دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Louai Alarabi (editor), Brahim Lejdel (editor), Eliseo Clementini (editor) سری: Lecture notes in networks and systems, ISBN (شابک) : 9783030963118, 303096311X ناشر: سال نشر: 2022 تعداد صفحات: 613 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 61 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Artificial intelligence and its applications : proceeding of the 2nd International Conference on Artificial Intelligence and Its Applications (2021) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب هوش مصنوعی و کاربردهای آن: مجموعه مقالات دومین کنفرانس بین المللی هوش مصنوعی و کاربردهای آن (2021) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Contents Machine Learning Based Indoor Localization Using Wi-Fi and Smartphone in a Shopping Malls 1 Introduction 2 Related Work 3 Machine Learning-Based Indoor Localization 3.1 Algorithms 3.2 Features 4 Methodology 4.1 Architecture System 4.2 Datasets 5 Experiment and Results 6 Conclusion 7 Future Work References A Comparative Study Between the Two Applications of the Neural Network and Space Vector PWM for Direct Torque Control of a DSIM Fed by Multi-level Inverters 1 Introduction 2 Modeling of DSIM 3 DTC Strategy Control 3.1 Control Strategy of Flux 4 Principal of DTC-SVM 5 DTC Based on Neural Network DTNC 5.1 Artificial Neural Network Principle 5.2 Principal of DTNC 6 Simulation Results and Discussion of DTC-SVM and DTNC 7 Study Comparative Between the DTC-SVM and DTNC Strategies 8 Conclusion References Interval Versus Histogram of Symbolic Representation Based One-Class Classifier for Offline Handwritten Signature Verification 1 Introduction 2 Brief Review of Symbolic Data Representation 3 Proposed System 3.1 Preprocessing 3.2 Generation of Features 3.3 Generation of Feature-Dissimilarities (GFD) 3.4 Building the OC-SDAClassifier 3.5 Verification Process 4 Experimental Results 4.1 Dataset Description and Evaluation Criteria 4.2 Experimental Setup 4.3 Experimental Evaluation 4.4 Comparative Analysis 5 Conclusion References Residual Neural Network for Predicting Super-Enhancers on Genome Scale 1 Introduction 2 Relatd Works 3 ResSEN: Residual Neural Network for Predicting Oncogenic Super-Enhancers 3.1 Datasets 3.2 ResSEN Model 4 Experiment Results and Comparison 5 Comparison and Discussion 6 Conclusion References Machine Learning Algorithms for Big Data Mining Processing: A Review 1 Introduction 2 Literature Survey 2.1 Big Data Analytics and Machine Learning 3 Summary of the Papers Reviewed 4 Practical Proofs and Discussion 5 Conclusion and Future Scope References Digital Text Authentication Using Deep Learning: Proposition for the Digital Quranic Text 1 Introduction 2 Related Works 2.1 Spam Detection 2.2 Fake News Detection 2.3 Paraphrase Detection 2.4 Language Checking 3 Background 3.1 Text Preprocessing 3.2 Text Representation 3.3 Deep Learning Algorithms 4 Proposed Methodology 4.1 Dataset 4.2 Data Representation 4.3 Classification Model 5 Experiments 5.1 Evaluation Measures 5.2 Experimental Results 6 Conclusion and Future Works References Prediction of Cancer Clinical Endpoints Using Deep Learning and RPPA Data 1 Introduction 2 Proposed Architecture 2.1 Data Collection 2.2 PPI and Features Filtration 2.3 Deep Features Learning 2.4 Classification 3 Results and Discussion 3.1 Implement and Train the Features Learning Model 3.2 Classification Results 4 Conclusion References Clustering Educational Items from Response Data Using Penalized Pearson Coefficient and Deep Autoencoders 1 Introduction 2 Related Works to Educational Items Clustering 3 Proposed Architecture 3.1 Penalized Pearson 3.2 Dimensionality Reduction 4 Experimental Results 4.1 Data Collection and Preparation 4.2 Dimestionality Reduction Autoencoder Training 4.3 Clustering 4.4 Results and Discussion 5 Conclusion References Rational Function Model Optimization Based On Swarm Intelligence Metaheuristic Algorithms 1 Introduction 2 Rational Function Model (RFM) 3 Swarm Intelligence Based Meta-heuristic Algorithms Applied for RFM Optimization Review 3.1 Binary Ant Colony Optimization (BACO) 3.2 Genetic Algorithms 3.3 Particle Swarm Optimization 3.4 The Proposed Parallel Hybrid GA-PSO Algorithm for RFM Optimization 4 Experimental Tests and Discussion 4.1 The Accuracy Test 4.2 Convergence Speed and Computational Time 5 Conclusion References Maximum Power Point Tracking of a Wind Turbine Based on Artificial Neural Networks and Fuzzy Logic Controllers 1 Introduction 2 WECS Modeling 2.1 Wind Turbine 2.2 MPPT Strategy Control 2.3 Five Phase PMSG 2.4 Pitch Control 3 PI Controller 4 Fuzzy Logic Controller (FLC) 5 Neural Network Controller (ANNC) 6 Results and Discussions 7 Conclusion References Deep Neural Network Based TensorFlow Model for IoT Lightweight Cipher Attack 1 Introduction 2 IoT Lightweight Ciphers Implementation Techniques 3 Related Work 4 TensorFlow and TensorBoard Framework 5 Methodology and Results 5.1 Problem Framing 5.2 Datasets Processing 5.3 Neural Network Architecture 5.4 Experimental Results 6 Conclusion References Sentiment Analysis of Algerian Dialect Using a Deep Learning Approach 1 Introduction 2 Related Work 3 Proposed Approach 3.1 Data Collection 3.2 Language Detection 3.3 Cleaning and Pre-treatment 3.4 Sentiment Analysis 4 Expermentation and Evaluation 4.1 Sentiment Analysis Results 5 Conclusion and Perspectives References Do We Need Change Detection for Dynamic Optimization Problems?: A Survey 1 Introduction 2 Dynamic Optimization Problems (DOPs): Problem Statement and Challenges 2.1 Diversity Loss Problem 2.2 Outdated Memory Problem 3 Change Detection Based Methods 3.1 Assumption-Based Detection 3.2 Behavior-Based Detection 3.3 Reevaluation-Based Detection 3.4 Hybridization-Based Detection 4 Without Change Detection Based Methods 5 Conclusion References GPS/IMU in Direct Configuration Based on Extended Kalman Filter Controlled by Degree of Observability 1 Introduction 2 Research Method 2.1 Extended Kalman Filter 2.2 Observability Analysis 2.3 INS-GPS Integration Methods 3 Results and Discussion 3.1 Field-Test Data Description 3.2 IMU (Motion Pak II) Properties 3.3 Error State Results 3.4 Degree of Observability (DoO) Results 3.5 Comparison GPS Measurements, Reference and Estimate Trajectories 4 Conclusion References Recognizing Arabic Handwritten Literal Amount Using Convolutional Neural Networks 1 Introduction 2 Related Work 3 Deep Learning for Arabic Literal Amount Recognition 3.1 Convolutional Neural Networks 3.2 Visual Geometry Group (VGG) 3.3 Residual Network (ResNet) 4 Database Presentation 5 Experimental Results 5.1 Results of the Proposed Architecture 5.2 VGG Results 5.3 Resnet Results 5.4 Results Discussion 5.5 Comparison with State of the Art Systems 6 Conclusion and Perspectives References A Novel Separable Convolutional Neural Network for Human Activity Recognition 1 Introduction 2 Related Works 3 Preliminaries and Methodology 3.1 Time Series 3.2 Convolutional Neural Networks 3.3 Separable Convolutional Neural Networks 3.4 HAR-Model Architecture 4 Experimental 4.1 HAR Dataset Description 4.2 Experiments Setup 5 Results and Discussion 6 Conclusion References Deep Approach Based on User’s Profile Analysis for Capturing User’s Interests 1 Introduction 2 Related Works 3 Proposed Methodology 3.1 Traditional Classification Approach 3.2 Deep Learning Approach 4 Dataset Collection and Construction 5 Results and Discussion 6 Conclusion and Future Works References Multi Agent Systems Based CPPS – An Industry 4.0 Test Case 1 Introduction 2 Laboratory Assembly Cell Use Case 3 The Developed CPPS Architecture 3.1 Description of the CPPS Architecture 3.2 Implementation of the Multi Agent System 4 The Virtual Commissioning 4.1 General Description 4.2 SIL Testing Validation 4.3 Discussions 5 Conclusion References Ranking Social Media News Feeds: A Comparative Study of Personalized and Non-personalized Prediction Models 1 Introduction 2 Background 3 Non-personalized models 4 A Personalized Prediction Model 5 Experiments and Comparison Results 5.1 Dataset 5.2 Measures 5.3 Methodology 5.4 Results 6 Conclusion References A Social Media Approach for Improving Decision-Making Systems 1 Introduction 2 Literature Background 2.1 Datawarehouse 2.2 OLAP Technology 2.3 Decision-Making System 2.4 Twitter 2.5 Big Data 2.6 Sentiment Analysis 3 Related work 4 Data and Methodology 4.1 Non Social Datawarehouse Part 4.2 Social Datawarehouse Part 5 Multidimensional Analysis 5.1 Geographical Analysis 5.2 Linguistic Analysis 5.3 Sources Type Analysis 5.4 Sentiment Analysis 5.5 Redundant Topics Analysis 6 Tool Implementation 6.1 Development Architecture 6.2 Developed Modules 6.3 External Data Integration Module 6.4 Social Corpus Construction Module 6.5 Social Data Cube Construction Module 6.6 Social Data Cube Manipulation Module 6.7 Other Features of Our Tool 7 Conclusion References Applying Artificial Intelligence Techniques for Predicting Amount of CO2Emissions from Calcined Cement Raw Materials 1 Introduction 2 Brief Description of Artificial Intelligence Techniques 2.1 Deep Neural Networks (DNN) 2.2 Artificial Neural Network Optimised by Ant Colony Optimization (ACO-ANN) 2.3 Artificial Neural Network Optimised by Genetic Algorithm (GA-ANN) 3 Material and Methods 3.1 Materials and Experiments 3.2 Data Collection 4 Results and Discussion 4.1 DNN Results 4.2 ACO-ANN Results 4.3 GA-ANN Results 4.4 Comparison Between Different Techniques 5 Conclusion References Local Directional Strength Pattern for Effective Offline Handwritten Signature Verification 1 Introduction 2 Methodology 2.1 Local Directional Strength Patterns 2.2 Support Vector Machine 3 Experimental Results 4 Conclusion References Ball Bearing Monitoring Using Decision-Tree and Adaptive Neuro-Fuzzy Inference System 1 Introduction 2 Methodology 2.1 Decision Tree 2.2 Adaptive Neuro-Fuzzy Inference System (ANFIS) 3 Data Collection 4 Results and Discussion 4.1 Feature Selection 4.2 Prediction Using ANFIS 5 Conclusion References Artificial Intelligent in Upstream Oil and Gas Industry: A Review of Applications, Challenges and Perspectives 1 Introduction 2 Machine Learning Algorithm 3 Applications of ML in Upstream Oil and Gas 3.1 Exploration 3.2 Reservoir Engineering 3.3 Drilling Engineering 3.4 Production Engineering 4 Challenges and Perspectives 5 Conclusion References A Comparative Study of Road Traffic Forecasting Models 1 Introduction 2 Approaches Adopted in the Prediction of Road Traffic 2.1 Statistical Approaches 2.2 Time Series Based Approaches 2.3 Deep Learning Approaches 3 Comparative Synthesis for the Three Approaches 3.1 The Qualitative Index 3.2 Quantitative Index 4 Conclusion References Machnine Learning for Sentiment Analysis Using Algerian Dialect 1 Introduction 2 State of the Art 3 Contribution 3.1 Annotation 3.2 Dictionary 4 Experimentation and Results 4.1 Features 4.2 Comparison of Results 5 Conclusion and Future Works References Road Segments Traffic Dependencies Study Using Cross-Correlation 1 Introduction 2 Brief Review of Related Work 3 Context Study and Problem Formulation 3.1 Data Collection and Modelling 3.2 Problem Formulation as a Multi-varied Time Series 4 Dependency Detection Model 5 Experiments 5.1 Experiment Setup 5.2 Interpretation 6 Conclusion References On the Use of the Convolutional Autoencoder for Arabic Writer Identification Using Handwritten Text Fragments 1 Introduction 2 Brief Review of the Convolutional Autoencoder 3 Description of the Proposed System 3.1 Feature Generation 3.2 Classification 4 Experimental Results 4.1 Dataset Description 4.2 Evaluation Criterion 4.3 Experimental Design 4.4 Experimental Evaluation 4.5 Comparative Analysis 5 Conclusion References Security Issues in Self-organized Ad-Hoc Networks (MANET, VANET, and FANET): A Survey 1 Introduction 2 Self-organized AdHoc Networks 2.1 Background 2.2 Main Features 3 Security Issues and Services 4 Attacks on AdHoc Networks 4.1 Sniffing Attacks 4.2 Modification Attacks 4.3 Fabrication Attacks 4.4 Selfish Behavior Attacks 4.5 Routing Attacks 5 Potential Attacks and Threats on MANET VANET and FANET 5.1 Attacks on MANET 5.2 Attacks on VANET 5.3 Attacks on FANET 6 Conclusion References A Comprehensive Study of Multicast Routing Protocols in the Internet of Things 1 Introduction 2 Background on Multicast Routing in the IoT 2.1 RPL-Independent Multicast 2.2 RPL-Dependent Multicast 3 Experimental Design and Tools 3.1 Experimental Protocol 3.2 Comparison Criteria 4 Performance Evaluation Results 4.1 Variation of the Reception Probability 4.2 Variation of the Density and the Number of Nodes 4.3 Variation of the Number of Multicast Sources 4.4 RAM and ROM Consumption 5 Conclusion and Future Work References Efficient Auto Scaling and Cost-Effective Architecture in Apache Hadoop 1 Introduction 2 Related Works 3 Auto Scaling Approach 3.1 Cluster Monitor Nagios 3.2 Auto-Scaler 4 Implementation and Results 5 Conclusion References GA-Based Approaches for Optimization Energy and Coverage in Wireless Sensor Network: State of the Art 1 Introduction 1.1 Classification of GA-Based Methods 1.2 Scheduling 1.3 Energy-Efficient Protocols 1.4 Optimal Path 1.5 Clustering 1.6 Mobility 2 Synthesis and Open Issues 3 Conclusion References The Internet of Things Security Challenges: Survey 1 Introduction 2 Definition 3 IoT Properties 4 Areas and Scope of Application 5 Actors of the IoT Ecosystem 6 Architectures and Technology 7 The Security 7.1 From a Point of View: Properties of IoT and the Security of Traditional Networks 7.2 From a Point of View: Area and Scope of Application 7.3 From a Point of View: Actors of the IoT Ecosystem 7.4 From a Point of View: Architectures and Technology 8 Comparative Table of the Different Points of View 9 Conclusion References Hybrid Approach to WebRTC Videoconferencing on Mobile Devices 1 Introduction 2 Related Works 3 The Proposed Solution 3.1 Signaling Server 3.2 Client Applications 4 Evaluation and Results 4.1 Experimental Environments 4.2 Evaluation Over WLAN 4.3 Evaluation over LTE 5 Discussion 6 Conclusion and Future Works References Modeling and Simulation of Urban Mobility in a Smart City 1 Introduction 2 The Design Approach 2.1 System Requirements Model 2.2 Agent Society Model 2.3 Description of the Domain 3 Development Tools Netlogo Plateform 3.1 Agent Concepts 3.2 Simulation of the Application 4 Discussion 5 Conclusion References OAIDS: An Ontology-Based Framework for Building an Intelligent Urban Road Traffic Automatic Incident Detection System 1 Introduction 2 Related Works 3 Proposed Ontology Framework 3.1 AIDS Structure 3.2 OAIDS Development 4 Conclusion and Future Works References A Study of Wireless Sensor Networks Based Adaptive Traffic Lights Control 1 Introduction 2 Sensing Technologies 2.1 Traffic Sensors Classification 2.2 Anisotropic Magnetoresistance Sensors 3 Relevant Works 3.1 Queuing Theory 3.2 Score Function 3.3 Fuzzy Logic 3.4 Prioritizing Emergency Vehicles 4 Discussion and Enhancement Factors 5 Conclusion References Forwarding Strategies in NDN-Based IoT Networks: A Comprehensive Study 1 Introduction 2 Named Data Networking in the Internet of Things 3 Related Work 4 Performance Evaluation 4.1 Simulation Platform and Parameters 4.2 Performance Metrics 4.3 Obtained Results and Discussion 5 Conclusion References Dilated Convolutions Based 3D U-Net for Multi-modal Brain Image Segmentation 1 Introduction 2 Related Work 3 Description of our model 3.1 Network Architecture 3.2 Training 4 Experimental Results 4.1 Data 4.2 Data Augmentation 4.3 Evaluation Metrics 4.4 Results 5 Conclusion References Image Restoration Using Proximal-Splitting Methods 1 Introduction 2 Proximal Splitting Methods 2.1 Proximal Operator 2.2 Fixed Points 2.3 Forward-Backward Splitting 2.4 Douglas Rachford Splitting 3 Reconstructed Image Using Proximal Algorithm 3.1 Reconstructed Image Using Forward-Backward Splitting Algorithm 3.2 Reconstructed Image Using Douglas-Rachford Splitting Algorithm 4 Numerical Results 5 Conclusion References Segmentation of the Breast Masses in Mammograms Using Active Contour for Medical Practice: AR Based Surgery 1 Introduction 2 Proposed System 2.1 Pretreatments Stage 2.2 Segmentation Method 3 Experimental Results and Discussion 4 Conclusion References A Hybrid LBP-HOG Model and Naive Bayes Classifier for Knee Osteoarthritis Detection: Data from the Osteoarthritis Initiative 1 Introduction 2 Material and Methods 2.1 Dataset 2.2 Methods 3 Results and Discussion 4 Conclusion References RONI-Based Medical Image Watermarking Using DWT and LSB Algorithms 1 Introduction 2 Preliminaries 2.1 Medical Imaging 2.2 Sharpening Filter 2.3 Snake Segmentation 2.4 Discrete Wavelet Transform (DWT) 2.5 Last Signification Bit (LSB) 3 The Proposed Method 3.1 Measurements Metrics 3.2 Simulation Results 4 Conclusion References Deep Learning for Seismic Data Semantic Segmentation 1 Introduction 1.1 Salt Structures 2 Related Works 3 Proposition 4 Evaluation and Results 5 Conclusion References Feature Fusion for Kinship Verification Based on Face Image Analysis 1 Introduction 2 Proposed Kinship Verification System 2.1 Proposed Features 2.2 SVM-Based Kinship Verification 3 Experimental Results 4 Conclusion References Image Processing: Image Compression Using Compressed Sensing, Discrete Cosine Transform and Wavelet Transform 1 Introduction 2 Methods 2.1 Discrete Cosine Transform (DCT) 2.2 Discrete Wavelet Transform (DWT) 2.3 Compressed Sensing (CS) 3 Results and Discussions 4 Conclusion References An External Archive Guided NSGA-II Algorithm for Multi-depot Green Vehicle Routing Problem 1 Introduction 2 Multi-depot Green Vehicle Routing Problem 3 The Proposed Algorithm (EAG-NSGA-II) for MDGVRP 3.1 Solution Representation 3.2 Crossover Operator 3.3 Adaptive Local Search 4 Computational Results 5 Conclusions References New Approach for Multi-valued Mathematical Morphology Computation 1 Introduction 2 Vectors Ordering Based on Outranking Relations 3 Experimental Results 4 Conclusion References Data-Intensive Scientific Workflow Scheduling Based on Genetic Algorithm in Cloud Computing 1 Introduction 2 Related Work 3 Problem Description 4 Description of Proposed Work 4.1 Chromosome Representation 4.2 Initial Population 4.3 Fitness Function 4.4 Selection 4.5 Crossover 4.6 Mutation 5 Results and Discussion 6 Conclusion and Future Work References Multi-robot Visual Navigation Structure Based on Lukas-Kanade Algorithm 1 Introduction 2 Brief on Optical Flow Approach 2.1 Definition 2.2 Lucas-Kanade Algorithm 2.3 Focus of Expansion (FOE) 2.4 Time to Contact (TTC) 3 The Mobile Robot 4 Control Structure 5 Simulation Results 5.1 Experiment 1 5.2 Experiment 2 6 Conclusion References Real-Time Speed Control of a Mobile Robot Using PID Controller 1 Introduction 2 Mobile Robot Description 3 Modeling of the Mobile Robot 3.1 Kinematic Model 3.2 Actuation Model 4 Control System Description 5 Experimental Results 6 Conclusion References A Novel Methodology for Geovisualizing Epidemiological Data 1 Introduction 2 Preliminaries 3 Proposed Methodology 4 Results 5 Discussions 6 Conclusion References MCBRA (Multi-agents Communities Based Routing Algorithm): A Routing Protocol Proposition for UAVs Network 1 Introduction 2 Related Works 3 Solution Proposition 4 Conclusion References A CNN Approach for the Identification of Dorsal Veins of the Hand 1 Introduction 1.1 Related Works 1.2 Dorsal Hand Vien Image Collection 1.3 Preprocessing and Extraction of the ROI 1.4 Aquiring the ROI Image 1.5 Image Processing 1.6 Results 2 Feature Extraction 2.1 SATO Filter 2.2 OTSU Thresholding Algorithm 2.3 Experimental Results 3 Classification 3.1 CNN Architecture 3.2 Experimental Results 3.3 Training of the Architecture 4 Conclusion References A CBR Approach Based on Ontology to Supplier Selection 1 Introduction 2 State of the Art 3 Proposed Supplier Selection Approach 4 Illustrative Example 5 Conclusion References Author Index