{"title":"Free-Form Parametric Fitting of Van der Waals Binodal and Spinodal Curves with Bat Algorithm","authors":"Almudena Campuzano, A. Iglesias, A. Gálvez","doi":"10.1109/SKIMA47702.2019.8982533","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982533","url":null,"abstract":"This paper concerns the Van der Waals (VdW) equation of state, originally conceived to be a generalization of the ideal gas law. For practical use, it is often necessary to compute two characteristic curves of VdW, called binodal and spinodal curves. They are usually constructed through polynomial fitting from a collection of 2D points in the pressure-volume plane by using standard numerical procedures. However, the resulting models are still limited and can be further enhanced. In this paper, we carry out this task through least-squares approximation of sets of 2D points using free-form Bézier curves. This requires to perform data parameterization in addition to computing the poles of the curves. To this aim, we apply a powerful nature-inspired swarm intelligence method for continuous optimization called the bat algorithm. To test the performance of this new approach, it has been applied to real data of a gas. Our experimental results show that the method can reconstruct the characteristic curves with very good accuracy. In addition, the computing times are also very good, given the complexity of this problem. These remarkable features make this approach very promising in the field. Furthermore, it is actually ready to be applied to real-world instances of chemical components and mixtures.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ugail, Rokas Mackevicius, M. Hardy, A. Hill, M. Horne, T. Murrells, J. Holliday, R. Chinnadorai
{"title":"MotiVar: Motivating Weight Loss Through A Personalised Avatar","authors":"H. Ugail, Rokas Mackevicius, M. Hardy, A. Hill, M. Horne, T. Murrells, J. Holliday, R. Chinnadorai","doi":"10.1109/SKIMA47702.2019.8982405","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982405","url":null,"abstract":"This work aims to develop a personalised avatar based virtual environment for motivating weight loss and weight management. Obesity is a worldwide epidemic which has not only enormous resource impact for the healthcare systems but also has substantial health as well as a psychological effect among the individuals who are affected. We propose to tackle this issue via the development of a personalised avatar, the form of which can be adjusted to show the present and the future self of the individual. For the avatar design and development phase, we utilise a parametric based mathematical formulation derived from the solutions of a chosen elliptic partial differential equation. This method not only enables us to generate a parameterised avatar model, but it also allows us to quickly and efficiently create various avatar shapes corresponding to different body weights and even to different body postures.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129401516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Gálvez, A. Iglesias, H. Ugail, L. You, H. Haron, Z. Habib
{"title":"Firefly Algorithm Approach For Rational Bézier Border Reconstruction of Skin Lesions from Macroscopic Medical Images","authors":"A. Gálvez, A. Iglesias, H. Ugail, L. You, H. Haron, Z. Habib","doi":"10.1109/SKIMA47702.2019.8982465","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982465","url":null,"abstract":"Image segmentation is a fundamental step for image processing of medical images. One of the most important tasks in this step is border reconstruction, which consists of constructing a border curve separating the organ or tissue of interest from the image background. This problem can be formulated as an optimization problem, where the border curve is computed through data fitting procedures from a collection of data points assumed to lie on the boundary of the object under analysis. However, standard mathematical optimization techniques do not provide satisfactory solutions to this problem. Some recent papers have applied evolutionary computation techniques to tackle this issue. Such works are only focused on the polynomial case, ignoring the more powerful (but also more difficult) case of rational curves. In this paper, we address this problem with rational Bézier curves by applying the firefly algorithm, a popular bio-inspired swarm intelligence technique for optimization. Experimental results on medical images of melanomas show that this method performs well and can be successfully applied to this problem.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133778840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bassem Abd-El-Atty, M. Amin, A. El-latif, H. Ugail, I. Mehmood
{"title":"An Efficient Cryptosystem based on the Logistic-Chebyshev Map","authors":"Bassem Abd-El-Atty, M. Amin, A. El-latif, H. Ugail, I. Mehmood","doi":"10.1109/SKIMA47702.2019.8982535","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982535","url":null,"abstract":"We utilise the Logistic-Chebyshev map as a cascade discrete-time chaotic system to design a new form of a cryptosystem. Based on the Logistic-Chebyshev map, we present a novel method for constructing substitution boxes or S-boxes. The performance of the proposed S-box scheme is investigated. Our results shows that the constructed S-box has significant qualities for viable applications in security related domains. Additionally, we utilise a new pseudo-random number generator (PRNG) scheme for the purpose of generating keystreams for further encryption. We utilise this technique to demonstrate how a PRNG based chaotic system can be utilsied for image encryption. Our simulation results and analysis show that the proposed scheme has efficient performance for cryptographic based image processing applications.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"771 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Curve of Minimal Length between Two Points On a Bézier Surface","authors":"A. Carriazo, M. C. Márquez, H. Ugail","doi":"10.1109/SKIMA47702.2019.8982434","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982434","url":null,"abstract":"In this paper, we present a method to obtain the distance between two fixed points of a Bézier surface by minimizing the length of curves on the surface linking the two points. We use a discretization of the classical orthogonal variations method for a regular planar curve. We provide interesting examples of Bézier surfaces which approximate the cylinder, the sphere and the hyperbolic paraboloid.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Burst and Congestion-Aware Routing Metric for RPL Protocol in IoT Network","authors":"Hussien Saleh Altwassi, Zeeshan Pervez, K. Dahal","doi":"10.1109/SKIMA47702.2019.8982460","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982460","url":null,"abstract":"The packet loss and power consumption are the main issues considered once congestion occurs in any network, such as the Internet of Things (IoT) with a huge number of sensors and applications. Since IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is not initially designed for high stream traffic load, this restricts the application domain of RPL in several IoT scenarios such as burst traffic scenarios. The performance of RPL suffers in a network with burst traffic load, which leads to reducing the lifetime of the network and causing traffic congestion among the neighbour nodes. Therefore, to address this issue, we proposed a Burst and Congestion-Aware Metric for RPL called BCA-RPL, which calculates the rank, considering the number of packets. Also, the proposed mechanism includes congestion avoiding and load balancing techniques by switching the best parent selection to avoid the congested area. Our scheme is built and compared to the original RPL routing protocol for low power and lossy network with OF0 (OF0-RPL). Simulation results based on Cooja simulator shows BCA-RPL performs better than the original RPL-OF0 routing protocol in terms of packet loss, power consumption and packet delivery ratio (PDR) under burst traffic load. The BCA-RPL significantly improves the network where it decreases the packet loss around 50% and power consumption to an acceptable level with an improvement on the PDR of the IoT network.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132220036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An interactive approach to teach automation in the training of the industry 4.0","authors":"T. Tran, H. Yahoui, N. Siauve","doi":"10.1109/SKIMA47702.2019.8982491","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982491","url":null,"abstract":"In this paper, we propose a new method to teach automation in the training of industry 4.0. This method uses an interactive approach to help students rapidly familiarize with PLC programming. Computers are transformed into PLC training kits using Factory I/O – a 3D factory simulator and CodeSys – a development system. A series of training activities have been organized to encourage life-long learning among the students. Besides, a survey has been conducted with 20 students in first-year master Energy at Energy Master, Claude Bernard University Lyon 1, Lyon, France. The results indicate that students are satisfied with this approach.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115582821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust and the Digital Transformation","authors":"A. Gábor","doi":"10.1109/SKIMA47702.2019.8982511","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982511","url":null,"abstract":"Digitalization, digital transformation radically change society, social life. Trust is a controversial phenomenon in the context of digitalization, since, on one hand contributes to the declination of trust, on the other hand offers numerous opportunities to recovery or re-build trust. The paper introduces the trust declination of trust in the life of a local community, outlines the problems of grabbing the trust level and operationalization of trust measurement through a case study. In the final part a deployed semantic technology-based trust recovery action is demonstrated.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116178369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Security System Using Face Recognition on Raspberry Pi","authors":"Fahim Faisal, S. A. Hossain","doi":"10.1109/SKIMA47702.2019.8982466","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982466","url":null,"abstract":"Privacy and Security are two of the most important universal rights. To ensure security in our daily life through technology, a lot of research is going on. Among them facial recognition is a popular and well-established technology. In this technology, faces are detected and identified out of images and with the help of Internet of Things (IoT), it becomes even more useful and precise. Using face recognition and IoT, we aim to create a smart door, which secures the gateway on the basis of who we are. In our proof of the concept of such a smart security system, we have used Viola-Jones method to detect faces and Eigenfaces method to recognize people. A Raspberry Pi has been used as the microprocessor for ensuring low-cost and small size of the system. The door will open automatically for the known person upon receiving command from the processor. On the other hand, photo of the unknown will be uploaded to a webserver while an email is sent to the owner of the place containing a link to the image. From the website of the system, the owner can then allow/block entry and also trigger an alarm from anywhere in the world.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127150000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Farming in Thailand","authors":"Supalin Tiammee, Jirapohn Wongyai, Piyachat Udomwong, Aniwat Phaphuangwittayakul, Lampang Saenchan, Somsak Chanaim","doi":"10.1109/SKIMA47702.2019.8982525","DOIUrl":"https://doi.org/10.1109/SKIMA47702.2019.8982525","url":null,"abstract":"Thailand’s economic growth depends on agriculture. Roughly 30 to 40 percents of the total employment in Thailand is in the agricultural sector, but this group of people do not earn enough to spend on a daily basis. In this study, we proposed two production functions for Thai agriculture: with and without entrepreneurships. Entrepreneurship in agriculture is defined based on Schumpeter framework. In the first model, the Cobb- Douglas production function is applied to agricultural production without entrepreneurship and the stochastic frontier analysis is applied as an estimation technique to estimate the parameters. In the second model, the entrepreneurship variable is part of land, capital and labor inputs. Maximum likelihood estimation is used to find the estimated parameters. The results show that the returns to scale obtained from the developed production function with entrepreneurship are greater than those obtained from the production function without entrepreneurship.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130614588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}