100% found this document useful (2 votes)
26 views

Instant Access to Intelligent Systems Design and Applications 19th International Conference on Intelligent Systems Design and Applications ISDA 2019 held December 3 5 2019 Ajith Abraham ebook Full Chapters

International

Uploaded by

rinestizii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
26 views

Instant Access to Intelligent Systems Design and Applications 19th International Conference on Intelligent Systems Design and Applications ISDA 2019 held December 3 5 2019 Ajith Abraham ebook Full Chapters

International

Uploaded by

rinestizii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Experience Seamless Full Ebook Downloads for Every Genre at textbookfull.

com

Intelligent Systems Design and Applications 19th


International Conference on Intelligent Systems
Design and Applications ISDA 2019 held December 3
5 2019 Ajith Abraham
https://textbookfull.com/product/intelligent-systems-design-
and-applications-19th-international-conference-on-
intelligent-systems-design-and-applications-isda-2019-held-
december-3-5-2019-ajith-abraham/

OR CLICK BUTTON

DOWNLOAD NOW

Explore and download more ebook at https://textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Intelligent Systems Design and Applications: 18th


International Conference on Intelligent Systems Design and
Applications (ISDA 2018) held in Vellore, India, December
6-8, 2018, Volume 1 Ajith Abraham
https://textbookfull.com/product/intelligent-systems-design-and-
applications-18th-international-conference-on-intelligent-systems-
design-and-applications-isda-2018-held-in-vellore-india-
december-6-8-2018-volume-1-ajith-abraham/
textboxfull.com

Intelligent Systems Design and Applications: 18th


International Conference on Intelligent Systems Design and
Applications (ISDA 2018) held in Vellore, India, December
6-8, 2018, Volume 2 Ajith Abraham
https://textbookfull.com/product/intelligent-systems-design-and-
applications-18th-international-conference-on-intelligent-systems-
design-and-applications-isda-2018-held-in-vellore-india-
december-6-8-2018-volume-2-ajith-abraham/
textboxfull.com

Hybrid Intelligent Systems 19th International Conference


on Hybrid Intelligent Systems HIS 2019 held in Bhopal
India December 10 12 2019 Ajith Abraham
https://textbookfull.com/product/hybrid-intelligent-systems-19th-
international-conference-on-hybrid-intelligent-systems-his-2019-held-
in-bhopal-india-december-10-12-2019-ajith-abraham/
textboxfull.com

Intelligent Systems Design and Applications Ajith Abraham

https://textbookfull.com/product/intelligent-systems-design-and-
applications-ajith-abraham/

textboxfull.com
Intelligent Systems Design and Applications 16th
International Conference on Intelligent Systems Design and
Applications ISDA 2016 held in Porto Systems and Computing
557 Band 557 Ana Maria Madureira (Editor)
https://textbookfull.com/product/intelligent-systems-design-and-
applications-16th-international-conference-on-intelligent-systems-
design-and-applications-isda-2016-held-in-porto-systems-and-
computing-557-band-557-ana-maria-madureira/
textboxfull.com

Hybrid Intelligent Systems Ajith Abraham

https://textbookfull.com/product/hybrid-intelligent-systems-ajith-
abraham/

textboxfull.com

Hybrid Intelligent Systems 15th International Conference


HIS 2015 on Hybrid Intelligent Systems Seoul South Korea
November 16 18 2015 1st Edition Ajith Abraham
https://textbookfull.com/product/hybrid-intelligent-systems-15th-
international-conference-his-2015-on-hybrid-intelligent-systems-seoul-
south-korea-november-16-18-2015-1st-edition-ajith-abraham/
textboxfull.com

Proceedings of the 16th International Conference on Hybrid


Intelligent Systems HIS 2016 1st Edition Ajith Abraham

https://textbookfull.com/product/proceedings-of-the-16th-
international-conference-on-hybrid-intelligent-systems-his-2016-1st-
edition-ajith-abraham/
textboxfull.com

Intelligent Systems and Applications: Proceedings of the


2020 Intelligent Systems Conference (IntelliSys) Volume 3
Kohei Arai
https://textbookfull.com/product/intelligent-systems-and-applications-
proceedings-of-the-2020-intelligent-systems-conference-intellisys-
volume-3-kohei-arai/
textboxfull.com
Advances in Intelligent Systems and Computing 1181

Ajith Abraham
Patrick Siarry
Kun Ma
Arturas Kaklauskas Editors

Intelligent
Systems Design
and Applications
19th International Conference
on Intelligent Systems Design and
Applications (ISDA 2019) held
December 3–5, 2019
Advances in Intelligent Systems and Computing

Volume 1181

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Ajith Abraham Patrick Siarry
• •

Kun Ma Arturas Kaklauskas


Editors

Intelligent Systems Design


and Applications
19th International Conference on Intelligent
Systems Design and Applications
(ISDA 2019) held December 3–5, 2019

123
Editors
Ajith Abraham Patrick Siarry
Scientific Network for Innovation Université Paris-Est Créteil Val-de-Ma
and Research Excellence Creteil Cedex, France
Machine Intelligence Research Labs (MIR)
Auburn, WA, USA Arturas Kaklauskas
Department of Construction Management
Kun Ma and Real Estate
School of Information Science Vilnius Gediminas Technical University
and Engineering Vilnius, Lithuania
University of Jinan
Jinan, Shandong, China

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-49341-7 ISBN 978-3-030-49342-4 (eBook)
https://doi.org/10.1007/978-3-030-49342-4
© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

Welcome to the 19th International Conference on Intelligent Systems Design and


Applications (ISDA’19) held in the World Wide Web. ISDA’19 is hosted and
sponsored by the Machine Intelligence Research Labs (MIR Labs), USA. Due to
the xenophobic attacks, which spread in South Africa during early September 2019,
several authors requested us to withdraw their papers. Hence, we had to change the
venue to online mode.
ISDA’19 brings together researchers, engineers, developers and practitioners
from academia and industry working in all interdisciplinary areas of computational
intelligence and system engineering to share their experience, and to exchange and
cross-fertilize their ideas. The aim of ISDA’19 is to serve as a forum for the
dissemination of state-of-the-art research, development and implementations of
intelligent systems, intelligent technologies and useful applications in these two
fields.
ISDA’19 received submissions from 33 countries and each paper was reviewed
by at least five or more reviewers, and based on the outcome of the review process,
62 papers were accepted for inclusion in the conference proceedings (40% accep-
tance rate).
First, we would like to thank all the authors for submitting their papers to the
conference, for their presentations and discussions during the conference. Our
thanks go to program committee members and reviewers, who carried out the most
difficult work by carefully evaluating the submitted papers. Our special thanks to
the following plenary speakers, for their exciting plenary talks:
• Michael Pecht, University of Maryland, USA
• Yukio Ohsawa, University of Tokyo, Japan
• Karim Djouani, University Paris Est Creteil (UPEC), Paris, France
• Mourad Fakhfakh, National School of Electronics and Telecommunications of
Sfax, Tunisia
• Kaushik Das Sharma, University of Calcutta, India.
• Ali Siadat, Ecole Nationale Superieure d’Arts et M tiers (ENSAM), France
• Fabio Scotti, Università degli Studi di Milano, Italy

v
vi Preface

We express our sincere thanks to the organizing committee chairs for helping us
to formulate a rich technical program. Enjoy reading the articles!

Ajith Abraham
Patrick Siarry
General Chairs

Kun Ma
Arturas Kaklauskas
Program Chairs
Organization

Program Committee

Ajith Abraham Machine Intelligence Research Labs, USA


Laurence Amaral Federal University of Uberlandia
Babak Amiri The University of Sydney
Mauricio Ayala-Rincon Universidade de Brasilia
Nashwa El-Bendary Arab Academy for Science, Technology
and Maritime Transport, Egypt
Heder Bernardino Universidade Federal de Juiz de Fora
José Everardo Bessa Maia State University of Ceará - UECE
Mohammad Reza Bonyadi The University of Adelaide
János Botzheim Budapest University of Technology
and Economics
Alberto Cano Virginia Commonwealth University
Paulo Carrasco University of Algarve
Oscar Castillo Tijuana Institute of Technology
Turgay Celik University of the Witwatersrand
Isaac Chairez UPIBI-IPN
Lee Chang-Yong Kongju National University
Francisco Chicano University of Máalaga
Mario Giovanni C. A. Cimino University of Pisa
Phan Cong-Vinh Nguyen Tat Thanh University
Gloria Cerasela Crisan “Vasile Alecsandri” University of Bacau
Haikal El Abed German International Cooperation (GIZ) GmbH
El-Sayed M. El-Alfy King Fahd University of Petroleum and Minerals
Wilfried Elmenreich Alpen-Adria-Universität Klagenfurt
Carlos Fernandez-Llatas Universitat Politècnica de València
Amparo Fuster-Sabater Institute of Applied Physics (C.S.I.C.),
Serrano 144, 28006 Madrid, Spain
Terry Gafron Bio-Inspired Technologies

vii
viii Organization

Elizabeth Goldbarg Federal University of Rio Grande do Norte


Stefan Gruner University of Pretoria
Biju Issac Teesside University
Isabel Jesus Institute of Engineering of Porto
Jerry Chun-Wei Lin Western Norway University of Applied Sciences
Simone Ludwig North Dakota State University
Ana Madureira Departamento de Engenharia Informática
Vukosi Marivate University of Pretoria
Efrén Mezura-Montes University of Veracruz
Jolanta Mizera-Pietraszko Wroclaw University of Technology
Paulo Moura Oliveira UTAD University
Ramzan Muhammad Maulana Mukhtar Ahmad Nadvi Technical
Campus
Akila Muthuramalingam KPR Institute of Engineering and Technology
Janmenjoy Nayak Veer Surendra Sai University of Technology
Varun Ojha University of Reading
George Papakostas Human–Machines Interaction (HMI) Laboratory,
Department of Computer and Informatics
Engineering, EMT Institute of Technology
Konstantinos Parsopoulos University of Ioannina
Carlos Pereira ISEC
Eduardo Pires UTAD University
Dilip Pratihar Department of Mechanical Engineering
Radu-Emil Precup Politehnica University of Timisoara
Oscar Gabriel Reyes Pupo UCO
José Raúl Romero University of Cordoba
Keun Ho Ryu Chungbuk National University
Ozgur Koray Sahingoz Istanbul Kultur University
Neetu Sardana Jaypee Institute of Information Technology
Mansi Sharma Indian Institute of Technology, Delhi
Tarun Kumar Sharma Amity University, Rajasthan
Mohammad Shojafar University of Padua, Italy
Patrick Siarry Universit de Paris 12
Antonio J. Tallón-Ballesteros University of Huelva
Shing Chiang Tan Multimedia University
Sanju Tiwari NIT
Jih Fu Tu Department of Electronic Engineering,
St. Johns University
Eiji Uchino Yamaguchi University
Leonilde Varela University of Minho
Gai-Ge Wang School of Computer Science and Technology,
Jiangsu Normal University
Lin Wang University of Jinan
Organization ix

Additional Reviewers
Adly, Mohammad Goyal, Ayush
Ahuactzin, Juan-Manuel Kassem, Abdallah
Bagnall, Anthony Mckinlay, Steve
Barbudo Lunar, Rafael Pérez, Eduardo
Berkich, Don Ramírez, Aurora
Crisan, Gloria Cerasela Salado-Cid, Rubén
Das Sharma, Kaushik Tiago Da Cunha, Italo
Diniz, Thatiana Timm, Nils
Gabriel, Paulo
Contents

Data Jackets as Communicable Metadata for Potential


Innovators – Toward Opening to Social Contexts . . . . . . . . . . . . . . . . . 1
Yukio Ohsawa, Sae Kondo, and Teruaki Hayashi
A Proposal Based on Instance Typicality for Dealing with Nominal
Attribute Values in Instance-Based Learning Environments . . . . . . . . . 14
S. V. Gonçalves and M. C. Nicoletti
Dataset for Intrusion Detection in Mobile Ad-Hoc Networks . . . . . . . . . 24
Rahma Meddeb, Bayrem Triki, Farah Jemili, and Ouajdi Korbaa
Visual Password Scheme Using Bag Context Shape Grammars . . . . . . . 35
Blessing Ogbuokiri and Mpho Raborife
Peak Detection Enhancement in Autonomous Wearable
Fall Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Mario Villar and Jose R. Villar
Automated Detection of Tuberculosis from Sputum Smear
Microscopic Images Using Transfer Learning Techniques . . . . . . . . . . . 59
Lillian Muyama, Joyce Nakatumba-Nabende, and Deborah Mudali
Comparative Performance Analysis of Neural Network Base
Training Algorithm and Neuro-Fuzzy System with SOM
for the Purpose of Prediction of the Features of Superconductors . . . . . 69
Subrato Bharati, Mohammad Atikur Rahman, Prajoy Podder,
Md. Robiul Alam Robel, and Niketa Gandhi
Automatic Detection of Parkinson’s Disease from Speech Using
Acoustic, Prosodic and Phonetic Features . . . . . . . . . . . . . . . . . . . . . . . 80
Rania Khaskhoussy and Yassine Ben Ayed

xi
xii Contents

A Deep Convolutional Neural Network Model for Multi-class


Fruits Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Laith Alzubaidi, Omran Al-Shamma, Mohammed A. Fadhel,
Zinah Mohsin Arkah, and Fouad H. Awad
Distributed Architecture of Snort IDS in Cloud Environment . . . . . . . . 100
Mondher Essid, Farah Jemili, and Ouajdi Korbaa
Turing-Style Test Approach for Verification and Validation
of Unmanned Aerial Vehicles’ Intelligence . . . . . . . . . . . . . . . . . . . . . . . 112
Marwa Brichni and Said El Gattoufi
Big Data Processing for Intrusion Detection System Context:
A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Marwa Elayni, Farah Jemili, Ouajdi Korbaa, and Basel Solaiman
Hardware Accelerator for Real-Time Holographic Projector . . . . . . . . . 132
Mohammed A. Fadhel, Omran Al-Shamma, and Laith Alzubaidi
Automatic Lung Segmentation in CT Images Using Mask R-CNN
for Mapping the Feature Extraction in Supervised Methods
of Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Luís Fabrício de F. Souza, Gabriel Bandeira Holanda, Shara S. A. Alves,
Francisco Hércules dos S. Silva, and Pedro Pedrosa Rebouças Filho
Structures Discovering for Optimizing External Clustering
Validation Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Marcos A. Spalenza, Juliana P. C. Pirovani, and Elias de Oliveira
The Influence of NER on the Essay Grading . . . . . . . . . . . . . . . . . . . . . 162
Elias Oliveira, James Alves, Jessica Brito, and Juliana Pirovani
Evaluation of Acoustic Features for Early Diagnosis
of Alzheimer Disease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Randa Ben Ammar and Yassine Ben Ayed
P-Median Problem: A Real Case Application . . . . . . . . . . . . . . . . . . . . . 182
M. B. Bernábe-Loranca, R. González-Velázquez,
Erika Granillo-Martinez, M. Romero-Montoya,
and Ricardo A. Barrera-Cámara
Towards Context-Aware Business Process Cost Data Analysis
Including the Control-Flow Perspective . . . . . . . . . . . . . . . . . . . . . . . . . 193
Dhafer Thabet, Nourhen Ganouni, Sonia Ayachi Ghannouchi,
and Henda Hajjami Ben Ghezala
Drone Authentication Using ID-Based Signcryption
in LoRaWAN Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Sana Benzarti, Bayrem Triki, and Ouajdi Korbaa
Contents xiii

Extrinsic Plagiarism Detection for French Language


with Word Embeddings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Maryam Elamine, Fethi Bougares, Seifeddine Mechti,
and Lamia Hadrich Belguith
Using Opinion Mining in Student Assessments to Improve
Teaching Quality in Universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Aillkeen Bezerra de Oliveira, André Luiz F. Alves,
and Cláudio de Souza Baptista
Automated Threat Propagation Model Through a Topographical
Environment Modelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Kilian Vasnier, Abdel-Illah Mouaddib, Sylvain Gatepaille,
and Stephan Brunessaux
Solving Lorenz ODE System Based Hardware Booster . . . . . . . . . . . . . 245
Hassan Al-Yassin, Mohammed A. Fadhel, Omran Al-Shamma,
and Laith Alzubaidi
Object Recognition Software Using RGBD Kinect Images
and the YOLO Algorithm for Mobile Robot Navigation . . . . . . . . . . . . 255
Douglas Henke dos Reis, Daniel Welfer,
Marco Antonio de Souza Leite Cuadros,
and Daniel Fernando Tello Gamarra
Paper Co-citation Analysis Using Semantic Similarity Measures . . . . . . 264
Mohamed Ali Hadj Taieb, Mohamed Ben Aouicha,
and Houcemeddine Turki
Assessment of the ISNT Rule on Publicly Available Datasets . . . . . . . . . 278
J. Afolabi Oluwatobi, Gugulethu Mabuza-Hocquet,
and Fulufhelo V. Nelwamondo
An Autonomous Fallers Monitoring Kit: Release 0.0 . . . . . . . . . . . . . . . 287
Enrique de la Cal, Alvaro DaSilva, Mirko Fáñez, Jose Ramón Villar,
Javier Sedano, and Victor Suárez
Random Forest Missing Data Imputation Methods:
Implications for Predicting At-Risk Students . . . . . . . . . . . . . . . . . . . . . 298
Bevan I. Smith, Charles Chimedza, and Jacoba H. Bührmann
Noise Reduction with Detail Preservation in Low-Dose Dental CT
Images by Morphological Operators and BM3D . . . . . . . . . . . . . . . . . . 309
Romulo Marconato Stringhini, Daniel Welfer,
Daniel Fernando Tello Gamarra, and Gustavo Nogara Dotto
An Effective Approach to Detect and Prevent Collaborative Grayhole
Attack by Malicious Node in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Sanjeev Yadav, Rupesh Kumar, Naveen Tiwari, and Abhishek Bajpai
xiv Contents

Hand-Crafted and Learned Features Fusion for Predicting Freezing


of Gait Events in Patients with Parkinson’s Disease . . . . . . . . . . . . . . . . 336
Hadeer El-ziaat, Nashwa El-Bendary, and Ramadan Moawad
Signature of Electronic Documents Based on Fingerprint
Recognition Using Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Souhaïl Smaoui, Manel Ben Salah, and Mustapha Sakka
Comparison of a Trajectory Controller Based on Fuzzy Logic
and Backstepping Using Image Processing for a Mobile Robot . . . . . . . 355
Rodrigo Mattos da Silva, Thiago Rodrigues Garcia,
Marco Antonio de Souza Leite Cuadros,
and Daniel Fernando Tello Gamarra
The Use of Area Covered by Blood Vessels in Fundus Images
to Detect Glaucoma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
J. Afolabi Oluwatobi, Gugulethu Mabuza-Hocquet,
and Fulufhelo V. Nelwamondo
Complexity of Rule Sets Induced from Data with Many Lost
Values and “Do Not Care” Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Patrick G. Clark, Jerzy W. Grzymala-Busse, Zdzislaw S. Hippe,
Teresa Mroczek, and Rafal Niemiec
ReLU to Enhance MDLSTM for Offline Arabic
Handwriting Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Rania Maalej and Monji Kherallah
Histogram Based Method for Unsupervised Meeting
Speech Summarization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Nouha Dammak and Yassine BenAyed
Deep Support Vector Machines for Speech Emotion
Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Hadhami Aouani and Yassine Ben Ayed
Biometric Individual Identification System Based
on the ECG Signal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Sihem Hamza and Yassine Ben Ayed
Bayesian Anomaly Detection and Classification for Noisy Data . . . . . . . 426
Ethan Roberts, Bruce A. Bassett, and Michelle Lochner
How to Trust the Middle Artificial Intelligence:
Uncertainty Oriented Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Marwa Brichni and Said El Gattoufi
Design the HCI Interface Through Prototyping for the Telepresence
Robot Empowered Smart Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Ramona Plogmann, Qing Tan, and Frédérique Pivot
Contents xv

Ant Colony Optimization on an OBS Network with Link Cost


and Impairments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Francois Du Plessis, M. C. Du Plessis, and Tim Gibbon
The Categorical Integration of Symbolic and Statistical AI:
Quantum NLP and Applications to Cognitive and Machine
Bias Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Yoshihiro Maruyama
Vehicle Routing Problem with Fuel Station Selection (VRPFSS):
Formulation and Greedy Heuristic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Jhonata Soares de Freitas and André Gustavo dos Santos
Requirements Change Requests Classification:
An Ontology-Based Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Zaineb Sakhrawi, Asma Sellami, and Nadia Bouassida
An Efficient MPLS-Based Approach for QoS Providing in SDN . . . . . . 497
Manel Majdoub, Ali El Kamel, and Habib Youssef
HoneyBees Mating Optimization Algorithm for the Static Bike
Rebalancing Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Mariem Sebai, Ezzeddine Fatnassi, and Lilia Rejeb
A Hybrid MAC Protocol for Heterogeneous M2M Networks . . . . . . . . . 520
Abdelfetteh Lachtar, Marwa Lachtar, and Abdennaceur Kachouri
Hybrid Approach for Trajectory Identification of Mobile Node via
Lagrange Interpolation and Kalman Filtering Framework . . . . . . . . . . 530
Pranchal Mishra, Ayush Tripathi, Abhishek Bajpai, and Naveen Tiwari
Post-Truth AI and Big Data Epistemology: From the Genealogy
of Artificial Intelligence to the Nature of Data Science as a New
Kind of Science . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
Yoshihiro Maruyama
Interoperable Decision Support System Based on Multivariate Time
Series for Setup Data Processing and Visualization . . . . . . . . . . . . . . . . 550
M. L. R. Varela, Gabriela Amaral, Sofia Pereira, Diogo Machado,
António Falcão, Rita Ribeiro, Emanuel Sousa, Jorge Santos,
and Alfredo F. Pereira
Cross-Model Retrieval Via Automatic Medical Image
Diagnosis Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
Sabrine Benzarti, Wahiba Ben Abdessalem Karaa,
and Henda Hajjami Ben Ghezala
Gap-Filling of Missing Weather Conditions Data Using Support
Vector Regression Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Heba Osman, Nashwa El-Bendary, and Essam El Fakharany
xvi Contents

Automating the Process of Faculty Evaluation in a Private


Higher Institution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Adewole Adewumi, Olamide Laleye, Sanjay Misra, Rytis Maskeliūnas,
Robertas Damaševičius, and Ravin Ahuja
A Web Based System for the Discovery of Blood Banks
and Donors in Emergencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Babajide Ayeni, Olaperi Yeside Sowunmi, Sanjay Misra,
Rytis Maskeliūnas, Robertas Damaševičius, and Ravin Ahuja
Smart City Waste Management System Using Internet of Things
and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
Aderemi A. Atayero, Segun I. Popoola, Rotimi Williams, Joke A. Badejo,
and Sanjay Misra
Employability Skills: A Web-Based Employer Appraisal System
for Construction Students . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612
Afolabi Adedeji, Afolabi Ibukun, Ojelabi Rapheal, Sanjay Misra,
and Ravin Ahuja
A Prognosis Method for Esophageal Squamous Cell Carcinoma
Based on CT Image and Three-Dimensional Convolutional
Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Kaipeng Fan, Jifeng Guo, Bo Yang, Lin Wang, Lizhi Peng,
Baosheng Li, Jian Zhu, and Ajith Abraham
Age Distribution Adjustments in Human Resource Department
Using Shuffled Frog Leaping Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 632
Tarun K. Sharma and Ajith Abraham
Selection of Cloud Service Provider Based on Sampled
Non-functional Attribute Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
Mehul Mahrishi, Kamal Kant Hiran, and Ruchi Doshi
Image Processing Techniques for Breast Cancer Detection:
A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Mahendra G. Kanojia, Mohd. Abuzar Mohd. Haroon Ansari,
Niketa Gandhi, and S. K. Yadav

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661


Data Jackets as Communicable Metadata
for Potential Innovators – Toward Opening
to Social Contexts

Yukio Ohsawa1(B) , Sae Kondo2 , and Teruaki Hayashi1


1 Department of Systems Innovation, School of Engineering,
The University of Tokyo, 7-3-1 Hongo, Bunkyo-Ku, Tokyo 113-8656, Japan
[email protected]
2 Research Center for Advanced Science and Technology,

The University of Tokyo, 4-6-1 Komaba, Meguro-Ku, Tokyo 153-8904, Japan

Abstract. Data Jackets are human-made metadata for each dataset, reflecting
peoples’ subjective or potential interests. By visualizing the relevance among
DJs, participants in the market of data think and talk about why and how they
should combine the corresponding datasets. Even if the owners of data may hes-
itate to open their data to the public, they can present the DJs in the Innovators
Marketplace on Data Jackets that is a platform for innovations. Here, participants
communicate to find ideas to combine/use/reuse data or future collaborators. Fur-
thermore, explicitly or implicitly required data can be searched by the use of tools
developed on DJs, which enabled, for example, analogical inventions of data anal-
ysis methods. Thus, we realized a data-mediated birthplace of seeds in business
and science. In this paper, we show a new direction to collect and use DJs to fit
social requirements externalized and collected in living labs. The effect of living
labs here is to enhance participants’ sensitivity to the contexts in the open society
according to the author’s practices, and the use of DJs to these contexts means to
develop the process of evidence-based innovation, i.e., the loop of living humans’
interaction to create dimensions of performance in businesses.

Keywords: Innovation · Data jackets · Living lab

1 Introduction

Since innovation appeared as such changes of the combinations of the factors of produc-
tion as cannot be affected by infinitesimal steps or variations on the margin [1], it does
not mean just inventing a product. Innovation is the process of commercial applications
of new technology, combining with material, methods, and resources, toward opening
up a new market. Rogers, after his theory of the diffusion of innovation involving various
stakeholders in the process of innovation and expansion of the opened market, pointed
out leading consumers play the role of innovators [2]. Here, not only the creators or
developers of new products but also users play the important role to discover new value

© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2021
A. Abraham et al. (Eds.): ISDA 2019, AISC 1181, pp. 1–13, 2021.
https://doi.org/10.1007/978-3-030-49342-4_1
2 Y. Ohsawa et al.

of a product via using it and diffuse the value to the majority in the market. According to
von Hippel [3], leading consumers invent, not only use and diffuse, technologies. All in
all, innovation evolved to be a term referring to the thoughts and the interaction of stake-
holders in the market including consumers. This point distinguishes innovation from a
child’s talent of value sensing acquired in the growth of mind [4] or a part of sense-
making that can be supported by information systems using data [5]. That is, innovation
is the interaction of stakeholders of potential markets via combining elements and “do-
ing” the ideas in the real life, to cause a change that creates a dimension of performance
[6] of products, the life of users, or the society.
Innovators Marketplace on Data Jackets (IMDJ [7]) is a method following the above
redefinition of innovation, where participants interact with combining data jackets shown
in Sect. 2 to invent and execute ideas of data usage. In IMDJ, participants communicate
to create solutions to satisfy data users’ requirements by sharing, combining, and using
data without violating constraints of owners (e.g., data protection and confidentiality as
a business resource). IMDJ has been used in science and business as stated in Sect. 2
and is now at the stage to prevail to daily human lives.
In this paper, Living Lab on Data Jackets (LLDJ) is proposed as a modification of
IMDJ for opening the communication and thoughts to a deeper and wider range of latent
requirements than in IMDJ. We still aim at aiding innovations, that is not about sheer
inventions but means the process of the humans’ interaction to externalize new dimen-
sions of performance. The role of the living lab here is to open participants’ sensitivity to
the requirements of people in the society who may not attend the workshop. In Sect. 2, a
logical description of data jackets and humans’ process of communication for reasoning
toward satisfying requirements are shown. IMDJ is briefly reviewed as a method to real-
ize this process, and its limit is shown from the point of the gap between the requirements
and the theory obtained in the reasoning. The living lab is introduced in Sect. 3 as an
approach to coping with this limit by deepening and widening participants’ sensitivity
to requirements. LLDJ is proposed in Sect. 4. This is not necessarily an improvement to
replace IMDJ with, but an addition of a new direction from the viewpoint of daily living
of people. The visualized sequence of utterances in a round-table discussion shown as
preliminary evidence implies the effect of LL in LLDJ.

2 Data Jackets as Communicable Metadata


2.1 Data Jacket: The Definition and Its Role in Satisfying Requirements
A data jacket (DJ hereafter, first introduced in [7]), is a piece of digest information of
a dataset, that does not open the content of the data, but includes the title, the abstract,
and variables, that may represent the subjective expectation of data owner or potential
data users about the utility of the data. The idea comes from a jacket of a movie DVD
in a shopping store, where only superficial information about the movie is shown for
an exhibition. The content of data should be hidden to reduce the risk of being leaked
to anyone who may harm the benefits of stakeholders. Such a policy of secure data
management has been used in IMDJ where each data owner takes part in submitting
DJs introduced below. In contrast to real data, DJs are easy to write and disclose for
appealing the latent utility of corresponding data, via showing potential links between
datasets. For example, DJs about personal health and food consumption can be disclosed
Data Jackets as Communicable Metadata for Potential Innovators 3

although the data may be confidential and combined for understanding the relevance of
weather and health linked via “time” and “place” that are common variables between
the two datasets or via the concept “daily behavior” common between them (Fig. 1).

Fig. 1. A snapshot of on-line IMDJ [9]. Solutions (squares e.g., “We can have..”) are proposed
combining DJs (large cards e.g. DI1039) responding to requirements (e.g., “what are….”).

See Fig. 2 to find examples of simple DJs. More formally, a DJ is defined as follows
by relaxing the constraint on V i and the redundancies in [8].
DJ i (i ∈ [1, N]): The i-th data jacket (N: the number of datasets in the market of
data)
DJ i : = {V i , F i , Pi }, where elements are defined as follows.

V i : the set of variables in DJ i


F i : elements of V i expressed as functions over other elements of V i
Pi : the set of predicates that relate elements of V i

G: The goal, i.e., the requirement incompletely defined as the relation over terms
corresponding to events or entities in the target world
T: The theory, i.e., a model described by a set of Horn clauses, each of which is
given using predicates in PG below. T is represented over elements of PG , F G , and V G ,
that compose the set of DJs in DJcom(G) in Eq. (1), that satisfies Eq. (2) (where [v]
for variable v means the range of the value of variable v), if a conclusion G’ derived by
theory T subsumes goal G. This means a formal expression G’ is related to the informal
expression G of goal, and T is completely defined that intuitively means all the clauses
in T are supported by data corresponding to some DJcom(G).

DJcom(G) := {DJa , DJb , . . . DJL } ⊆ {DJ1 , DJ2 , . . . DJN } where


VG := Va ∪ Vb ∪ . . . ∪ VL , FG := Fa ∪ Fb ∪ . . . FL , PG := Pa ∪ Pb ∪ . . . PL , (1)
4 Y. Ohsawa et al.


v ∈ VG [∀ Vx ∈ {Va , Vb , . . . VL }, ∃ vx ∈ Vx |[v] ∩ [vx ] = ∅]. (2)
For example, suppose G is the requirement to know the influence of weather on
health, represented as “health ← weather”. By relating health to g-GTP_high(person
ID, date) and weather to hot(date), G corresponds to G’ in clause (3).
G :∃ person ID{γ − GTP_high(person ID, date) ← hot(date)} (3)
G’ can be derived by the combination of clauses (4) and (5) by which T is formed.
γ − GTP_high(person ID, date) ← beer_consume(person ID, date) (4)


person ID{beer_consume(person ID, date) ← hot(date)} (5)
Here hot(date) and γ-GTP_high(person ID, date) can respectively mean
air_temperature (date) - air_ temperature (date −10) > α [deg] and γ-GTP(date)-
γ-GTP(date −10) > β [u/l] for constants α and β. The values α and β are obtained using
data represented by DJs. For example, a can be obtained from Data B below.
Data B, represented by DJ 1 ) that is DJ(B) in Fig. 2) weather: variables {date, address,
air temperature, etc.}, a function such as air_temperature(date) in F 1 is also in V 1
defined over date in V 1 , and a predicate such as hot in P1 is defined on air_temperature
and date.
In Fig. 2(a), each dotted line connects the appearances of the same variable in multiple
DJs to combine predicates, corresponding to sharing a variable among all V x used for
deriving G’ as in Eq. (2). If the obtained T is not satisfactory (here the low confidence
in Fig. 2(a) and (b)), other variables such as address in Fig. 2(b) in a DJ used so far as in
Fig. 2 (a) are additionally used. Furthermore, as in Fig. 2 (c), new DJs may be added to
DJcom(G) to obtain a satisfactory T and evaluate it by data corresponding to the DJs.

2.2 Innovators Marketplace on Data Jackets


Our approach toward realizing such reasoning as in 2.1 or Fig. 2 has been IMDJ as
summarized in the introduction. For aiding participants’ thought about the connectivity
among DJs, a gaming board is made using KeyGraph [10] where some words or variables
shared by multiple DJs are highlighted and positioned on bridges between the DJs.
IMDJ starts with the set of DJs and the gaming board obtained from the set, followed
by the process to propose and evaluate solutions based on combined DJs to meet the
requirements of data users following the procedure exemplified in 2.1.
Below let us show a few of the results obtained so far, that externalized the dimension
of performance in decisions using data in businesses, that is the explanation of changes
rather than the detection or prediction realized using machine learning technologies.
Here, a TJ stands for a Tool Jacket [11] where a tool for using data (a method of AI, data
visualization, or simulation) is summarized in the form of DJ i.e., the title, the abstract,
and the input/output variables. Example 3 was realized on the analogy from the basis
of Example 2 using DJ store [12], where the links between DJ3 and Req 2 had been
learned from past IMDJ logs, by diverting the idea to use TJ1 to chance explanation
from purchases in the market to earthquakes.
Data Jackets as Communicable Metadata for Potential Innovators 5

Fig. 2. The connection of DJs for combining data in IMDJ. To refine the performance of data
mining, variables as “address” in (a) to (b) or data as DJ(B) or DJ(D) are in/exported.
6 Y. Ohsawa et al.

Fig. 3. Innovators’ Marketplace on Data Jackets of two types. Solid arrows mean without action
planning, whereas dotted arrows with action planning. Action planning may cause requirement
revision, which breaks the ideas created in IMDJ

Example 1, Skill development in sports) Req 1: Evaluate and improve the defense
skill of a soccer team [13]

DJ1: wide-view video


DJ2: body direction
Sol1: visualize “lines” of teammates on which to quickly pass a ball, that explains the
skill of a defensive team to manage the changes in the offensive team

Example 2, Change explanation in businesses) Req 2: Detect and explain causes of


customers/investors’ behavioral shifts [14, 15]

DJ3: data on the market e.g., position of the sale in a supermarket or stock prices
TJ1: Tangled String or Graph-based entropy
Sol2: user interface for explaining changes in the consumption market with visualized
“explanatory” changes implying the latent dynamics in the market

Example 3: Change explanation in nature) Req: Detect precursors of and explain


changes in earthquakes [16]

DJ4: Sequence of earthquakes in Japan


DJ5: Location of seismographs in Japan
DJ6: (The way of using) Position of sale data (as in Example 3)
TJ2: Regional entropy on seismic information based on the idea of TJ1
Sol3: Entropy-based detection of precursors from the sequence of earthquakes

However, it turned out that solutions tend not to be satisfactory enough to attract
participants in IMDJ to realize the proposed solutions even if they were highly evaluated
by the participants. We hypothesize here that the problem was in the lack of correspon-
dence between G and a predicate in G’ derived by T, because we provided no explicit
Data Jackets as Communicable Metadata for Potential Innovators 7

user interface to urge subscribers of DJs to write their subjective expectations meaning
the predicates, i.e., elements of P, but just to fill the DJ with their expectations about
the utility of the data in natural language. Such expectations may partially cover some
potential relations among variables, and the post-process of IMDJ called Action Plan-
ning introduced additional details of the planned use of data. In the Action Planning
phase, the latent requirement that may be the reason of requirements presented as G in
IMDJ was obtained and the solution corresponding to T was revised to meet this new
goal. However, the new goal was just one level deeper (higher in Fig. 3) than G which
may not reach the level of DJ, and the solution T obtained in IMDJ may get lost due to
the goal revision. In such a case, it has been difficult to reach a shared awareness of the
value of the data-based solutions to be obtained.

3 Living Lab for Enhancing the Sensitivity to the Open Society

We expect to satisfy the requirements not satisfied by the previous IMDJ for the reason
in 2.2, by inviting citizens to join the workshop in Living Labs discussed below to both
deepen and widen causal desires to explain the originally presented requirements. In this
section, let us discuss the expectations of the effects of combining LL and DJs.

3.1 Living Labs and Its Effects

In recent years, the living lab (LL hereafter) has been attracting the attention of indus-
try, government, and academia to create new solutions services by solving problems
together. LL was born as a social participatory method that works from the viewpoint
of consumers, mainly in northern Europe, and is regarded as a framework for the par-
ticipation of various stakeholders supporting innovation and sustainable development
in the community. Therefore, LL is expected as a mechanism for promoting wide-
ranging social participation and changing individual consciousness near living spaces
by introducing new, sometimes deepened aspects into communication about problems
and solutions in the daily life. By this effect of LL, the proposed LLDJ below aims to
overcome the problem of IMDJ mentioned in Sect. 2.2 inviting citizens and working
people in the target region to (1) widen the scope of communication, and also (2) deepen
the communication about potential requirements to reinforce the possibility of presented
goals to reach the level of DJs.
The studies so far on LL have been preceded by Europe. In particular, in recent years,
interest has been attracted to the LL that aims to create innovations and infiltrate users
with ICT as the core. Følstad (2008), who organized 32 references on this type, pointed
out the elucidation of processes and methods [17]. In response, Leminen (2012) and
Almirall & Wareham (2011) conducted analysis from the perspectives of management
and participation methods and the roles of the parties involved [18, 19]. Neither method
has yet been elucidated because the definition of innovation has not been explicitly
clarified for each study. In other words, since the effect of LL is not clear, the evaluation
index has not been established. This point is improved, and the meaning of introducing
LL for the improving IMDJ comes to be clear in 3.2.
8 Y. Ohsawa et al.

3.2 Lessons for Livings from Organizational Citizenship Behavior


Living lab activities are considered as voluntary and organized social contribution activ-
ities, and as an evaluation viewpoint of their effects, we focus on the effects of LL
that contribute to Organizational Citizenship Behavior (OCB). OCB has been defined
as individual behavior that is discretionary, not directly or explicitly recognized by the
formal reward system, and that in the aggregate promotes the effective functioning of
the organization [20]. In the sense that OCBs are not parts of the job description but
are performed by an employee’s personal choice for positive contribution to the overall
organizational effectiveness, Contextual Performance (non-task related work behaviors
and activities contributing to the social and psychological aspects of the organization
[21]) and Extra-role Behavior (behavior attempting to benefit the organization beyond
existing role expectations [22]), are all in our target here to realize by LL. The explana-
tory scales on the five-factor model in [20] has also been developed, specified or extended
in applying to industrial and governmental organizations. For example, the mediating
effect of political skills as a scale includes the ability to sense the influence of individuals
on others and the intentions of others, as well as the ability to build social agility and
human relations [23].
On the other hand, it is known that the LL activities can result in the networking of
participants and the expression of potential requirements. Since these results are thought
to be related to the above-mentioned regulatory and explanatory factors of OCB, it
is hypothesized that LL contributes to the enhancement of OCB using these factors.
By introducing LL, via enhancing OCB and taking advantage of its effects, we can
expect it raises the sensitivity of participants to deep and wide potential requirements
that did not work well in the conventional IMDJ. As shown in Fig. 4, the abstracts of
OCB and LL respectively collected from Wikipedia are visualized into one graph by
KeyGraph to see the contact points between them, among the 117 words visualized. The
words “work” “social” “personal” “life”, “experience”, “evaluation” and “context” are
shared between OCB and LL, to which concepts related to collaborative problem solving
such as “problem” “conflicts” “multidisciplinary” are linked. This implies, although
the abstracts are weak as evidence, that the concept of evaluating the performance of
individual persons in social contexts in the problem detection (i.e. requirement sensing)
and of the organization to solve problems from multidisciplinary viewpoints are parts
of the effects of living lab that can be expected from the perspective of the OCB. It was
a lacking point. Thus, in the future workshops, we plan to introduce the process of the
next chapter as Living Lab on Data Jackets (LLDJ) in Sect. 4.

4 Living Lab on Data Jackets


The presented new process is the simple four steps below.

Step 0) Set the topic Z, without a solution for requirements. Collect the initial participants
in LL Step 1 (PLL ).
Step 1) Open the LL relevant to topic Z (from the viewpoint of daily life, which means to
communicate requirements and to propose solutions for the requirements. The require-
ments are deepened to latent requirements by asking the reasons for the requirements
before proposing any solution (see the regulation mentioned below).
Data Jackets as Communicable Metadata for Potential Innovators 9

Fig. 4. The KeyGraph visualization of LL (right half) and OCB (left)

Step 2) Make the set RLL of requirements obtained in Step 1 (KeyGraph can be used
here as stated later in Fig. 6).
Step 3) Search DJs using words in the requirements in RLL as the query to DJ store [11],
on which an IMDJ starts applying RLL as the initial requirements. Collect the participants
in IMDJ (IMDJ ) relevant to these DJs and to the initial requirements.
Step 4) The solution(s) and added requirements in Step 3 are returned to Step 1. Call
participants relevant to these added items additionally to LL .

For externalizing deeper requirements, the communication is regulated by setting a


rule that each solution in Steps 1 and 3 must be proposed after asking a deep reasoning
question i.e., “why is do you require it?”, based on the limit-handling framework in [24,
25]. LLDJ and IMDJ are compared in Fig. 5 and Table 1. As in Fig. 5, LLDJ contributes
to solutions for more general social issues than sheer IMDJ where each requirement is
shown by a participant and a solution is usually addressed to a few requirements.
For externalizing deeper requirements, the communication is regulated by setting a
rule that each solution in Steps 1 and 3 must be proposed after asking a deep reasoning
question i.e., “why is do you require it?”, based on the theory of questions for design in
[24]. LLDJ and IMDJ are compared in Fig. 5 and Table 1. As in Fig. 5, LL.
Let us use KeyGraph in Fig. 6 to visualize utterances in the first, second, third, and
the last quarter of utterances in a round-table discussion held for two hours inviting
five workers in the Ota ward in Tokyo, two governmental workers, and three professors
from universities in Tokyo. Ota has more than 3000 manufacturing firms 50% of which
have less than four workers, that makes hard to employ young staff members. The topic
10 Y. Ohsawa et al.

Fig. 5. The structure of Living Lab with Data Jackets (LLDJ)

Table 1. The comparison of IMDJ versus LLDJ.

Elements of a workshop IMDJ LLDJ


Participants Fixed members including Members revised by cycles (Step
data providers/experts, data 1 to 4), including ordinary
users, data scientists citizens in LL, and others similar
to IMDJ
Visualization as common KeyGraph showing DJs and KeyGraph of words in LL and
reference for participants links between them co-occurrence links between
them, in addition to the graph for
IMDJ. Both are revised by cycles
The communication Proposing to use multiple Presenting and deepening
data, corresponding DJs requirements in the living context
connected in KeyGraph, of people in LL, followed by
combined into one IMDJ initiated by the
requirements in LL
Structure of requirements One or two layers Can exceed two layers

of the discussion was “Networking of Young People and Middle/small Firms,” and had
340 utterances. The white rectangles show words proposing requirements (or suggesting
Data Jackets as Communicable Metadata for Potential Innovators 11

problems) in the region from either side (young people or firm managers), and the black
ones the solutions or deepened latent requirements behind the requirements presented
in the previous quarter. For example, it was pointed out that there are problems in the
education of students in the 1st quarter, which was deepened to the requirement to clarify
the utility of lessons in schools for working in each job category. About the words in
the questionnaires by the government (2nd quarter), participants came to require the
clarification of influence of students’ concerns about the mood in workplaces and the
evaluation of workers to the students’ choice of things to learn and places to work
(3rd ). In the 4th , methods for education (e.g. OJT) and managements are proposed, with
open problems corresponding to deepened requirements. This result shows an example
where a communication inviting real living sites works to meet our aim to deepen the
requirements, and this effect can be aided by visualization of words as in Step 2.

Fig. 6. A sequence of graphs on KeyGraph for the four segments of a round-table discussion

5 Conclusions
We first redefined innovation based on the original definition by Schumpeter, and rede-
fined also data jackets on which the effect of IMDJ for innovation and the problem
12 Y. Ohsawa et al.

for IMDJ are shown. Then LLDJ is proposed as a method to deepen and widen the
requirement to be shown from communication inviting local aspects in daily living to
externalize general issues that can be closer to DJs than a requirement in IMDJ. This
effect is not only due to covering a wider range of requirements, but also due to the
tendency that data tends to be collected for general purposes. In future work, we plan to
design new DJs, that are revisable and extensible reflecting new expectations about data
usage to further reinforce the effects of and take advantage of LLDJ.

Authors Contributions. Ohsawa invented DJ and IMDJ, and organizes this project of LLDJ.
Kondo has been executing Living Lab at the University of Tokyo, which lead her to the finding that
the effects of Living Lab go via the enhancement of the participants’ sensitivity to the interests in
the open society. Hayashi contributed to the creation of technologies supporting IMDJ, e.g., the
DJ Store and Action Planning.

References
1. Schumpeter, J.A., Theorie der wirtschaftlichen Entwicklung, Duncker & Humblot (1912)
2. Rogers, E.M.: Diffusion of Innovations, 5th edn. Free Press (2003)
3. von Hippel, E.: Democratizing Innovation. New edn. The MIT Press (2006)
4. Donaldson, M.: Human Minds: An Exploration. The Penguin Press, Allen/Lane (1992)
5. Dervin, B.: From the mind’s eye of the user: the sense-making qualitative-quantitative method-
ology. In: Glazier, J.D., Powell, R.R. (eds.) Qualitative Research in Information Management,
Englewood, CO, pp. 61–84 (1992)
6. Drucker, P.F.: The discipline of innovation. Harvard Bus. Rev. 63(3), 67–73 (1985)
7. Ohsawa, Y., Kido, H., Hayashi, T., Liu, C.: Data jackets for synthesizing values in the market
of data. Procedia Comput. Sci. 22, 709–716 (2013)
8. Ohsawa, Y., Hayashi, T., Kido, H.: Restructuring incomplete models in innovators marketplace
on data jackets. In: Magnani, L., Bertolotti, T. (eds.) Handbook of Model-Based Science,
pp. 1015–1031. Springer (2017)
9. Iwasa, D., Hayashi, T., Ohsawa, Y.: Development and evaluation of a new platform for accel-
erating cross-domain data exchange and cooperation. New Gener. Comput. 38(1), 65–96
(2019)
10. Ohsawa, Y.: KeyGraph: visualized structure among event clusters. In: Ohsawa, Y., McBurney,
P. (eds.) Chance Discovery, pp. 262–275. Springer (2003)
11. Hayashi, T., Ohsawa, Y.: Data jacket store: structuring knowledge of data utilization and
retrieval system. Trans. Japan. Soc. Artif. Intell. 31(5), A-G15_1 (2016)
12. Hayashi, T., Ohsawa, Y.: Meta-data generation of analysis tools and connection with structured
meta-data of datasets. In: Proceedings of 3rd International Conference on Signal Processing
and Integrated Networks, pp. 226–231 (2016)
13. Takemura, K., Hayashi, T., Ohsawa, Y., Aihara, D., Sugawa, A.: Computational coach support
using soccer videos and visualization. IEICE-TR 117(440), 93–98 (2018). in Japanese
14. Ohsawa, Y.: Graph-based entropy for detecting explanatory signs of changes in market. Rev.
Socionetw. Strat. 12(2), 183–203 (2018). https://doi.org/10.1007/s12626-018-0023-8
15. Ohsawa, Y., Hayashi, T., Yoshino, T.: Tangled string for multi-timescale explanation of
changes in stock market. Information 10(3), 118 (2019)
16. Ohsawa, Y.: Regional seismic information entropy for detecting earthquake activation
precursors. Entropy 20(11), 861 (2018)
17. Følstad, A.: Living labs for innovation and development of information and communication
technology: a literature review. EJ. Virtual Organ. Netw. 10, 99–131 (2008)
Data Jackets as Communicable Metadata for Potential Innovators 13

18. Leminen, S., Westerlund, M., Nyström, A.G.: Living labs as open-innovation networks.
Technol. Innov. Manag. Rev. 2(9), 6–12 (2012)
19. Almirall, E., Wareham, J.: Living labs: arbiters of mid- and ground-level innovation. Technol.
Anal. Strateg. Manag. 23(1), 87–102 (2011)
20. Organ, D.W.: A restatement of the satisfaction-performance hypothesis. J. Manag. 14(4),
547–557 (1988)
21. Borman, W.C., Motowidlo, S.J.: Expanding the criterion domain to include elements of
contextual performance. In: Schmitt, N., Borman, W.C., (eds.) Personnel Selection in
Organizations, pp. 71–98. Jossey-Bass, San-Francisco (1993)
22. Dyne, V.L., Cummings, L.L., McLean Parks, J.: Extra-role behaviors: in pursuit of construct
and definitional clarity. Res. Organ. Behav. 17, 215–285 (1995)
23. Ohshima, R., Miyazaki, G., Haga, S.: The mediating effect of political skill in influencing the
effect of the big five personality domains on organizational citizenship behavior. Jpn. Assoc.
Ind./Organ. Psychol. J. 32(1), 31–41 (2018)
24. Eris, O.: Effective Inquiry for Innovative Engineering Design. Kluwer Academic, Dordrecht
(2004)
25. Eris, O., Bergner, D., Jung, M., Leifer, L.: ConExSIR: a dialogue-based framework of design
team thinking and discovery. In: Ohsawa, Y., Tsumoto, S. (eds.) Chance Discoveries in Real
World Decision Making (SCI30), pp. 329–344. Springer, Heidelberg (2006)
Another Random Scribd Document
with Unrelated Content
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or
determine the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like