Professional Documents
Culture Documents
Proceedings of International Conference On Recent Trends in Machine Learning, Iot, Smart Cities and Applications: Icmisc 2020 Vinit Kumar Gunjan
Proceedings of International Conference On Recent Trends in Machine Learning, Iot, Smart Cities and Applications: Icmisc 2020 Vinit Kumar Gunjan
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-
loucas/
https://textbookfull.com/product/foundations-and-trends-in-smart-
learning-proceedings-of-2019-international-conference-on-smart-
learning-environments-maiga-chang/
https://textbookfull.com/product/the-2020-international-
conference-on-machine-learning-and-big-data-analytics-for-iot-
security-and-privacy-spiot-2020-volume-1-john-macintyre/
https://textbookfull.com/product/proceedings-of-international-
conference-on-artificial-intelligence-smart-grid-and-smart-city-
applications-aisgsc-2019-1st-edition-l-ashok-kumar/
Blockchain, big data and machine learning: trends and
applications First Edition Kumar
https://textbookfull.com/product/blockchain-big-data-and-machine-
learning-trends-and-applications-first-edition-kumar/
https://textbookfull.com/product/advances-in-distributed-
computing-and-machine-learning-proceedings-of-icadcml-2020-asis-
kumar-tripathy/
https://textbookfull.com/product/recent-trends-in-computer-
applications-best-studies-from-the-2017-international-conference-
on-computer-and-applications-dubai-uae-jihad-mohamad-aljaam/
https://textbookfull.com/product/proceedings-of-international-
conference-on-artificial-intelligence-and-applications-
icaia-2020-poonam-bansal/
Advances in Intelligent Systems and Computing 1245
Proceedings
of International
Conference on Recent
Trends in Machine
Learning, IoT,
Smart Cities and
Applications
ICMISC 2020
Advances in Intelligent Systems and Computing
Volume 1245
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
Editors
Proceedings of International
Conference on Recent Trends
in Machine Learning, IoT,
Smart Cities and Applications
ICMISC 2020
123
Editors
Vinit Kumar Gunjan Jacek M. Zurada
Department of Computer Science Department of Electrical
and Engineering and Computer Engineering
CMR Institute of Technology University of Louisville
Hyderabad, India Louisville, KY, USA
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
Artificial intelligence (AI) and machine learning (ML) are the emerging technolo-
gies that are moving organizations faster than ever before. In this era of digital
transformation, the success is based on using analytics to find huge amount of data
with close insights. Historically, these insights were discovered manually through
in-depth data analytics–but data complexity continues to increase, as does the
complexity of data. AI and ML are the latest tools for data scientists, enabling them
to rapidly refine the data to ensure its value.
The term ‘smart cities’ first gained traction back in the 1990s, when it was
adopted as a way to illustrate the use of technology and innovation in urban
development. Since then, the world has become increasingly urbanized. By 2020,
55% of the world’s population lives in urban areas, and the number is expected to
increase to around 70% by 2050. This rapid urbanization will put increasing
pressure on resources and address the demand for intelligent and sustainable
environments. The requirements of citizens providing a higher quality of life will
increase.
We are entering into a new era of computing technology that many are calling as
the Internet of Things (IoT). Machine to Machine, Machine to Infrastructure,
Machine to Environment, Internet of Everything, Internet of Intelligent Things,
Intelligent System–call it what you want, but it is happening, and its potential is
huge.
This book is comprised of selected and presented papers of the International
conference on Recent Trends in Machine Learning, IOT, Smart Cities &
Applications, 2020. It consists of selected manuscripts arranged on the basis of their
approaches and contributions to the scope of the conference. The chapters of this
book present key algorithms and theories that form the core of the technologies and
applications concerned, consisting mainly of face recognition, evolutionary algo-
rithms such as genetic algorithms, automotive applications, automation devices
with artificial neural networks, business management systems, IoT, machine
learning, data science and modern speech processing systems. This book also
v
vi Preface
covers recent advances in medical diagnostic systems, sensor networks and systems
of VLSI domain. Discussion of learning and software modules in deep learning
algorithms is added wherever suitable. In a nut shell the book will bring insights to
the modern advancements involved in smart cities with an IoT and ML approach.
vii
viii Contents
Genetic System for Project Support with the Sequencing Problem . . . . 977
Amelec Viloria, Noel Varela, Carlos Herazo-Beltran,
Omar Bonerge Pineda Lezama, Alberto Mercado, Jairo Martinez Ventura,
and Hugo Hernandez Palma
Method for the Recovery of Images in Databases of Skin Cancer . . . . . 985
Amelec Viloria, Noel Varela, Narledys Nuñez-Bravo,
and Omar Bonerge Pineda Lezama
xvii
Automated Identification of Interictal
Activity from EEG Signal Using
Non-linear Features
1 Introduction
Set C and Set D hold interictal discharges from five patients from the epileptic zone
in set C and opposite to epileptic zone in set D. Set E contains ictal activity. In this
work, our focus is to distinguish controlled activity from interictal activity. For this
work, we have considered four cases under group controlled and interictal; which
are A–C, B–C, A–D, and B–D (Fig. 2).
2 Methodology
For this work the objective was to classify between data taken from controlled patients
and data taken from people with interictal activity; therefore, a total of four cases
were considered. Total of 100 files was present in each set. Each signal was recorded
for 23.6 s at a sampling frequency of 173.6 Hz and hence had 4096 data points.
4 A. Kaur et al.
All the datasets considered in this work are divided into five sub-bands; ‘db4’ wavelet
is used for the sub-band division. Table 1 depicts the specific frequency range.
Feature Extraction:
For this work, three entropy-based features are Approximate Entropy, Sample
Entropy, and fuzzy approximate entropy are extracted out of the five sub-bands used
mentioned in Table 1. Correlation dimension is extracted out of complete signal. Total
16 features are used to train the model. These entropy-based features have been also
used by previous researches either independently or with combination with other
features and have been elaborately explained in [11–15]. For this work, the value of
parameters used are as follows N is taken to be 4097, m is embedding dimension; it
is set to two and r is vector comparison distance. It is set to 0.2 times the standard
deviation of the signal. Correlation dimension measure chaotic signal complexity
for time-domain signal which is uniformly sampled is used in this work is specified
more clearly in [16].
2.3 Classification
Backpropagation neural network was used in this work. The number of hidden layers
used in this algorithm was set to 10. The maximum epoch was set to 1000. Tan-
Sigmoid was used as a transfer function. Levenberg Marquardt optimization is used
for this work. The validation method opted is k-fold where the value of k is set to 10.
Three parameters Accuracy, Sensitivity, and Specificity are calculated. Following
Eqs. (1–3) specifies the formulas. For the equations considered true positive cases
are where the interictal activity is correctly classified, true negative is one where
there is no actual activity and it is actually classified as such.
T r ue Positive
Sensitivity: = (2)
T r ue Positive + FalseN egative
T r ueN egative
Specificity: = (3)
T r ueN egative + False Positive
3 Results
Table 2 holds the results obtained using the methodology proposed in this work. For
this work, four cases have been evaluated for all of which accuracy, sensitivity, and
specificity have been calculated. Table 2 contains the results obtained. Highest accu-
racy of 99% has been achieved for case 2 (B–C) when comparing controlled group and
interictal activity recorded from epileptic zone; while comparing controlled activity
from and interictal activity from opposite from epileptic zone highest accuracy of
98.98% has been achieved for case 4 (B–D). This work indents on comparing inter-
ictal activity and activity from the controlled patients. For this work Backpropagation
neural is used to classify between them. Nonlinear entropy-based features approxi-
mate entropy, sample entropy, and fuzzy approximate entropy were extracted from
five sub-bands of both types of signals and correlation dimensions from a complete
signal.
Figures 3 and 4 compares correlation dimension of two sets used in this study from
which it can be observed that interictal activity which is represented by Set C and
Set D has higher correlation dimension than activity from controlled patient repre-
sented by Set A and Set B. Table 3 compares different studies on a similar database.
1.5
0.5
0
100
147
Set A Set C
1.5
0.5
100
147
Set B Set D
Previous researchers have worked on compared (a) activity from controlled patients
with epileptic, (b) activity from controlled patients with interictal, (c) interictal with
epileptic activity taking different cases. However, not much work is available to
compare activity from controlled patients with interictal activity. This study has
considered four such cases. From Table 3 it can be seen that different researchers
have worked on different cases on similar problems and the proposed methodology
outperforms [17–19] to the good margin where a different combination of sets for the
same problem is considered. Though, work done in [20, 21] have marginally outper-
formed the proposed method by 0.2% and 1% for case 1 and case 3 considered in
Automated Identification of Interictal Activity … 7
our work, respectively. However, not all cases have been considered in any of the
recent and previous studies.
4 Conclusion
To identify interictal discharges from routine EEG admits of artefacts through visual
inspection is a crucial but time-consuming task. To support the diagnosis of epilepsy
it is an important process. The automation of this process will ensure will supplement
the neurologist. This work is done to conquer the same problem. For validation k-
fold validation method is used in this work. We have considered four cases from the
publically available dataset and have achieved good performance measures.
Acknowledgements The authors express appreciation to R. G. Andrzejaket et al. for their public
accessible database [10].
References
1. Fisher RS, van Emde BW, Blume W et al (2005) Epileptic seizures and epilepsy: definitions
proposed by the International League against Epilepsy (ILAE) and the International Bureau
for Epilepsy (IBE). Epilepsia 46:470–472
2. Kobayashi T, Misaki K, Nakagawa H, Madokoro S, Ihara H, Tsuda K et al (1999) Non-linear
analysis of the sleep EEG. Psychiatry Clin Neurosci 53(2):159–161. https://doi.org/10.1046/j.
1440-1819.1999.00540
3. Lin R, Lee RG, Tseng CL, Zhou HK, Chao CF, Jiang JA (2006) A new approach for identifying
sleep apnea syndrome using wavelet transform and neural networks. Biomed Eng Appl Basis
Commun 18(3):138–144
4. Lin W-C, Chiu H-W, Hsu C-Y (2005) Discovering EEG signals response to musical signal
stimuli by time-frequency analysis and independent component analysis. In: Proceedings of
the 27th annual IEEE engineering in medicine and biology conference. Shanghai, China, pp
2765–2768
5. Babloyantz A, Nicolis C, Salazar JM (1985) Evidence of chaotic dynamics of brain activity
during the sleep cycle. Phys Lett 111A:152–157
6. Acharya UR et al (2012) Automated diagnosis of epileptic EEG using entropies. Biomed Signal
Process Control 7(4):401–408
7. Acharya UR, Fujita H, Sudarshan VK, Bhat S, Koh JEW (2015) Application of entropies for
automated diagnosis of epilepsy using EEG signals: a review. Knowledge-Based Syst 88:85–96
8. Tawfik NS, Youssef SM, Kholief M (2016) A hybrid automated detection of epileptic seizures
in EEG records. Comput Electr Eng 1(53):177–190
9. Acharya UR et al (2019) Characterization of focal EEG signals: a review. Future Gener Comput
Syst 91:290–299
10. Andrzejak RG, Lehnertz K, Mormann F, Rieke C, David P, Elger CE (2001) Indications
of nonlinear deterministic and finite-dimensional structures in time series of brain electrical
activity: dependence on recording region and brain state. Phys Rev E 64(6):061907
11. Kumar Y, Anand MLDRS (2014) Epileptic seizures detection in EEG using DWT-based ApEn
and artificial neural network, pp 1323–1334
8 A. Kaur et al.
12. Chen LL, Zhang J, Zou JZ, Zhao CJ, Wang GS (2014) A framework on wavelet-based nonlinear
features and extreme learning machine for epileptic seizure detection. Biomed Signal Process
Control 10(1):1–10
13. Xiang J, Li C, Li H, Cao R, Wang B, Han X, Chen J (2015) The detection of epileptic seizure
signals based on fuzzy entropy. J Neurosci Methods 243:18–25
14. Song Y, Liò P (2010) A new approach for epileptic seizure detection: sample entropy based
feature extraction and extreme learning machine. J Biomed Sci Eng 3(6):556–567
15. Bai D, Li X, Qiu T (2007) The sample entropy and its application in EEG based epilepsy
detection. J Biomed Eng 24(1):200–205
16. Theiler J (1987) Efficient algorithm for estimating the correlation dimension from a set of
discrete points. Phys Rev A 36(9):4456 American Physical Society
17. Sharma M, Pachori RB, Acharya UR (2017) A new approach to characterize epileptic seizures
using analytic time-frequency flexible wavelet transform and fractal dimension. Pattern Recogn
Lett 15(94):172–179
18. Hekim M (2016) The classification of EEG signals using discretization-based entropy and the
adaptive neuro-fuzzy inference system. Turkish J Electr Eng Comput Sci 24(1):285–297
19. Wang Y, Li Z, Feng L, Bai H, Wang C (2018) Hardware design of multiclass SVM classification
for epilepsy and epileptic seizure detection. IET Circ Dev Syst 12:108–115
20. Sriraam SRN (2017) Classification of epileptic seizures using wavelet packet log energy and
norm entropies with recurrent Elman neural network classifier. Cogn Neurodyn 11(1):51–66
21. Jaiswal AK, Banka H (2017) Local pattern transformation based feature extraction techniques
for classification of epileptic EEG signals. Biomed Signal Process Control 34:81–92. https://
doi.org/10.1016/j.bspc.2017.01.005
A Survey on Phishing URL Detection
Using Artificial Intelligence
1 Introduction
[3]. The newest technologies come along with the use of the highest-requirements of
the internet. According to [4], in the future, we will have a network of about 6 billion
connected devices and we should have a reliable solution to protect them. The number
of networks we have, the complexity of cybersecurity threats will be increased. So,
we need new security solutions every time to protect our devices and systems [5].
Computing and communication have experienced exceptional changes in ongoing
decades. Computation favour on the go with a large demand for mobility support
in communicating [6, 7]. The Internet can access using three technologies such as
Broadband which is expensive, Wi-Fi having short-range, Dial-up which is slow and
outdated and major developing countries such as India, China, Brazil and Mexico
are in more potential in demanding Broadband access due to the recent austerity of
Internet requirements. Wireless communication can provide such services to a great
extent to a larger audience, but the wireless system has many glitches that make
it uncomfortable to provide reliable services [8]. Due to a huge number of users
in a wireless environment communication model also have shifted to the concept
of Cognitive Radio Networks [9, 10] for greater utilization of wireless spectrum.
Cyber-attackers always try to breach these security and control systems to get the
confidential information of users. Phishing is the most common method to exploit
user accounts and get the information. It can be done by either using the URL or
Web Page method. Traditional methods to detect a phishing attack were not given
the proper output so we have been shifted to Artificial Intelligence based techniques
for accurate detection.
In the past two decades, different AI techniques we have been used to detect
phishing website client-side on random forest, SVM and Naive Bayes do best
respecting the highest true positive rate and accuracy [11]. In [12], the researchers
present an Adaptive Neuro-Fuzzy Interface System (ANFIS) based powerful system
using the integrated features of the text, images and frames for phishing web detec-
tion and protection after they provide the best solution for phishing web detection
system. In [13], the paper aims to give a comprehensive review and a structural
knowledge of malicious URL detection methods using machine learning. In real-
time anti-phishing system, which uses different types of classification algorithm
with NLP based feature is proposed, such as Decision tree, adaboost, Kstar1 , KNN,
random forest, SMO, Naive Bayes and after the finalized result base on algorithms,
only random forest with NLP-based features are given best accuracy rate [14].
1.1 Cybersecurity
1. Cloud Security: It is secure of data storage in online like stealing data, leakage
data.
2. Network Security: Network Security means any criminals or hackers are do not
access to the file or directory in a computer system or network.
3. Application Security: It secures the data and code within the application against
the attacker or unauthorized person.
4. Internet of Things (IoT) Security: It is the technological field protection to the
devices and networks in the internet of things (IoT).
5. Infrastructure Security: It is the protection of infrastructures like financial
and common area infrastructures in banking, hospitals, hotels, airports, railway
transportation, etc.
1.2 Cyberattack
A cyberattack is an attack done on the computer from different one or more networks.
In which, the aim is to make the target computer disable to the system. In which
intention is the get access to the data of the target computer. Figure 2 shows the
different types of a cybersecurity attack.
1. Phishing Attack: Phishing is one type of social engineering attack, in which
attackers or users are connected via email, telephone, or text message. The
attacker sends any fake message to the user and steals the user’s personal
information.
2. Password Attack: It is a process of retrieving a password from the data store
in a computer system. A common method to retrieving a password used in a
brute-force attack to try guess password and check them against as possible.
12 A. Vadariya and N. K. Jadav