Proceedings of the 1st International Conference on Innovation in Information Technology and Business (ICIITB 2022)

+ Advanced search
22 articles
Proceedings Article

Peer-Review Statements

Nebojsa Bacanin, Hothefa Shaker
Proceedings Article

Multi-criteria Decision-Making on Operational Risk in Banks

Vladimir Ristanović, Goranka Knežević
The frequency of application of different multi-criteria decision-making methods in business and financial problems is justified by the diversity and complexity of business decisions. The methods enable analysts and decision-makers to assess when making a decision. This research aims to present the contribution...
Proceedings Article

Impact of Blockchain Technology on Operations and Supply Chain Management Performance

Hesham Magd, Mohammad Sultan Ahmad Ansari, Saurav Negi
This paper emphasizes exploring the relationships between blockchain technology and operations, and supply chain management, and the impacts of blockchain on the performance of operations, logistics and supply chain management. The study revealed that blockchain has been widely applied in the logistics...
Proceedings Article

Media Law Challenges and Effects on Quality of Information – A Review

Anfal Issa Mohamed Al Raisi, Ayyappan Palanissamy, Hesham Magd
Media law is known to protect the freedom of expression and the press. It is a branch of law that deals with the flow of information and the public’s overall interest, where anything published and distributed falls under its rules and restrictions. Media direction is especially significant because of...
Proceedings Article

Impact of Twitter on Stock Market Performance: Evidence from Elon Musk and Tesla

Jovana Stokanović Šević, Nikola Stakić, Ana Jovancai Stakić
In the last decade, rising social media impact along with technological progress has given the potential for higher “democratization” of public voice. However, influential individuals, with hundreds of millions followers got the possibility to shape the public opinion and create herding behavior. Twitter...
Proceedings Article

Healthcare Information Exchange Using Blockchain and Machine Learning

Basant Kumar, Istafa Albusaidi, Maram Halloush
In several industries, including healthcare, new technologies like blockchain and machine learning are being leveraged to generate innovative solutions. A blockchain network is used in the healthcare system, coupled with machine learning, to store and distribute patient data among hospitals, diagnostic...
Proceedings Article

The Determinants of Bank Selection Criteria Among Students of Higher Learning and Their Implications for the Islamic Banking Industry in Oman

Umar Ahmed, Bashir Ahmad Fida, Afra Ali Al Asmi
The overall goal of this study is to investigate the most important determinants of bank selection criteria among higher education students and their implications for the Islamic banking industry in Oman. To achieve this objective, this study used a quantitative research method in which questionnaires...
Proceedings Article

IoT-Enabled Smart Cities: A Review of Security Frameworks, Privacy, Risks and Key Technologies

Bushra Al Barwani, Esraa Al Maani, Basant Kumar
Smart cities are becoming increasingly popular worldwide as cities grow; technology evolves and improves daily. The internet of things devices are used in smart cities that are all interconnected to run critical systems that a city requires to function correctly. The Internet of Things controls traffic...
Proceedings Article

The Use of Machine Learning in Digital Forensics: Review Paper

Yusra Al Balushi, Hothefa Shaker, Basant Kumar
With the increase of cybercrimes in the current years, digital forensics has become an important matter to study in order achieve quality evidence. Forensic investigators face difficulties with data collection and analysis to reconstruct events. Due to humans’ immense interaction on a daily basis, machine...
Proceedings Article

Effectiveness of Wireshark Tool for Detecting Attacks and Vulnerabilities in Network Traffic

Nawal A. L. Mabsali, Hothefa Jassim, Joseph Mani
Due to the popularity of using the technology, network security plays a crucial role recently which supports to establish strong systems that work against cyberattacks. Furthermore, the term “network vulnerabilities” refers to the flaws in the network which attackers exploit to break security and steal...
Proceedings Article

Moth-Flame Optimization and Ant Nesting Algorithm: A Systematic Evaluation

Hanan K. AbdulKarim, Tarik A. Rashid
In this paper, some swarm metaheuristic algorithms are analyzed to show the performance of algorithms. Swarm Intelligence algorithms are more trapping in local optima because of low exploration. The Moth-Flame Optimization algorithm is a widely applied metaheuristic algorithm. Nevertheless, the Ant Nesting...
Proceedings Article

A Tutorial on Child Drawing Development Optimization

Azad A. Ameen, Tarik A. Rashid, Shavan Askar
In 2021, a novel metaheuristic algorithm inspired by the child’s learning behavior and cognitive development employs the golden ratio. The golden ratio was first presented by the renowned scientist Fibonacci. The ratio of two consecutive numbers in the Fibonacci sequence is alike, and it is named the...
Proceedings Article

A Systematic Study of Krill Herd and FOX Algorithms

Rebwar Khalid Hamad, Tarik A. Rashid
In 2012, Amir Hossein Gandomi and Amir Hossein Alavi presented the Krill Herd algorithm (KH), a revolutionary biologically inspired method for addressing optimization tasks. On the other hand, another new and powerful metaheuristic algorithm called FOX was proposed by Hardi Mohammed and Tarik Rashid...
Proceedings Article

Forecasting Bitcoin Price by Tuned Long Short Term Memory Model

Aleksandar Petrovic, Luka Jovanovic, Miodrag Zivkovic, Nebojsa Bacanin, Nebojsa Budimirovic, Marina Marjanovic
The interest for cryptocurrencies is high and hence this work focuses on providing a practical real-world application of the swarm metaheuristics and long short term memory model (LSTM). The goal is price forecasting which is interesting due to the high volatility of the cryptocurrencies. The authors...
Proceedings Article

Intrusion Detection by XGBoost Model Tuned by Improved Multi-verse Optimizer

Aleksandar Petrovic, Milos Antonijevic, Ivana Strumberger, Nebojsa Budimirovic, Nikola Savanovic, Stefana Janicijevic
Artificial intelligence and internet of things (IoT) fields have contributed to the flourishment of the industry 4.0 concept. The main benefits include the improvements in terms of device communication, productivity, and efficiency. Nevertheless, there is a downside concerning the security of these systems....
Proceedings Article

The XGBoost Approach Tuned by TLB Metaheuristics for Fraud Detection

Aleksandar Petrovic, Milos Antonijevic, Ivana Strumberger, Luka Jovanovic, Nikola Savanovic, Stefana Janicijevic
The recent pandemic had a major impact on online transactions. With this trend, credit card fraud increased. For the solution to this problem the authors explore existing solutions and propose an optimized solution. The solution is based on an extreme gradient boosting algorithm (XGBoost) and a teaching-learning-based-optimization...
Proceedings Article

Feature Selection and Optimization Based Deep Learning for Rainfall Prediction

P. Vijaya, Satish Chander, Praba Palanisamy, Alycia Sebastian, Joseph Mani
Rainfall hugely impacts every aspect of human life, such as transportation, agriculture, water management, and so on. It also is a grave cause of several natural calamities, like landslides, floods, and drought, which pose a serious threat to the well-being of individuals. These concerns have necessitated...
Proceedings Article

Biometrically Authenticated Boot Loading System from USB Drive by Exploiting the Fingerprint and Finger Vein

Alycia Sebastian, Vijaya Padmanabha, Joseph Mani
Commonly, a USB flash drive is utilized for storing, transferring and backing up data like personal files, software, media files, etc. But users might not have much knowledge about its other hidden characteristics. It could also act as a replacement of CD/hard disk/DVD media as OSs handler resources...
Proceedings Article

Design and Execution of Secure Smart Home Environments on Visual Simulation Tool

Basant Kumar, Hothefa Shaker, Josephmani
The advent of smart technologies is going to be a paradigm shift and game changer in resolving current universal issues such as climate change, cybersecurity, health care, mental health, insecure home, food, water, and energy. Evolving smart home systems has been a prodigious and challenging task for...
Proceedings Article

Person Identification by Models Trained Using Left and Right Ear Images Independently

K. R. Resmi, G. Raju, Vijaya Padmanabha, Joseph Mani
The application of Deep Learning Techniques in biometrics has grown significantly during the last decade. The use of deep learning models in ear biometrics is restricted due to the lack of large ear datasets. Researchers employ transfer learning based on several pretrained models to overcome the limitations....
Proceedings Article

Artificial Neural Network Tuning by Improved Sine Cosine Algorithm for HealthCare 4.0

Masa Gajevic, Nemanja Milutinovic, Jelena Krstovic, Luka Jovanovic, Miodrag Zivkovic, Marina Marjanovic, Catalin Stoean
This paper explores classification of datasets for Healthcare 4.0 using artificial neural networks which are tuned by improved sine cosine algorithm (SCA). Healthcare 4.0 themes include internet of things (IoT), industrial IoT (IIoT), cognitive computing, artificial intelligence, cloud computing, fog...
Proceedings Article

Training a Logistic Regression Machine Learning Model for Spam Email Detection Using the Teaching-Learning-Based-Optimization Algorithm

Savia Berrou, Khadija Al Kalbani, Milos Antonijevic, Miodrag Zivkovic, Nebojsa Bacanin, Bosko Nikolic
Spam and emails have always been intrinsically linked since the creation of the Advanced Research Projects Agency Network, otherwise known as (ARPANET). The latter witnessed, on May 3rd, 1978, the first known spam email to date. Today, spam emails negatively affect the users’ productivity and private...