Proceedings of the 1st International Conference on Innovation in Information Technology and Business (ICIITB 2022)
22 articles
Proceedings Article
Multi-criteria Decision-Making on Operational Risk in Banks
Vladimir Ristanović, Goranka Knežević
The frequency of application of different multi-criteria decision-making methods in business and financial problems is justified by the diversity and complexity of business decisions. The methods enable analysts and decision-makers to assess when making a decision. This research aims to present the contribution...
Proceedings Article
Impact of Blockchain Technology on Operations and Supply Chain Management Performance
Hesham Magd, Mohammad Sultan Ahmad Ansari, Saurav Negi
This paper emphasizes exploring the relationships between blockchain technology and operations, and supply chain management, and the impacts of blockchain on the performance of operations, logistics and supply chain management. The study revealed that blockchain has been widely applied in the logistics...
Proceedings Article
Media Law Challenges and Effects on Quality of Information – A Review
Anfal Issa Mohamed Al Raisi, Ayyappan Palanissamy, Hesham Magd
Media law is known to protect the freedom of expression and the press. It is a branch of law that deals with the flow of information and the public’s overall interest, where anything published and distributed falls under its rules and restrictions. Media direction is especially significant because of...
Proceedings Article
Impact of Twitter on Stock Market Performance: Evidence from Elon Musk and Tesla
Jovana Stokanović Šević, Nikola Stakić, Ana Jovancai Stakić
In the last decade, rising social media impact along with technological progress has given the potential for higher “democratization” of public voice. However, influential individuals, with hundreds of millions followers got the possibility to shape the public opinion and create herding behavior. Twitter...
Proceedings Article
Healthcare Information Exchange Using Blockchain and Machine Learning
Basant Kumar, Istafa Albusaidi, Maram Halloush
In several industries, including healthcare, new technologies like blockchain and machine learning are being leveraged to generate innovative solutions. A blockchain network is used in the healthcare system, coupled with machine learning, to store and distribute patient data among hospitals, diagnostic...
Proceedings Article
The Determinants of Bank Selection Criteria Among Students of Higher Learning and Their Implications for the Islamic Banking Industry in Oman
Umar Ahmed, Bashir Ahmad Fida, Afra Ali Al Asmi
The overall goal of this study is to investigate the most important determinants of bank selection criteria among higher education students and their implications for the Islamic banking industry in Oman. To achieve this objective, this study used a quantitative research method in which questionnaires...
Proceedings Article
IoT-Enabled Smart Cities: A Review of Security Frameworks, Privacy, Risks and Key Technologies
Bushra Al Barwani, Esraa Al Maani, Basant Kumar
Smart cities are becoming increasingly popular worldwide as cities grow; technology evolves and improves daily. The internet of things devices are used in smart cities that are all interconnected to run critical systems that a city requires to function correctly. The Internet of Things controls traffic...
Proceedings Article
The Use of Machine Learning in Digital Forensics: Review Paper
Yusra Al Balushi, Hothefa Shaker, Basant Kumar
With the increase of cybercrimes in the current years, digital forensics has become an important matter to study in order achieve quality evidence. Forensic investigators face difficulties with data collection and analysis to reconstruct events. Due to humans’ immense interaction on a daily basis, machine...
Proceedings Article
Effectiveness of Wireshark Tool for Detecting Attacks and Vulnerabilities in Network Traffic
Nawal A. L. Mabsali, Hothefa Jassim, Joseph Mani
Due to the popularity of using the technology, network security plays a crucial role recently which supports to establish strong systems that work against cyberattacks. Furthermore, the term “network vulnerabilities” refers to the flaws in the network which attackers exploit to break security and steal...
Proceedings Article
Moth-Flame Optimization and Ant Nesting Algorithm: A Systematic Evaluation
Hanan K. AbdulKarim, Tarik A. Rashid
In this paper, some swarm metaheuristic algorithms are analyzed to show the performance of algorithms. Swarm Intelligence algorithms are more trapping in local optima because of low exploration. The Moth-Flame Optimization algorithm is a widely applied metaheuristic algorithm. Nevertheless, the Ant Nesting...
Proceedings Article
A Tutorial on Child Drawing Development Optimization
Azad A. Ameen, Tarik A. Rashid, Shavan Askar
In 2021, a novel metaheuristic algorithm inspired by the child’s learning behavior and cognitive development employs the golden ratio. The golden ratio was first presented by the renowned scientist Fibonacci. The ratio of two consecutive numbers in the Fibonacci sequence is alike, and it is named the...
Proceedings Article
A Systematic Study of Krill Herd and FOX Algorithms
Rebwar Khalid Hamad, Tarik A. Rashid
In 2012, Amir Hossein Gandomi and Amir Hossein Alavi presented the Krill Herd algorithm (KH), a revolutionary biologically inspired method for addressing optimization tasks. On the other hand, another new and powerful metaheuristic algorithm called FOX was proposed by Hardi Mohammed and Tarik Rashid...
Proceedings Article
Forecasting Bitcoin Price by Tuned Long Short Term Memory Model
Aleksandar Petrovic, Luka Jovanovic, Miodrag Zivkovic, Nebojsa Bacanin, Nebojsa Budimirovic, Marina Marjanovic
The interest for cryptocurrencies is high and hence this work focuses on providing a practical real-world application of the swarm metaheuristics and long short term memory model (LSTM). The goal is price forecasting which is interesting due to the high volatility of the cryptocurrencies. The authors...
Proceedings Article
Intrusion Detection by XGBoost Model Tuned by Improved Multi-verse Optimizer
Aleksandar Petrovic, Milos Antonijevic, Ivana Strumberger, Nebojsa Budimirovic, Nikola Savanovic, Stefana Janicijevic
Artificial intelligence and internet of things (IoT) fields have contributed to the flourishment of the industry 4.0 concept. The main benefits include the improvements in terms of device communication, productivity, and efficiency. Nevertheless, there is a downside concerning the security of these systems....
Proceedings Article
The XGBoost Approach Tuned by TLB Metaheuristics for Fraud Detection
Aleksandar Petrovic, Milos Antonijevic, Ivana Strumberger, Luka Jovanovic, Nikola Savanovic, Stefana Janicijevic
The recent pandemic had a major impact on online transactions. With this trend, credit card fraud increased. For the solution to this problem the authors explore existing solutions and propose an optimized solution. The solution is based on an extreme gradient boosting algorithm (XGBoost) and a teaching-learning-based-optimization...
Proceedings Article
Feature Selection and Optimization Based Deep Learning for Rainfall Prediction
P. Vijaya, Satish Chander, Praba Palanisamy, Alycia Sebastian, Joseph Mani
Rainfall hugely impacts every aspect of human life, such as transportation, agriculture, water management, and so on. It also is a grave cause of several natural calamities, like landslides, floods, and drought, which pose a serious threat to the well-being of individuals. These concerns have necessitated...
Proceedings Article
Biometrically Authenticated Boot Loading System from USB Drive by Exploiting the Fingerprint and Finger Vein
Alycia Sebastian, Vijaya Padmanabha, Joseph Mani
Commonly, a USB flash drive is utilized for storing, transferring and backing up data like personal files, software, media files, etc. But users might not have much knowledge about its other hidden characteristics. It could also act as a replacement of CD/hard disk/DVD media as OSs handler resources...
Proceedings Article
Design and Execution of Secure Smart Home Environments on Visual Simulation Tool
Basant Kumar, Hothefa Shaker, Josephmani
The advent of smart technologies is going to be a paradigm shift and game changer in resolving current universal issues such as climate change, cybersecurity, health care, mental health, insecure home, food, water, and energy. Evolving smart home systems has been a prodigious and challenging task for...
Proceedings Article
Person Identification by Models Trained Using Left and Right Ear Images Independently
K. R. Resmi, G. Raju, Vijaya Padmanabha, Joseph Mani
The application of Deep Learning Techniques in biometrics has grown significantly during the last decade. The use of deep learning models in ear biometrics is restricted due to the lack of large ear datasets. Researchers employ transfer learning based on several pretrained models to overcome the limitations....
Proceedings Article
Artificial Neural Network Tuning by Improved Sine Cosine Algorithm for HealthCare 4.0
Masa Gajevic, Nemanja Milutinovic, Jelena Krstovic, Luka Jovanovic, Miodrag Zivkovic, Marina Marjanovic, Catalin Stoean
This paper explores classification of datasets for Healthcare 4.0 using artificial neural networks which are tuned by improved sine cosine algorithm (SCA). Healthcare 4.0 themes include internet of things (IoT), industrial IoT (IIoT), cognitive computing, artificial intelligence, cloud computing, fog...
Proceedings Article
Training a Logistic Regression Machine Learning Model for Spam Email Detection Using the Teaching-Learning-Based-Optimization Algorithm
Savia Berrou, Khadija Al Kalbani, Milos Antonijevic, Miodrag Zivkovic, Nebojsa Bacanin, Bosko Nikolic
Spam and emails have always been intrinsically linked since the creation of the Advanced Research Projects Agency Network, otherwise known as (ARPANET). The latter witnessed, on May 3rd, 1978, the first known spam email to date. Today, spam emails negatively affect the users’ productivity and private...