ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Artificial Intelligence and Smart Environment: ICAISE’2022

دانلود کتاب هوش مصنوعی و محیط هوشمند: ICAISE’2022

Artificial Intelligence and Smart Environment: ICAISE’2022

مشخصات کتاب

Artificial Intelligence and Smart Environment: ICAISE’2022

ویرایش:  
نویسندگان: , , ,   
سری: Lecture Notes in Networks and Systems, 635 
ISBN (شابک) : 3031262530, 9783031262531 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 946
[947] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 79 Mb 

قیمت کتاب (تومان) : 38,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Artificial Intelligence and Smart Environment: ICAISE’2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب هوش مصنوعی و محیط هوشمند: ICAISE’2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب هوش مصنوعی و محیط هوشمند: ICAISE’2022

این کتاب به بررسی وضعیت هنر تجزیه و تحلیل داده های بزرگ، هوش مصنوعی و محیط های هوشمند می پردازد. داده ها در حال تبدیل شدن به یک منبع تعیین کننده در جوامع مدرن، اقتصادها و سازمان های دولتی هستند. علم داده، هوش مصنوعی و محیط‌های هوشمند الهام‌بخش تکنیک‌ها و نظریه‌های جدید هستند که از ریاضیات، آمار، تئوری اطلاعات، علوم کامپیوتر و علوم اجتماعی استخراج شده‌اند. این کتاب به بررسی وضعیت هنر تجزیه و تحلیل داده های بزرگ، هوش مصنوعی و محیط های هوشمند می پردازد. این شامل مسائلی است که به پردازش سیگنال، مدل‌های احتمال، یادگیری ماشین، داده کاوی، پایگاه داده، مهندسی داده، تشخیص الگو، تجسم، تجزیه و تحلیل پیش‌بینی‌کننده، انبار داده، فشرده‌سازی داده‌ها، برنامه‌نویسی کامپیوتر، شهر هوشمند و غیره مربوط می‌شود. نتایج تحقیقات انجام شده در این زمینه مطالعاتی بودند. دومی از برنامه ها و تکنیک های مربوط به تجزیه و تحلیل داده ها به طور کلی و داده های بزرگ و شهر هوشمند به طور خاص استفاده می کند. این کتاب برای دانشجویان پیشرفته کارشناسی و کارشناسی ارشد، محققان فوق دکترا، مدرسان و محققان صنعتی و همچنین هر کسی که علاقه مند به تجزیه و تحلیل داده های بزرگ و هوش مصنوعی است، جذاب است.


توضیحاتی درمورد کتاب به خارجی

This book reviews the state of the art of big data analysis, artificial intelligence, and smart environments. Data is becoming an increasingly decisive resource in modern societies, economies, and governmental organizations. Data science, artificial intelligence, and smart environments inspire novel techniques and theories drawn from mathematics, statistics, information theory, computer science, and social science. This book reviews the state of the art of big data analysis, artificial intelligence, and smart environments. It includes issues that pertain to signal processing, probability models, machine learning, data mining, database, data engineering, pattern recognition, visualization, predictive analytics, data warehousing, data compression, computer programming, smart city, etc. The papers in this book were the outcome of research conducted in this field of study. The latter makes use of applications and techniques related to data analysis in general and big data and smart city in particular. The book appeals to advanced undergraduate and graduate students, post-doctoral researchers, lecturers, and industrial researchers, as well as anyone interested in big data analysis and artificial intelligence.



فهرست مطالب

Preface
Chairman of ICAISE’2022
Contents
A Collaborative Fog-Based Healthcare Intrusion Detection Security Using Blockchain and Machine Learning
	1 Introduction
	2 Review and Related Work
	3 Proposal Model
		3.1 IDS Using Catboost
		3.2 Collaboration with Blockchain
	4 Conclusion and Future Work
	References
A Combined Approach of Computer Vision and NLP for Documents Data Extraction
	1 Introduction
	2 Problematic Statement
	3 Related Work
	4 Dataset Construction
		4.1 Dataset
		4.2 Labeling
	5 Proposed Approach
		5.1 Architecture
	6 Experiments Model Training and Results
		6.1 Results Discussion
	7 Conclusion and Future Work
	References
A Comprehensive Analysis of Novel Intrusion Detection Systems for Internet of Things Networks
	1 Introduction
	2 Analysis of Intrusion Detection Systems for IoT
	3 Discussion
	4 Conclusions
	References
A Coupled Graph Theoric and Deep Learning Approaches for Nonrigid Image Registration
	1 Introduction
	2 Theory and Methods
		2.1 Nonrigid Image Registration
		2.2 Graph Cuts for Image Registration
		2.3 Proposed Approach
	3 Results and Discussion
	4 Conclusion and Next Directions
	References
A Deep Convolutional Neural Networks for the Detection of Breast Cancer Using Mammography Images
	1 Introduction
	2 Related Work
	3 Methodology
	4 Experimental Results
		4.1 Effectiveness
		4.2 Efficiency
	5 Discussion
	6 Conclusion
	References
A Dynamic Panel Data Analysis on the Impact of Quality of Institutions on the Economic Growth: Evidence from Wu-Hausman Specification Test
	1 Introduction
	2 Mathematical Modeling
	3 Estimation and Discussion
		3.1 Estimation
		3.2 Fixed or Random Effect Model
		3.3 Discussion of the Findings
	4 Conclusion and Policy Implications
	References
A Literature Review of Solar Cell Overheating Control
	1 Introduction
	2 Autonomous Technologies for Preventing Overheating in Solar Collectors
	3 Innovative Smart Selective Coating
	4 The Usage of Supercritical Fluids
	5 Nanofluids in Solar Thermal Collectors
	6 Hybrid Solar Collectors and Overheating
	7 Discussion
	8 Conclusion
	References
A Machine Learning-Based Model for Energy Efficiency Classification of an Unmanned Aerial Vehicle
	1 Introduction
	2 Materials and Methods
		2.1 Gathering Information and Defining Variables
		2.2 Model Design
		2.3 Improved Releif-F Algorithm
		2.4 K-Nearest Neighbor (KNN)
		2.5 Evaluation Measures
	3 Results and Analysis
	4 Conclusion
	References
A New CBIR Search Engine with a Vision Transformer Architecture
	1 Introduction
	2 Materials and Methods
		2.1 Dataset
		2.2 Pre-processing
		2.3 Methods
	3 Results and Discussion
	4 Conclusions and Perspectives
	References
A New Coronary Artery Stenosis Detection Method with a Hybrid LSTM-CNN Model
	1 Introduction
	2 Related Works
	3 Proposed Approach
		3.1  VGG16 Model
		3.2 Hybrid CNN-LSTM Model
		3.3 Explainable Deep Learning
	4 Evaluation Dataset
		4.1 Dataset
		4.2 Pre-processing Phase
	5 Experimental Results
		5.1 Sensitivity (Recall) and Specificity (Precision)
		5.2 Confusion Matrix
		5.3 Training and Testing Curves
		5.4 Explainability
	6 Conclusion and Future Work
	References
A New Four-Ports MIMO Antenna for 5G IoT Applications
	1 Introduction
	2 Design Flow
		2.1 Single Element Antenna
		2.2 Two-Element Array
		2.3 MIMO Antenna
	3 Comparison of Results
	4 Conclusion
	References
A New Proof of the Sobolev Logarithmic Inequality on the Circle R/2πZ
	1 Introduction
	2 Preliminaries
	3 Main Results
	References
A New Robust Adaptive Control for Variable Speed Wind Turbine
	1 Introduction
	2 The System of Wind Turbine
	3 Problem Statement
	4 Stability Analysis
	5 Simulation Results
	6 Conclusion
	References
A New Version of the Alkhalil Morpho Sys 2 Analyzer for Contemporary Documents
	1 Introduction
	2 State of Art
		2.1 Out of Context Analyzers
		2.2 Analyzers in Context
	3 Building a Contemporary Vocabulary of Arabic
		3.1 Collection and Pre-processing of the Contemporary Corpus
		3.2 Morphological Analysis of the Corpus
	4 New Version of the Alkhalil Analyzer for the MSA
		4.1 Construction of the New Database of the Alkhalil Analyzer
		4.2 Comparison Between Alkhalil Morpho Sys 2 and the New Version
	5 Conclusion
	References
A Proposed Machine Learning Model for Intrusion Detection in VANET
	1 Introduction
	2 Related Works
	3 Proposed Work
	4 Evaluation Study
	5 Conclusion and Future Works
	References
A Quadratic Observer for Sensorless Drive System Controller
	1 Introduction
	2 Luneberger Observer
	3 Application of Luenberger Observer (LO) to PMSM
	4 Simulation Results of LO with Classical PI Controller
	5 Conclusion
	References
A Review of the Application of Artificial Intelligence for Weather Prediction in Solar Energy: Using Artificial Neural Networks
	1 Introduction
	2 Methods
		2.1 Analysis
	3 Results and Discussion
	4 Conclusion
	References
A Sorting-AB Approach for an Enhanced IDS in Cloud Environment
	1 Introduction
	2 Background and Related Works
	3 Proposed Sorting-AB IDS Framework
	4 Results and Discussions
	5 Conclusion
	References
A SWOT Analysis for Healthcare Using Machine Learning
	1 Introduction
	2 Literature Review
		2.1 Applications of ML in Healthcare
	3 Research Methodology
		3.1 SWOT Analysis
	4 Discussion of Results
	5 Conclusion
	References
A Systematic Review on LiDAR-Based 3D Object Detection
	1 Introduction
	2 LiDAR-Based 3D Object Detection
		2.1 Single-Stage Methods
		2.2 Two-Stage Methods
	3 Advantages and Limitations
		3.1 Advantages
		3.2 Limitations
	4 Discussion
	5 Conclusion and Perspectives
	References
Adaptive Neural Fuzzy Inference System (ANFIS) in a Grid Connected-Fuel Cell-Electrolyser-Solar PV-Battery-Super Capacitor Energy Storage System Management
	1 Introduction
	2 Mathematical Modelling and Description of System Components
		2.1 PV Model
		2.2 Fuel Cell
		2.3 Pack Battery
		2.4 Super Capacitor Model
	3 Results and Discussion
	4 Conclusion and Future Work
	References
AI Applications in Smart Cities Between Advantages and Security Challenge
	1 Introduction
	2 Research Methodology
	3 Background and Related Works
		3.1 Smart City: An Emergent Paradigm
		3.2 AI as a New Support for Smart City
	4 AI and Smart Cities: Applications and Benefits
		4.1 Smart Transport
		4.2 Smart Healthcare
		4.3 Urban Environment
		4.4 Smart Home
		4.5 Smart Government
		4.6 Smart Learning
		4.7 Smart Security
	5 Challenges of AI in Smart Cities
		5.1 Social Challenges
		5.2 Economic Challenges
		5.3 Legal Issues
		5.4 Ethical and Privacy Challenges
		5.5 Security Issues
	6 Conclusion and Future Works
	References:
An Analysis of NDN-IoHT Congestion Control Policies
	1 Introduction
	2 Congestion in IoHT
		2.1 Receiver-Based Control
		2.2 Hop-by-Hop Control
		2.3 Hybrid Control
	3 Discussion
	4 Conclusion
	References
An Enhanced Artificial Hummingbird Algorithm for Workflow Scheduling in Cloud
	1 Introduction
	2 Related Work
	3 The Problem Formulation
	4 The Proposed Algorithm
	5 Simulation Results
	6 Conclusion
	References
An Enhanced Medical Diagnosis System for Malaria and Typhoid Fever Using Genetic Neuro-Fuzzy System
	1 Introduction
	2 Materials and Methods
		2.1 Data Collection
		2.2 Fuzzy Logic Component
		2.3 Genetic Neuro-Fuzzy Inference Engine
		2.4 Decision Support Engine Component
		2.5 The Performance Metrics Used for the Proposed System
	3 Results and Discussion
		3.1 Training the Model
		3.2 Testing the System
		3.3 The Proposed System Performance
		3.4 The Comparison of the Proposed Model with ANN, and Fuzzy Logic
	4 Conclusion
	References
An Image Encryption Algorithm Based on Substitution and Diffusion Chaotic Boxes
	1 Introduction
	2 Chaotic Sequences
	3 Encryption Setting Design
		3.1 S-Box and D-Box Construction
		3.2 Initialization Vector Computation
		3.3 Chaotic Vector Generation
	4 Encryption and Decryption Process
		4.1 Encryption Process
		4.2 Decryption Process
	5 Experimental Simulation and Security Analysis
		5.1 Statistical Analysis
		5.2 Differential Analysis
	6 Comparison with Other Works
	7 Conclusion
	References
An Image Encryption Scheme Based on DNA Sequence Operations and Chaotic System
	1 Introduction
	2 The Proposed Method
		2.1 Chaotic Sequences Development
		2.2 Plain Image Preparation
		2.3 Diffusion Process
		2.4 Passage to Binary Vector
		2.5 Transition to Nucleotid Vector
		2.6 Generation of a Chaotic Nucleotide Vectors
		2.7 Transformation of the Binary Image to Nucleotide Image
		2.8 Genetic Operations
		2.9 Decryption Process
	3 Simulation and Security Analysis
		3.1 Key-Space Analysis
		3.2 Secret Key’s Sensitivity Analysis
		3.3 Histogram Analysis
		3.4 Entropy Analysis
		3.5 Correlation Analysis
		3.6 Differential Analysis
	4 Conclusion
	References
An Improvement to the Cloud Service Research and Selection System's Usage of the Skyline Algorithm
	1 Introduction
	2 Related Work
	3 Our Proposed Approach
	4 Experimentation and Results
	5 Conclusion
	References
An Innovative Approach for Supervised Link Prediction Using Feature Embedding Methods
	1 Introduction
	2 Proposed Approach
		2.1 Feature Extraction
		2.2 Supervised Machine Learning Algorithms Extraction
	3 Results and Discussion
	4 Conclusion
	References
An Intelligent Monitoring Approach Based on WiFi Sensing for Smart Hospital
	1 Introduction
	2 Background Information
		2.1 Received Signal Strength Indicator (RSSI)
		2.2 Channel State Information (CSI)
	3 System Design
		3.1 Challenges
		3.2 System Architecture
		3.3 Preprocessing Data
	4 Experimental Study
		4.1 Experiment Environment
		4.2 Hardware Configuration
		4.3 Experiments
	5 Conclusion and Future Work
	References
Analysis of Packet Health Fields on a WSN MicaZ-Crossbow Platform
	1 Introduction
	2 WSN MicaZ-Crossbow Platform and Packet Health
		2.1 WSN MicaZ-Crossbow Platform
		2.2 Packet Health
	3 Interpretation of Results
	4 Conclusion
	References
Artificial Intelligence Applications in Date Palm Cultivation and Production: A Scoping Review
	1 Introduction
	2 Review Methodology
		2.1 Topic Selection and Search String Definition
		2.2 Review Boundary and Exclusion Criteria
		2.3 Research Questions
	3 Results and Discussion
	4 Conclusion and Perspectives
	References
Artificial Intelligent-Based System for Thermal Comfort Control in Smart Building
	1 Introduction
	2 Proposed System Architecture
	3 Methodology and Experiment
		3.1 Data Set
		3.2 ML Models
	4 Results and Discussion
	5 Conclusion
	References.
Assessing Hydrologic Impacts of Future Land Cover Change Scenarios in a Mediterranean Watershed
	1 Introduction
	2 Methodology
		2.1 Study Area
		2.2 Modeling Approach
		2.3 Alternative Future Scenarios by 2040
	3 Results and Discussion
		3.1 Analysis of Land Cover Change
		3.2 Temporal and Spatial Distribution of Hydrological Processes
	4 Conclusions
	References
Assessing the Improvements Brought by Artificial Intelligence on the Prediction of Aerodynamic Coefficients
	1 Introduction and Background
	2 General Architecture of the Networks
		2.1 Discuss the Similarities and Dissimilarities
		2.2 Discussion of the Different Methods Employed
	3 General Techniques Used
		3.1 Geometry Representation
		3.2 Network Training
	4 Computational Fluid Dynamics Simulations
	5 Conclusion and Perspectives
	References
Attitude Control of LEO Satellite via LQR Based on Reaction Wheels Versus Magnetorquer
	1 Introduction
	2 Satellite Attitude Dynamic Model
		2.1 With Reaction Wheels
		2.2 With Magnetorquer
	3 Controllability and Observability
	4 Linear Quadratic Regulator Controller
	5 Simulations and Results
	6 Conclusion
	References
Autism Spectrum Disorder Screening Using Artificial Neural Network
	1 Introduction
	2 Materials and Methods
		2.1 ASD Screening Dataset
		2.2 Artificial Neural Network Model
	3 Results and Discussion
	4 Conclusion
	References
Backstepping Control of the Permanent Magnet Synchronous Generator (PMSG) Used in a Wind Power System
	1 Introduction
		1.1 Model of the Turbine and the Permanent Magnet Synchronous Machine
	2 PMSG Control by Backstepping Technique
	3 Designed of Backstepping Controller
		3.1 Simulations Results
		3.2 Simulations and Discussion
	4 Conclusion
	References
BDIV: Healthcare Blockchain Data Integrity Schemes Verification on Storage Cloud
	1 Introduction
	2 Blockchain Background and Related Work
		2.1 Blockchain Background
		2.2 Related Works
	3 Proposed Method
		3.1 System Model
		3.2 Discussion
		3.3 Limitations on Blockchain Data Integrity Verification and Future Trends
	4 Conclusion
	References
Big Data and the Effectiveness of Tourism Marketing: A Prospective Review of the Literature
	1 Introduction
	2 Theoretical and Conceptual Framing
		2.1 Big Data and its Application in Marketing
		2.2 Analytics Big Data and Reinventing Tourism Marketing
	3 Methodology
		3.1 Research Protocol
		3.2 Characteristics of the Sample of References Examined
	4 Results and Discussion
		4.1 Results
		4.2 Discussion and Perspectives
	5 Conclusion
	References
Big Data Application in Education: Overview
	1 Introduction
	2 Related Work
	3 Big Educational Data
		3.1 History of Big Data
	4 The 5 V’s of Big Data
	5 Applications of Big Educational Data
	6 Conclusions
	References
BPMN to UML Transformation for MDA Approach to Represent an EDM Acquisition Functionality
	1 Introduction
	2 Related Work
	3 Background Knowledge
		3.1 EDM Overview
		3.2 Mda
		3.3 BPMN Standard
	4 Proposed Approach
		4.1 Use Case Study on the Process of Digitization by the BPMN
	5 Conclusion
	References
Business Intelligence Models for E-Government in Mauritania: A Survey
	1 Introduction
	2 Overview of the Literature
		2.1 Business Intelligence
		2.2 Data Warehouse
		2.3 Datamart
		2.4 ETL
		2.5 Dashboard
		2.6 e-Government
	3 Related Works
		3.1 Social Media Data Analysis
		3.2 Sentiment Analysis
		3.3 Synthesis
	4 Conclusion
	References
CF Recommender System Based on Ontology and Nonnegative Matrix Factorization (NMF)
	1 Introduction
	2 New Hybrid CF Recommender Approach
		2.1 System Architecture
		2.2 Similarity Calculation Process
		2.3 Dimensionality Reduction
	3 Experimental Evaluations Results
		3.1 Dataset
		3.2 Implementation and Evaluation
	4 Discussion
	5 Conclusion and Future Work
	References
Circuit Analysis of Series and Shunt Rectifier Topologies for RF Energy Harvesting Applications at 5.80 GHz
	1 Introduction
		1.1 Rectenna Design
		1.2 Rectifying Circuit Background
	2 Conclusion
	References
CNN-Based Deep Features with Ensemble Learning for COVID-19 Classification
	1 Introduction
	2 The Proposed Methodology
		2.1 First Phase: X-ray Images Pre-processing
		2.2 Second Phase - Feature Extraction
		2.3 Third Phase: Classification with Machine Learning
	3 Experimental Results
		3.1 Dataset
		3.2 Results
	4 Conclusion
	References
Combination of Renewable Energy Source and Battery for Quality of Service of Connected Objects
	1 Introduction
	2 Hybrid System Scheme
	3 PV Panel Model
		3.1 Modelling in the Matlab/ Simulink Environment
	4 Controller Design
	5 Simulation Results
	6 Conclusion
	References
Covid-19 Dataset Analysis: A Systematic Review
	1 Introduction
	2 Methodology
	3 Results and Discussion
	4 Conclusion
	References
Deep Learning Algorithms for Skin Cancer Classification
	1 Introduction
	2 Background and Related Work
	3 Materials and Methods
		3.1 Dataset
		3.2 Proposed Deep Learning Model
		3.3 Steps of the System
		3.4 System Performance
	4 Results and Discussion
		4.1 Model Accuracy and Loss
		4.2 Cross-Validation Model
	5 Conclusion
	References
Design of an Adaptive Neuro-Fuzzy Inference System for Photovoltaic System
	1 Introduction
	2 Conception of Photovoltaic System
		2.1 Characteristics I-V and P-V of Photovoltaic Panel
	3 Improvement of ANFIS for MPPT Controller for Photovoltaic System
		3.1 Design of Fuzzy Logic Controller
		3.2 Design of ANN Controller
		3.3 Design of ANFIS Controller
	4 Simulation and Results
	5 Conclusion
	References
Disturbance Observer-Based Adaptive Sliding Mode Control for Autonomous Vehicles
	1 Introduction
	2 Vehicle Dynamics Model and Reference Trajectory
		2.1 Vehicle Bicycle Model
		2.2 Reference Path Model
	3 Control Strategy
		3.1 Super-Twisting Control
		3.2 Cose of Disturbance Observer
		3.3 Design of SMC Control Based Observer
		3.4 Particle Swarm Optimization
	4 Simulation Results
	5 Conclusions
	References
Electric Vehicle Backstepping Controller Using Synchronous Machine
	1 Introduction
	2 Modeling of the Elements of the Traction Chain
		2.1 Vehicle Dynamics
		2.2 Model of the Electric Motorization of the Electric Vehicle
	3 Backstepping Control Design
	4 Designed of Backstepping Controller for EV Speed Control
	5 Simulation Results and Discussion
		5.1 Simulations Results
		5.2 Simulations and Discussion
	6 Conclusion
	References
Emotion Detection in Real-Time Video Using Deep Learning
	1 Introduction
	2 Methodology of the FER System
		2.1 Preprocessing
		2.2 Feature Extraction
		2.3 Classification
	3 Application and Discussion
		3.1 Facial Emotion Recognition Dataset (FER-2013)
		3.2 Architecture of Our CNN
		3.3 Emotion Classification in Real-Time Video
	4 Conclusion
	References
Energy Efficiency Optimization Techniques for the 5G Cellular Networks
	1 Introduction
	2 Ecological Challenge of 5G
	3 Energy Efficiency Optimization Strategies
		3.1 Base Station Energy Efficiency
		3.2 Strategies Based on Network Organization
		3.3 Machine Learning
	4 Comparative Study of Strategies
	5 Conclusion
	References
Energy Management Strategy Based on Neural Network for Hybrid Renewable System
	1 Introduction
	2 Presentation and Modeling of Studied System
		2.1 Wind Turbine Modeling
		2.2 Photovoltaic Panels Modeling
		2.3 Batteries Modeling
		2.4 Supercapacitors Modeling
	3 Proposed ANN-EMS
	4 Simulation and Results
	5 Conclusion
	References
Estimation of Global Irradiation on Horizontal Plane Using Artificial Neural Network
	1 Introduction
	2 Materials and Methods
		2.1 Artificial Neural Networks (ANN)
		2.2 Multilayer Perceptron (MLP)
	3 Results and Discussion
		3.1 Model Development
		3.2 Performance Evaluation
	4 Conclusion
	References
Evaluating the Impact of Dataset Size on Univariate Prediction Techniques for Moroccan Agriculture
	1 Introduction
	2 Data
	3 Prediction Methodology
		3.1 Statistical Models
		3.2 Exponential Smoothing
		3.3 Regression
	4 Application and Results
		4.1 Experiment I
		4.2 Experiment II:
		4.3 Experiment III
	5 Discussion
	6 Conclusion
	References
Experimental Assessment of MPPT Based on a Neural Network Controller
	1 Introduction
	2 Presentation and Modeling of Studied System
		2.1 Photovoltaic Panel Model
		2.2 DC-DC Boost Converter Model
	3 Maximum Power Point Tracking (MPPT)
		3.1 Perturb & Observe (P&O)
		3.2 Incremental Conductance (INC)
		3.3 Neural Network (ANN)
	4 Experimental Results and Discussion
	5 Conclusion
	References
Explainable Prediction of Intelligent DTN Routing
	1 Introduction
	2 Methodology and Approach
		2.1 Model Interpretation for Machine Learning
		2.2 Experimental Study and Results Analysis
		2.3 Performance Metrics
		2.4 Model Explainability
		2.5 Comparative Analysis
	3 Conclusion
	References
Facial Emotion Recognition Using a GoogLeNet Architecture
	1 Introduction
	2 Related Works
	3 Proposed Model
		3.1 Transfer Learning with CNN
		3.2 GoogLeNet
		3.3 Dataset
		3.4 FER Using Transfer Learning with Pre-trained GoogLeNet-CNN
	4 Test and Results
		4.1 Results Analysis
	5 Conclusion
	References
Fake Profile Identification Using Machine Learning
	1 Introduction
	2 Related Work
	3 Proposed Hybrid System
		3.1 Security layer based on the social honeypots
		3.2 Security Layer Based on Collaborative Filtering
	4 Conclusion
	References
Faster RFID Authentication Scheme Based on ECC for Improving the Security in IoT Environment
	1 Introduction
	2 An Overview of Elliptic Curve Cryptography
	3 Proposed Authentication Protocol
		3.1 Initialization
		3.2 Authentication Phase
		3.3 Required Security Services
	4 Comparative Analysis
	5 Conclusion
	References
Feature Selection Impact on Time Series Problems for Solar Radiation Forecasting
	1 Introduction
	2 Related Works
	3 Our Proposed Approach
	4 Experimental Study
		4.1 Environment
		4.2 Discussion of Results
	5 Conclusion and Perspectives
	References
Fetal Electrocardiogram Identification Using Statistical Analysis
	1 Introduction
	2 Theoretical Background
		2.1 Model
		2.2 Jade Algorithm
	3 Methods
		3.1 ECG Recording
		3.2 Algorithm
	4 Simulation Results
	5 Discussion and Conclusion
	References
Fuzzy Logic Based Adaptive Second-Order Nonsingular Terminal Sliding Mode Lateral Control for Uncertain Autonomous Vehicle
	1 Introduction
	2 Mathematical Modeling of the Vehicle
	3 Controller Strategy Design
		3.1 Classical Adaptive Second-Order Nonsingular Terminal Sliding Mode Control [3] Design
		3.2 T-S Fuzzy Logic Methodology
	4 Results Obtained
	5 Conclusion
	References
Fuzzy Semantic Query Mapping and Processing
	1 Introduction
	2 Fuzzy Semantic Data Model
		2.1 Principles of Fuzzy Semantic Data Model
		2.2 Fuzzy Semantic Data Model Query Language
	3 Middleware Approach to Query Mapping and Processing
	4 Conclusion
	References
Geographic Information System for the Study of Water Resources in Chaâba El Hamra, Mohammedia (Morocco)
	1 Introduction
	2 Materials and Methods
	3 Results and Discussion
	4 Conclusion
	References
Gilbert Cell Down-Conversion Mixer for THz Wireless Communication
	1 Introduction
	2 Circuit Designs
	3 Simulations and Results
		3.1 The Power of the Local Oscillator
		3.2 Conversion Gain
		3.3 Compression Point at 1 dB
	4 Conclusion
	References
Heikin Ashi Candlesticks for Cryptocurrency Returns Clustering
	1 Introduction
		1.1 Trading Cryptocurrencies
		1.2 Kmeans Clustering
		1.3 Logarithmic Returns
	2 Data and Methods
		2.1 Data Retrieval
		2.2 Data Preprocessing
		2.3 Kmeans and Elbow Method
	3 Results
	4 Conclusion and Perspectives
	References
Health Surveillance and Management System Using WBSNs
	1 Introduction
	2 Literature Review
	3 System Architecture
		3.1 Architecture Design
		3.2 Implementation
	4 Conclusion
	References
How to Define a Functional Charges Copybook for an Agricultural Robot?
	1 Introduction
	2 Related Works
		2.1 What is the Role of Function Analysis?
		2.2 Horned Beast Diagram
		2.3 Octopus Diagram
		2.4 FAST Diagram
	3 Results and Discussion
		3.1 Horned Beast Diagram
		3.2 Octopus Diagram
	4 Conclusion
	References
Hybrid Congestion Control Mechanism as a Secured Communication Technology for the Internet of Health Things
	1 Introduction
	2 EC-Elastic Algorithm
	3 Performance Evaluation
		3.1 Simulation Metrics
		3.2 Simulation Results
	4 Conclusion
	References
Impact of Feature Vectorization Methods on Arabic Text Readability Assessment
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Data
		3.2 Feature Extraction
	4 Experiments and Results
	5 Conclusion and Future Work
	References
Impact of Landscape Change on Hydrological and Sediment Response of the Tleta Watershed in Northern of Morocco
	1 Introduction
	2 Methodology
		2.1 Study Area
		2.2 AGWA-K2 Modeling Process
		2.3 Input for K2 Simulation
	3 Results and Discussions
		3.1 Landscape Maps Evolution (1998–2018)
		3.2 Simulation Results
	4 Conclusion
	References
Implementation of Artificial Intelligence Methods for Solar Energy Prediction
	1 Introduction
	2 Data Collection and Methodology
	3 Results and Discussion
	4 Conclusion
	References
Improved Parallel Genetic Algorithm for Fixed Charge Transportation Problem
	1 Introduction
	2 Problem Description
	3 Standard Genetic Algorithm
		3.1 Master-Slave Approach MS-GA
		3.2 Coarse-Grained Approach CG-GA
		3.3 Hybrid Approach MSCG-GA
	4 Numerical Results
	5 Conclusion
	References
Increasing the Efficiency of Industry 4.0 Through the Use of the Digital Twin Concept
	1 Introduction
	2 Methodology
	3 Modeling Autonomous Systems
		3.1 Cyber-Physical Production System (CPPS)
		3.2 Model of Digital Twin Synchronization
		3.3 Model of Autonomy in the Flow of Part
		3.4 Model of Autonomy in Handling Breakdowns
	4 Discussion of Results and Comparison
	5 Conclusion
	References
Explainable Machine Learning for Identifying Malicious Profiles in Online Social Networks
	1 Introduction
	2 Approaches for Explainability
		2.1 Rule-Based Learning
		2.2 Feature Relevance
		2.3 Visual Explanations
	3 Methodology
	4 Results and Analysis
	5 Conclusion
	References
Intrusion Detection Framework for IoT-Based Smart Environments Security
	1 Introduction
	2 Related Works
	3 Proposed Intrusion Detection Framework
		3.1 DEIGASe Features Engineering Technique
		3.2 Environment Description and Dataset
		3.3 Discussion of Results
	4 Conclusion
	References
IoT Network Attack Types by Application Domains
	1 Introduction
	2 IoT Application Domains
		2.1 Security Vulnerabilities in the IoT Networks by Application Domains
		2.2 Security Requirements for IoT Systems
		2.3 Types of Attacks on IoT Networks by Application Domains
	3 Conclusion
	References
IoT-Based Intelligent System of Real-Time Data Acquisition and Transmission for Solar Photovoltaic Features
	1 Introduction
	2 Proposed Work
		2.1 System Overview
		2.2 Hardware Design Tools
	3 Results and Discussions
	4 Conclusion
	References
IoT-Enabled Smart Agriculture: Security Issues and Applications
	1 Introduction
		1.1 Smart Farming Architecture
		1.2 Smart Farming Applications
	2 Smart Farming Security and Solutions
		2.1 Security Issues
		2.2 Smart Farming Attacks
		2.3 Countermeasures
	3 Conclusion and Future Work
	References
Learning Analytics in the Teaching of French as a Foreign Language (FFL) and Big Data: What Resources? For What Skills?
	1 Introduction
	2 Learning Analytics at the Service of FFL
	3 Research Method
	4 Results
	5 Discussion
		5.1 Objective
		5.2 Discussion of the Results
	6 Conclusion
	References
Lexical Simplification of Arabic Educational Texts Through a Classification Approach
	1 Introduction
	2 Related Work
	3 Data and Tools
		3.1 Data
		3.2 Tools
	4 Methodology
		4.1 Difficulty Level Prediction
		4.2 Complex Words Identification
		4.3 Substitution Generation
		4.4 Experiments and Results
	5 Conclusion and Future Work
	References
License Plate Character Recognition System Using YOLOv5
	1 Introduction
	2 Related Works
	3 Dataset
	4 Architecure (YOLOv5)
	5 Results and Analysis
		5.1 License Plate Detection
		5.2 Character Detection
	6 Conclusion
	References
Lie-Trotter and Strang-Marchuk Methods for Modeling the 1D-Transport with Reaction Equation
	1 Introduction
	2 Methodology
		2.1 Lie-Trotter Operator Splitting Method
		2.2 Strang-Marchuk Operator Splitting Method
	3 Numerical Tests
	4 Conclusion and Discussion
	References
Machine Learning Application in Precision Marketing: A Systematic Literature Review and Comparative Study
	1 Introduction
	2 Research Questions and Search Strategy
	3 Exclusion and Inclusion Criteria and Quality Assessment
	4 Data Extraction Strategy and Synthesis
	5 Results of Protocol
		5.1 Distribution of Selected Studies by Machine Learning Methods and Publication Venue
		5.2 Comparison of Machine Learning Methods Using Performance Results
		5.3 Data Extraction Results
	6 Conclusion
	References
Mathematical Modeling of Financial Time Series Volatility: A GARCH Model
	1 Introduction
	2 GARCH Model
		2.1 Model Identification: ARIMA Model
		2.2 GARCH Model: A Brief Overview
	3 Analytical Study: Application to Stock Price Volatility
		3.1 Software
		3.2 Implementing of GARCH
		3.3 Outputs
	4 Conclusion
	References
Mathematical Modeling of Monetary Poverty: Evidence from Moroccan Case
	1 Introduction
	2 Theoretical Framework
	3 Empirical Framework
	4 Data and Results
		4.1 Data
		4.2 Statistical Descriptive
		4.3 Econometric Results
		4.4 Discussion the Results
	5 Conclusion
	References
Miniaturized Patch Metamaterial Antenna for 5G 3.5 GHz Band
	1 Introduction
	2 Antenna Design Methodology
		2.1 Design of the 4.7 GHz Conventional Patch Antenna
		2.2 Design of the Metamaterial Antenna
	3 Simulation Results and Discussion
	4 Conclusion
	References
Modeling of PV Power Source and Fuel Cell Used for Energy Autonomy of Connected Objects
	1 Introduction
	2 Background Theory
	3 Fuel Cell model
	4 Modeling of the Solar Photovoltaic Panel
		4.1 Equivalent Circuit of a PV Cell
		4.2 Equations of the PV Cell
	5 Simulation Results Obtained
		5.1 Fuel Cell Simulation Results
		5.2 PV Panel Simulation Results
	6 Conclusion
	References
Monitoring Energy Consumption of Android Apps with AppsDrain
	1 Introduction
	2 Related Works
	3 Power Measurement
	4 AppsDrain
	5 Case Study: Sorting Algorithms
	6 Conclusion
	References
Multi-task Offloading to a MEC Server with Energy and Delay Constraint
	1 Introduction
	2 System Model and Problem Formulation
	3 Proposed Algorithm
	4 Implementation and Evaluation
	5 Conclusion
	References
Multivariate Time Series Forecasting Using Recurrent Neural Network for a Complex System
	1 Introduction
	2 Methodology
		2.1 Data Description
		2.2 Processing Strategy
		2.3 Results and Discussion
	3 Conclusion
	References
Parallel Genetic Algorithms, Parameters and Design
	1 Introduction
	2 Literature Review
	3 Designing Parallel Genetic Algorithms
		3.1 Number of Populations
		3.2 Population Granularity
		3.3 Migration
		3.4 Overlapping
		3.5 PGA Design
	4 Conclusions and Future Work
	References
Particle Swarm Optimization to Design Microwave Components Based Substrate Integrated Waveguide Technology
	1 Introduction
	2 Modeling of Losses in Substrate Integrated Waveguide
	3 Optimization of SIW Using Particle Swarm Optimization
		3.1 Overview of Particle Swarm Optimization (PSO)
		3.2 Objective Function and Design Variables
	4 Results and Discussion
	5 Conclusion
	References
PI Controller and Quadratic Feedback of Synchronous Machine
	1 Introduction
	2 Mathematical Model of the PMSM
	3 Field-Oriented Control of Synchronous Machine SM
	4 Application of PI Controller
	5 Backstepping Design
		5.1 Backstepping Designee
	6 Simulations Results
	7 Discussion
	8 Conclusion
	References
Practical Implementation of Pseudo-random Control in Step-Down Choppers and Its Efficiency in Mitigating Conducted Electromagnetic Emissions
	1 Introduction
	2 The Fundamental Framework for Pseudo-random Modulation
	3 Method Proposed
		3.1 Pseudo-random Modulation Implementation Using the Arduino Uno Board in Real-World Applications
	4 Results and Discussion
		4.1 Conducted Electromagnetic Interference Measurement in a Buck Converter
	5 Conclusion
	References
Prediction of Sudden Death Due to COVID-19 Using Machine Learning Models
	1 Introduction
	2 Material and Methods
		2.1 Data Collection
		2.2 Proposed Model
		2.3 Validation Metrics
	3 Results and Discussion
	4 Conclusion
	References
Profiles Behavior Analysis in Blockchain Social Network
	1 Introduction
	2 Background and Related Works
	3 Blockchain and Social Network
	4 Profiles Detection in Bosms: the Steemit Case Study
	5 Comparative Analysis
	6 Conclusions and Future Work
	References
PSO Optimization Algorithm for QoS Enhancement in IoT-Enabled WSNs
	1 Introduction
	2 Problem Formulation
		2.1 Coverage Area of a Sensor
		2.2 Particle Swarm Optimization
	3 Proposed Work
	4 Simulation and Results
		4.1 Coverage Optimization
		4.2 Throughput
	5 Conclusion and Future Work
	References
Road Accident Forecast Using Machine Learning
	1 Introduction
	2 Related Work
	3 Data Collection
	4 Data Analysis
	5 Prediction
		5.1 Arima Time Series Model
		5.2 Forecast
	6 Conclusion and Future Work
	References
Security of Hadoop Framework in Big Data
	1 Introduction
	2 Hadoop Framework
		2.1 Definition
		2.2 Distributed File System of Hadoop (HDFS)
		2.3 The Hadoop Map Reduce
		2.4 The Hadoop yet Another Resource Negotiator (YARN)
	3 Hadoop Security Issues
	4 Hadoop Security Solution
		4.1 Threat-Response Models
		4.2 Security Architecture
	5 Conclusion
	References
Simple Inter-stage Impedance Matching Technique for 5G mm-Wave Systems
	1 Introduction
	2 Impedance Matching Technique
	3 Impedance Matching Circuit
	4 SOM Design and Performance
	5 Conclusion
	References
Smart Learning Using Autonomous Chatbot Based on NLP Techniques
	1 Introduction
	2 Literature Review
	3 Our Autonomous Solution and Its Implementation
	4 Conclusion and Future Works
	References
Speech Emotion Recognition Using yet Another Mobile Network Tool
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Dataset Collection
		3.2 The Model: Yet Another Mobile Network
		3.3 Experimental Setup
	4 Experimental Result
	5 Conclusion
	References
Study and Design of a 28/38 GHz Bi-band MIMO Antenna Array Element for 5G
	1 Introduction
	2 Modeling Method and Antenna Design
		2.1 The Choice of the 28/38 GHz Band
		2.2 Structure of This Proposed Antenna
	3 Results and Discussion
		3.1 Results of the Simulations Carried Out During This Work
	4 Conclusion
	References s
Temporal Blockchains for Intelligent Transportation and Autonomous Vehicles Management
	1 Introduction
	2 BiTchain: A New Data Model for Bitemporal Blockchain Management
		2.1 Temporal Extension of the Conventional Data Model
	3 BiTEQL: A Temporal Query Language for Querying BiTchain Blockchains
		3.1 Time Representation and Manipulation in BiTEQL
		3.2 Temporal Selection in BiTEQL
		3.3 Temporal Projection in BiTEQL
		3.4 Examples of BiTEQL Queries
	4 Conclusion
	References
Terahertz Antennas: Application, Research Challenges and Future Directions
	1 Introduction
	2 Applications of THz Frequencies
		2.1 Spectroscopy
		2.2 Medical Application
		2.3 Telecommunications
	3 Terahertz Radiation Sources and Detectors
		3.1 Sources
		3.2 Detectors THz
	4 Development of Terahertz Antennas
	5 Basic Terahertz Antennas
	6 Impact of THz on 6G Wireless Communication
		6.1 Overview of the 6G Antenna
	7 Future Research Directions of THz Antennas
	8 Conclusion
	References
The Artificial Intelligence for Modeling and Predicting SMALL’s Cities Attractiveness
	1 Introduction
	2 Definition and Estimation
		2.1 Target Population
		2.2 Estimating the Net Migration Rate
	3 Mathematical Modeling
		3.1 Methodology
		3.2 List of Variables
	4 Results
		4.1 Results of the Logistic Regression Using Stepwise Backward Regression
		4.2 Results of the ANN
	5 Conclusion
	References
The Transformation Method from Business Processes Models by BPMN to Class Diagram by UML: CIM to PIM
	1 Introduction
	2 Related Works
	3 Method
		3.1 Case Study
		3.2 The Result
	4 Conclusion and Perspectives
	References
The Use of a Genetic Algorithm to Alleviate the Limited Content Issue in a Content-Based Recommendation System
	1 Introduction
	2 Theoretical Background
	3 Research problematic
	4 Research Methodology
	5 Our Proposed Approach
	6 Results, Interpretations and Discussions
	7 Conclusion
	References
The Use of the Surface Response Methodology of Water Pre-treatment for a Better Demineralization
	1 Introduction
	2 Research Methodology
		2.1 Presentation of the Study Area
		2.2 Experimental Research Methodology
	3 Results and Discussion
		3.1 Determination of the pH and the Optimal Dose of Aluminum Sulphate
	4 Conclusion
	References
Towards a Smart Photovoltaic Panel: Numerical and Experimental StudY
	1 Introduction
	2 Related Work
	3 Map Modeling
		3.1 Characteristics of the Panel Studied
		3.2 Constituents of Our IOT System
	4 Implementation and Results
		4.1 Operating Algorithm and Simulation Results
		4.2 Prototype of the Smart Panel
	5 Conclusion
	References
Towards an Effective Anomaly Detection in Solar Power Plants Using the AE-LSTM-GA Approach
	1 Introduction
	2 Data Source
	3 Results and Findings
		3.1 Isolation Forest (IF)
		3.2 Local Outlier Factor (LOF)
		3.3 AutoEncoder Long Short-Term Memory with Genetic Algorithm (AE-LSTM-GA) Approach
	4 Conclusion
	References
Towards an Integrated Rough Set and Data Modelling Framework for Data Management and Knowledge Extraction
	1 Introduction
	2 Principles of Rough Set Theory
	3 Rough Semantic Data Model
		3.1 Basic Concepts
		3.2 Quality of Classification and Accuracy of Approximation
		3.3 Attribute Reducts and Core
		3.4 Data Structuring
		3.5 Knowledge Extraction
	4 Towards an Integrated Data Management and Knowledge Extraction Framework
	5 Conclusion
	References
Towards Cd-Free Sb2Se3 Based Solar Cells Using SCAPS-1D
	1 Introduction
	2 Device Structure and Simulation
	3 Results and Discussion
		3.1 Current Density-Voltage Characteristic for Different Buffer Layers
		3.2 Effect of the Sb2Se3 Absorber Layer’s Thickness
		3.3 Active Layer Acceptor Doping Concentration Optimization
		3.4 Impact of WS2 Buffer Layer Thickness
	4 Conclusion
	References
Using MPI to Compare Two Protocols That Allow Paillier’s Cryptosystem to Perform Homomorphic Multiplication
	1 Introduction
	2 Related Works
	3 Protocols that Enable Homomorphic Multiplication
		3.1 Paillier Encryption and the Russian Multiplication Protocol
		3.2 Paillier Encryption and Continuous Logarithm
		3.3 Comparison Between Multiplication Protocols Using MPI
		3.4 Implementation and Results
	4 Conclusion
	References
Using the Ethereum Blockchain to Secure a Crowdfunding System in the Real Estate Sector
	1 Introduction
	2 Related Work
	3 Proposed Model
	4 Result and Discussion
	5 Conclusion
	References
Vigenère Implemented in Two Chaotic Feistel Laps for Medical Images Encryption Followed by Genetic Mutation
	1 Introduction
		1.1 The Classical Feistel Technique
		1.2 Vigenère Classical Technique
		1.3 Genetic Mutation
		1.4 Our Contribution
	2 The Proposed Method
		2.1 Chaotic Vectors Design
		2.2 Encryption Process
		2.3 Decryption of Encrypted Image
	3 Examples and Simulations
		3.1 Statistics Attack Security
		3.2 Differential Analysis
	4 Conclusion
	References
Word Embedding Methods of Text Processing in Big Data: A Comparative Study
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 System Architecture
		3.2 Word Embedding Techniques:
		3.3 Text Classifiers
	4 Results and Discussion
	5 Conclusion
	References
Yolov2 Implementation and Optimization for Moroccan Traffic Sign Detection
	1 Introduction
	2 Proposed Method
		2.1 Architecture of Proposed Method
		2.2 Datasets and Working Environment
		2.3 Optimization of Generated Code C/C++ 
	3 Experimental Results
		3.1 Testing Using MATLAB
		3.2 Testing Generated C/C++ code Using Visual Studio
	4 Conclusion
	References
τJSONPath: A Temporal Extension of the JSONPath Language for the τJSchema Framework
	1 Introduction
	2 Temporal JSON Data Model
		2.1 Illustrative Example
		2.2 Desiderata
	3 Temporal JSONPath Query Language
		3.1 Syntax and Semantics of tJSONPath
		3.2 Examples of tJSONPath Queries
	4 Conclusion
	References
Virtual Communities Homophily Based on Users Posts in Online Social Networks. Case Study: 198 Facebook Public Groups
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Publishers-Based Relationship
		3.2 Treatment Process
		3.3 Interval of the Relationship Between the User and the Group
		3.4 Special Cases Management
	4 Results and Discussion
		4.1 Processing Result
		4.2 Featured Users
	5 Visualisation the Relations
	6 Conclusion and Perspective
	References
Prediction Student Performance in E-Learning Environment: Challenge and Opportunity
	1 Introduction
	2 E-Learning and MOOC
		2.1 E-Learning
	3 Main Trends and Challenges in the Future Development of Educational Artificial Intelligence
		3.1 Development Trend
		3.2 The Key Challenge
	4 Conclusions
	References
Routing Protocol Based on Artificial Neural Network for Vehicular Ad Hoc Networks
	1 Introduction
	2 Related Works
	3 Algorithm Overview
	4 Proposed Approach
	5 Performance Results
	6 Conclusion
	References
Towards Secure SDN-Based VANETs Paradigm
	1 Introduction
	2 VANETs and SDN: Background Overview
		2.1 VANET Architecture
	3 Related Work
	4 Our Proposed Software-defined VANET Model
	5 Security Evaluation and Analysis for Our Proposed Scheme
	6 Conclusion and Future Work
	References
Solving a Proposed Traffic Flow Model Using Deep Learning and Physical Constraint
	1 Introduction
	2 Proposed Model
	3 Methodologies
		3.1 Physics-Informed Neural Networks for Solving PDEs
	4 Implementation and Discussion Results
	5 Conclusion
	References
The Use of Online Social Networks: Comparing Moroccan and French Communities on Facebook
	1 Introduction
	2 Related Work
	3 Measures and Methodology
		3.1 Comparing Communities
		3.2 Data Collection
	4 Results and Discussions
	5 Conclusion and Perspectives
	References
Performance Study of Linear and Circular Arrays Based on Wideband DOA Estimation
	1 Introduction
	2 Signal Model and Array Geometries
		2.1 Signal Model for ULA
		2.2 Signal Model for UCA
		2.3 Formulation of Array Correlation Matrix
	3 TOFS Method
	4 Simulation Results
		4.1 Resolution
		4.2 RMSE
	5 Conclusion
	References
The Realization of 5G Network Booster Using Various Types of Antennas
	1 Introduction
	2 Design and Functioning
		2.1 Design of the Mobile Phone Network Booster Circuit
		2.2 Functioning
	3 Test
		3.1 Two Helical Antenna Mobile Phone Network Booster Circuit
		3.2 Aluminium Antenna Mobile Phone Network Booster
		3.3 Cover Antenna Mobile Phone Network Booster Circuit
		3.4 Patch Antenna Mobile Phone Network Booster
	4 Results and Discussion
	5 Construction of the Mobile Phone Booster Circuit
	6 Conclusion
	References
Efficiency in the Availability of Indicators of a Datamart Based on the Kimball Methodology for a Baking Company
	1 Introduction
	2 Methodology
	3 Results
		3.1 Requirements
		3.2 Datamart Construction
		3.3 Improvement in the Efficiency of the Availability of Indicators
	4 Conclusions
	References
Author Index




نظرات کاربران