دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2022 نویسندگان: Mohamed Ben Ahmed (editor), Horia-Nicolai L. Teodorescu (editor), Tomader Mazri (editor), Parthasarathy Subashini (editor), Anouar Abdelhakim Boudhir (editor) سری: ISBN (شابک) : 9811636362, 9789811636363 ناشر: Springer سال نشر: 2021 تعداد صفحات: 885 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 25 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Networking, Intelligent Systems and Security: Proceedings of NISS 2021 (Smart Innovation, Systems and Technologies, 237) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه، سیستمهای هوشمند و امنیت: مجموعه مقالات NISS 2021 (نوآوری هوشمند، سیستمها و فناوریها، 237) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Committee Preface Contents About the Editors Artificial Intelligence for Sustainability Detection of Human Activities in Wildlands to Prevent the Occurrence of Wildfires Using Deep Learning and Remote Sensing 1 Introduction 1.1 Wildfire and Machine Learning 1.2 Deep Learning and Remote Sensing 1.3 Problem 2 Related Work 3 Proposed Solution and Methods 3.1 Architecture and Implementation of the Design 3.2 Conventional Neural Network Model 3.3 Transfer Learning 3.4 Datasets 3.5 Results 3.6 Discussions 4 Conclusion References The Evolution of the Traffic Congestion Prediction and AI Application 1 Introduction 2 Method 3 Data-Driven Approach 3.1 Real-Time Data Sources 3.2 Gravity Model 4 Model-Driven Approach 4.1 VISTA (Visual Interactive System for Transport Algorithms) 4.2 Dynamic Network Assignment for Management of Information to Travelers (DynaMIT) 5 AI Application 6 Discussion 7 Related Works 8 Proof of Concept 9 Proposed Architecture 10 Conclusion and Future Research References Tomato Plant Disease Detection and Classification Using Convolutional Neural Network Architectures Technologies 1 Introduction 2 Related Work 3 CNN Architecture 3.1 DenseNet169 3.2 InceptionV3 4 Deployment Strategy for the Deep Learning Architecture 4.1 Data-Collection 4.2 Transfert Learning 4.3 Data Augmentation 4.4 Fine-Tuning 5 Hardware and Software Tool 6 Result and Discussion 7 Conclusion and Perspectives Research References Generative and Autoencoder Models for Large-Scale Mutivariate Unsupervised Anomaly Detection 1 Introduction 2 Background and Context: Anomaly Detection 3 Anomaly Detection Techniques 3.1 Unsupervised Machine Learning for Anomaly Detection 3.2 Unsupervised Deep Learning for Anomaly Detection 4 Datasets Description and Performance Evaluation 4.1 Datasets 4.2 Results and Discussion 5 Conclusion References Automatic Spatio-Temporal Deep Learning-Based Approach for Cardiac Cine MRI Segmentation 1 Introduction 2 Materials and Methods 2.1 Dataset Presentation 2.2 Data Preprocessing 2.3 Data Augmentation 2.4 2D Convolutional LSTM Layer 2.5 Unet-Based Segmentation Network 3 Experiments and Model Training 3.1 Segmentation Evaluation Metrics 3.2 Loss Functions 3.3 Total Loss 3.4 Training Hyperparameters Tuning 4 Results and Discussions 4.1 Validation Results 4.2 Test Results 5 Conclusion References Skin Detection Based on Convolutional Neural Network 1 Introduction 2 Related Work 3 Proposed Method 3.1 The Used CNN Architecture 3.2 Training Stage 3.3 Segmentation Stage 4 Results and Discussion 4.1 Dataset and Training 4.2 Experiments and Discussion 5 Conclusion References CRAN: An Hybrid CNN-RNN Attention-Based Model for Arabic Machine Translation 1 Introduction 2 CRAN Arabic MT Model 2.1 Input Layer 2.2 Conventional CNN 2.3 BiGRU Layer 2.4 Attention Layer 2.5 The Output Layer 2.6 Training and Inference 3 Results and Evaluation 3.1 Hyperparameters Choices 3.2 The Impact of Different RNN Variants on Arabic MT 3.3 Comparison with RCAN Model 3.4 Comparison with Previous Related Works and Qualitative Evaluation 4 Conclusion References Impact of the CNN Patch Size in the Writer Identification 1 Introduction 2 Related Work 3 Proposed Approach 3.1 Preprocessing 3.2 Extraction of Patches 3.3 CNN Training 3.4 Database 4 Experiments and Results 4.1 Training Patches 4.2 Test Patches 5 Conclusion References Network and Cloud Technologies Optimization of a Multi-criteria Cognitive Radio User Through Autonomous Learning 1 Introduction 2 Related Work 2.1 Bayesian Nonparametric Approaches for CR Optimization 2.2 Reinforcement Learning-Based Approaches for CR Optimization 2.3 SVM-Based Approaches for CR Optimization 2.4 ANN-Based Approaches for CR Optimization 2.5 Game Theoretic Approaches for CR Optimization 3 TOPSIS Method 3.1 Ideal and Anti-ideal Solution 3.2 Decision Matrix 3.3 The Six Steps of the TOPSIS Algorithm 4 Proposed Approach 4.1 Flowchart and Objective Functions of the TOPSIS Algorithm 5 JADE Simulation 5.1 Presentation of the Proposed Approach 5.2 Negotiation Between Secondary and Primary Users 6 Results and Discussion 7 Conclusion References MmRPL: QoS Aware Routing for Internet of Multimedia Things 1 Introduction 2 RPL Overview 3 Related Work 4 Problem Statement 4.1 Case Study 5 The Proposed Solution 6 Performance Evaluation and Discussion 6.1 Performance Metrics 6.2 Results Discussion 6.3 Comparative Results 7 Conclusion and Future Work References Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot Contamination 1 Introduction 1.1 Related Works 1.2 Contributions 1.3 Work Scheduling 2 System Model 3 Channel Estimation 3.1 LS Channel Estimation 3.2 MMSE Channel Estimation 3.3 Approximate MMSE Channel Estimator 3.4 EW-MMSE Estimator 4 Simulation Results 5 Conslusion References On Channel Estimation of Uplink TDD Massive MIMO Systems Through Different Pilot Structures 1 Introduction 1.1 Related Works 1.2 Organization of This Work 1.3 Contributions of This work 2 System Model 3 Least Square Channel Estimation 3.1 Regular Pilot 3.2 Superimposed Pilots 3.3 Staggered Pilots 4 MMSE Channel Estimation 4.1 Regular Pilot 4.2 Superimposed Pilots 4.3 Staggered Pilots 5 Simulation Results 6 Conclusion References NarrowBand-IoT and eMTC Towards Massive MTC: Performance Evaluation and Comparison for 5G mMTC 1 Introduction 2 Related Works 3 Overview of Cellular IoT Technologies: NB-IoT and eMTC 3.1 Narrowband IoT: NB-IoT 3.2 Enhanced Machine-Type Communication: eMTC 4 NB-IoT and eMTC Performance Evaluation 4.1 Coverage 4.2 Throughput 4.3 Latency 4.4 Battery Life 4.5 Connection Density 5 Comparative Analysis of the Performance of NB-IoT and eMTC Technologies 6 Conclusion References Integrating Business Intelligence with Cloud Computing: State of the Art and Fundamental Concepts 1 Introduction 2 Overview of Fundamental Concepts 2.1 Cloud Computing 2.2 Characteristics’ and Deployment Model 3 Business Intelligence 3.1 Data Warehouse 3.2 ETL 3.3 Multidimensional Analysis 3.4 Restitutions 3.5 BI Architecture 4 Integrating Business Intelligence into Cloud Computing 4.1 Cloud BI 4.2 Migration of BI to the Cloud 4.3 Comparison Between Private and Public Cloud BI 5 Inspected Scenarios 5.1 Scenario 1: OLAP Cloud BI Framework Based on OPNET Model 5.2 Scenario 2: Model of Cloud BI Framework by Using Multi-cloud Providers 6 Comparison of the Scenarios 7 Conclusion and Perspective References Distributed Architecture for Interoperable Signaling Interlocking 1 Introduction 2 Railway Signaling System: Existing 2.1 Railways Control System 2.2 Computer Interlocking Architectures 3 Interoperability of Computer Interlocking 3.1 The European Initiatives for Railway Signaling Interoperability 3.2 Software Architecture Proposition for Interoperability 4 Distributed Architecture for Interoperable Signaling Interlocking 4.1 Quantitative Calculation Comparison 4.2 Flow Exchange Variables 5 Analysis and Discussion of Results 6 Conclusion and Perspectives References A New Design of an Ant Colony Optimization (ACO) Algorithm for Optimization of Ad Hoc Network 1 Introduction 2 Presentation of the Algorithm ACO 3 Proposed Approach: New Design of ACO in AD HOC (GlobalACO) 4 Proposed Simulations and Results 4.1 Solve the Sensor Network Big Map Using GlobalACO 5 Conclusion References Real-Time Distributed Pipeline Architecture for Pedestrians’ Trajectories 1 Introduction 2 Architecture 2.1 Traccar GPS Tracker 2.2 Kafka 2.3 Spring Boot 2.4 Neo4j Instantiation 2.5 React Js 3 Architecture Components Implementation 3.1 Processing Real-Time Data Operation 3.2 Neo4J Instance 3.3 Testing 4 Results 5 Conclusion and Future Work References Reconfiguration of the Radial Distribution for Multiple DGs by Using an Improved PSO 1 Introduction 2 Related Works 3 Suggested Algorithm 3.1 Problematic 3.2 Network with DGs 3.3 PSO Algorithm 4 Test and Results 4.1 Chaotic Inertia Weight Results 4.2 Combination Method Results 5 Conclusion Appendix References On the Performance of 5G Narrow-Band Internet of Things for Industrial Applications 1 Introduction 2 5G Use Cases 3 Industrial Internet of Things (IIoT) 4 5G NR Radio Interface 5 Performance of 5G Narrow-Band Internet of Things for Industrial Applications 6 Conclusion References A Novel Design of Frequency Reconfigurable Antenna for 5G Mobile Phones 1 Introduction 2 Design of the Proposed Antenna 3 Results and Discussion 4 Validation of the Results 5 Proposed Millimeter Wave Antenna Array for 5G 6 Conclusion References Smart Security A Real-Time Smart Agent for Network Traffic Profiling and Intrusion Detection Based on Combined Machine Learning Algorithms 1 Introduction 2 Related Works 3 A Real-Time Security Agent Based on Machine Learning and Honeypot Technologies 3.1 Profiles Creation (Phase 1) 3.2 Attacks Detection (Phase 2) 4 Conclusion References Privacy Threat Modeling in Personalized Search Systems 1 Introduction 2 Privacy in Personalized Search 2.1 Personalized Search Systems 2.2 Privacy Threats 2.3 Privacy Threat Model 3 Privacy Protection Solutions 3.1 Privacy Laws and Regulations 3.2 Privacy-Enhancing Technologies 4 Cryptographic Solutions 4.1 Secure k-NN Algorithm 4.2 Attribute-Based Encryption 4.3 Homomorphic Encryption (HE) 5 Conclusion and Perspectives References Enhanced Intrusion Detection System Based on AutoEncoder Network and Support Vector Machine 1 Introduction 2 Theoretical Background 2.1 Intrusion Detection System 2.2 Vehicular Ad Hoc Network VANET 2.3 Deep Learning 3 Literature Survey 4 Enhanced IDS Based on AE and SVM 4.1 The Proposed Architecture 4.2 Performance Metrics and Results 4.3 Security Analysis 5 Conclusion References Comparative Study of Keccak and Blake2 Hash Functions 1 Introduction 2 Hash Functions Algorithms 2.1 Keccak 2.2 Blake2 3 Performance 4 Conclusion References Cryptography Over the Twisted Hessian Curve H3a,d 1 Introduction 2 Arithmetic Over the Ring mathbbFq[ε], ε3=0 3 Twisted Hessian Curves Over the Ring R3 3.1 Classification of Elements of H3a,d 3.2 The Group Law Over H3a,d 3.3 The tildeπ Homomorphism and Results 4 Cryptographic Applications 4.1 Coding of Elements of E 4.2 Exchange of Secret Key 4.3 Twisted Hessian Curve Key Generation Block Diagram 4.4 Twisted Hessian Curve Encryption Process Block Diagram 4.5 Twisted Hessian Curve Decryption Process Block Diagram 5 Conclusion References Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF 1 Introduction 2 Literature Review 2.1 Methods for Designing Cybersecurity Countermeasures 2.2 Mechanisms and Cases of Infection 3 Method 3.1 Fundamentals 3.2 Cybersecurity Controls 3.3 P1: Answering the Questionnaire 3.4 P2: Perform Diagnosis 3.5 P3: Define Recommendations 3.6 P4: Implement Countermeasures 3.7 P5: Evaluate Countermeasures 4 Validation 4.1 Case Study 4.2 Method Application 4.3 Results 5 Conclusions References Comparative Study Between Network Layer Attacks in Mobile Ad Hoc Networks 1 Introduction 2 Background 2.1 Link-Spoofing Attack in MANETs 2.2 Replay Attack in MANETs 2.3 HELLO Flooding Attack in MANETs 2.4 RREQ Flooding Attack in MANETs 2.5 DATA Flooding Attack in MANETs 2.6 Related Works 3 Experimental Environment Set Up 4 Performance Metrics 4.1 Packet Delivery Rate 4.2 Normalized Routing Load 5 Comparison Between Types of Flooding Attack 5.1 Packet Delivery Rate 5.2 Normalized Routing Load 6 Comparison Between Link-Spoofing, DATA Flooding and Replay Attacks 6.1 Packet Delivery Rate 6.2 Normalized Routing Load 7 Conclusion References Security of Deep Learning Models in 5G Networks: Proposition of Security Assessment Process 1 Introduction 2 Overview of 5G Architecture 2.1 Enhanced Mobile BroadBand (eMBB) 2.2 Massive Machine Type Communication (mMTC) 2.3 Ultra-Reliable Low Latency Communication (URLLC) 3 Deep Learning Models Applications in 5G 3.1 Deep Learning model's Capabilities of Forecasting in 5G 3.2 Deep Learning Model's Capabilities of Optimization and Adaptability in 5G 3.3 Deep Learning model's Capabilities of Event Detection in 5G 4 Vulnerabilities in Deep Learning Models Employed in 5G Networks 5 Proposition of Security Assessment Process for Deep Learning Models 6 Conclusion References Effects of Jamming Attack on the Internet of Things 1 Introduction 2 MAC Protocols for WSN 2.1 MAC Protocols 2.2 S-MAC Protocol 3 Attacks on IoT 3.1 Attacks Perception Layer 3.2 Attacks Network Layer 3.3 Attacks Application Layer 4 Jamming Attack Implementation on S-MAC Protocol 4.1 Proposed System 4.2 Simulation Experiment 4.3 Analysis of the Results 5 Conclusion References H-RCBAC: Hadoop Access Control Based on Roles and Content 1 Introduction 2 Hadoop 2.1 HDFS: Hadoop Distributed File System 2.2 MapReduce 3 Access Control Models on Big Data 3.1 Access Control Lists (ACLs) 3.2 Role-Based Access Control (RBAC) 3.3 Content-Based Access Control (CBAC) 3.4 Attribute-Based Access Control (ABAC) 4 Security Projects on Big Data 4.1 Basic Hadoop Security 4.2 Apache Sentry 4.3 Apache Ranger 4.4 Rhino Project 5 H-RCBAC: Hadoop Access Control Based on Roles and Content 5.1 H-RCBAC Implementation 6 Conclusion and Perspectives References Toward a Safe Pedestrian Walkability: A Real-Time Reactive Microservice Oriented Ecosystem 1 Introduction 2 Related Works 3 System Model 4 Modeling Pedestrian Risk 4.1 Urban Road Networks 4.2 Pedestrians Risk 4.3 Safest Route Determination 5 Conclusion References Image-Based Malware Classification Using Multi-layer Perceptron 1 Introduction 2 Related Works 3 Multi-layer Perceptron 4 Data Processing 5 Experimentation 6 Results and Discussion 7 Conclusion and Perspective References Preserving Privacy in a Smart Healthcare System Based on IoT 1 Introduction 2 Access Control 2.1 Dictionary Access Control (DAC) 2.2 Mandatory Access Control (DAC) 2.3 Identity-Based Access Control (IBAC) 2.4 Role-Based Access Control (RBAC) 2.5 Attribute-Based Access Control (ABAC) 3 Comparative Analysis of Access Control on Distributed Smart Environment 4 Our Proposed AABAC Model Based on IoT 5 Design and Implementation of the AABAC Model in a Distributed Healthcare Environment Based on IoT 6 Conclusion References Smart Digital Learning Extracting Learner's Model Variables for Dynamic Grouping System 1 Introduction 2 Variables Used to Describe Learner's Model 3 Data Analysis 3.1 Frequent Patterns Mining 3.2 Analysis and Results 4 Discussion and Proposed Model 5 Conclusion References E-learning and the New Pedagogical Practices of Moroccan Teachers 1 Introduction 2 Methodology 3 Theoretical Framework 4 Presentation of the Collab [18] 5 Results of the Experiment 6 Commentary 7 Conclusion References A Sentiment Analysis Based Approach to Fight MOOCs’ Drop Out 1 Introduction 2 Preliminaries 2.1 Massive Open Online Course (MOOC) 2.2 Quality Approach 3 Materials and Methods 3.1 Naïve Bayesienne Algorithm 3.2 K Medoids Algorithm 3.3 Pareto 4 Problematic Statement 5 Literature Review 6 MOOC Analysis Model 6.1 Data Collection Approach 6.2 Classification System 6.3 Clustering 6.4 Causes Analysis 7 Proposed Quality Approach 7.1 Prototype 7.2 Model Description 8 Conclusion References The Personalization of Learners’ Educational Paths E-learning 1 Introduction 2 Related Work 3 Materials and Methods 3.1 Research Framework and Context 3.2 The Traces 3.3 Semantic Web 3.4 Web Ontology Language (OWL) 3.5 Resource Description Framework (RDF) 3.6 RDFS Language (RDF Scheme) 3.7 SPARQL Protocol and RDF Query Language (SPARQL) 4 Result 5 Conclusion References Formulating Quizzes Questions Using Artificial Intelligent Techniques 1 Introduction 2 Quizzes Questions Vocabulary Types and Standards for Their Construction 2.1 Response Production Questions 2.2 Response Selection Questions [3] 3 The Required Background to Complete and Develop This Field 4 Some of the Ingredients that Will Help Us Verify the Credibility and Stability of the Question 4.1 Cognitive Level 4.2 Difficulties 4.3 Discrimination 5 Uses of Artificial Intelligence in the Industry of Questions 5.1 Methods for Formulating and Making Questions 6 Results 7 Conclusion References Smart Campus Ibn Tofail Approaches and Implementation 1 Introduction 2 Smart Campus Architecture 3 Related Work 4 Proposed Method 4.1 Academic Function 4.2 Infrastructure Function 4.3 Residential Function 4.4 Business and Leisure 5 Use Case for Smart Campus 5.1 Smart Home 5.2 Smart Parking 5.3 Smart Education 5.4 System Monitoring 6 Conclusions References Boosting Students Motivation Through Gamified Hybrid Learning Environments Bleurabbit Case Study 1 Introduction 2 Related Works 3 Gamification Working Definition 4 Gamification Design Frameworks (Two Models Approach) 4.1 M.D.A 4.2 Player-Based Gamification Hexad Model 5 Bluerabbit 5.1 Narrative Elements 5.2 Feedback and Rewards 6 Methdological Approach 7 Case Study Design 7.1 Sampling 7.2 The Onboarding Process 7.3 Sidequest 7.4 Deadlines 7.5 Reward and Rating Mechanism 8 Results and Discussion 8.1 Results 8.2 Discussion 9 Conclusion and Perspectives References An Analysis of ResNet50 Model and RMSprop Optimizer for Education Platform Using an Intelligent Chatbot System 1 Introduction 2 Related Works 3 System Architecture 4 Proposed Architecture 4.1 Image-Response Model 4.2 Question-Response Model 5 Implementation 5.1 Dataset 5.2 Hardware 5.3 Languages and Libraries Used 5.4 Pre-processing 5.5 Evaluation Metrics 6 Results and Comparative Study 7 Conclusion References Smart Information Systems BPMN to UML Class Diagram Using QVT 1 Introduction 2 Related Works 3 Background Knowledge 3.1 The Business Processes Models: BPMN 3.2 The Model-Driven Architecture MDA 3.3 The Query View Transformation: QVT 4 Our Proposal Approach 4.1 BPMN to Class Diagram Transformation QVT Rules 4.2 Case Study: BPMN Diagram by Eclipse 4.3 Extracted Code by QVT Language Used by Eclipse 4.4 The Result of the Transformation 5 Conclusion and Perspectives References Endorsing Energy Efficiency Through Accurate Appliance-Level Power Monitoring, Automation and Data Visualization 1 Introduction 1.1 Our Contributions 1.2 Paper Organization 2 Related Work 3 Overview of the (EM)3 Framework 4 Proposed Platform 4.1 Home-Assistant Platform 4.2 Sensing Components 5 Overview of Home-Assistant 5.1 Connected Nodes 5.2 Data Visualization Options 6 (EM)3 Smart Plug 7 Results and Discussion 7.1 Test-Bed Overview 7.2 Comparative Analysis Between Smart Plugs 7.3 Discussion 8 Conclusion References Towards a Smart City Approach: A Comparative Study 1 Introduction 2 Literature Review 3 Methodology 4 Problem of Statement 5 Results 5.1 Smart City Objectives 5.2 Smart City Challenges 5.3 Smart City Main Components 5.4 Smart City Stakeholders 5.5 Smart City Resources 6 Conclusion References Hyperspectral Data Preprocessing of the Northwestern Algeria Region 1 Introduction 2 Study Area and Data Used 3 Methodology 3.1 Bad Bands Removal 3.2 Radiometric Calibration and Atmospheric Correction 3.3 Destriping of Band 3.4 Minimum Noise Fraction (MNF) Transform 4 Results and Discussion 5 Comparison of Efficient Techniques of Atmospheric Corrections on Hyperspectral Data for Mineralogy Studies 5.1 Methodology 5.2 Results and Discussion 6 Conclusion References Smart Agriculture Solution Based on IoT and TVWS for Arid Regions of the Central African Republic 1 Introduction 2 State of the Art 2.1 Impact of Desertification on Agriculture in the Central African Republic 2.2 Climate-Smart Agriculture 2.3 The Internet of Things in Agriculture 2.4 The TVWS in Agriculture 3 Materials and Methodology 3.1 Architecture of Our Solution 3.2 How the Solution Works 4 Results and Discussions 4.1 Irrigation System Test Without Wi-Fi Connection 4.2 Remote Control of the Irrigation System by Simulating the Connection to the TVWS Network 5 Conclusion References Model-Driven Engineering: From SQL Relational Database to Column—Oriented Database in Big Data Context 1 Introduction 2 Related Works 3 Model Driven Architecture (MDA) Approach 3.1 The Transformations of MDA Model 3.2 The Elaborationist Approach 4 Column-Oriented NoSQL Database 5 Source and Target Meta-Models 5.1 UML Source Meta-Model 5.2 Column-Oriented Target Meta-Model 6 The Process of Transforming UML Source Model to Column—Oriented Target Code 6.1 The Transformation Rules M2M 6.2 The Transformation Rules M2M 6.3 Result 7 Conclusion and Perspectives References Data Lake Management Based on DLDS Approach 1 Introduction 2 Related Work 3 Challenges of Data Catalog in Data Lake 4 What to Consider When Designing a Data Lake 5 Data Lake Architecture 5.1 Formalization of Our Approach 5.2 Proposed Architecture 6 Technical Details 7 Results and Discussion 8 Conclusion References Evaluation of Similarity Measures in Semantic Web Service Discovery 1 Introduction 2 Web Service Discovery 3 Related Works 4 Similarity Measures 4.1 The Cosine Similarity 4.2 Wu and Palmer’s Similarity Measure 4.3 Jaccard Index 5 Experimentation and Results 6 Conclusion and Perspectives References Knowledge Discovery for Sustainability Enhancement Through Design for Relevance 1 Introduction 2 Preliminaries 2.1 Knowledge Discovery in Databases (KDD) 2.2 Data Mining (DM) 3 Related Works 4 Methodology 4.1 K-means 4.2 Hierarchical 4.3 Self-Organizing Maps 5 Results and Discussion 5.1 Dataset Collection 5.2 Data-Preprocessing and Transformation 5.3 Data-Mining: Clustering 5.4 Knowledge for Sustainability Enhancement of the Design for Relevance 6 Conclusion References Location Finder Mobile Application Using Android and Google SpreadSheets 1 Introduction 2 System Architecture of Location Finder 2.1 Google Spreadsheets for Storing Information of Places 2.2 Material Design and Optimization 2.3 Android Studio Setup 3 User Interface of Location Finder 4 Evaluation and Comparison of Mobile Application Performances 5 Conclusions References Sign Language Recognition with Quaternion Moment Invariants: A Comparative Study 1 Introduction 2 Quaternion Algebra 3 Evaluated Quaternion Moment Invariants Methods 3.1 Quaternion Tchebichef Moment Invariants 3.2 Quaternion Krawtchouk Moment Invariants 3.3 Quaternion Hahn Moment Invariants 4 Experimental Results 4.1 Invariability Property 4.2 Recognition Results Under Noise-Free Conditions 4.3 Recognition Results Under Noisy Conditions 4.4 Recognition Results Under Complex Background 5 Conclusion References Virtual Spider for Real-Time Finding Things Close to Pedestrians 1 Introduction 2 System Components 2.1 Graph Database 2.2 Kafka Message Broker 2.3 Geographical Information System 3 System Design 3.1 Collected Data 3.2 Kafka Producer 3.3 Kafka Consumer 3.4 Neo4j Graph in the Database 3.5 Find Things Close to Pedestrian 4 Conclusion References Evaluating the Impact of Oversampling on Arabic L1 and L2 Readability Prediction Performances 1 Introduction 2 Related Work 3 Classification and Class Imbalance 3.1 Under-Sampling 3.2 Oversampling 4 Resources and Methodology 4.1 Data 4.2 Morphological Annotation 4.3 Methodology 5 Results and Discussions 5.1 L2 Prediction Models 5.2 L1 Prediction Models 6 Conclusions and Futures Works References An Enhanced Social Spider Colony Optimization for Global Optimization 1 Introduction 2 Enhanced Social Spider Colony Optimization 2.1 Inspiration 2.2 Mathematical Model and Optimization Algorithm 3 Experimental Results and Discussion 4 Conclusion References Data Processing on Distributed Systems Storage Challenges 1 Introduction and Background 1.1 HDFS—Reliable Storage 2 Paper Sections 3 Related Work 3.1 Reminder 3.2 Motivation 4 Existing Solutions 4.1 HAR Files 5 SequenceFiles 6 Proposed Work 6.1 Little Reminder 6.2 The Proposed Approach for Small File Management 6.3 Operational Mode Explanation 6.4 File Combining 6.5 File Mapping 6.6 Prefetching and Caching 7 Experimental 7.1 Experimental Environment 7.2 Phases Algorithms 7.3 Results 7.4 Performances Comparison 8 Conclusion and Future Works References COVID-19 Pandemic Data-Based Automatic Covid-19 Rumors Detection in Social Networks 1 Introduction 2 Related Works 3 Background 3.1 A Rumor is a Statement Whose Truth Value is Either True, False or Unverified [15] 3.2 A Rumor is Defined as Unreliable Information that is Easily Transmissible, Often Questioned [25, 26] 4 Problem Statement 5 Real-Time Computational Problem 6 Methodology 6.1 Extraction and Storage of Tweets 6.2 Classification of Tweets 6.3 Discussion 7 Conclusion References Security and Privacy Protection in the e-Health System: Remote Monitoring of COVID-19 Patients as a Use Case 1 Introduction 2 Related Works 3 Preliminaries 4 Secure Storage and Sharing of E-Health Data 4.1 An Overview of Our Proposed Schemes 4.2 Modeling of Our Blockchain 4.3 The Proposed ABE Encryption Algorithm 4.4 Secure Data Storage and Sharing Scheme 5 Security And Performance Analysis 5.1 Security Analysis 5.2 Performance Analysis 6 Conclusion References Forecasting COVID-19 Cases in Morocco: A Deep Learning Approach 1 Introduction 2 Related Works 3 Data Description 4 LSTM Model for Forecasting 5 Results and Discussion 5.1 Root-Mean-Squared Errors 5.2 Mean Absolute Percentage Error 6 Conclusion References The Impact of COVID-19 on Parkinson's Disease Patients from Social Networks 1 Introduction 2 Sentiment Analysis and Modelling Language 2.1 Sentiment Analysis and Affective Computing 2.2 Medical Conceptualization 3 Proposed Approach 3.1 Text Vectorization and Embedding 3.2 Common Sense Detection 4 Experiments and Output Results 5 Conclusion References Missing Data Analysis in the Healthcare Field: COVID-19 Case Study 1 Introduction 2 Preliminaries 2.1 Missing Data and Data Collection Mechanisms 2.2 Prediction Function 3 Problematic Statement 4 Related Works 5 COVID-19 Diagnosis Monitoring 5.1 Architecture 5.2 Missing Data Handling: Prototype 5.3 Discussion 6 Conclusion References An Analysis of the Content in Social Networks During COVID-19 Pandemic 1 Introduction 2 Related Works 3 Data Set 4 Results 5 Discussions and Conclusions References Author Index