دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Mohamed Ben Ahmed, Boudhir Anouar Abdelhakim, Bernadetta Kwintiana Ane, Didi Rosiyadi سری: Lecture Notes on Data Engineering and Communications Technologies, 147 ISBN (شابک) : 3031151909, 9783031151903 ناشر: Springer سال نشر: 2022 تعداد صفحات: 547 [548] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 56 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Emerging Trends in Intelligent Systems & Network Security به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب روندهای نوظهور در سیستم های هوشمند و امنیت شبکه نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل آثار پژوهشی منتخب ارائه شده در پنجمین کنفرانس بین المللی شبکه، سیستم های اطلاعات و امنیت (NISS 2022) است که توسط مرکز تحقیقات علوم داده و اطلاعات در آژانس ملی تحقیقات و نوآوری (BRIN) سازماندهی شده است. ، جمهوری اندونزی، و انجمن علوم و توسعه پایدار مدیترانه مراکش، مراکش، طی 30 تا 31 مارس 2022، در حالت آنلاین در باندونگ، اندونزی میزبانی شد. این کتاب با تکیه بر تاریخچه موفقیت آمیز مجموعه کنفرانس در چهار سال اخیر، با هدف ارائه نقش مهم اتصال محققان در سراسر جهان برای انتشار و به اشتراک گذاری ایده های جدید در سیستم های اطلاعاتی هوشمند، امنیت سایبری و فناوری های شبکه است. span>
49 فصل ارائه شده در این کتاب با دقت بررسی و از بین 115 مورد ارسالی انتخاب شدند. آنها بر ارائه راه حل های هوشمند از طریق استفاده از سیستم های اطلاعاتی پیشرفته، شبکه و امنیت برای مزیت رقابتی و صرفه جویی در هزینه در بخش های صنعتی مدرن و همچنین بخش های عمومی، تجاری و آموزشی تمرکز می کنند. نویسندگان، دانشگاهیان، دانشمندان، محققان و دانشمندان برجسته در زمینه های مربوطه از سراسر جهان هستند.
This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30–31, 2022, hosted in online mode in Bandung, Indonesia. Building on the successful history of the conference series in the recent four years, this book aims to present the paramount role of connecting researchers around the world to disseminate and share new ideas in intelligent information systems, cyber-security, and networking technologies.
The 49 chapters presented in this book were carefully reviewed and selected from 115 submissions. They focus on delivering intelligent solutions through leveraging advanced information systems, networking, and security for competitive advantage and cost savings in modern industrial sectors as well as public, business, and education sectors. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
Preface Committee Conference General Chair Conference General Co-chairs Conference Chairs Technical Program Committee Chair Treasurer Chair Program (Paper/Special Session/Poster) Chair Proceedings/Book Chair Sponsorship, Event, and Logistics Chair Event Publication and Documentation Chair IT Support/Web Administrator Chair Technical Program Committee Member Event Publication and Documentation Member IT Support/Web Administrator Member International Advisory Committee Steering Committee Technical Program Committee Keynote Speakers Difficult Data Analysis E-CARGO and Role-Based Collaboration E-CARGO and Role-Based Collaboration Feature Object Extraction – Fusing Evidence, Not Rolling the Die AIoT: Cloud or Edge, Big or Small Data, Public or Private Model Communication and Computing Resource Management for Internet of Things Hardware-Software Co-design Approaches for Sustainable AI Architectures, Challenges and Opportunities within 6G Emerging Technologies Contents A Bi-objective Evolutionary Algorithm to Improve the Service Quality for On-Demand Mobility 1 Introduction 2 The On-Demand Transport Problem 3 The Proposed Method 3.1 The Representation of a Solution 3.2 The Fitness Function 3.3 The Move Operator 4 Experimental Results 5 Conclusion and Prospects References A Dynamic Circular Hough Transform Based Iris Segmentation 1 Introduction 1.1 Related Work 2 Materials and Methods 2.1 Dataset 2.2 Proposed Methodology 3 Results 3.1 Comparing of the Segmentation Methods 4 Conclusion References A Game Theoretic Framework for Interpretable Student Performance Model 1 Introduction 2 Methodology 2.1 Model Creation 2.2 Model Evaluation 2.3 Model Interpretation 3 Experiments and Result Analysis 3.1 Data Description 3.2 Description of Experimental Protocol 3.3 Result Analysis 4 Conclusion References A New Telecom Churn Prediction Model Based on Multi-layer Stacking Architecture 1 Introduction 2 Description of the Problem 3 Machine Learning Using Stacknets 4 Methodology 4.1 Dataset 4.2 Data Preprocessing 4.3 Feature Engineering 4.4 Unbalanced Class in Binary Classification 4.5 Model Building 4.6 Performance Metrics 5 Results of Experiments 5.1 Used Algorithms 5.2 Performance Evaluation 5.3 Discussion 6 Conclusion References A Novel Hybrid Classification Approach for Predict Performance Student in E-learning 1 Introduction 2 Related Work 3 Proposed Method 4 Applied Algorithms 4.1 Voting 4.2 Random Forest 5 Results 5.1 Dataset 5.2 Validation 6 Discussion 7 Conclusions References A Proposed Big Data Architecture Using Data Lakes for Education Systems 1 Introduction 2 Background 2.1 Traditional Data Warehouse 2.2 Modern Data Warehouse 2.3 The Data Lake 3 Literature Review 4 Proposed System 4.1 Data Source Layer 4.2 Data Consolidation Layer 4.3 Data Warehouse Layer 4.4 Data Consumption Layer 4.5 Potential Application 5 Discussion 6 Conclusion and Future Works References A SVM Approach for Assessing Traffic Congestion State by Similarity Measures 1 Introduction 2 Traffic Congestion Identification 2.1 Jaccard Similarity Coefficient 2.2 Dice Similarity Coefficient 2.3 BF (Boundary F1) Score 3 Methodology 3.1 Data Collection 3.2 Pre-treatment 3.3 SVM Learning 3.4 Classification 3.5 Results 4 Experiments 4.1 Data Sources 4.2 Traffic Classification Based on SVM 5 Conclusion and Future Work References A Tool for the Analysis, Characterization, and Evaluation of Serious Games in Teaching 1 Introduction 2 Related Works 3 Research Method 3.1 Experimental Study 3.2 Proposed Approach 4 Evaluation 4.1 Presentation of the Analysis Tool 4.2 Evaluation Protocol 4.3 Results 5 Discussion 6 Conclusion References Analysis and Examination of the Bus Control Center (BCC) System: Burulaş Example 1 Introduction 2 Material and Method 3 Application 3.1 General Features of the Bus Control Center (BCC) System and Determination of Application Areas 3.2 Identification of Lines, Routes, Vehicles and Stops 3.3 Services Planning 3.4 Emergency Management 3.5 Violation Management 4 Discussion and Recommendations 5 Conclusion References Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System 1 Introduction 2 Literature Review 3 Methodology 3.1 AES (Advanced Encryption Standard) 3.2 RSA (Rivest Shamir Adleman) 3.3 Efficiency Criteria 4 Experimental Result 4.1 Histogram Analysis 4.2 PSNR Analyses 4.3 Entropy Analyses 4.4 Elapsed Time Analyses 5 Discussion 6 Conclusion References Aspect-Based Sentiment Analysis of Indonesian-Language Hotel Reviews Using Long Short-Term Memory with an Attention Mechanism 1 Introduction 2 Methods 2.1 Data Collection 2.2 Data Cleaning 2.3 Data Preprocessing 2.4 Word2vec Model Training 2.5 Data Splitting 2.6 Model Training 2.7 Testing 2.8 Evaluation 3 Results and Discussion 4 Conclusion References Big Data and Machine Learning in Healthcare: Concepts, Technologies, and Opportunities 1 Introduction 2 The Concept of Big Data 2.1 Big Data Definition 2.2 Characteristics of Big Data 2.3 Big Data in Healthcare 3 Big Data Analytics 3.1 Hadoop 3.2 Spark 4 The Concept of Machine Learning 4.1 Machine Learning Definition 4.2 Deep Learning 4.3 Machine Learning in Healthcare 5 The Impact of Big Data on Healthcare 6 The Impact of Machine Learning in Healthcare 7 Conclusion and Future Work References Classification of Credit Applicants Using SVM Variants Coupled with Filter-Based Feature Selection 1 Introduction 2 Related Works 3 Background 3.1 SVM Variants 3.2 Filter-Based Feature Selection 4 Experimental Design 5 Results and Discussions 6 Conclusion References Classification of Hate Speech Language Detection on Social Media: Preliminary Study for Improvement 1 Introduction 2 Related Work 3 Method 3.1 Building a Dataset 3.2 Hate Speech and Abusive Language Detection 4 Experiments and Results 4.1 Experiment Results 4.2 Discussion and Limitation 5 Conclusion and Future Work References CoAP and MQTT: Characteristics and Security 1 Introduction 2 Background 3 CoAP Security 3.1 DTLS Based Communications 3.2 Related Works 4 MQTT Security 4.1 TLS Based Communications 4.2 Related Works 5 Conclusion References Combining Static and Contextual Features: The Case of English Tweets 1 Introduction 2 The Proposed Model 3 Experiments 3.1 Data Preprocessing 3.2 Experimental Settings 4 Conclusion References Comparative Study on the Density and Velocity of AODV and DSDV Protocols Using OMNET++ 1 Introduction 2 Related Works 3 Methods and Techniques 3.1 Routing Protocols Overview 3.2 Simulation Environment 3.3 Performance Metrics 3.4 Simulation Scenario 4 Results and Discussions 4.1 Node Density Versus AODV and DSDV 4.2 Pause Time Versus AODV and DSDV 4.3 Comparison Between OMNET++ and NS2 for AODV 4.4 Comparison Between OMNET++ and NS2 for DSDV 5 Conclusion and Future Work References Cybersecurity Awareness Through Serious Games: A Systematic Literature Review 1 Introduction 2 Methodology 2.1 Systematic Literature Review 2.2 Research Question 2.3 Search Strategy 3 Results and Discussion 4 Conclusion References Design and Implementation of a Serious Game Based on Recommender Systems for the Learning Assessment Process at Primary Education Level 1 Introduction 2 Background 2.1 Learning Assessment 2.2 Serious Game 2.3 Recommendation Systems 3 Proposed Approach 3.1 Learning Assessment 3.2 Recommendation Process 4 Results and Discussion 5 Conclusion References DLDB-Service: An Extensible Data Lake System 1 Introduction 2 Related Works 2.1 Data Lake Concept 2.2 Metadata Management 3 DLDB-Service Architecture 3.1 Data Ingestion 3.2 Data Storage 3.3 Data Analysis 3.4 Data Exploration 4 Technical Demonstration 5 Discussion 6 Conclusion References Effect of Entropy Reshaping of the IP Identification Covert Channel on Detection 1 Introduction 2 The Proposed REIPIC Method 2.1 Parameters and Notations 2.2 Frequencies of Occurrence Matrix 2.3 REIPIC Algorithm 2.4 Frequencies of Occurrence Treatment (FOT) 3 Experiment and Settings 4 Results and Discussion 4.1 REIPIC Effect on Entropy Reshaping 4.2 REIPIC Effect on the IP ID CC Detection 5 Conclusion and Future Work References Explainable Machine Learning Model for Performance Prediction MAC Layer in WSNs 1 Introduction 2 Methodology 2.1 Prepossessing 2.2 Models Development 2.3 Interpretation of ML Models Using SHAP Values 2.4 Interpretation of ML Models Using SHAP Values 3 Experiments and Results Analysis 3.1 WSN Dataset 3.2 Results 3.3 Results of Model Prediction Interpretation 4 Conclusion References Hadoop-Based Big Data Distributions: A Comparative Study 1 Introduction 2 Hadoop Distributions 2.1 Stand-Alone Hadoop Distributions 2.2 Hybrid Hadoop Distributions 2.3 Cloud-Based Hadoop Distributions 3 A Comparison of Hadoop Distributions 3.1 Comparing Factors 3.2 Comparing Hadoop Distributions 3.3 Advantages and Disadvantages of Hadoop Distributions 3.4 Discussion 4 Conclusion References HDFS Improvement Using Shortest Path Algorithms 1 Introduction 2 HADOOP Platform 2.1 HDFS – Reliable Storage 2.2 DIJKSTRA’s Algorithm Presentation 2.3 DIJKSTRA’s Algorithm Examples 2.4 SubAlgorithm Dijkstra(Dijkstratype) 3 Article Sections 4 Proposed Work 4.1 Little Reminder 4.2 The Proposed Approach for Small File Management 5 Experimental 5.1 Experimental Environment (RatioTable) 5.2 Phases Algorithms 5.3 Results 5.4 Conclusion and Future Works References Improved Hourly Prediction of BIPV Photovoltaic Power Building Using Artificial Learning Machine: A Case Study 1 Introduction 2 Materials and Methods 2.1 Proposed BIPV Study of Case 2.2 Description of Machine Learning Models 3 Empirical Evaluations 3.1 Datasets 3.2 Error Metrics 3.3 Results and Interpretation 4 Conclusion References Improving Speaker-Dependency/Independency of Wavelet-Based Speech Emotion Recognition 1 Introduction 2 Speech Emotion Recognition Literature 3 Multilevel Wavelet Transform 3.1 1-D Discrete Wavelet Transform (DWT) 3.2 1-D Stationary Wavelet Transform (SWT) 4 Methods 4.1 Feature Extraction and Selection 4.2 Classification 5 Experimental Setups and Results 5.1 Speaker-Dependent (SD) 5.2 Speaker-Independent (SI) 5.3 Comparison with SER Studies 6 Conclusion and Future Work References Improving the Quality of Service Within Multi-objective Customer-Oriented Dial-A-Ride Problems 1 Introduction 1.1 Presentation of DARP 1.2 The Customer Oriented Design of the Quality of Service in DARPs 1.3 Contributions 2 Literature Review 2.1 The Quality of Service in DARPs 2.2 Customized Service Quality in Multi-objective DARPs 3 The Multi-objective Customer Oriented DARP 3.1 Description of the Problem 3.2 Mathematical Formulation of the Problem 4 Preliminary Tests 5 Discussion and Conclusion References Interpretability Based Approach to Detect Fake Profiles in Instagram 1 Introduction 2 Methodology 2.1 Dataset and Features 2.2 Data Preprocessing 2.3 Over-simpling 2.4 Models Construction 2.5 Interpretation of Machine Learning Models 3 Results and Analysis 4 Conclusion References Learning Styles Prediction Using Social Network Analysis and Data Mining Algorithms 1 Introduction 2 Learning Styles 3 The Relationship Between Learning Styles and Social Networks 4 Proposed Method 5 Conclusion References Managing Spatial Big Data on the Data LakeHouse 1 Introduction 2 Background and Related Works 3 Data LakeHouse 4 Spatial Big Data on the LakeHouse 5 Experimental Study 5.1 The Spatial Lakehouse Architecture 5.2 Storage and Query Optimization 5.3 Input Datasets 5.4 Setup and Hardware 5.5 Analysis and Results 6 Conclusion References Medication Decision for Cardiovascular Disease Through Fermatean Fuzzy Bipolar Soft Set 1 Introduction 2 Literature Review 3 Fermatean Fuzzy Sets with Soft Sets 4 Medication Decision (Selection of the CVD Therapies) 5 Conclusion References Microservices: Investigating Underpinnings 1 Introduction 2 Fundamental Concepts of MSA 2.1 Internal Structure of Microservices 2.2 MSA Design Patterns in DevOps 3 Different Aspects of Microservices Architecture 3.1 Core Principles for MSA 3.2 Service Management Activities 4 Discussion 4.1 Motivations Behind the Migration to MSA 4.2 Open Research Challenges in MSA 5 Conclusion References Network Slicing User Association Under Optimal Input Covariance Matrix in Virtual Network MVNO 1 Introduction 2 Related Work 3 System Model 4 Ergodic Capacity of MIMO 4.1 Without Channel State Information (CSI) 4.2 With Channel State Information (CSI) 5 Proposed Slice Selection Method: Softmax 6 Numerical Investigation 7 Conclusion and Future Work References Pedagogical Classification Model Based on Machine Learning 1 Introduction 2 Related Work 3 Methodologies 3.1 Theoretical Foundation of Our Proposed Approach 3.2 Approach 4 Experimental Study 4.1 Evaluation Metrics 4.2 Datasets Analysis and Exploration 4.3 Environment Setup and Implementation 4.4 Results and Analysis 5 Conclusion References Performance Evaluation of NS2 and NS3 Simulators Using Routing Protocols in Mobile Ad Hoc Networks 1 Introduction 2 Related Works 3 Methods and Technics 4 Results and Discussions 5 Conclusion and Future Work References Gamification in Software Development: Systematic Literature Review 1 Introduction 2 Relevant Theory 2.1 Gamification 2.2 Software Development 3 Methodology 4 Results and Discussion 4.1 Publication 4.2 RQ1 What Gamification Elements Have Been Used 4.3 RQ2 What Gamification Framework Has Been Used 5 Conclusion References Robust Method for Estimating the Fundamental Matrix by a Hybrid Optimization Algorithm 1 Introduction 2 Fundamental Matrix 3 Estimation of the Fundamental Matrix by an AG-LM Algorithm 4 Experiments 5 Conclusion References SDN Southbound Protocols: A Comparative Study 1 Introduction 2 SDN Background 2.1 SDN Architecture 2.2 SDN Interfaces 3 Overview of SDN Southbound Protocols 3.1 OpenFlow 3.2 ForCES 3.3 P4 4 Discussion 5 Conclusion References Simulating and Modeling the Vaccination of Covid-19 Pandemic Using SIR Model - SVIRD 1 Introduction 2 Overview 3 Method and Model Description 3.1 SIR Model 3.2 SVIRD Extention of SIR Model 4 Sample and Analysis 4.1 Low Vaccinated Population 4.2 High Vaccinated Population 5 Simulator Description 5.1 Simulation Parameter 5.2 Simulation Process 6 Conclusion References The New Generation of Contact Tracing Solution: The Case of Morocco 1 Introduction 2 State of the Art 3 Method 3.1 System Architecture 3.2 The Proposed Algorithms 3.3 Assessment of Concerns for General Contact Tracing Applications 3.4 Privacy Policy and Data Confidentiality 3.5 Results 4 Discussion of Results 5 Conclusion References The Prediction Stock Market Price Using LSTM 1 Introduction 2 Related Works 3 Methodology 3.1 Raw Data 3.2 Data Processing 3.3 Model 3.4 Training 3.5 Compared Methods 3.6 Performance Evaluation 4 Results 4.1 Simulation Tools 4.2 Experimental Results 5 Discussion 6 Conclusion and Future Work References Hybrid Movie Recommender System Based on Word Embeddings 1 Introduction 2 Related Work 2.1 Recommendation Based on Content Filtering 2.2 Recommendation Based on Collaborative Filtering 3 Proposed Approach 3.1 Hybrid Recommendation 3.2 Word2vec 3.3 K Nearest Neighbor 3.4 The Overall Approach 4 Experiments 5 Conclusion References Towards Big Data-based Sustainable Business Models and Sustainable Supply Chain 1 Context and Motivations 2 Overview 2.1 Sustainability and Supply Chain 2.2 Business Models Vs Sustainable Business Models 2.3 Sustainable Business Models and Sustainable Supply Chain 3 Big Data-driven Sustainable Business Models 4 Conclusion and Future Work Directions References Treatment of Categorical Variables with Missing Values Using PLS Regression 1 Introduction and Literature Review 2 PLS1 for Categorical Predictors with Missing Values 3 Comparative Case Study 3.1 Data Description 3.2 Matrix Quantification 3.3 PLS1-NIPLAS Application 4 Conclusion References Type 2 Fuzzy PID for Robot Manipulator 1 Introduction 2 System Modeling of Two-Link Robot Manipulator 3 Proposed Controller Design 4 Simulations Results 5 Conclusion References Using Latent Class Analysis (LCA) to Identify Behavior of Moroccan Citizens Towards Electric Vehicles 1 Introduction 2 Proposed Method: Latent Class Analysis 3 Description of Data 4 Experimental Results 4.1 Multiple Correspondence Analysis Application 4.2 Interpretation of MCA Results 4.3 LCA Method Application 4.4 Analysis and Discussion 5 Conclusion References Using Learning Analytics Techniques to Calculate Learner’s Interaction Indicators from Their Activity Traces Data 1 Introduction 2 Research Background 3 LA Techniques and Their Application in E-Learning Systems 4 LA Techniques to Get Interaction Indicators in E-Learning Environments 4.1 Learner Interaction Indicators 4.2 Classification of Interaction Indicators 5 Synthesis and Discussion 6 Conclusion and Future Work References Web-Based Dyscalculia Screening with Unsupervised Clustering: Moroccan Fourth Grade Students 1 Introduction 2 Related Works 3 Non-verbal Intelligence and Mathematical Performances 4 Materials and Methods 4.1 Participants 4.2 Measures 4.3 Screening Model 5 Results and Discussion 5.1 Dendrogram 5.2 Silhouette Score 5.3 Dataset Clustering 6 Conclusion References Author Index