ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Networking, Intelligent Systems and Security: Proceedings of NISS 2021 (Smart Innovation, Systems and Technologies, 237)

دانلود کتاب شبکه، سیستم‌های هوشمند و امنیت: مجموعه مقالات NISS 2021 (نوآوری هوشمند، سیستم‌ها و فناوری‌ها، 237)

Networking, Intelligent Systems and Security: Proceedings of NISS 2021 (Smart Innovation, Systems and Technologies, 237)

مشخصات کتاب

Networking, Intelligent Systems and Security: Proceedings of NISS 2021 (Smart Innovation, Systems and Technologies, 237)

ویرایش: 1st ed. 2022 
نویسندگان: , , , ,   
سری:  
ISBN (شابک) : 9811636362, 9789811636363 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 885 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 25 مگابایت 

قیمت کتاب (تومان) : 50,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 13


در صورت تبدیل فایل کتاب Networking, Intelligent Systems and Security: Proceedings of NISS 2021 (Smart Innovation, Systems and Technologies, 237) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب شبکه، سیستم‌های هوشمند و امنیت: مجموعه مقالات NISS 2021 (نوآوری هوشمند، سیستم‌ها و فناوری‌ها، 237) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Committee
Preface
Contents
About the Editors
Artificial Intelligence for Sustainability
Detection of Human Activities in Wildlands to Prevent the Occurrence of Wildfires Using Deep Learning and Remote Sensing
	1 Introduction
		1.1 Wildfire and Machine Learning
		1.2 Deep Learning and Remote Sensing
		1.3 Problem
	2 Related Work
	3 Proposed Solution and Methods
		3.1 Architecture and Implementation of the Design
		3.2 Conventional Neural Network Model
		3.3 Transfer Learning
		3.4 Datasets
		3.5 Results
		3.6 Discussions
	4 Conclusion
	References
The Evolution of the Traffic Congestion Prediction and AI Application
	1 Introduction
	2 Method
	3 Data-Driven Approach
		3.1 Real-Time Data Sources
		3.2 Gravity Model
	4 Model-Driven Approach
		4.1 VISTA (Visual Interactive System for Transport Algorithms)
		4.2 Dynamic Network Assignment for Management of Information to Travelers (DynaMIT)
	5 AI Application
	6 Discussion
	7 Related Works
	8 Proof of Concept
	9 Proposed Architecture
	10 Conclusion and Future Research
	References
Tomato Plant Disease Detection and Classification Using Convolutional Neural Network Architectures Technologies
	1 Introduction
	2 Related Work
	3 CNN Architecture
		3.1 DenseNet169
		3.2 InceptionV3
	4 Deployment Strategy for the Deep Learning Architecture
		4.1 Data-Collection
		4.2 Transfert Learning
		4.3 Data Augmentation
		4.4 Fine-Tuning
	5 Hardware and Software Tool
	6 Result and Discussion
	7 Conclusion and Perspectives Research
	References
Generative and Autoencoder Models  for Large-Scale Mutivariate Unsupervised Anomaly Detection
	1 Introduction
	2 Background and Context: Anomaly Detection
	3 Anomaly Detection Techniques
		3.1 Unsupervised Machine Learning for Anomaly Detection
		3.2 Unsupervised Deep Learning for Anomaly Detection
	4 Datasets Description and Performance Evaluation
		4.1 Datasets
		4.2 Results and Discussion
	5 Conclusion
	References
Automatic Spatio-Temporal Deep Learning-Based Approach for Cardiac Cine MRI Segmentation
	1 Introduction
	2 Materials and Methods
		2.1 Dataset Presentation
		2.2 Data Preprocessing
		2.3 Data Augmentation
		2.4 2D Convolutional LSTM Layer
		2.5 Unet-Based Segmentation Network
	3 Experiments and Model Training
		3.1 Segmentation Evaluation Metrics
		3.2 Loss Functions
		3.3 Total Loss
		3.4 Training Hyperparameters Tuning
	4 Results and Discussions
		4.1 Validation Results
		4.2 Test Results
	5 Conclusion
	References
Skin Detection Based on Convolutional Neural Network
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 The Used CNN Architecture
		3.2 Training Stage
		3.3 Segmentation Stage
	4 Results and Discussion
		4.1 Dataset and Training
		4.2 Experiments and Discussion
	5 Conclusion
	References
CRAN: An Hybrid CNN-RNN Attention-Based Model for Arabic Machine Translation
	1 Introduction
	2 CRAN Arabic MT Model
		2.1 Input Layer
		2.2 Conventional CNN
		2.3 BiGRU Layer
		2.4 Attention Layer
		2.5 The Output Layer
		2.6 Training and Inference
	3 Results and Evaluation
		3.1 Hyperparameters Choices
		3.2 The Impact of Different RNN Variants on Arabic MT
		3.3 Comparison with RCAN Model
		3.4 Comparison with Previous Related Works and Qualitative Evaluation
	4 Conclusion
	References
Impact of the CNN Patch Size in the Writer Identification
	1 Introduction
	2 Related Work
	3 Proposed Approach
		3.1 Preprocessing
		3.2 Extraction of Patches
		3.3 CNN Training
		3.4 Database
	4 Experiments and Results
		4.1 Training Patches
		4.2 Test Patches
	5 Conclusion
	References
Network and Cloud Technologies
Optimization of a Multi-criteria Cognitive Radio User Through Autonomous Learning
	1 Introduction
	2 Related Work
		2.1 Bayesian Nonparametric Approaches for CR Optimization
		2.2 Reinforcement Learning-Based Approaches for CR Optimization
		2.3 SVM-Based Approaches for CR Optimization
		2.4 ANN-Based Approaches for CR Optimization
		2.5 Game Theoretic Approaches for CR Optimization
	3 TOPSIS Method
		3.1 Ideal and Anti-ideal Solution
		3.2 Decision Matrix
		3.3 The Six Steps of the TOPSIS Algorithm
	4 Proposed Approach
		4.1 Flowchart and Objective Functions of the TOPSIS Algorithm
	5 JADE Simulation
		5.1 Presentation of the Proposed Approach
		5.2 Negotiation Between Secondary and Primary Users
	6 Results and Discussion
	7 Conclusion
	References
MmRPL: QoS Aware Routing for Internet of Multimedia Things
	1 Introduction
	2 RPL Overview
	3 Related Work
	4 Problem Statement
		4.1 Case Study
	5 The Proposed Solution
	6 Performance Evaluation and Discussion
		6.1 Performance Metrics
		6.2 Results Discussion
		6.3 Comparative Results
	7 Conclusion and Future Work
	References
Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot Contamination
	1 Introduction
		1.1 Related Works
		1.2 Contributions
		1.3 Work Scheduling
	2 System Model
	3 Channel Estimation
		3.1 LS Channel Estimation
		3.2 MMSE Channel Estimation
		3.3 Approximate MMSE Channel Estimator
		3.4 EW-MMSE Estimator
	4 Simulation Results
	5 Conslusion
	References
On Channel Estimation of Uplink TDD Massive MIMO Systems Through Different Pilot Structures
	1 Introduction
		1.1 Related Works
		1.2  Organization of This Work
		1.3 Contributions of This work
	2 System Model
	3 Least Square Channel Estimation
		3.1 Regular Pilot
		3.2 Superimposed Pilots
		3.3 Staggered Pilots
	4 MMSE Channel Estimation
		4.1 Regular Pilot
		4.2 Superimposed Pilots
		4.3 Staggered Pilots
	5 Simulation Results
	6 Conclusion
	References
NarrowBand-IoT and eMTC Towards Massive MTC: Performance Evaluation and Comparison for 5G mMTC
	1 Introduction
	2 Related Works
	3 Overview of Cellular IoT Technologies: NB-IoT and eMTC
		3.1 Narrowband IoT: NB-IoT
		3.2 Enhanced Machine-Type Communication: eMTC
	4 NB-IoT and eMTC Performance Evaluation
		4.1 Coverage
		4.2 Throughput
		4.3 Latency
		4.4 Battery Life
		4.5 Connection Density
	5 Comparative Analysis of the Performance of NB-IoT and eMTC Technologies
	6 Conclusion
	References
Integrating Business Intelligence with Cloud Computing: State of the Art and Fundamental Concepts
	1 Introduction
	2 Overview of Fundamental Concepts
		2.1 Cloud Computing
		2.2 Characteristics’ and Deployment Model
	3 Business Intelligence
		3.1 Data Warehouse
		3.2 ETL
		3.3 Multidimensional Analysis
		3.4 Restitutions
		3.5 BI Architecture
	4 Integrating Business Intelligence into Cloud Computing
		4.1 Cloud BI
		4.2 Migration of BI to the Cloud
		4.3 Comparison Between Private and Public Cloud BI
	5 Inspected Scenarios
		5.1 Scenario 1: OLAP Cloud BI Framework Based on OPNET Model
		5.2 Scenario 2: Model of Cloud BI Framework by Using Multi-cloud Providers
	6 Comparison of the Scenarios
	7 Conclusion and Perspective
	References
Distributed Architecture for Interoperable Signaling Interlocking
	1  Introduction
	2 Railway Signaling System: Existing
		2.1 Railways Control System
		2.2 Computer Interlocking Architectures
	3 Interoperability of Computer Interlocking
		3.1 The European Initiatives for Railway Signaling Interoperability
		3.2 Software Architecture Proposition for Interoperability
	4 Distributed Architecture for Interoperable Signaling Interlocking
		4.1 Quantitative Calculation Comparison
		4.2 Flow Exchange Variables
	5 Analysis and Discussion of Results
	6 Conclusion and Perspectives
	References
A New Design of an Ant Colony Optimization (ACO) Algorithm for Optimization of Ad Hoc Network
	1 Introduction
	2 Presentation of the Algorithm ACO
	3 Proposed Approach: New Design of ACO in AD HOC (GlobalACO)
	4 Proposed Simulations and Results
		4.1 Solve the Sensor Network Big Map Using GlobalACO
	5 Conclusion
	References
Real-Time Distributed Pipeline Architecture for Pedestrians’ Trajectories
	1 Introduction
	2 Architecture
		2.1 Traccar GPS Tracker
		2.2 Kafka
		2.3 Spring Boot
		2.4 Neo4j Instantiation
		2.5 React Js
	3 Architecture Components Implementation
		3.1 Processing Real-Time Data Operation
		3.2 Neo4J Instance
		3.3 Testing
	4 Results
	5 Conclusion and Future Work
	References
Reconfiguration of the Radial Distribution for Multiple DGs by Using an Improved PSO
	1 Introduction
	2 Related Works
	3 Suggested Algorithm
		3.1 Problematic
		3.2 Network with DGs
		3.3 PSO Algorithm
	4 Test and Results
		4.1 Chaotic Inertia Weight Results
		4.2 Combination Method Results
	5 Conclusion
	Appendix
	References
On the Performance of 5G Narrow-Band Internet of Things for Industrial Applications
	1 Introduction
	2 5G Use Cases
	3 Industrial Internet of Things (IIoT)
	4 5G NR Radio Interface
	5 Performance of 5G Narrow-Band Internet of Things for Industrial Applications
	6 Conclusion
	References
A Novel Design of Frequency Reconfigurable Antenna for 5G Mobile Phones
	1 Introduction
	2 Design of the Proposed Antenna
	3 Results and Discussion
	4 Validation of the Results
	5 Proposed Millimeter Wave Antenna Array for 5G
	6 Conclusion
	References
Smart Security
A Real-Time Smart Agent for Network Traffic Profiling and Intrusion Detection Based on Combined Machine Learning Algorithms
	1 Introduction
	2 Related Works
	3 A Real-Time Security Agent Based on Machine Learning and Honeypot Technologies
		3.1 Profiles Creation (Phase 1)
		3.2 Attacks Detection (Phase 2)
	4 Conclusion
	References
Privacy Threat Modeling in Personalized Search Systems
	1 Introduction
	2 Privacy in Personalized Search
		2.1 Personalized Search Systems
		2.2 Privacy Threats
		2.3 Privacy Threat Model
	3 Privacy Protection Solutions
		3.1 Privacy Laws and Regulations
		3.2 Privacy-Enhancing Technologies
	4 Cryptographic Solutions
		4.1 Secure k-NN Algorithm
		4.2 Attribute-Based Encryption
		4.3 Homomorphic Encryption (HE)
	5 Conclusion and Perspectives
	References
Enhanced Intrusion Detection System Based on AutoEncoder Network and Support Vector Machine
	1 Introduction
	2 Theoretical Background
		2.1 Intrusion Detection System
		2.2 Vehicular Ad Hoc Network VANET
		2.3 Deep Learning
	3 Literature Survey
	4 Enhanced IDS Based on AE and SVM
		4.1 The Proposed Architecture
		4.2 Performance Metrics and Results
		4.3 Security Analysis
	5 Conclusion
	References
Comparative Study of Keccak and Blake2 Hash Functions
	1 Introduction
	2 Hash Functions Algorithms
		2.1 Keccak
		2.2 Blake2
	3 Performance
	4 Conclusion
	References
Cryptography Over the Twisted Hessian Curve H3a,d
	1 Introduction
	2 Arithmetic Over the Ring mathbbFq[ε], ε3=0
	3 Twisted Hessian Curves Over the Ring R3
		3.1 Classification of Elements of H3a,d
		3.2 The Group Law Over H3a,d
		3.3 The tildeπ Homomorphism and Results
	4 Cryptographic Applications
		4.1 Coding of Elements of E
		4.2 Exchange of Secret Key
		4.3 Twisted Hessian Curve Key Generation Block Diagram
		4.4 Twisted Hessian Curve Encryption Process Block Diagram
		4.5 Twisted Hessian Curve Decryption Process Block Diagram
	5 Conclusion
	References
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF
	1 Introduction
	2 Literature Review
		2.1 Methods for Designing Cybersecurity Countermeasures
		2.2 Mechanisms and Cases of Infection
	3 Method
		3.1 Fundamentals
		3.2 Cybersecurity Controls
		3.3 P1: Answering the Questionnaire
		3.4 P2: Perform Diagnosis
		3.5 P3: Define Recommendations
		3.6 P4: Implement Countermeasures
		3.7 P5: Evaluate Countermeasures
	4 Validation
		4.1 Case Study
		4.2 Method Application
		4.3 Results
	5 Conclusions
	References
Comparative Study Between Network Layer Attacks in Mobile Ad Hoc Networks
	1 Introduction
	2 Background
		2.1 Link-Spoofing Attack in MANETs
		2.2 Replay Attack in MANETs
		2.3 HELLO Flooding Attack in MANETs
		2.4 RREQ Flooding Attack in MANETs
		2.5 DATA Flooding Attack in MANETs
		2.6 Related Works
	3 Experimental Environment Set Up
	4 Performance Metrics
		4.1 Packet Delivery Rate
		4.2 Normalized Routing Load
	5 Comparison Between Types of Flooding Attack
		5.1 Packet Delivery Rate
		5.2 Normalized Routing Load
	6 Comparison Between Link-Spoofing, DATA Flooding and Replay Attacks
		6.1 Packet Delivery Rate
		6.2 Normalized Routing Load
	7 Conclusion
	References
Security of Deep Learning Models in 5G Networks: Proposition of Security Assessment Process
	1 Introduction
	2 Overview of 5G Architecture
		2.1 Enhanced Mobile BroadBand (eMBB)
		2.2 Massive Machine Type Communication (mMTC)
		2.3 Ultra-Reliable Low Latency Communication (URLLC)
	3 Deep Learning Models Applications in 5G
		3.1 Deep Learning model's Capabilities of Forecasting in 5G
		3.2 Deep Learning Model's Capabilities of Optimization and Adaptability in 5G
		3.3 Deep Learning model's Capabilities of Event Detection in 5G
	4 Vulnerabilities in Deep Learning Models Employed in 5G Networks
	5 Proposition of Security Assessment Process for Deep Learning Models
	6 Conclusion
	References
Effects of Jamming Attack on the Internet of Things
	1 Introduction
	2 MAC Protocols for WSN
		2.1 MAC Protocols
		2.2 S-MAC Protocol
	3 Attacks on IoT
		3.1 Attacks Perception Layer
		3.2 Attacks Network Layer
		3.3 Attacks Application Layer
	4 Jamming Attack Implementation on S-MAC Protocol
		4.1 Proposed System
		4.2 Simulation Experiment
		4.3 Analysis of the Results
	5 Conclusion
	References
H-RCBAC: Hadoop Access Control Based on Roles and Content
	1 Introduction
	2 Hadoop
		2.1 HDFS: Hadoop Distributed File System
		2.2 MapReduce
	3 Access Control Models on Big Data
		3.1 Access Control Lists (ACLs)
		3.2 Role-Based Access Control (RBAC)
		3.3 Content-Based Access Control (CBAC)
		3.4 Attribute-Based Access Control (ABAC)
	4 Security Projects on Big Data
		4.1 Basic Hadoop Security
		4.2 Apache Sentry
		4.3 Apache Ranger
		4.4 Rhino Project
	5 H-RCBAC: Hadoop Access Control Based on Roles  and Content
		5.1 H-RCBAC Implementation
	6 Conclusion and Perspectives
	References
Toward a Safe Pedestrian Walkability: A Real-Time Reactive Microservice Oriented Ecosystem
	1 Introduction
	2 Related Works
	3 System Model
	4 Modeling Pedestrian Risk
		4.1 Urban Road Networks
		4.2 Pedestrians Risk
		4.3 Safest Route Determination
	5 Conclusion
	References
Image-Based Malware Classification Using Multi-layer Perceptron
	1 Introduction
	2 Related Works
	3 Multi-layer Perceptron
	4 Data Processing
	5 Experimentation
	6 Results and Discussion
	7 Conclusion and Perspective
	References
Preserving Privacy in a Smart Healthcare System Based on IoT
	1 Introduction
	2 Access Control
		2.1 Dictionary Access Control (DAC)
		2.2 Mandatory Access Control (DAC)
		2.3 Identity-Based Access Control (IBAC)
		2.4 Role-Based Access Control (RBAC)
		2.5 Attribute-Based Access Control (ABAC)
	3 Comparative Analysis of Access Control on Distributed Smart Environment
	4 Our Proposed AABAC Model Based on IoT
	5 Design and Implementation of the AABAC Model in a Distributed Healthcare Environment Based on IoT
	6 Conclusion
	References
Smart Digital Learning
Extracting Learner's Model Variables for Dynamic Grouping System
	1 Introduction
	2 Variables Used to Describe Learner's Model
	3 Data Analysis
		3.1 Frequent Patterns Mining
		3.2 Analysis and Results
	4 Discussion and Proposed Model
	5 Conclusion
	References
E-learning and the New Pedagogical Practices of Moroccan Teachers
	1 Introduction
	2 Methodology
	3 Theoretical Framework
	4 Presentation of the Collab [18]
	5 Results of the Experiment
	6 Commentary
	7 Conclusion
	References
A Sentiment Analysis Based Approach to Fight MOOCs’ Drop Out
	1 Introduction
	2 Preliminaries
		2.1 Massive Open Online Course (MOOC)
		2.2 Quality Approach
	3 Materials and Methods
		3.1 Naïve Bayesienne Algorithm
		3.2 K Medoids Algorithm
		3.3 Pareto
	4 Problematic Statement
	5 Literature Review
	6 MOOC Analysis Model
		6.1 Data Collection Approach
		6.2 Classification System
		6.3 Clustering
		6.4 Causes Analysis
	7 Proposed Quality Approach
		7.1 Prototype
		7.2 Model Description
	8 Conclusion
	References
The Personalization of Learners’ Educational Paths E-learning
	1 Introduction
	2 Related Work
	3 Materials and Methods
		3.1 Research Framework and Context
		3.2 The Traces
		3.3 Semantic Web
		3.4 Web Ontology Language (OWL)
		3.5 Resource Description Framework (RDF)
		3.6 RDFS Language (RDF Scheme)
		3.7 SPARQL Protocol and RDF Query Language (SPARQL)
	4 Result
	5 Conclusion
	References
Formulating Quizzes Questions Using Artificial Intelligent Techniques
	1 Introduction
	2 Quizzes Questions Vocabulary Types and Standards for Their Construction
		2.1 Response Production Questions
		2.2 Response Selection Questions [3]
	3 The Required Background to Complete and Develop This Field
	4 Some of the Ingredients that Will Help Us Verify the Credibility and Stability of the Question
		4.1 Cognitive Level
		4.2 Difficulties
		4.3 Discrimination
	5 Uses of Artificial Intelligence in the Industry of Questions
		5.1 Methods for Formulating and Making Questions
	6 Results
	7 Conclusion
	References
Smart Campus Ibn Tofail Approaches and Implementation
	1 Introduction
	2 Smart Campus Architecture
	3 Related Work
	4 Proposed Method
		4.1 Academic Function
		4.2 Infrastructure Function
		4.3 Residential Function
		4.4 Business and Leisure
	5 Use Case for Smart Campus
		5.1 Smart Home
		5.2 Smart Parking
		5.3 Smart Education
		5.4 System Monitoring
	6 Conclusions
	References
Boosting Students Motivation Through Gamified Hybrid Learning Environments Bleurabbit Case Study
	1 Introduction
	2 Related Works
	3 Gamification Working Definition
	4 Gamification Design Frameworks (Two Models Approach)
		4.1 M.D.A
		4.2 Player-Based Gamification Hexad Model
	5 Bluerabbit
		5.1 Narrative Elements
		5.2 Feedback and Rewards
	6 Methdological Approach
	7 Case Study Design
		7.1 Sampling
		7.2 The Onboarding Process
		7.3 Sidequest
		7.4 Deadlines
		7.5 Reward and Rating Mechanism
	8 Results and Discussion
		8.1 Results
		8.2 Discussion
	9 Conclusion and Perspectives
	References
An Analysis of ResNet50 Model and RMSprop Optimizer for Education Platform Using an Intelligent Chatbot System
	1 Introduction
	2 Related Works
	3 System Architecture
	4 Proposed Architecture
		4.1 Image-Response Model
		4.2 Question-Response Model
	5 Implementation
		5.1 Dataset
		5.2 Hardware
		5.3 Languages and Libraries Used
		5.4 Pre-processing
		5.5 Evaluation Metrics
	6 Results and Comparative Study
	7 Conclusion
	References
Smart Information Systems
BPMN to UML Class Diagram Using QVT
	1 Introduction
	2 Related Works
	3 Background Knowledge
		3.1 The Business Processes Models: BPMN
		3.2 The Model-Driven Architecture MDA
		3.3 The Query View Transformation: QVT
	4 Our Proposal Approach
		4.1 BPMN to Class Diagram Transformation QVT Rules
		4.2 Case Study: BPMN Diagram by Eclipse
		4.3 Extracted Code by QVT Language Used by Eclipse
		4.4 The Result of the Transformation
	5 Conclusion and Perspectives
	References
Endorsing Energy Efficiency Through Accurate Appliance-Level Power Monitoring, Automation and Data Visualization
	1 Introduction
		1.1 Our Contributions
		1.2 Paper Organization
	2 Related Work
	3 Overview of the (EM)3 Framework
	4 Proposed Platform
		4.1 Home-Assistant Platform
		4.2 Sensing Components
	5 Overview of Home-Assistant
		5.1 Connected Nodes
		5.2 Data Visualization Options
	6 (EM)3 Smart Plug
	7 Results and Discussion
		7.1 Test-Bed Overview
		7.2 Comparative Analysis Between Smart Plugs
		7.3 Discussion
	8 Conclusion
	References
Towards a Smart City Approach: A Comparative Study
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Problem of Statement
	5 Results
		5.1 Smart City Objectives
		5.2 Smart City Challenges
		5.3 Smart City Main Components
		5.4 Smart City Stakeholders
		5.5 Smart City Resources
	6 Conclusion
	References
Hyperspectral Data Preprocessing of the Northwestern Algeria Region
	1 Introduction
	2 Study Area and Data Used
	3 Methodology
		3.1 Bad Bands Removal
		3.2 Radiometric Calibration and Atmospheric Correction
		3.3 Destriping of Band
		3.4 Minimum Noise Fraction (MNF) Transform
	4 Results and Discussion
	5 Comparison of Efficient Techniques of Atmospheric Corrections on Hyperspectral Data for Mineralogy Studies
		5.1 Methodology
		5.2 Results and Discussion
	6 Conclusion
	References
Smart Agriculture Solution Based on IoT and TVWS for Arid Regions of the Central African Republic
	1 Introduction
	2 State of the Art
		2.1 Impact of Desertification on Agriculture in the Central African Republic
		2.2 Climate-Smart Agriculture
		2.3 The Internet of Things in Agriculture
		2.4 The TVWS in Agriculture
	3 Materials and Methodology
		3.1 Architecture of Our Solution
		3.2 How the Solution Works
	4 Results and Discussions
		4.1 Irrigation System Test Without Wi-Fi Connection
		4.2 Remote Control of the Irrigation System by Simulating the Connection to the TVWS Network
	5 Conclusion
	References
Model-Driven Engineering: From SQL Relational Database to Column—Oriented Database in Big Data Context
	1 Introduction
	2 Related Works
	3 Model Driven Architecture (MDA) Approach
		3.1 The Transformations of MDA Model
		3.2 The Elaborationist Approach
	4 Column-Oriented NoSQL Database
	5 Source and Target Meta-Models
		5.1 UML Source Meta-Model
		5.2 Column-Oriented Target Meta-Model
	6 The Process of Transforming UML Source Model to Column—Oriented Target Code
		6.1 The Transformation Rules M2M
		6.2 The Transformation Rules M2M
		6.3 Result
	7 Conclusion and Perspectives
	References
Data Lake Management Based on DLDS Approach
	1 Introduction
	2 Related Work
	3 Challenges of Data Catalog in Data Lake
	4 What to Consider When Designing a Data Lake
	5 Data Lake Architecture
		5.1 Formalization of Our Approach
		5.2 Proposed Architecture
	6 Technical Details
	7 Results and Discussion
	8 Conclusion
	References
Evaluation of Similarity Measures in Semantic Web Service Discovery
	1 Introduction
	2 Web Service Discovery
	3 Related Works
	4 Similarity Measures
		4.1 The Cosine Similarity
		4.2 Wu and Palmer’s Similarity Measure
		4.3 Jaccard Index
	5 Experimentation and Results
	6 Conclusion and Perspectives
	References
Knowledge Discovery for Sustainability Enhancement Through Design for Relevance
	1 Introduction
	2 Preliminaries
		2.1 Knowledge Discovery in Databases (KDD)
		2.2 Data Mining (DM)
	3 Related Works
	4 Methodology
		4.1 K-means
		4.2 Hierarchical
		4.3 Self-Organizing Maps
	5 Results and Discussion
		5.1 Dataset Collection
		5.2 Data-Preprocessing and Transformation
		5.3 Data-Mining: Clustering
		5.4 Knowledge for Sustainability Enhancement of the Design for Relevance
	6 Conclusion
	References
Location Finder Mobile Application Using Android and Google SpreadSheets
	1 Introduction
	2 System Architecture of Location Finder
		2.1 Google Spreadsheets for Storing Information of Places
		2.2 Material Design and Optimization
		2.3 Android Studio Setup
	3 User Interface of Location Finder
	4 Evaluation and Comparison of Mobile Application Performances
	5 Conclusions
	References
Sign Language Recognition with Quaternion Moment Invariants:  A Comparative Study
	1 Introduction
	2 Quaternion Algebra
	3 Evaluated Quaternion Moment Invariants Methods
		3.1 Quaternion Tchebichef Moment Invariants
		3.2 Quaternion Krawtchouk Moment Invariants
		3.3 Quaternion Hahn Moment Invariants
	4 Experimental Results
		4.1 Invariability Property
		4.2 Recognition Results Under Noise-Free Conditions
		4.3 Recognition Results Under Noisy Conditions
		4.4 Recognition Results Under Complex Background
	5 Conclusion
	References
Virtual Spider for Real-Time Finding Things Close to Pedestrians
	1 Introduction
	2 System Components
		2.1 Graph Database
		2.2 Kafka Message Broker
		2.3 Geographical Information System
	3 System Design
		3.1 Collected Data
		3.2 Kafka Producer
		3.3 Kafka Consumer
		3.4 Neo4j Graph in the Database
		3.5 Find Things Close to Pedestrian
	4 Conclusion
	References
Evaluating the Impact of Oversampling on Arabic L1 and L2 Readability Prediction Performances
	1 Introduction
	2 Related Work
	3 Classification and Class Imbalance
		3.1 Under-Sampling
		3.2 Oversampling
	4 Resources and Methodology
		4.1 Data
		4.2 Morphological Annotation
		4.3 Methodology
	5 Results and Discussions
		5.1 L2 Prediction Models
		5.2 L1 Prediction Models
	6 Conclusions and Futures Works
	References
An Enhanced Social Spider Colony Optimization for Global Optimization
	1 Introduction
	2 Enhanced Social Spider Colony Optimization
		2.1 Inspiration
		2.2 Mathematical Model and Optimization Algorithm
	3 Experimental Results and Discussion
	4 Conclusion
	References
Data Processing on Distributed Systems Storage Challenges
	1 Introduction and Background
		1.1 HDFS—Reliable Storage
	2 Paper Sections
	3 Related Work
		3.1 Reminder
		3.2 Motivation
	4 Existing Solutions
		4.1 HAR Files
	5 SequenceFiles
	6 Proposed Work
		6.1 Little Reminder
		6.2 The Proposed Approach for Small File Management
		6.3 Operational Mode Explanation
		6.4 File Combining
		6.5 File Mapping
		6.6 Prefetching and Caching
	7 Experimental
		7.1 Experimental Environment
		7.2 Phases Algorithms
		7.3 Results
		7.4 Performances Comparison
	8 Conclusion and Future Works
	References
COVID-19 Pandemic
Data-Based Automatic Covid-19 Rumors Detection in Social Networks
	1 Introduction
	2 Related Works
	3 Background
		3.1 A Rumor is a Statement Whose Truth Value is Either True, False or Unverified [15]
		3.2 A Rumor is Defined as Unreliable Information that is Easily Transmissible, Often Questioned [25, 26]
	4 Problem Statement
	5 Real-Time Computational Problem
	6 Methodology
		6.1 Extraction and Storage of Tweets
		6.2 Classification of Tweets
		6.3 Discussion
	7 Conclusion
	References
Security and Privacy Protection in the e-Health System: Remote Monitoring of COVID-19 Patients as a Use Case
	1 Introduction
	2 Related Works
	3 Preliminaries
	4 Secure Storage and Sharing of E-Health Data
		4.1 An Overview of Our Proposed Schemes
		4.2 Modeling of Our Blockchain
		4.3 The Proposed ABE Encryption Algorithm
		4.4 Secure Data Storage and Sharing Scheme
	5 Security And Performance Analysis
		5.1 Security Analysis
		5.2 Performance Analysis
	6 Conclusion
	References
Forecasting COVID-19 Cases in Morocco: A Deep Learning Approach
	1 Introduction
	2 Related Works
	3 Data Description
	4 LSTM Model for Forecasting
	5 Results and Discussion
		5.1 Root-Mean-Squared Errors
		5.2 Mean Absolute Percentage Error
	6 Conclusion
	References
The Impact of COVID-19 on Parkinson's Disease Patients from Social Networks
	1 Introduction
	2 Sentiment Analysis and Modelling Language
		2.1 Sentiment Analysis and Affective Computing
		2.2 Medical Conceptualization
	3 Proposed Approach
		3.1 Text Vectorization and Embedding
		3.2 Common Sense Detection
	4 Experiments and Output Results
	5 Conclusion
	References
Missing Data Analysis in the Healthcare Field: COVID-19 Case Study
	1 Introduction
	2 Preliminaries
		2.1 Missing Data and Data Collection Mechanisms
		2.2 Prediction Function
	3 Problematic Statement
	4 Related Works
	5 COVID-19 Diagnosis Monitoring
		5.1 Architecture
		5.2 Missing Data Handling: Prototype
		5.3 Discussion
	6 Conclusion
	References
An Analysis of the Content in Social Networks During COVID-19 Pandemic
	1 Introduction
	2 Related Works
	3 Data Set
	4 Results
	5 Discussions and Conclusions
	References
Author Index




نظرات کاربران