Table Of ContentAdvances in Intelligent Systems and Computing 998
Kohei Arai
Rahul Bhatia
Supriya Kapoor Editors
Intelligent
Computing
Proceedings of the 2019 Computing
Conference, Volume 2
Advances in Intelligent Systems and Computing
Volume 998
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science & Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
NadiaNedjah,DepartmentofElectronicsEngineering,UniversityofRiodeJaneiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen, Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
Theseries“AdvancesinIntelligentSystemsandComputing”containspublications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing.Virtuallyalldisciplinessuchasengineering,naturalsciences,computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare,lifesciencearecovered.Thelistoftopicsspansalltheareasofmodern
intelligentsystemsandcomputingsuchas:computationalintelligence,softcomput-
ingincludingneuralnetworks,fuzzysystems,evolutionarycomputingandthefusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms,machineethics,intelligentdataanalysis,knowledgemanagement,intelligent
agents, intelligent decision making and support, intelligent network security, trust
management,interactiveentertainment,Webintelligenceandmultimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
More information about this series at http://www.springer.com/series/11156
Kohei Arai Rahul Bhatia
(cid:129) (cid:129)
Supriya Kapoor
Editors
Intelligent Computing
Proceedings of the 2019
Computing Conference, Volume 2
123
Editors
KoheiArai RahulBhatia
Faculty of Science andEngineering TheScience andInformation
SagaUniversity (SAI) Organization
Saga,Japan Bradford, West Yorkshire, UK
SupriyaKapoor
TheScience andInformation
(SAI) Organization
Bradford, West Yorkshire, UK
ISSN 2194-5357 ISSN 2194-5365 (electronic)
Advances in Intelligent Systems andComputing
ISBN978-3-030-22867-5 ISBN978-3-030-22868-2 (eBook)
https://doi.org/10.1007/978-3-030-22868-2
©SpringerNatureSwitzerlandAG2019
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar
methodologynowknownorhereafterdeveloped.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom
therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
hereinorforanyerrorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregard
tojurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations.
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG
Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland
’
Editor s Preface
OnbehalfoftheOrganizingCommitteeandProgramCommitteeoftheComputing
Conference 2019, we would like to welcome you to the Computing Conference
2019 which will be held from July 16 to 17, 2019, in London, UK.
Despitetheshorthistoryofcomputerscienceasaformalacademicdiscipline,it
has made a number offundamental contributions to science and society—in fact,
along with electronics, it is a founding science of the current epoch of human
historycalledtheInformationAgeandadriveroftheInformationRevolution.The
goal of this conference is to give a platform to researchers with such fundamental
contributionsandtobeapremiervenueforindustrypractitionerstosharenewideas
anddevelopmentexperiences.Itisoneofthebestrespectedconferencesinthearea
of computer science.
Computing Conference 2019 began with an opening ceremony, and the con-
ferenceprogramfeaturedwelcomespeeches.Itwasatwo-dayconference,andeach
daystartedwithkeynotespeechesfromexpertsinthefield.Duringthespanoftwo
days, a total of 18 paper presentation sessions and 4 poster presentation sessions
were organized giving the opportunity to the authors to present their papers to an
international audience. The conference attracted a total of 563 submissions from
manyacademicpioneeringresearchers,scientists,industrialengineers,andstudents
from all around the world. These submissions underwent a double-blind
peer-review process. Of those 563 submissions, 170 submissions have been
selected to be included in this proceedings. The published proceedings has been
divided into two volumes covering a wide range of conference tracks, such as
technology trends, computing, intelligent systems, machine vision, security,
communication, electronics, and e-learning to name a few.
Deepappreciationgoestothekeynotespeakersforsharingtheirknowledgeand
expertise with us and to all the authors who have spent the time and effort to
contribute significantly to this conference. We are also indebted to the Organizing
Committee for their great efforts in ensuring the successful implementation of the
conference.Inparticular,wewouldliketothanktheTechnicalCommitteefortheir
constructive and enlightening reviews on the manuscripts in the limited timescale.
v
vi Editor’sPreface
We hope that all the participants and the interested readers benefit scientifically
fromthisbookandfinditstimulatingintheprocess.Wearepleasedtopresentthe
proceedings of this conference as its published record.
Hope to see you in 2020, in our next Computing Conference, with the same
amplitude, focus, and determination.
Kohei Arai
Contents
Check2: A Framework for Fake Check-in Detection . . . . . . . . . . . . . . . 1
Dina Abbas Abd El Moniem and Hoda M. O. Mokhtar
n-means: Adaptive Clustering Microaggregation of Categorical
Medical Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Malik Imran-Daud
An Efficient Density-Based Clustering Algorithm Using Reverse
Nearest Neighbour . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Stiphen Chowdhury and Renato Cordeiro de Amorim
We Know What You Did Last Sonar: Inferring Preference in Music
from Mobility Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
José C. Carrasco-Jiménez, Fernando M. Cucchietti, Artur Garcia-Saez,
Guillermo Marin, and Luz Calvo
Characterization and Recognition of Proper Tagged Probe
Interval Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Sanchita Paul, Shamik Ghosh, Sourav Chakraborty, and Malay Sen
Evolvable Media Repositories: An Evolutionary System to Retrieve
and Ever-Renovate Related Media Web Content. . . . . . . . . . . . . . . . . . 76
Marinos Koutsomichalis and Björn Gambäck
Ensemble of Multiple Classification Algorithms to Predict
Stroke Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Omesaad Rado, Muna Al Fanah, and Ebtesam Taktek
A Parallel Distributed Galois Lattice Approach for Data Mining
Based on a CORBA Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Abdelfettah Idri and Azedine Boulmakoul
A Community Discovery Method Based on Spectral Clustering
and Its Possible Application in Audit. . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Hu Jibing, Ge Hongmei, and Yang Pengbo
vii
viii Contents
Refinement and Trust Modeling of Spatio-Temporal Big Data . . . . . . . 132
Lei Zhang
Data Analytics: A Demographic and Socioeconomic Analysis
of American Cigarette Smoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Ah-Lian Kor, Reavis Mitch, and Sanela Lazarevski
Designing a System for Integration of Macroeconomic and Statistical
Data Based on Ontology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Olga N. Korableva, Olga V. Kalimullina, and Viktoriya N. Mityakova
A Modified Cultural Algorithm for Feature Selection
of Biomedical Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Oluwabunmi Oloruntoba and Georgina Cosma
Exploring Scientists’ Research Behaviors Based on LDA. . . . . . . . . . . . 178
Benji Li, Weiwei Gu, Yahan Lu, Chensheng Wu, and Qinghua Chen
Hybrid of Filters and Genetic Algorithm - Random Forests Based
Wrapper Approach for Feature Selection and Prediction . . . . . . . . . . . 190
Pakizah Saqib, Usman Qamar, Andleeb Aslam, and Aleena Ahmad
A New Arabic Dataset for Emotion Recognition . . . . . . . . . . . . . . . . . . 200
Amer J. Almahdawi and William J. Teahan
Utilise Higher Modulation Formats with Heterogeneous Mobile
Networks Increases Wireless Channel Transmission . . . . . . . . . . . . . . . 217
Heba Haboobi and Mohammad R. Kadhum
Performance Analysis of Square-Shaped and Star-Shaped
Hierarchically Modulated Signals Generated Using
All-Optical Techniques. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Anisa Qasim and Salman Ghafoor
Dynamic Bit Loading with the OGFDM Waveform Maximises
Bit-Rate of Future Mobile Communications. . . . . . . . . . . . . . . . . . . . . . 242
Mohammad R. Kadhum, Triantafyllos Kanakis, and Robin Crockett
The Two Separate Optical Fibres Approach in Computing
with 3NLSE–Domain Optical Solitons . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Anastasios G. Bakaoukas
Intra-channel Interference Avoidance with the OGFDM Boosts
Channel Capacity of Future Wireless Mobile Communication. . . . . . . . 281
Mohammad R. Kadhum, Triantafyllos Kanakis, and Robin Crockett
Decomposition of a Non-stationary Process Using
Time-Dependent Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Abdullah I. Al-Shoshan
Contents ix
Open Source Firmware Customization Problem: Experimentation
and Challenges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Thomas Djotio Ndie and Karl Jonas
An Entity-Based Black-Box Specification Approach for Modeling
Wireless Community Network Services . . . . . . . . . . . . . . . . . . . . . . . . . 318
Thomas Djotio Ndié
Downlink High Quality 72 GHz Millimeter . . . . . . . . . . . . . . . . . . . . . . 336
Fawziya Al-Wahaibi and Hamed Al-Rwashidi
Study the Performance of Optical Millimetre Wave Based on Carrier
Suppressed by Using an Inverted Optical Filter. . . . . . . . . . . . . . . . . . . 345
Fawziya Al-Wahaibi, Rajagopal Nilavalan, and Hamed Al-Rwashidi
Visualization: A Tool to Study Nodes in
Multi-dimensional Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Fozia Noor, Muhammad Usman Akram, Asadullah Shah,
and Shoab Ahmad Khan
The Nigerian E-Waste Problem: Way Forward . . . . . . . . . . . . . . . . . . . 368
VictorNdakoAdama,IbrahimShehiShehu,SolomonAdelowoAdepojur,
and A. Fatima Sulayman
High-Throughput Electronic Band Structure Calculations
for Hexaborides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Zhenxi Pan, Yong Pan, Jun Jiang, and Liutao Zhao
Switched-Current Sampled and Hold Circuit with Digital Noise
Cancellation Circuit for 2+2 MASH ƩD Modulator. . . . . . . . . . . . . . . . 396
Guo-Ming Sung, Leenendra Chowdary Gunnam, and Shan-Hao Sung
Towards the Identification of Context in 5G Infrastructures . . . . . . . . . 406
Chrysostomos Symvoulidis, Ilias Tsoumas, and Dimosthenis Kyriazis
Researches on Time-Domain Relay Feedback Identification
Approaches for High-Acceleration Linear Servo Systems. . . . . . . . . . . . 419
Xiaoli Shi, Yong Han, Jianhua Wu, and Chao Liu
Multimodal Biometrics Using Features from Face, Iris,
and Conjunctival Vasculature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Noorjahan Khatoon and Mrinal Kanti Ghose
Evaluating Machine Learning Models on the Ethereum Blockchain
for Android Malware Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Md. Shohel Rana, Charan Gudla, and Andrew H. Sung
Blockchain-Based Authentication for Network
Infrastructure Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Chi Ho Lau, Kai-Hau Yeung, and Kai Man Kwong