LEADER 13348nam 2200601 450 001 9910647785303321 005 20230510063515.0 010 $a3-031-25344-2 024 7 $a10.1007/978-3-031-25344-7 035 $a(MiAaPQ)EBC7191436 035 $a(Au-PeEL)EBL7191436 035 $a(CKB)26089875300041 035 $a(DE-He213)978-3-031-25344-7 035 $a(PPN)268207178 035 $a(EXLCZ)9926089875300041 100 $a20230510d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$a12th International Conference on Information Systems and Advanced Technologies "ICISAT 2022" $eintelligent information, data science and decision support system /$fMohamed Ridda Laouar [and four others] editors 205 $a1st ed. 2023. 210 1$aCham, Switzerland :$cSpringer,$d[2023] 210 4$d©2023 215 $a1 online resource (586 pages) 225 1 $aLecture notes in networks and systems ;$v624 311 08$aPrint version: Laouar, Mohamed Ridda 12th International Conference on Information Systems and Advanced Technologies ICISAT 2022 Cham : Springer International Publishing AG,c2023 9783031253430 320 $aIncludes bibliographical references and index. 327 $aIntro -- Contents -- Modelling of Propagation Loss for Single Trees Using Simulated Coppice at Microwave Frequencies -- 1 Introduction -- 2 Measurement Details -- 3 Conclusion -- References -- A New Collective Simulated Annealing with Adapted Objective Function for Web Service Selection -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experimentation -- 5 Case Study -- 6 Conclusion -- References -- An Image Encryption-Based Method for Handwritten Digit Recognition -- 1 Introduction -- 2 Related Works -- 3 Image Encryption Systems -- 3.1 RSA Encryption -- 3.2 ECC Encryption -- 3.3 Chaos Encryption -- 3.4 Knight Encryption -- 3.5 Arnold Encryption -- 3.6 Joseph Encryption -- 4 Proposed Method -- 5 Experimentation and Results -- 6 Conclusion and Perspectives -- References -- The Malaysian Higher Education Students' Perceptions and Acceptance Toward Mobile Learning During the COVID-19 Pandemic -- 1 Introduction -- 1.1 Mobile Learning in Malaysia During the COVID-19 Pandemic -- 2 Purpose and Objectives of the Study -- 3 The Conceptual Framework -- 4 Methodology -- 5 Results and Discussion -- 5.1 Respondent Profile -- 5.2 Perceptions of Mobile Technology Adoption -- 5.3 Mobile Learning Perceptions and Acceptance During the COVID-19 Pandemic -- 5.4 Open-Ended Items -- 6 Conclusion -- References -- Face Masks Use and Face Perception: Social Judgments and Emotion Recognition -- 1 Introduction -- 2 Key Parameters -- 2.1 Sex Recognition -- 2.2 Age Estimation -- 2.3 Trustworthiness -- 2.4 Attractiveness -- 2.5 Approachability -- 2.6 Emotion Perception -- 3 The Current Study -- 3.1 Participants -- 3.2 Materials and Stimuli -- 4 Design -- 4.1 Procedure -- 4.2 Data Analysis -- 5 Results -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 6 Discussion -- References. 327 $aBibliometric Analysis of Research Publication Trends on the ICT Use in Government Institutions from 2015-2022 -- 1 Introduction -- 2 Literature Review -- 2.1 Use ICT in Government -- 2.2 Bibliometrics Analysis -- 3 Research Methods -- 4 Finding and Discussion -- 4.1 Analysis of Global Publication -- 4.2 Mapping of Co-occurrences Analysis -- 4.3 Topic Classification and Theme Descriptions -- 5 Conclusion -- References -- A Paring-Free ID-Based Authenticated Key Agreement Protocol for IoT Environment -- 1 Introduction -- 1.1 Motivation -- 1.2 Outline of Paper -- 2 Related Work -- 3 Technical Background -- 3.1 Diffie Hellman Key Agreement Protocol -- 3.2 Elliptic Curve Cryptography -- 3.3 ECDL Hard Problem -- 3.4 Computational Diffie-Hellman Hard (CDHP) Problem -- 3.5 Identity-Based Encryption -- 4 Proposed Scheme -- 4.1 Setup -- 4.2 Private Key Extraction -- 4.3 Session Key Agreement -- 5 Security Analysis -- 5.1 MITM Attack -- 5.2 Known Provisionally Information Attack -- 5.3 Known Key Attack -- 5.4 Perfect Forward Security -- 5.5 PKG Forward Security -- 5.6 No Key Dominant -- 5.7 Replication and Unidentified Key Share Attack -- 6 Conclusion -- References -- Intention to Use Hackathon by Information Technology Programming Students -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Material, Methods, Research Population and Sample -- 3.2 Instrument Development and Research Hypothesis -- 4 Results and Discussion -- 4.1 Reliability Analysis -- 4.2 Factor Analysis -- 4.3 Level of Hackathon Acceptance -- 4.4 Correlation Analysis -- 5 Conclusion, Recommendation, and Future Studies -- References -- Clustering Algorithms for Wireless Sensor Networks: A Review -- 1 Introduction -- 2 Overview on Clustering Mechanism -- 3 Analysis of Relevant Clustering Algorithms in WSNs -- 3.1 Literature Review. 327 $a3.2 Classification of Clustering Techniques -- 4 Comparison Between Some Relevant Clustering Algorithms -- 5 Conclusion -- References -- Vision Sensor Surveillance for Online Stationary Object Detection Based on Basic Sequential Clustering -- 1 Introduction -- 2 Method Schema -- 3 Background Model and Foreground Estimation -- 4 Stationary Luggage Detection -- 4.1 Stationary Object Detection -- 4.2 MRF Framework -- 4.3 Stationary Human Event Elimination -- 5 Experimental Results -- 6 Conclusion -- References -- A Fuzzy Navigation Approach Using the Intelligent Lights Algorithm for an Autonomous Mobile Robot -- 1 Introduction -- 2 Related Works -- 2.1 Smarts Light Control System -- 2.2 Fuzzy Logic -- 2.3 Bee Colony Optimization (BCO) -- 2.4 Artificial Bee Colony -- 2.5 Neural Network -- 2.6 Particle Swarm Optimization -- 2.7 Genetic Algorithm -- 3 Methodology -- 3.1 The Smart Lights Control System -- 3.2 Discussion -- 4 Conclusion -- References -- Emotion Analysis of Social Media Content for Mental Health Improvement -- 1 Introduction -- 1.1 Anxiety -- 1.2 Stress -- 1.3 Depression -- 1.4 Loneliness -- 1.5 Eating Disorders -- 2 Overview -- 3 Methodology -- 3.1 Data Preprocessing -- 3.2 Sentiment Analysis of Tweet Content -- 3.3 Emotion Analysis of Tweet Content -- 4 Discussion -- 5 Limitations -- 6 Conclusion and Perspectives -- References -- Named Entity Recognition for Algerian Arabic Dialect in Social Media -- Abstract -- 1 Introduction -- 2 Algerian Dialect: Overview and Specificities -- 3 Related Work -- 4 Methodology -- 5 Arabic Pre-trained Models -- 5.1 AraBERT -- 5.2 MARBERT -- 5.3 ARBERT -- 5.4 DziriBERT -- 5.5 mBERT -- 6 Experiments -- 6.1 Dataset -- 6.2 Experimentation Setup -- 7 Results -- 8 Discussion -- 9 Conclusion -- References -- Protection of Nurse-Sys Platform from Man-In the Middle Attacks -- 1 Introduction. 327 $a2 Hardware Design and Testing -- 3 Neuro-Fuzzy Modeling -- 4 Attack Session Hijacking -- 5 Results and Discussion -- 5.1 Temperature Sensor Design -- 5.2 Analyzing Data in Server -- 6 Conclusion -- References -- On the Effectiveness of Dimensionality Reduction Techniques on High Dimensionality Datasets -- 1 Introduction -- 2 Materials and Method -- 2.1 Related Works -- 2.2 Data Normalization -- 2.3 Dimensionality Reduction Methods -- 3 Dataset Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Industries Application of Type-2 Fuzzy Logic -- 1 Introduction -- 2 T2FL is Used in Pattern Classification -- 3 T2FL is Used in the Classification -- 4 T2FL is Used in Intelligent Control -- 5 T2FL is Used in Other Regions of Use -- 5.1 Assembly Plants and Companies are Standard Techniques -- 5.2 Uses in the Manufacturing and Service Sectors -- 5.3 Uses Relating to Communication and Technologies -- 6 A Broad Review of the Industry and Its Prospects -- 7 Discussion -- 8 Conclusion -- References -- New Research Methodology to Analyze Time Series and Correlations' Reliability -- 1 Introduction -- 2 The Framework -- 2.1 CReMIT Module -- 2.2 Analysis Module (AM) -- 2.3 Random Correlations (RC) -- 3 Implementation of the Framework -- 4 Conclusion -- References -- A Comparative Study of Filter Feature Selection Methods on Microarray Data -- 1 Introduction -- 2 Related Works -- 3 Methods and Materials -- 3.1 ReliefF -- 3.2 Chi-Square -- 3.3 Mutual Information -- 3.4 Fisher Score -- 3.5 F-Score -- 3.6 Laplacian Score -- 3.7 Conditional Mutual Information Maximization (CMIM) -- 3.8 Minimum Redundancy Maximum Relevance -- 4 Results and Discussion -- 4.1 Datasets -- 5 Conclusion -- References -- Glaucoma Detection Using Optimal Batch Size for Transfer Learning and Ensemble Model Techniques -- 1 Introduction -- 2 Related Works -- 2.1 Pre-trained CNN. 327 $a2.2 Generative Models -- 3 Contribution of the Paper -- 4 Method Overview -- 4.1 Pre-processing -- 4.2 Fine-Tuned Models -- 4.3 Batch Size Optimization -- 4.4 Ensemble Models -- 5 Experimental Results -- 5.1 Datasets Presentation -- 5.2 Method Performance -- 5.3 Training Time and Accuracy Comparison -- 5.4 Comparative Results -- 6 Discussions -- 7 Conclusion -- References -- A Semantic Interoperability Approach for Heterogeneous Meteorology Big IoT Data -- 1 Introduction -- 2 Related Work -- 3 Approach Overview -- 3.1 BID Sensing Module -- 3.2 BID Semantic Module -- 3.3 BID Cloud Module -- 4 Use Case and Implementation -- 4.1 Analysis of Collected Data -- 4.2 Creation and Population of the SWR Ontology -- 4.3 Querying the KB and Viewing Data -- 4.4 Publication of SWR on LOD Cloud -- 4.5 Using SWR on the Web -- 5 Conclusion and Future Work -- References -- Delineation of Raining Cloud Using a WkNN from Multispectral Data of SEVIRI Radiometer -- 1 Introduction -- 2 Region of Study and Data -- 2.1 Region of Study -- 2.2 The Data -- 3 Methodology -- 3.1 Application -- 4 Results and Discussion -- 5 Conclusions -- References -- Water Quality Monitoring Systems for Sub-saharan Africa: Towards an Effectiveness Framework -- 1 Introduction -- 2 Background -- 3 Effectiveness Framework -- 4 Research Design and Methodology -- 5 Findings and Discussion -- 5.1 In Situ Water Quality Monitoring Systems (In Situ) -- 5.2 Wireless Sensor Network Water Quality Monitoring Systems (WSN) -- 5.3 IoT and Cloud Computing Smart Water Quality Monitoring Systems (SWQMS) -- 5.4 Summary of Findings -- 6 Conclusion -- References -- Insect Recognition and Classification Using Optimized Densely Connected Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 2.1 Automated Insect Species Identification Models -- 2.2 Local Feature Based Insect Recognition. 327 $a2.3 Combination Model. 330 $aThe ICISAT?2022 conference provided a forum for research and developments in the field of information systems and advanced technologies and new trends in developing information systems organizational aspects of their development and intelligent aspects of the final product. The aim of the ICIS1T?2022 is to report progress and development of methodologies, technologies, planning and implementation, tools, and standards in information systems, technologies, and sciences. ICISAT?2022 aims at addressing issues related to the intelligent information, data science, and decision support system, from multidisciplinary perspectives and to discuss the research, teaching, and professional practice in the field. The book of ICISAT?2022 includes selected papers from the 12th International Conference on Information Systems and Advanced Technologies ?ICISAT?2022?, organized online during August 26?27, 2022. In this book, researchers, professional software, and systems engineers from around the world addressed intelligent information, data science, and decision support system for the conference. The ideas and practical solutions described in the book are the outcome of dedicated research by academics and practitioners aiming to advance theory and practice in this research domain. The list of topics is in all the areas of modern intelligent information systems and technologies such as neural networks, evolutionary computing, adaptive systems, pervasive system, ubiquitous system, E-learning and teaching, knowledge-based paradigms, learning paradigms, intelligent data analysis, intelligent decision making and support system, intelligent network security, web intelligence, deep learning, natural language processing, image processing, general machine learning, and unsupervised learning. 410 0$aLecture notes in networks and systems ;$v624. 517 3 $aTwelfth International Conference on Information Systems and Advanced Technologies "ICISAT 2022" 606 $aComputational intelligence 606 $aComputational intelligence$vCongresses 606 $aComputer systems 615 0$aComputational intelligence. 615 0$aComputational intelligence 615 0$aComputer systems. 676 $a006.3 702 $aLaouar$b Mohamed Ridda 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647785303321 996 $a12th International Conference on Information Systems and Advanced Technologies "ICISAT 2022"$93364028 997 $aUNINA