This book includes the latest research in the diverse field of intelligent distributed computing, covering a multitude of aspects in both distributed computing and intelligent systems. It includes contributions in machine learning, distributed systems & agents, text- and research-centric applications, social systems, and smart cities.
It was written by leading experts in the field, who presented their work as part of the 15th International Symposium on Intelligent Distributed Computing (IDC 2022).
Author(s): Lars Braubach, Kai Jander, Costin Bădică
Series: Studies in Computational Intelligence, 1089
Publisher: Springer
Year: 2023
Language: English
Pages: 313
City: Cham
Preface
Organization
Contents
Machine Learning
Using Artificial Neural Networks to Model Initial Recruitment of Mediterranean Pine Forests
1 Introduction
2 The Artificial Neural Networks Stage
2.1 An Overview
2.2 The Dataset
2.3 The Neural Network Setting
3 Results and Discussion
4 Conclusions
References
Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center
1 Introduction
2 Related Work
3 Theoretical Background
4 Implementation
5 Experimental Results
6 Conclusion
References
Dynamic Management of Distributed Machine Learning Projects
1 Introduction
2 Conceptualization
2.1 Data Model
2.2 Architecture
3 Validation
4 Discussion, Conclusions and Future Work
References
Enabling Neural Network Edge Computing on a Small Robot Vehicle
1 Introduction
2 Selection of Suitable Frameworks
3 Prototype Implementations
4 Summary and Outlook
References
Using SHAP-Based Interpretability to Understand Risk of Job Changing
1 Introduction
2 Related Works
3 System Development
3.1 Data Collection
3.2 Features and Data Pre-processing
3.3 Model Development
4 Experiments and Results
4.1 General Result over Training Data
4.2 Individual Result over Training Data
4.3 Application Example
5 Conclusions and Future Works
References
Image-Based Intrusion Detection in Network Traffic
1 Introduction
2 Related Works
3 The Proposed Approach to Image Based Feature Extraction
4 Experiments and Results
5 Discussion and Conclusions
References
Real-Time Traffic Prediction Using Distributed Deep Learning Based Multivariate Time-Series Models
1 Introduction
2 Related Works
3 Distributed Deep Learning for Time Series Forecasting
3.1 Deep Learning Models for Time Series Forecasting
3.2 Distributed Deep Learning Implementation
4 Experiment
4.1 Dataset
4.2 Experimental Results
4.3 Comparative Study
5 Conclusion
References
Machine Learning Model for Flower Image Classification on a Tensor Processing Unit
1 Introduction
2 Related Work
3 Algorithm and Model Architecture
3.1 EfficientNet
3.2 DenseNet
4 Implementation
4.1 Dataset
4.2 Tensor Processing Unit (TPU)
4.3 Data Access and Visualization
4.4 Model Creation and Training
4.5 Model Evaluation
5 Experimental Results
6 Conclusion
References
Distributed Systems, Agents and Microservices
Distributed Microservices Architecture for Fuzzy Risk-Based Structural Analysis of Resistance to Change in Digital Transformation Practice
1 Introduction
2 Theoretical Basis on Fuzzy Galois Lattices
2.1 Fuzzy Formal Concepts Analysis
2.2 Computing Process
3 Method
3.1 Illustrative Example: Fuzzy FCA and Risks in Digital Transformation Practice
3.2 Microservices and Distributed Architecture
4 Results and Discussion
5 Conclusion
References
Simulating Traffic with Agents, Microservices and REST
1 Introduction
2 Related Work
2.1 Traffic Simulation
2.2 Multi-agent Systems
3 A Prototype Traffic Simulation
3.1 Sketch of Implementation
3.2 Walkthrough
4 Lessons Learnt
5 Conclusions
References
Stock Price Forecasting on BigDL - A Parallel and Distributed Framework
1 Introduction
2 Related Works
3 Dataset
4 Methodologies
4.1 Frameworks
4.2 Models
5 Experiment and Evaluation
6 Conclusion and Future Work
References
Towards a New Architecture: Multi-agent Based Cloud-Fog-Edge Computing and Digital Twin for Smart Agriculture
1 Introduction
2 Related Work
3 Proposed Architecture
4 Conclusions and Future Work
References
A Survey on the Use of the Multi-agent Paradigm in Coordination of Connected and Autonomous Vehicles
1 Introduction
1.1 Adopted Methodology
1.2 Exploited Agent Approaches
2 Classification of the Papers
3 Conclusions
References
Proof-of-Concept (PoC) Biometric-Based Decentralized Digital Identifiers
1 Introduction
2 Concept Overview and Methods
2.1 Face Detection, User-Image Extraction
2.2 Biometric Feature Data Extraction and Cryptography
2.3 Visual Cryptography Output-Image Smoothing and Biometric Feature Matching
2.4 Blockchain Network and Smart Contract
3 Biometrically Based Decentralized Digital Identifiers
3.1 User Registration and Authentication
3.2 User Authentication
4 Limitations and Conclusions
References
Text and Research
Correlation Between Researchers' Centrality and H-Index: A Case Study
1 Introduction
2 MAT/05 Data Source and Co-authorship Network
3 dataset build
4 Predicting the h-index from the Centrality Metrics
5 Conclusions
References
Towards an Online Multilingual Tool for Automated Conceptual Database Design
1 Introduction
2 Related Work
3 TexToData Tool
4 Illustrative Examples
5 Conclusion
References
ProExamit: Development of Cross-Platform, Fully Automated and Expandable in Terms of Detectable Violations Proctoring
1 Introduction
2 State of the Art
3 Architecture
3.1 Violations
3.2 Video Handlers
4 Conclusion and Future Work
References
A Novel Two-Stages Information Extraction Algorithm for Vietnamese Book Cover Images
1 Introduction
2 Related Work
3 Dataset Creation
3.1 Annotation Guidelines
3.2 Annotation Process
3.3 Dataset Statistics
4 Baselines
4.1 Text Detection
4.2 Text Recognition
5 Experiments
5.1 Experiment Setting
5.2 Experiment Results
6 Conclusion and Future Work
References
Enhancing 2D Hand Pose Detection and Tracking in Surgical Videos by Attention Mechanism
1 Introduction
2 Related Work
3 Attention-Based 2D Hand Pose Detection and Tracking
3.1 Baseline
3.2 Soft-Attention-Based Models
3.3 Channel Attention-Based Models
4 Performance Evaluation
4.1 Dataset
4.2 Experimental Setup
4.3 Numerical Results
5 Conclusion
References
An Autonomy-Based Collaborative Trust Model for User-IoT Systems Interaction
1 Introduction
2 State of the Art
3 Simulation Model
3.1 The User
3.2 The Devices
3.3 The Tasks
3.4 Trust and Autonomy
4 Simulations and Results
5 Discussion and Conclusions
References
Efficient Approaches to Categorize Unstructured Documents into Sustainable Categories by Using Machine Learning
1 Introduction
2 Related Work
3 Text and Document Classification
4 Implementation Details
4.1 Dataset Preparation
4.2 Data Cleaning and Preparing
4.3 Optimal Number of Clusters
4.4 K-Means Unsupervised Algorithm
4.5 Bayesian Gaussian Mixture Algorithm
5 Results and Evaluation
6 Conclusion and Future Work
References
Prediction Models Applied to Lung Cancer Using Data Mining
1 Introduction
2 Related Work
3 Materials and Methods
4 Data Mining Implementation
5 Conclusions and Future Work
References
Social Systems
Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts
1 Introduction
2 Research Methodology and Input Data
3 Datasets and Models for Sentiment Analysis
4 Sentiment-Based Feature for Destructiveness and Experiments
5 Classifier for the Detection of the Potentially Destructive Impact Considering the Sentiment-Based Feature and Discussion
6 Conclusion
References
SABRE: Cross-Domain Crowdsourcing Platform for Recommendation Services
1 Introduction
2 Related Work
3 SABRE: Cross-Domain Crowdsourcing Platform
3.1 Overview
3.2 User Cognition-Based Collaborative Filtering Model
4 Experiments
4.1 Datasets
4.2 Evaluation
5 Conclusion
References
Balance vs. Contingency: Adaption Measures for Organizational Multi-agent Systems
1 Adaptivity in Agent Architectures
2 Sonar: Organisations as Run-Time Models for MAS
3 The Sonar-Formalism
4 Analysis of Sonar-Models Assuming a Static Environment
5 Analysis of Sonar-Models Assuming a Dynamic Environment
6 Conclusion
References
Technique for Investigating Attacks on a Company's Reputation on a Social Media Platform
1 Introduction
2 Related Research
3 Proposed Methodology
3.1 Attack Identification
3.2 Attack Actors Identification
3.3 Assess Impact
3.4 Identify Core Actors
3.5 Identify Bots Usage
3.6 Identify Conflict Initiation Attempts
3.7 Identify Competitor Promotion
3.8 Identify Uncoordinated User Attack
4 Evaluation
4.1 Assess the Presence of an Attack
4.2 Identify Attack's Actors
4.3 Assess Impact
4.4 Identify Core Actors and Attack Strategy
5 Discussion and Conclusion
References
An Experimental Validation of the Practical Byzantine Fault Tolerant Algorithm
1 Introduction
2 Related Works
3 Problem Description
3.1 PBFT in a Nutshell
3.2 Authentication
3.3 Network Mapper
3.4 Node Component
3.5 Node Stub
4 Experimental Results
4.1 Experiments and Discussion
5 Conclusion and Future Works
References
Smart Cities
Smart Parking for All: Equipped and Non-equipped Vehicles in Smart Cities
1 Introduction
2 Related Work
3 The Scenario
4 Our Proposal for Smart Parking
5 Experiments and Results
5.1 Experimental Set up
5.2 Experiments
6 Conclusions
References
EV Route Planning Across Smart Energy Neighborhoods
1 Introduction
2 Related Work
3 Problem Formulation and Solution Strategy
3.1 Charge Allocation
4 Energy Schedule
4.1 Genetic Algorithm Solution
5 Experimental Results
6 Conclusion
References
A 3D Urban Aerial Network for New Mobility Solutions
1 Introduction
2 Framework Background
3 The 3D Urban Air Network Model
4 Requirements and Implications of the 3D-UAN Model
5 Simulation Architecture
6 Discussion and Conclusion
References
License Plate Detection and Recognition Using CRAFT and LSTM
1 Introduction
2 Background and Related Research
3 System Design
3.1 Number Plate Detection
3.2 Number Plate Recognition
4 Implementation and Results
4.1 Dataset
4.2 Evaluation Criterion
4.3 Result of the Number Plate Detection Phase
4.4 Result of the Number Plate Recognition Phase
5 Discussion and Conclusion
References
Cooperative Negotiation-Based Traffic Control for Connected Vehicles at Signal-Free Intersection
1 Introduction
2 Related Work
3 Distributed, Cooperative Negotiation Method in Signal-Free Intersection Control
3.1 Problem Definition
3.2 Distributed, Cooperative Negotiation Method
4 Performance Evaluation
4.1 Simulations Settings
4.2 Simulation Results
5 Conclusions
References
Author Index