Table Of ContentEAI/Springer Innovations in Communication and Computing
Manolo Dulva Hina
Amar Ramdane-Cherif
Rafik Zitouni
Assia Soukane Editors
Advances in
Computational
Intelligence and
Communication
Selected Papers from the
2nd EAI International Conference
on Computational Intelligence and
Communications (CICom 2021)
EAI/Springer Innovations in Communication
and Computing
SeriesEditor
ImrichChlamtac,EuropeanAllianceforInnovation,Ghent,Belgium
The impact of information technologies is creating a new world yet not fully
understood. The extent and speed of economic, life style and social changes
already perceived in everyday life is hard to estimate without understanding the
technological driving forces behind it. This series presents contributed volumes
featuring the latest research and development in the various information engi-
neering technologies that play a key role in this process. The range of topics,
focusing primarily on communications and computing engineering include, but
arenotlimitedto,wirelessnetworks;mobilecommunication;designandlearning;
gaming;interaction;e-healthandpervasivehealthcare;energymanagement;smart
grids;internetofthings;cognitiveradionetworks;computation;cloudcomputing;
ubiquitousconnectivity,andinmodegeneralsmartliving,smartcities,Internetof
Thingsandmore.Theseriespublishesacombinationofexpandedpapersselected
from hosted and sponsored European Alliance for Innovation (EAI) conferences
that present cutting edge, global research as well as provide new perspectives on
traditional related engineering fields. This content, complemented with open calls
forcontributionofbooktitlesandindividualchapters,togethermaintainSpringer’s
and EAI’s high standards of academic excellence. The audience for the books
consists of researchers, industry professionals, advanced level students as well as
practitioners in related fields of activity include information and communication
specialists, security experts, economists, urban planners, doctors, and in general
representativesinallthosewalksoflifeaffectedadcontributingtotheinformation
revolution.
Indexing:ThisseriesisindexedinScopus,EiCompendex,andzbMATH.
About EAI - EAI is a grassroots member organization initiated through coopera-
tion between businesses, public, private and government organizations to address
the global challenges of Europe’s future competitiveness and link the European
Research community with its counterparts around the globe. EAI reaches out to
hundreds of thousands of individual subscribers on all continents and collaborates
with an institutional member base including Fortune 500 companies, government
organizations, and educational institutions, provide a free research and innovation
platform. Through its open free membership model EAI promotes a new research
and innovation culture based on collaboration, connectivity and recognition of
excellencebycommunity.
Manolo Dulva Hina • Amar Ramdane-Cherif •
Rafik Zitouni • Assia Soukane
Editors
Advances in Computational
Intelligence and
Communication
Selected Papers from the 2nd EAI
International Conference on Computational
Intelligence and Communications (CICom
2021)
Editors
ManoloDulvaHina AmarRamdane-Cherif
SICLaboratory,OmnesEducation LISVlaboratory
ResearchCentre UniversityofVersailles-Paris-Saclay
ECEParisSchoolofEngineering Vélizy,France
Paris,France
RafikZitouni AssiaSoukane
5GIC&6GIC,InstituteforCommunication ECEResearchCentre
Systems(ICS) ECEParisSchoolofEngineering
UniversityofSurrey Paris,France
Guildford,UK
ISSN2522-8595 ISSN2522-8609 (electronic)
EAI/SpringerInnovationsinCommunicationandComputing
ISBN978-3-031-19522-8 ISBN978-3-031-19523-5 (eBook)
https://doi.org/10.1007/978-3-031-19523-5
©EuropeanAllianceforInnovation2023
Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether
thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse
ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and
transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar
ordissimilarmethodologynowknownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook
arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor
theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany
errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional
claimsinpublishedmapsandinstitutionalaffiliations.
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG
Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland
Preface
This book contains some selected papers from CICom 2021, the second EAI
International Conference on Computational Intelligence and Communications.
The book is intended as academic and research material for students, educators
and researchers who wish to learn the latest developments in the domain of
computationalintelligenceandcommunications.
Artificial Intelligence is a domain that deals with the design, development
and implementation of various systems capable of imitating human intelligence.
Computational intelligence is a subset of artificial intelligence. It is a field of
computersciencebywhichacomputerlearnssomespecifictasksusinglearneddata
or experimental observations. It addresses complex real-world problems in which
usingmathematicalortraditionalmodellingisnotthepreferredsolutiongiventhat
(i) the involved computational process might be too complex for mathematical
reasoning; (ii) it might contain some uncertainties during solution processing; or
(iii)bynature,thecomputationalprocessisarandomlydeterminedone(heuristic).
Nature-inspired phenomena are imitated, and different solutions inspired by such
phenomena are adapted. Nowadays, computational intelligence has evolved to
include neural networks, fuzzy logic systems and evolutionary computation, as
well as social reasoning, artificial life, ambient intelligence, deep learning and the
likes.Thisbookcontainseightchapters,eachofwhichpresentstypicaltopicsand
problemsinwhichvariouscomputationintelligencesolutionsareadapted.
Chapter 1 is about the perception enhancement of a vehicle in a bad weather
environment.Badweatherduetorain,fogorreducedvisibilityhinderstheproper
functioning of a sensor. The chapter proposes the use of drones (a.k.a., UAV or
unmanned aerial vehicle) to supplement or enhance the vehicle’s perception of
its environment. The environment perception and vehicle/UAV interactions are
managedbyaknowledgebaseintheformofanontology,andlogicalrulesareused
in order to detect and infer the environmental context and the UAV management.
Ausecaseispresented,testedandvalidatedusingasimulatordevelopedusingthe
Unity3Dprogrammingplatform.
Chapter2presentsaworkonadaptiveneuralbackstepping(BacksteppingRBF)
to control three joints (hip, knee and ankle) of a right lower limb exoskeleton. To
v
vi Preface
validate its proposed controller, cosimulation experiments were performed using
SolidWorks, SimMechanics and MATLAB/Robotics Toolbox. The results showed
that the authors’ proposed approach produces the best performance compared
to the backstepping controller, and the backstepping 1st and 2nd order sliding
mode controller techniques. The proposed method ensures tracking of the desired
trajectorywithhighaccuracywhileitgeneratesatorquewithoutchattering.
Chapter 3 deals with an evaluation framework for blockchain-based public
key infrastructures. The X.509 Public Key Infrastructure (PKI) is an important
trusted infrastructure for establishing a secure connection among participants on
theInternet.Nevertheless,theinfrastructureisfarfromperfectsincevariousattacks
in the past decade successfully exploited its weaknesses. A common idea for the
creation of a more resilient PKI is the use of distributed ledger technology such
asblockchain.Inthischapter,theauthorsproposeasetofrequirementswhichcan
beusedtoevaluate andcomparethemeritsofacertaindesign.Thisframeworkis
puttothetestbyareviewoftwelvepublishedblockchain-basedPKIreplacements
or extensions. The authors recommended integrating the most promising ideas
put forward by different proponents. In doing so, a holistic and scalable solution
becomespossible.
Chapter 4dealswithevaluationoftheperformanceofMIMOvehicularvisible
light communications. Vehicular communication allows connectivity and data
sharingbetweentravelingvehicles,becomingatooltoimproveroadsafetyandcom-
fortabledriving.Inthischapter,theperformanceofMultiple-InputMultiple-Output
(MIMO)vehicularcommunicationsystemutilizingthevisiblelightcommunication
(VLC) technology is investigated. The chapter considered a VLC-based-vehicle-
to-vehicle (V2V) system, where two vehicles follow each other on a single-lane
road. The received optical power and the bit error rate (BER) are investigated for
eachMIMOlinkbetweentransmittersandreceivers.Theimpactofdisplacements,
weatherconditionsandreceiveraperturesisalsodiscussed.
Chapter 5 proposes an efficient big data architecture based on microservices.
Software architectures for big data generally correspond to a stack of software
chosen initially for their functionality and compatibility. Big Data applications
evolveatdifferentrates.Theexecutionoftheseapplicationsrequiresconfigurations
thatdependontheresourcesused.Theseconfigurationsarenotfixed;someevolve
over time. The authors looked back at their Big Data architecture to make it more
manageableandmorereactivetotheexecutioncontextbyproposingaKubernetes
orchestration based on business microservices. As a result, the use of computing
resourceshasimproved,anddataaccessbecamebettermanaged.Theirapplication
logmanagementstrategyusedthedistributionofcomputationalcasebyseparating
theactivitymonitoringfromthebigdatacomputationcode.
Chapter6dealswithanintelligenttargetcellselectionalgorithmforlowlatency
5G networks. The fifth generation (5G) networks are characterized by ultra-dense
deploymentofbasestationswithalimitedfootprint.Consequently,userequipments
handoverfrequentlyastheymovewithin5Gnetworks.Inaddition,5Grequirements
ofultra-lowlatenciesimplythathandoversshouldbeexecutedswiftlytominimize
Preface vii
service disruptions. To preserve security and privacy while maintaining optimal
performanceduringhandovers,numerousschemeshavebeendeveloped.However,
majorityofthesetechniquesareeitherlimitedtosecurityandprivacyoraddressonly
the performance aspect of the handover mechanism. For this reason, there is need
for a novel handover authentication protocol that addresses security, privacy and
performance simultaneously. This chapter developed a machine learning protocol
that not only facilitated the optimal selection of target cell but also upheld both
securityandprivacyduringhandovers.Theauthors’simulationresultsshowedthat
their protocol had lower packets drop rate and pingpong rate, with a higher ratio
of packets received compared to improved 5G authentication and key agreement
(5GAKA’)protocol.Inaddition,theproposedprotocolwasrobustagainstpacket
replays,eavesdropping,forgery,masquerade,man-in-the-middle(MitM)anddenial
ofservice(DoS)attacks.
Chapter 7presents“AdvancesinCoyoteOptimizationAlgorithm:Variantsand
Applications”. TheCoyote Optimization Algorithm(COA) isarecentpopulation-
based algorithm inspired by the intelligent social behaviour of coyotes. COA has
been widely applied to tackle different optimization issues in several areas and
has proven its success compared to other meta-heuristics found in the literature.
Inthischapter,theauthorsdescribeanoverviewofCOAanditsvariantsincluding
modified and hybridized versions. Moreover, COA applications in various fields
suchasimagesegmentation,wirelesssensornetworks,economicdispatch,electric
power systems, distributed generation and other engineering problems are pre-
sented. Finally, we recommend some interesting future research areas directions
forCOA.
Chapter 8 presents “K Semantics for Security Policy Enforcement on Android
Applications with Practical Cases”. Android is one of the most widely used
operatingsystems,yetandroidapplicationshavehelpedmalwarecreatorstobreak
in and infect smartphone devices. A long list of threats caused by downloaded
applicationstargetstheintegrityofthesystemandtheprivacyofusers.Toprotect
android users from such applications, the authors propose a formal environment
for security policy enforcement. The main idea is to establish a synergy between
the aspect-oriented paradigm and formal methods such as the program rewriting
technique.Theapproachistorewritetheapplicationprogrambyaddingcontroltests
at certain carefully selected points to ensure that the security policy is respected.
The new version of the program preserves all the good behaviours of the original
version, complying with security policy and acting against the bad ones. Here, all
the steps for security policy enforcement are performed automatically using the
K-framework. This semantic engineering framework handles the whole process,
fromtheformalspecificationofthepolicyandtheprogramuptotheenforcement
technique.Twopracticalusecasesarediscussedinthechapter.
viii Preface
Thechapterspresentedaboveareindeedlatestresearchworksinthedomainof
recentadvancesincomputationalintelligenceandcommunications.
Paris,France ManoloDulvaHina
Versailles,France AmarRamdane-Cherif
Surrey,England,UK RafikZitouni
Paris,France AssiaSoukane
Contents
VehicularPerceptionImprovementinanInclementWeatherContext.... 1
Abderraouf Khezaz, Manolo Dulva Hina, Hongyu Guan,
andAmarRamdane-Cherif
AdaptiveBackstepping-RBFControlofLowerLimbExoskeleton ........ 13
FaridKenas,NoureddineAbabou,andNadiaSaadia
AnEvaluationFrameworkforBlockchain-BasedPublicKey
Infrastructures ................................................................... 31
LukasEhrmann,Kai-OliverKohlen,FengCheng,andPejmanNajafi
OnthePerformanceofMIMOVehicularVisibleLight
Communications ................................................................. 51
Selma Yahia, Yassine Meraihi, Asma Benmessaoud Gabis,
andAmarRamdane-Cherif
EfficientBigDataArchitectureBasedonMicroService .................... 63
FabriceMourlin,CyrilDumont,andLaurentNel
IntelligentTargetCellSelectionAlgorithmforLowLatency
5GNetworks...................................................................... 79
Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee,
ZaidAmeenAbduljabbar,AbdulhadiAlhassani,ImanQaysAbduljaleel,
andEnasWahabAbood
AdvancesinCoyoteOptimizationAlgorithm:Variants
andApplications ................................................................. 99
YassineMeraihi,AsmaBenmessaoudGabis,AmarRamdane-Cherif,
andDalilaAcheli
ix