PMF), Constrained PMF (CPMF), and Kernelized PMF (KPMF). It addresses the challenges faced by existing recommendation systems in handling large, sparse, and imbalanced datasets, particularly in the context of music and movie recommendations. The MixPMF model leverages user network information and artist tag data to enhance recommendation accuracy. The chapter provides a comprehensive overview of the architecture, background work, model training, and evaluation of the MixPMF system. It demonstrates the superior performance of MixPMF compared to PMF, CPMF, and KPMF models through RMSE evaluations. The chapter concludes with potential future enhancements, including the development of a GUI with automatic playlist generation and the exploration of parallel processing techniques for scalability.
    6. Chapter 33. Abstractive Text Summarization Using Machine Learning

      Aditya Dingare, Doina Bein, Wolfgang Bein, Abhishek Verma
      The chapter delves into the various types of text summarization, including single document, multi-document, informative summary, and query-focused summary. It differentiates between abstractive and extractive text summarization methods, highlighting the challenges and advantages of each. The authors apply three text summarization algorithms—extractive text summarization using NLTK and TextRank, and abstractive text summarization using Seq-to-Seq—to the Amazon Product Review dataset. The chapter presents a detailed analysis of the algorithms' performances, limitations, and potential future improvements, offering valuable insights for professionals in the field of natural language processing and machine learning.
    7. Chapter 34. Intelligent System for Detection and Identification of Ground Anomalies for Rescue

      Antonio Dantas, Leandro Diniz, Maurício Almeida, Ella Olsson, Peter Funk, Rickard Sohlberg, Alexandre Ramos
      The chapter delves into the importance of capturing images of the earth’s surface for various purposes, particularly in search and rescue (SAR) activities. It discusses the development of methods and tools by Brazilian and Swedish researchers to interpret soil images obtained by sensors embedded in unmanned aerial vehicles (UAVs). The challenges faced by these systems, such as adverse conditions and lighting changes, are highlighted. The chapter also presents recent works that use artificial intelligence for human detection, focusing on techniques like convolutional neural networks (CNN) and algorithms such as Single Shot MultiBox Detector (SSD) and You Only Look Once (YOLO). Additionally, it explores the methodology for identifying anomalies in images, including pre-processing techniques and the use of CNNs for efficient processing. The chapter concludes by proposing a decision support system for search and rescue, emphasizing the need for a dataset that reflects real-world scenarios.
Next
  • 1
  • current Page 2
  • 3
Previous
Title
ITNG 2022 19th International Conference on Information Technology-New Generations
Editor
Dr. Shahram Latifi
Copyright Year
2022
Electronic ISBN
978-3-030-97652-1
Print ISBN
978-3-030-97651-4
DOI
https://doi.org/10.1007/978-3-030-97652-1

Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.

Premium Partner

    Image Credits
    Neuer Inhalt/© ITandMEDIA, Nagarro GmbH/© Nagarro GmbH, AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, USU GmbH/© USU GmbH, Ferrari electronic AG/© Ferrari electronic AG