Intelligent Distributed Computing XIV

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book collects 43 regular papers received from 18 countries that present innovative advances in intelligent and distributed computing, encompassing both architectural and algorithmic results related to these fields. Significant attention is given to new models, techniques, and applications for distributed intelligent architectures and high-performance architectures, machine learning techniques, Internet of Things, blockchain, intelligent transport systems, data analytics, trust and reputation systems, and many others. The book includes the peer-reviewed proceedings of the 14th International Symposium on Intelligent Distributed Computing (IDC 2021), which was held in online mode due to the COVSARS2 pandemic situation, during September 16–18, 2021.

The IDC 2021 event included sessions on Internet of Things, data analytics, machine learning, multi-agent systems, algorithms, future intelligent transport solutions, blockchain, intelligent distributed computing for cyber-physical security, and security and trust and reputation in intelligent environments.

Author(s): David Camacho, Domenico Rosaci, Giuseppe M. L. Sarné, Mario Versaci
Series: Studies in Computational Intelligence, 1026
Publisher: Springer
Year: 2022

Language: English
Pages: 463
City: Cham

Organization
Preface
Contents
INTERNET OF THINGS (Main Track)—Chair: David Camacho
EBASI: IoT-Based Emotion and Behaviour Recognition System Against Elderly People Social Isolation
1 Introduction
2 Motivation and Related Work
2.1 Motivation
2.2 Related Work
3 Materials and Methods
3.1 Multimodal Sensor-Based Loneliness Recognition Methodology
3.2 Functional Architecture
3.3 Technical Architecture
3.4 Validation Methodology
4 Results and Discussion
5 Conclusions
References
Smart Health Services Based on IoT and GIS
1 Introduction
2 Definitions and Related Work
3 Smart Health Services Based on IoT and GIS
3.1 Finding the Nearest Health Care Facilities
3.2 Air Quality Monitoring
3.3 Improving Medical Services
3.4 Smart Transport for Patients
3.5 Mobile SOS System
References
A Review of Internet of Things Platforms Through the IoT-A Reference Architecture
1 Introduction
2 IoT-A Reference Architecture
3 State-of-the-Art Analysis
4 Discussion and Conclusions
References
Critical Comparison of Data Imputation Techniques at IoT Edge
1 Introduction
2 Related Work
3 Methodology
3.1 The Air Pollution Dataset
3.2 Techniques Chosen for the Edge Data Imputation
4 Results
5 Conclusion
References
A Novel Approach for Calculating Real-Time Composite Indicators Relying on Internet of Things and Industrial Data Spaces
1 Introduction
2 Context
3 Proposed Solution
3.1 Global Architecture
3.2 Data Gathering Strategy
3.3 Data Sharing Strategy
4 Candidate Open Source Technologies for Implementation
5 Future Work and Conclusions
References
MACHINE LEARNING (Main Track)—Chair: Antonio Guerrieri
Using Evolving Ensembles to Deal with Concept Drift in Streaming Scenarios
1 Introduction
2 An Evolving Ensemble to Deal with Concept Drift
2.1 Initialization
2.2 Evolutionary Phase
3 Results
4 Conclusions and Future Work
References
Applying of Machine Learning for Analyzing Network Traffic in the Conditions of an Unbalanced Data Sample
1 Introduction
2 The Proposed Approach
3 Experimental Study of an Ensemble of Classifiers
4 Conclusion
References
A WNN-Based Approach for Network Intrusion Detection
1 Introduction
2 Related Research
3 WiSARD: A WNN-Based Implementation
4 The CIC-IDS Dataset
5 Experimental Results
6 Conclusion
References
A Force Field Reinforcement Learning Approach for the Observation Problem
1 Introduction
2 Overview of Reinforcement Learning Method Applied to the Observation Problem
3 A Force Field Reinforcement Learning Approach (FFRL)
3.1 Force Field Framework
3.2 Environment Definition
4 Training and Simulation Results
4.1 Training Model
4.2 Results
5 Conclusion and Future Work
References
Macro Architecture for Microservices: Improving Internal Quality of Microservice Systems
1 Introduction
2 SOA Challenges and State of the Art
2.1 Inter-service Architecture Challenges
2.2 Interaction Challenges
2.3 Service Discovery
2.4 Implications
3 Concepts and Implementation
4 Conclusion and Outlook
References
An Artificial Neural Network to Simulate Surface Runoff and Soil Erosion in Burned Forests
1 Introduction
2 Materials and Methods
2.1 Theoretical Approach About the Artificial Neural Networks
2.2 Neural Network Architecture
2.3 Neural Network Training
2.4 The Hydrological Database
2.5 ANN Implementation
2.6 Data Pre-processing
3 Results and Discussions
3.1 Neural Network Approximation
3.2 Evaluation of the ANN Prediction Capability
4 Conclusions
References
FITS (Special Session)—Chair: Maria Nadia Postorino
Cooperative Negotiation in Connected Vehicles for Mitigating Traffic Congestion
1 Introduction
2 Related Work
3 Cooperative Negotiation in Traffic Routing
3.1 Problem Formulation
3.2 Cooperative Negotiation Model
4 Evaluation
4.1 Simulation Settings
4.2 Results
5 Conclusions
References
New Challenges for Urban Air Mobility Systems: Aerial Cooperative Vehicles
1 Introduction
2 Management of UAM Infrastructure
3 UAM Integrated Network and Flight Planning
4 Cooperative and Automated Aerial Vehicles
5 Discussion and Conclusion
References
Combining Coordination Strategies for Autonomous Vehicles in Intersections Networks
1 Introduction
2 Background and Related Work
2.1 Traditional Strategies
2.2 Innovative Strategies
2.3 Intersection Networks
3 Simulations and Results
3.1 Implemented Strategies
3.2 Results
4 Conclusions
References
Using Boundary Objects and ANT Concepts to Implement Multi-agent Systems as Drivers of Innovation in Logistics
1 Introduction
2 Boundary Objects and ANT
3 Implementing Multi-agent Systems as Drivers of Innovation in Logistics
4 Conclusions
References
Traffic Flow Modelling When Autonomous Vehicles Coexist with Human Driven Vehicles: Perspectives and Challenges
1 Introduction
2 Classical Models for Traffic Flows
2.1 Microscopic Models
2.2 Macroscopic Models
2.3 Machine Learning Approaches for Traffic Simulation
3 Modeling Traffic Flow in a Mixed Scenario: Perspectives and Challenges
4 Conclusions
References
Distributed Non-monotonic Reasoning for Transportation Network Congestion Monitoring: Theoretical Foundation
1 Introduction
2 Default Logic for Diagnosis and Symbolic Control
2.1 Default Logic Theory
2.2 Default Theories Extensions
2.3 New Formulation of Symbolic Control
3 Abductive Logical Actors of the Urban Network
3.1 Distributed Default Theory of Intelligent Agents
4 Conclusions
References
IDCCPSS 1 (Special Session)—Chair: Igor Kotenko
Using Clustering Methods of Anomalies and Neural Networks to Conduct Additional Diagnostics of a Computer Network
1 Introduction
2 Formulation of the Problem
3 Computer Network Monitoring System with an Additional Module for Anomaly Diagnostics
4 Method for Monitoring a Computer Network Using the Additional Module for Anomaly Diagnostics
5 Testing of the Module
6 Conclusion
References
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions
1 Introduction
2 Transport-Based Time Synchronization Solutions
3 Classification of Attacks
4 Preliminary Experiments with Software Tampering Attacks
5 Conclusions
References
An Approach to Automated Assessment of the Image of a Territorial Entity in the Media Discourse of a Foreign States
1 Introduction
2 State of the Art Analysis
3 Proposed Approach
4 Experimental Testbed
5 Results of the Experiment
6 Conclusion and Discussion
References
FL4J—Federated Learning Framework for Java
1 Introduction
2 Related Works
3 Framework Design
3.1 Components Overview
3.2 Abstract Mining Model Design
3.3 Data Mining Algorithm Design
3.4 ANN Implementation via DL4J
4 Experiments
5 Conclusions
References
BLOCKCHAIN (Main Track)—Chair: Daniele Santamaria
Ontological Smart Contracts in OASIS: Ontology for Agents, Systems, and Integration of Services
1 Introduction
2 Related Work
3 Ontological Smart Contracts in OASIS
4 Architectural Design of an OSC-Oriented Application
5 Conclusions and Future Work
References
Blockchains Through Ontologies: The Case Study of the Ethereum ERC721 Standard in OASIS
1 Introduction
2 Related Works
3 Preliminaries
4 Representing Ethereum Through OASIS
5 The ERC721 Standard in OASIS
6 Conclusions
References
Preselection Based Leader Election in Distributed Systems
1 Introduction
2 System Model and Problem Definition
3 Proposed Leader Election Algorithm
3.1 Complexity Analysis
3.2 Proof of Termination, Uniqueness, and Agreement Conditions
4 Experimental Analysis and Discussion
5 Conclusion
References
Physical Assets Tokenization for Blockchain Market
1 Introduction
2 Related Work
3 State of the Art
4 Proposed Approach
4.1 Phase 1
4.2 Phase 2
4.3 Phase 3
5 Conclusions
References
MAS & ALGORITHMS (Main Track)—Chair: Fabrizio Messina
Intelligent Agents for Diffused Cyber-Physical Museums
1 Introduction
2 Related Work
3 The Cleopatra Framework
3.1 Cyber-Physical Collaboration
3.2 Software Architecture
4 Case Study and Software Prototype
5 Conclusion
References
T-Patterns: A Way to Model Complex Trustworthiness in a Social Multi-agent Community
1 Introduction
2 Related Work
3 The Multi-agent Social Scenario
4 The T-Pattern Model
4.1 Automatic Rules Application
4.2 T-Pattern Network
4.3 An Explicative Example
5 The T-Pattern Architecture (TPA) to Automatically Manage a TPN
6 Conclusion
References
An Algorithmic Proposal for the Qualitative Comparison Between the Chen-Yeh EIT Mixture Model and the Susan-Resiga GSMs Experimental Model for MR Fluids
1 Introduction
2 The Chen-Yeh Model
3 The Susan-Resiga Model
4 The Proposed Algorithm
4.1 Step 1: Elast-Visco-Plastic Model and GSM and Simple Shear Flow
4.2 Step 2: GSMs Framework and The Constitutive Laws
4.3 Step3: GSMs Framework and Evolutionary Constitutive Equations
5 Some Important Results on the Qualitative Correspondence Between the Models
6 Conclusions and Perspectives
References
DataX: A System for Data eXchange and Transformation of Streams
1 Introduction
2 DataX Abstraction
3 Benefits
4 Design and Implementation
5 Distributed Application Development Using DataX
6 Related Work
7 Conclusion
References
Monitoring Hierarchical Systems for Safety Assurance
1 Introduction
2 Monitoring of Hierarchical Systems
3 Automotive Use Case
4 Conclusions
References
DATA ANALYTICS (Main Track)—Chair: Michele Malgeri
Preliminary Characterization of Italian Academic Scholars by Their Bibliometrics
1 Introduction
2 Data Set Description
3 Data Set Analysis
3.1 Bibliometrics Analysis
3.2 Analysis of Publication Area and Fields
4 Conclusions
References
ERAKS—Interactive Interface to Annotate Entities, Co-references, and Relationships
1 Introduction
2 Related Work
3 General Architecture of the Annotation
3.1 Annotation of Entities and Co-references
3.2 Annotation of Triggered Relationships Between Entities
4 Automatic and Interactive Manual Annotation
5 Graphic Interpretation of the Lists Extracted from the Annotated Documents
6 Conclusions and Future Work
References
Graph Theory Applied to Brain Network Analysis in Alzheimer's Disease
1 Introduction
2 Materials and Methodology
2.1 HD-EEG Acquisition System and Data Preprocessing
2.2 eLORETA Lagged Linear Connectivity Toolbox and Complex Network Parameters
3 Experimental Results
4 Discussion and Conclusions
References
Detection of Postpartum Depression-Related Posts: An Analysis for Serbian
1 Introduction
2 Related Work
3 Evaluation Dataset
4 Methodology
5 Results and Discussion
6 Conclusions and Future Work
References
SmartTeV—Leveraging eVoting with Smart Voting Ballots
1 Introduction
2 TeV Framework: Design Principles and Functionality Overview
3 Motivation for Smart Ballot
4 Intelligent Vote Tallying
5 Concluding Remarks and Future Directions
References
IDCCPSS 2 (Special Session)—Chair: Vasily Desnitsky
A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems
1 Introduction
2 Related Work
3 Technique Description
4 Experimental Evaluation
5 Discussion
6 Conclusion
References
An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents
1 Introduction
2 Related Work
3 Statement of the Problem of Synthesizing a Neural Network System for Diagnosing Computer Incidents
4 Parameters of the Combined Artificial Neural Network
5 The Structure of a Neural Network System for Diagnosing Computer Incidents
6 Experiments
7 Conclusion
References
Approach to Anomaly Detection in Cyber-Physical Object Behavior
1 Introduction
2 Related Work
3 Approach for the Assessment of Changes in CPO's Behaviour
4 Experiments and Discussion
5 Conclusion
References
Security Analysis of Information Systems Based on Attack Sequences Generation and Testing
1 Introduction
2 Related Work
3 The Technique for Information Security Analysis
3.1 Attack Sequences Generation and Testing
3.2 Risk Assessment
4 Implementation and Experiments
5 Conclusion
References
TRIE (Special Session) & COMPUTING—Chair: Lidia Fotia
A Comparative Analysis of a Designed CNN and AlexNet for Image Classification on Small Datasets
1 Introduction
2 Convolutional Neural Networks
2.1 Architecture of CNN
2.2 Pre-trained CNN: AlexNet
3 Experimental Setup and Results
3.1 Dataset
3.2 Experimental Setup for Designed CNN
3.3 Experimental Setup for AlexNet
3.4 Results
4 Conclusions
References
A Clustering Reputation-Based Framework in Edge-Based IoT Environments
1 Introduction
2 Related Work
3 Our Scenario
4 The Cluster Reputation Model
5 Experiments
6 Conclusions
References
On Next-Generation Sequencing Compression via Multi-GPU
1 Introduction
2 Genomics and VCF Format
3 Related Works
4 VCF Shark Details
4.1 Streams
4.2 Compression Schema and Computational Issues
5 Parallel Algorithm
5.1 Work-Load Distribution
5.2 GPU-parallel Implementation Details
6 Results
7 Conclusions
References
Experimental Approach of the Quantum Volume on Different Quantum Computing Devices
1 Introduction
2 Benchmarking Quantum Computing Devices
3 Quantum Volume
4 Experimental Investigation of Quantum Volume
5 Discussion
6 Conclusion
References