Computer and Communication Engineering: Third International Conference, CCCE 2023, Stockholm, Sweden, March 10–12, 2023, Revised Selected Papers (Communications in Computer and Information Science)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes refereed proceedings of the Third International Conference on Computer and Communication Engineering, CCCE 2023, held in Stockholm, Sweden, in March 2023.
The 18 full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in the following topical sections: image analysis and method; network model and function analysis of mobile network; system security estimation and analysis of data network; and AI-based system model and algorithm.

Author(s): Filippo Neri (editor), Ke-Lin Du (editor), Vijayakumar Varadarajan (editor), Angel-Antonio San-Blas (editor), Zhiyu Jiang (editor)
Publisher: Springer
Year: 2023

Language: English
Pages: 248

Preface
Conference Committees
Contents
Image Analysis and Method
Enhanced Acoustic Noise Reduction Techniques for Magnetic Resonance Imaging System
1 Introduction
2 Related Works
3 Proposed Methodology
4 Experimental Setup
4.1 Performance of Noise Reduction Process with the Effect of Insulation
4.2 Performance of Noise Reduction in the Presence of Static Magnetic Field
4.3 Performance of Noise Reduction with Multiple Microphones
5 Conclusions
References
Rough Rice Grading in the Philippines Using Infrared Thermography
1 Introduction
2 Materials and Methods
2.1 Rough Rice Sample
2.2 Image Acquisition
2.3 Purity and Foreign Matter
2.4 Moisture Content
2.5 Evaluation Using Confusion Matrix
3 Results and Discussion
4 Conclusion
References
An Interpretable Hybrid Recommender Based on Graph Convolution to Address Serendipity
1 Introduction
2 Previous Works
2.1 Recommendation Systems
2.2 Evaluating Novelty in Recommendation
2.3 Serendipity
2.4 Interpretability
3 Data
4 Proposed Methodology
4.1 Architecture
4.2 Neural Collaborative Filtering
4.3 Content-Based Recommender
4.4 Cluster-Based Recommender
4.5 Hybrid SocialLGN
4.6 Hybrid Recommender
4.7 Measuring Serendipity
4.8 Incorporating Interpretability
5 Results
6 Discussion
7 Conclusion
8 Future Work
References
Network Model and Function Analysis of Mobile Network
A Geometry-Based Strategic Placement of RISs in Millimeter Wave Device to Device Communication
1 Introduction
2 Related Works
3 System Model
3.1 Path Loss Model
3.2 Channel Model and System Throughput
4 Strategic Deployment of RIS
4.1 Candidate Zone for a Single Device Pair
4.2 Candidate Zones for All Device Pairs
4.3 Clique Based RIS Placement Strategy
5 Simulation Results
6 Conclusion
References
Obstacle Aware Link Selection for Stable Multicast D2D Communications
1 Introduction
2 System Model
3 Problem Formulation
4 Obstacle Aware Multicasting Algorithm
4.1 Constructing a Stable Multicast Route
5 Learning Blockage Probabilities
6 Simulation Results
7 Conclusion
References
Mobility Aware Path Selection for Millimeterwave 5G Networks in the Presence of Obstacles
1 Introduction
2 System Model
3 Proposed Path Allocation Algorithm
3.1 Estimating Dynamic Obstacle Trajectory
3.2 UE Mobility and Static Obstacles
3.3 Proposed Algorithm
4 Simulation Results
5 Conclusion
References
A Probabilistic Analysis of the Delay in RIS Assisted SISO D2D Communication Using Chernoff's Bounds
1 Introduction
2 Related Works
3 System Model
4 Problem Formulation
5 A Bound on Delay (n) for RIS Assisted D2D SISO Link
5.1 Apparent Link Success Probability p'
6 Simulation and Results
7 Conclusion
References
System Security Estimation and Analysis of Data Network
Enhancing IoT Security Through Deep Learning-Based Intrusion Detection
1 Introduction
2 Related Works
3 Dataset Description
4 System Framework
5 ERT Classifier Based Feature Importance
6 Classification Phase
6.1 Gated Recurrent Units
7 Results and Discussions
8 Conclusion and Future Scope
References
A Security and Vulnerability Assessment on Android Gambling Applications
1 Introduction
1.1 Objective of the Study
1.2 Scope and Limitation
2 Review of Related Literature and Studies
2.1 Vulnerabilities on the Mobile Phone and Applications
2.2 Quick Android Review Kit (QARK) as a Vulnerability Scanner
2.3 Mobile Security Framework (MobSF) as Another Tool for Security Scanning
3 Methodology
4 Results and Key Findings
4.1 APK 1 Using QARK
4.2 APK 2 Using QARK
4.3 APK 1 Using MOBSF
4.4 APK 2 Using MOBSF
5 Conclusion and Recommendation
References
A Compliance Based and Security Assessment of Bring Your Own Device (BYOD) in Organizations
1 Introduction
1.1 Background of the Study
1.2 Objective of the Study
1.3 Scope of the Study
2 Literature Review
2.1 BYOD – Compliance in Organization
2.2 BYOD Malware Attacks
3 Methodology
3.1 Research Design
3.2 Security Assessment Process
4 Results and Key Findings
4.1 Survey Questionnaire Results
4.2 Respondents Profile
4.3 BYOD at Work
4.4 Security Assessment
5 Discussion
6 Conclusion
References
Development of Home-Bot with Accident-Sensory System Using IOT and Android Application for Control
1 Introduction
2 Materials and Methods
2.1 Conceptual Framework
2.2 Functional Block Diagram
2.3 Process Flow Diagram
2.4 Software Integration
2.5 Hardware Design and Development
2.6 Conduct of Functionality Test
2.7 Confusion Matrix
3 Results and Discussion
3.1 Device Fabrication and Functionality
3.2 Data Gathering and Statistical Analysis
4 Conclusion and Future Works
References
AI-Based System Model and Algorithm
Application of Machine Learning in Predicting Crime Links on Specialized Features
1 Introduction
2 Related Works
2.1 Selected Theoretical Techniques
3 Proposed Crime Link Prediction by Classification
3.1 Stage 1: Data Acquisition
3.2 Stage 2: Data Pre-processing (ETL Process)
3.3 Stage 3: Modelling and Prediction
3.4 Evaluation Metrics
4 Experimental Evaluations and Results
4.1 Data Description and Experimental Settings
4.2 Experiment 1: Predicting Future Crime Locations from Africa-Based Data
5 Conclusion and Future Work
References
An Empirical Analysis on Lossless Compression Techniques
1 Introduction
2 Related Works
3 Preliminaries
3.1 Run Length Encoding
3.2 LZW Compression Algorithm
3.3 Huffman Encoding
4 Implementation
4.1 Run Length Encoding
4.2 LZW Compression Algorithm
4.3 Huffman Encoding
5 Comparison and Result Analysis
5.1 Measurement Factors
5.2 Result Comparison:
5.3 Result Analysis
6 Conclusion
References
An Analysis of the Performance Changes of the Model by Reducing the Input Feature Dimension in Stock Price Forecasting
1 Introduction
2 Related Works
2.1 Deep Learning Models for Stock Price Prediction
2.2 Dimensionality Reduction & PCA Algorithms with Stock
3 Model Design Using PCA Algorithms & Experiment
3.1 Detailed Design of the Model
4 Experiments
4.1 The Performance of Prediction Models
5 Conclusion
References
A Hybrid Algorithm by Incorporating Neural Network and Metaheuristic Algorithms for Function Approximation and Demand Prediction Estimation
1 Introduction
2 Literature Review
3 Methodology
4 Experimental Evaluation Results
4.1 Performance Estimation and Comparison
5 Case Study for Demand Prediction Estimation
6 Conclusions
References
Deep QA: An Open-Domain Dataset of Deep Questions and Comprehensive Answers
1 Introduction
2 Related Work
3 Dataset and Dataset Generation
3.1 Domain
3.2 Questions Requiring Deeper Understanding
3.3 Method for Generation of Questions
4 Dataset Analysis
4.1 Entities
4.2 Words
4.3 Sentences
4.4 Readability Scores
5 Evaluating the Answerability of DQA Questions
5.1 A Graph Based Approach for Answering Deeper Questions
6 Conclusion
References
Tropical Cyclone Analysis and Accumulated Precipitation Predictive Model Using Regression Machine Learning Algorithm
1 Introduction
2 Related Literature
2.1 Philippine as Disaster Prone Country
2.2 Early Warning Sign and Predictive Model
3 Methodology
3.1 Experimental Methodology
3.2 Tropical Cyclone Datasets
3.3 Data Pre-processing
3.4 Data Mining Tool
3.5 Rainfall Prediction Approach and Prediction Model Using Regression Machine Learning Algorithm
4 Results and Discussion
5 Conclusion
References
Mapping Learning Algorithms on Data, a Promising Novel Methodology to Compare Learning Algorithms
1 Introduction
2 State of the Art in Comparing Learning Algorithms
2.1 Our Proposal: Comparing Learning Algorithms with Performances Maps and Their HP(k) Values
3 Learners and Meta Optimization Methods
4 The Parameter Spaces for the Selected Learners
5 Parameter Settings for the Meta-Optimization Methods
6 Data Set Descriptions
7 Experimental Analysis
7.1 Performance Maps
8 Conclusions
References
Author Index