ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Emerging Trends in Intelligent Systems & Network Security

دانلود کتاب روندهای نوظهور در سیستم های هوشمند و امنیت شبکه

Emerging Trends in Intelligent Systems & Network Security

مشخصات کتاب

Emerging Trends in Intelligent Systems & Network Security

ویرایش:  
نویسندگان: , , ,   
سری: Lecture Notes on Data Engineering and Communications Technologies, 147 
ISBN (شابک) : 3031151909, 9783031151903 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 547
[548] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 56 Mb 

قیمت کتاب (تومان) : 37,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Emerging Trends in Intelligent Systems & Network Security به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب روندهای نوظهور در سیستم های هوشمند و امنیت شبکه نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب روندهای نوظهور در سیستم های هوشمند و امنیت شبکه



این کتاب شامل آثار پژوهشی منتخب ارائه شده در پنجمین کنفرانس بین المللی شبکه، سیستم های اطلاعات و امنیت (NISS 2022) است که توسط مرکز تحقیقات علوم داده و اطلاعات در آژانس ملی تحقیقات و نوآوری (BRIN) سازماندهی شده است. ، جمهوری اندونزی، و انجمن علوم و توسعه پایدار مدیترانه مراکش، مراکش، طی 30 تا 31 مارس 2022، در حالت آنلاین در باندونگ، اندونزی میزبانی شد. این کتاب با تکیه بر تاریخچه موفقیت آمیز مجموعه کنفرانس در چهار سال اخیر، با هدف ارائه نقش مهم اتصال محققان در سراسر جهان برای انتشار و به اشتراک گذاری ایده های جدید در سیستم های اطلاعاتی هوشمند، امنیت سایبری و فناوری های شبکه است. span>

49 فصل ارائه شده در این کتاب با دقت بررسی و از بین 115 مورد ارسالی انتخاب شدند. آنها بر ارائه راه حل های هوشمند از طریق استفاده از سیستم های اطلاعاتی پیشرفته، شبکه و امنیت برای مزیت رقابتی و صرفه جویی در هزینه در بخش های صنعتی مدرن و همچنین بخش های عمومی، تجاری و آموزشی تمرکز می کنند. نویسندگان، دانشگاهیان، دانشمندان، محققان و دانشمندان برجسته در زمینه های مربوطه از سراسر جهان هستند.


توضیحاتی درمورد کتاب به خارجی

This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30–31, 2022, hosted in online mode in Bandung, Indonesia. Building on the successful history of the conference series in the recent four years, this book aims to present the paramount role of connecting researchers around the world to disseminate and share new ideas in intelligent information systems, cyber-security, and networking technologies.

The 49 chapters presented in this book were carefully reviewed and selected from 115 submissions. They focus on delivering intelligent solutions through leveraging advanced information systems, networking, and security for competitive advantage and cost savings in modern industrial sectors as well as public, business, and education sectors. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.



فهرست مطالب

Preface
Committee
	Conference General Chair
	Conference General Co-chairs
	Conference Chairs
	Technical Program Committee Chair
	Treasurer Chair
	Program (Paper/Special Session/Poster) Chair
	Proceedings/Book Chair
	Sponsorship, Event, and Logistics Chair
	Event Publication and Documentation Chair
	IT Support/Web Administrator Chair
	Technical Program Committee Member
	Event Publication and Documentation Member
	IT Support/Web Administrator Member
	International Advisory Committee
	Steering Committee
	Technical Program Committee
	Keynote Speakers
Difficult Data Analysis
E-CARGO and Role-Based Collaboration
E-CARGO and Role-Based Collaboration
Feature Object Extraction – Fusing Evidence, Not Rolling the Die
AIoT: Cloud or Edge, Big or Small Data, Public or Private Model
Communication and Computing Resource Management for Internet of Things
Hardware-Software Co-design Approaches for Sustainable AI
Architectures, Challenges and Opportunities within 6G Emerging Technologies
Contents
A Bi-objective Evolutionary Algorithm to Improve the Service Quality for On-Demand Mobility
	1 Introduction
	2 The On-Demand Transport Problem
	3 The Proposed Method
		3.1 The Representation of a Solution
		3.2 The Fitness Function
		3.3 The Move Operator
	4 Experimental Results
	5 Conclusion and Prospects
	References
A Dynamic Circular Hough Transform Based Iris Segmentation
	1 Introduction
		1.1 Related Work
	2 Materials and Methods
		2.1 Dataset
		2.2 Proposed Methodology
	3 Results
		3.1 Comparing of the Segmentation Methods
	4 Conclusion
	References
A Game Theoretic Framework for Interpretable Student Performance Model
	1 Introduction
	2 Methodology
		2.1 Model Creation
		2.2 Model Evaluation
		2.3 Model Interpretation
	3 Experiments and Result Analysis
		3.1 Data Description
		3.2 Description of Experimental Protocol
		3.3 Result Analysis
	4 Conclusion
	References
A New Telecom Churn Prediction Model Based on Multi-layer Stacking Architecture
	1 Introduction
	2 Description of the Problem
	3 Machine Learning Using Stacknets
	4 Methodology
		4.1 Dataset
		4.2 Data Preprocessing
		4.3 Feature Engineering
		4.4 Unbalanced Class in Binary Classification
		4.5 Model Building
		4.6 Performance Metrics
	5 Results of Experiments
		5.1 Used Algorithms
		5.2 Performance Evaluation
		5.3 Discussion
	6 Conclusion
	References
A Novel Hybrid Classification Approach for Predict Performance Student in E-learning
	1 Introduction
	2 Related Work
	3 Proposed Method
	4 Applied Algorithms
		4.1 Voting
		4.2 Random Forest
	5 Results
		5.1 Dataset
		5.2 Validation
	6 Discussion
	7 Conclusions
	References
A Proposed Big Data Architecture Using Data Lakes for Education Systems
	1 Introduction
	2 Background
		2.1 Traditional Data Warehouse
		2.2 Modern Data Warehouse
		2.3 The Data Lake
	3 Literature Review
	4 Proposed System
		4.1 Data Source Layer
		4.2 Data Consolidation Layer
		4.3 Data Warehouse Layer
		4.4 Data Consumption Layer
		4.5 Potential Application
	5 Discussion
	6 Conclusion and Future Works
	References
A SVM Approach for Assessing Traffic Congestion State by Similarity Measures
	1 Introduction
	2 Traffic Congestion Identification
		2.1 Jaccard Similarity Coefficient
		2.2 Dice Similarity Coefficient
		2.3 BF (Boundary F1) Score
	3 Methodology
		3.1 Data Collection
		3.2 Pre-treatment
		3.3 SVM Learning
		3.4 Classification
		3.5 Results
	4 Experiments
		4.1 Data Sources
		4.2 Traffic Classification Based on SVM
	5 Conclusion and Future Work
	References
A Tool for the Analysis, Characterization, and Evaluation of Serious Games in Teaching
	1 Introduction
	2 Related Works
	3 Research Method
		3.1 Experimental Study
		3.2 Proposed Approach
	4 Evaluation
		4.1 Presentation of the Analysis Tool
		4.2 Evaluation Protocol
		4.3 Results
	5 Discussion
	6 Conclusion
	References
Analysis and Examination of the Bus Control Center (BCC) System: Burulaş Example
	1 Introduction
	2 Material and Method
	3 Application
		3.1 General Features of the Bus Control Center (BCC) System and Determination of Application Areas
		3.2 Identification of Lines, Routes, Vehicles and Stops
		3.3 Services Planning
		3.4 Emergency Management
		3.5 Violation Management
	4 Discussion and Recommendations
	5 Conclusion
	References
Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 AES (Advanced Encryption Standard)
		3.2 RSA (Rivest Shamir Adleman)
		3.3 Efficiency Criteria
	4 Experimental Result
		4.1 Histogram Analysis
		4.2 PSNR Analyses
		4.3 Entropy Analyses
		4.4  Elapsed Time Analyses
	5 Discussion
	6 Conclusion
	References
Aspect-Based Sentiment Analysis of Indonesian-Language Hotel Reviews Using Long Short-Term Memory with an Attention Mechanism
	1 Introduction
	2 Methods
		2.1 Data Collection
		2.2 Data Cleaning
		2.3 Data Preprocessing
		2.4 Word2vec Model Training
		2.5 Data Splitting
		2.6 Model Training
		2.7 Testing
		2.8 Evaluation
	3 Results and Discussion
	4 Conclusion
	References
Big Data and Machine Learning in Healthcare: Concepts, Technologies, and Opportunities
	1 Introduction
	2 The Concept of Big Data
		2.1 Big Data Definition
		2.2 Characteristics of Big Data
		2.3 Big Data in Healthcare
	3 Big Data Analytics
		3.1 Hadoop
		3.2 Spark
	4 The Concept of Machine Learning
		4.1 Machine Learning Definition
		4.2 Deep Learning
		4.3 Machine Learning in Healthcare
	5 The Impact of Big Data on Healthcare
	6 The Impact of Machine Learning in Healthcare
	7 Conclusion and Future Work
	References
Classification of Credit Applicants Using SVM Variants Coupled with Filter-Based Feature Selection
	1 Introduction
	2 Related Works
	3 Background
		3.1 SVM Variants
		3.2 Filter-Based Feature Selection
	4 Experimental Design
	5 Results and Discussions
	6 Conclusion
	References
Classification of Hate Speech Language Detection on Social Media: Preliminary Study for Improvement
	1 Introduction
	2 Related Work
	3 Method
		3.1 Building a Dataset
		3.2 Hate Speech and Abusive Language Detection
	4 Experiments and Results
		4.1 Experiment Results
		4.2 Discussion and Limitation
	5 Conclusion and Future Work
	References
CoAP and MQTT: Characteristics and Security
	1 Introduction
	2 Background
	3 CoAP Security
		3.1 DTLS Based Communications
		3.2 Related Works
	4 MQTT Security
		4.1 TLS Based Communications
		4.2 Related Works
	5 Conclusion
	References
Combining Static and Contextual Features: The Case of English Tweets
	1 Introduction
	2 The Proposed Model
	3 Experiments
		3.1 Data Preprocessing
		3.2 Experimental Settings
	4 Conclusion
	References
Comparative Study on the Density and Velocity of AODV and DSDV Protocols Using OMNET++ 
	1 Introduction
	2 Related Works
	3 Methods and Techniques
		3.1 Routing Protocols Overview
		3.2 Simulation Environment
		3.3 Performance Metrics
		3.4 Simulation Scenario
	4 Results and Discussions
		4.1 Node Density Versus AODV and DSDV
		4.2 Pause Time Versus AODV and DSDV
		4.3 Comparison Between OMNET++ and NS2 for AODV
		4.4 Comparison Between OMNET++ and NS2 for DSDV
	5 Conclusion and Future Work
	References
Cybersecurity Awareness Through Serious Games: A Systematic Literature Review
	1 Introduction
	2 Methodology
		2.1 Systematic Literature Review
		2.2 Research Question
		2.3 Search Strategy
	3 Results and Discussion
	4 Conclusion
	References
Design and Implementation of a Serious Game Based on Recommender Systems for the Learning Assessment Process at Primary Education Level
	1 Introduction
	2 Background
		2.1 Learning Assessment
		2.2 Serious Game
		2.3 Recommendation Systems
	3 Proposed Approach
		3.1 Learning Assessment
		3.2 Recommendation Process
	4 Results and Discussion
	5 Conclusion
	References
DLDB-Service: An Extensible Data Lake System
	1 Introduction
	2 Related Works
		2.1 Data Lake Concept
		2.2 Metadata Management
	3 DLDB-Service Architecture
		3.1 Data Ingestion
		3.2 Data Storage
		3.3 Data Analysis
		3.4 Data Exploration
	4 Technical Demonstration
	5 Discussion
	6 Conclusion
	References
Effect of Entropy Reshaping of the IP Identification Covert Channel on Detection
	1 Introduction
	2 The Proposed REIPIC Method
		2.1 Parameters and Notations
		2.2 Frequencies of Occurrence Matrix
		2.3 REIPIC Algorithm
		2.4 Frequencies of Occurrence Treatment (FOT)
	3 Experiment and Settings
	4 Results and Discussion
		4.1 REIPIC Effect on Entropy Reshaping
		4.2 REIPIC Effect on the IP ID CC Detection
	5 Conclusion and Future Work
	References
Explainable Machine Learning Model for Performance Prediction MAC Layer in WSNs
	1 Introduction
	2 Methodology
		2.1 Prepossessing
		2.2 Models Development
		2.3 Interpretation of ML Models Using SHAP Values
		2.4 Interpretation of ML Models Using SHAP Values
	3 Experiments and Results Analysis
		3.1 WSN Dataset
		3.2 Results
		3.3 Results of Model Prediction Interpretation
	4 Conclusion
	References
Hadoop-Based Big Data Distributions: A Comparative Study
	1 Introduction
	2 Hadoop Distributions
		2.1 Stand-Alone Hadoop Distributions
		2.2 Hybrid Hadoop Distributions
		2.3 Cloud-Based Hadoop Distributions
	3 A Comparison of Hadoop Distributions
		3.1 Comparing Factors
		3.2 Comparing Hadoop Distributions
		3.3 Advantages and Disadvantages of Hadoop Distributions
		3.4 Discussion
	4 Conclusion
	References
HDFS Improvement Using Shortest Path Algorithms
	1 Introduction
	2 HADOOP Platform
		2.1 HDFS – Reliable Storage
		2.2 DIJKSTRA’s Algorithm Presentation
		2.3 DIJKSTRA’s Algorithm Examples
		2.4 SubAlgorithm Dijkstra(Dijkstratype)
	3 Article Sections
	4 Proposed Work
		4.1 Little Reminder
		4.2 The Proposed Approach for Small File Management
	5 Experimental
		5.1 Experimental Environment (RatioTable)
		5.2 Phases Algorithms
		5.3 Results
		5.4 Conclusion and Future Works
	References
Improved Hourly Prediction of BIPV Photovoltaic Power Building Using Artificial Learning Machine: A Case Study
	1 Introduction
	2 Materials and Methods
		2.1 Proposed BIPV Study of Case
		2.2 Description of Machine Learning Models
	3 Empirical Evaluations
		3.1 Datasets
		3.2 Error Metrics
		3.3 Results and Interpretation
	4 Conclusion
	References
Improving Speaker-Dependency/Independency of Wavelet-Based Speech Emotion Recognition
	1 Introduction
	2 Speech Emotion Recognition Literature
	3 Multilevel Wavelet Transform
		3.1 1-D Discrete Wavelet Transform (DWT)
		3.2 1-D Stationary Wavelet Transform (SWT)
	4 Methods
		4.1 Feature Extraction and Selection
		4.2 Classification
	5 Experimental Setups and Results
		5.1 Speaker-Dependent (SD)
		5.2 Speaker-Independent (SI)
		5.3 Comparison with SER Studies
	6 Conclusion and Future Work
	References
Improving the Quality of Service Within Multi-objective Customer-Oriented Dial-A-Ride Problems
	1 Introduction
		1.1 Presentation of DARP
		1.2 The Customer Oriented Design of the Quality of Service in DARPs
		1.3 Contributions
	2 Literature Review
		2.1 The Quality of Service in DARPs
		2.2 Customized Service Quality in Multi-objective DARPs
	3 The Multi-objective Customer Oriented DARP
		3.1 Description of the Problem
		3.2 Mathematical Formulation of the Problem
	4 Preliminary Tests
	5 Discussion and Conclusion
	References
Interpretability Based Approach to Detect Fake Profiles in Instagram
	1 Introduction
	2 Methodology
		2.1 Dataset and Features
		2.2 Data Preprocessing
		2.3 Over-simpling
		2.4 Models Construction
		2.5 Interpretation of Machine Learning Models
	3 Results and Analysis
	4 Conclusion
	References
Learning Styles Prediction Using Social Network Analysis and Data Mining Algorithms
	1 Introduction
	2 Learning Styles
	3 The Relationship Between Learning Styles and Social Networks
	4 Proposed Method
	5 Conclusion
	References
Managing Spatial Big Data on the Data LakeHouse
	1 Introduction
	2 Background and Related Works
	3 Data LakeHouse
	4 Spatial Big Data on the LakeHouse
	5 Experimental Study
		5.1 The Spatial Lakehouse Architecture
		5.2 Storage and Query Optimization
		5.3 Input Datasets
		5.4 Setup and Hardware
		5.5 Analysis and Results
	6 Conclusion
	References
Medication Decision for Cardiovascular Disease Through Fermatean Fuzzy Bipolar Soft Set
	1 Introduction
	2 Literature Review
	3 Fermatean Fuzzy Sets with Soft Sets
	4 Medication Decision (Selection of the CVD Therapies)
	5 Conclusion
	References
Microservices: Investigating Underpinnings
	1 Introduction
	2 Fundamental Concepts of MSA
		2.1 Internal Structure of Microservices
		2.2 MSA Design Patterns in DevOps
	3 Different Aspects of Microservices Architecture
		3.1 Core Principles for MSA
		3.2 Service Management Activities
	4 Discussion
		4.1 Motivations Behind the Migration to MSA
		4.2 Open Research Challenges in MSA
	5 Conclusion
	References
Network Slicing User Association Under Optimal Input Covariance Matrix in Virtual Network MVNO
	1 Introduction
	2 Related Work
	3 System Model
	4 Ergodic Capacity of MIMO
		4.1 Without Channel State Information (CSI)
		4.2 With Channel State Information (CSI)
	5 Proposed Slice Selection Method: Softmax
	6 Numerical Investigation
	7 Conclusion and Future Work
	References
Pedagogical Classification Model Based on Machine Learning
	1 Introduction
	2 Related Work
	3 Methodologies
		3.1 Theoretical Foundation of Our Proposed Approach
		3.2 Approach
	4 Experimental Study
		4.1 Evaluation Metrics
		4.2 Datasets Analysis and Exploration
		4.3 Environment Setup and Implementation
		4.4 Results and Analysis
	5 Conclusion
	References
Performance Evaluation of NS2 and NS3 Simulators Using Routing Protocols in Mobile Ad Hoc Networks
	1 Introduction
	2 Related Works
	3 Methods and Technics
	4 Results and Discussions
	5 Conclusion and Future Work
	References
Gamification in Software Development: Systematic Literature Review
	1 Introduction
	2 Relevant Theory
		2.1 Gamification
		2.2 Software Development
	3 Methodology
	4 Results and Discussion
		4.1 Publication
		4.2 RQ1 What Gamification Elements Have Been Used
		4.3 RQ2 What Gamification Framework Has Been Used
	5 Conclusion
	References
Robust Method for Estimating the Fundamental Matrix by a Hybrid Optimization Algorithm
	1 Introduction
	2 Fundamental Matrix
	3 Estimation of the Fundamental Matrix by an AG-LM Algorithm
	4 Experiments
	5 Conclusion
	References
SDN Southbound Protocols: A Comparative Study
	1 Introduction
	2 SDN Background
		2.1 SDN Architecture
		2.2 SDN Interfaces
	3 Overview of SDN Southbound Protocols
		3.1 OpenFlow
		3.2 ForCES
		3.3 P4
	4 Discussion
	5 Conclusion
	References
Simulating and Modeling the Vaccination of Covid-19 Pandemic Using SIR Model - SVIRD
	1 Introduction
	2 Overview
	3 Method and Model Description
		3.1 SIR Model
		3.2 SVIRD Extention of SIR Model
	4 Sample and Analysis
		4.1 Low Vaccinated Population
		4.2 High Vaccinated Population
	5 Simulator Description
		5.1 Simulation Parameter
		5.2 Simulation Process
	6 Conclusion
	References
The New Generation of Contact Tracing Solution: The Case of Morocco
	1 Introduction
	2 State of the Art
	3 Method
		3.1 System Architecture
		3.2 The Proposed Algorithms
		3.3 Assessment of Concerns for General Contact Tracing Applications
		3.4 Privacy Policy and Data Confidentiality
		3.5 Results
	4 Discussion of Results
	5 Conclusion
	References
The Prediction Stock Market Price Using LSTM
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Raw Data
		3.2 Data Processing
		3.3 Model
		3.4 Training
		3.5 Compared Methods
		3.6 Performance Evaluation
	4 Results
		4.1 Simulation Tools
		4.2 Experimental Results
	5 Discussion
	6 Conclusion and Future Work
	References
Hybrid Movie Recommender System Based on Word Embeddings
	1 Introduction
	2 Related Work
		2.1 Recommendation Based on Content Filtering
		2.2 Recommendation Based on Collaborative Filtering
	3 Proposed Approach
		3.1 Hybrid Recommendation
		3.2 Word2vec
		3.3 K Nearest Neighbor
		3.4 The Overall Approach
	4 Experiments
	5 Conclusion
	References
Towards Big Data-based Sustainable Business Models and Sustainable Supply Chain
	1 Context and Motivations
	2 Overview
		2.1 Sustainability and Supply Chain
		2.2 Business Models Vs Sustainable Business Models
		2.3 Sustainable Business Models and Sustainable Supply Chain
	3 Big Data-driven Sustainable Business Models
	4 Conclusion and Future Work Directions
	References
Treatment of Categorical Variables with Missing Values Using PLS Regression
	1 Introduction and Literature Review
	2 PLS1 for Categorical Predictors with Missing Values
	3 Comparative Case Study
		3.1 Data Description
		3.2 Matrix Quantification
		3.3 PLS1-NIPLAS Application
	4 Conclusion
	References
Type 2 Fuzzy PID for Robot Manipulator
	1 Introduction
	2 System Modeling of Two-Link Robot Manipulator
	3 Proposed Controller Design
	4 Simulations Results
	5 Conclusion
	References
Using Latent Class Analysis (LCA) to Identify Behavior of Moroccan Citizens Towards Electric Vehicles
	1 Introduction
	2 Proposed Method: Latent Class Analysis
	3 Description of Data
	4 Experimental Results
		4.1 Multiple Correspondence Analysis Application
		4.2 Interpretation of MCA Results
		4.3 LCA Method Application
		4.4 Analysis and Discussion
	5 Conclusion
	References
Using Learning Analytics Techniques to Calculate Learner’s Interaction Indicators from Their Activity Traces Data
	1 Introduction
	2 Research Background
	3 LA Techniques and Their Application in E-Learning Systems
	4 LA Techniques to Get Interaction Indicators in E-Learning Environments
		4.1 Learner Interaction Indicators
		4.2 Classification of Interaction Indicators
	5 Synthesis and Discussion
	6 Conclusion and Future Work
	References
Web-Based Dyscalculia Screening with Unsupervised Clustering: Moroccan Fourth Grade Students
	1 Introduction
	2 Related Works
	3 Non-verbal Intelligence and Mathematical Performances
	4 Materials and Methods
		4.1 Participants
		4.2 Measures
		4.3 Screening Model
	5 Results and Discussion
		5.1 Dendrogram
		5.2 Silhouette Score
		5.3 Dataset Clustering
	6 Conclusion
	References
Author Index




نظرات کاربران