Vai al contenuto principale della pagina

Artificial Intelligence, Data Science and Applications : ICAISE'2023, Volume 2



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Farhaoui Yousef Visualizza persona
Titolo: Artificial Intelligence, Data Science and Applications : ICAISE'2023, Volume 2 Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing AG, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (637 pages)
Altri autori: HussainAmir  
SabaTanzila  
TaherdoostHamed  
VermaAnshul  
Nota di contenuto: Intro -- Preface -- Organisation -- Introduction -- Contents -- Exploring the Impact of Deep Learning Techniques on Evaluating Arabic L1 Readability -- 1 Introduction -- 2 Related Works -- 3 Methodology and Results -- 3.1 Data -- 3.2 Text Representation -- 4 Experiments and Results -- 5 Conclusion and Future Works -- References -- Performance Analysis of Two Serial Concatenations of Decoders Over a Rayleigh Channel -- 1 Introduction -- 2 Rayleigh Fading -- 3 Used Decoding Algorithms and Serial Concatenation -- 3.1 Hartmann Rudolph Decoder -- 3.2 Hard Decision Decoder Based on Hash and Syndrome Decoding (HSDec) Decoder -- 3.3 Syndrome Decoding and Hash Techniques (SDHT) Decoder -- 3.4 Serial Concatenation -- 4 Simulation Results -- 5 Conclusion -- References -- Blockchain and Reputation Based Secure Service Provision in Edge-Cloud Environments -- 1 Introduction -- 2 The Proposed System Architecture -- 2.1 Main Components -- 2.2 Service Model -- 3 The Blockchain Integration -- 3.1 Blockchain Components -- 3.2 Consensus Process -- 3.3 Blockchain Management -- 4 Conclusions and Perspectives -- References -- Exploring the Impact of Convolutions on LSTM Networks for Video Classification -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 Convolutional Neural Networks -- 2.3 Long Short-Term Memory -- 2.4 Convolutional Long Short-Term Memory (ConvLSTM) -- 2.5 Long-Term Recurrent Convolutional Networks (LRCN) -- 3 Results and Discussion -- 4 Conclusion -- References -- Classification Algorithms Implementation for Fire Prevention Data on Multiple Wireless Node Sensors -- 1 Introduction -- 2 Theory of Probability -- 3 Likelihood Algorithm -- 4 Bayesian Inference -- 5 CUSUM Algorithm -- 6 Result of Experiment -- 7 Conclusion -- References -- Implementation of an Intelligent Monitoring System Based on Quality 4.0 of the Induction Hardening Process.
1 Introduction -- 2 Literature Review -- 2.1 Industry 4.0 -- 2.2 Quality 4.0 -- 3 Case Study -- 3.1 Induction Hardening Machine -- 3.2 Smart Supervision System -- 4 Analysis and Discussion -- 5 Conclusion -- References -- Lithium-Ion Battery State of Charge Estimation Using Least Squares Support Vector Machine -- 1 Introduction -- 2 The SOC Estimation Methods -- 2.1 The Ampere Hour Counting Method -- 2.2 Least Squares Support Vector Machine (LSSVM) Method -- 3 Simulation and Results Discussion -- 4 Conclusion -- References -- Intrusion Detection in Software-Defined Networking Using Machine Learning Models -- 1 Introduction -- 2 Challenges of SDN Security -- 2.1 Distributed Denial of Services -- 2.2 Intrusion Detection System -- 3 Methodology -- 3.1 Performance Evaluation -- 3.2 Dataset -- 4 Result and Discussion -- 5 Conclusion -- References -- Neural Network for Link Prediction in Social Network -- 1 Introduction -- 2 Methodology -- 3 Experimental Results -- 3.1 Dataset Description -- 3.2 Results and Discussion -- 4 Conclusion -- References -- Design and Optimization of a Compact Microstrip Bandpass Filter Using on Open Loop Rectangular Resonators for Wireless Communication Systems -- 1 Introduction -- 2 Design of the Proposed Bandpass Filter -- 3 Simulation Results and Discussion -- 4 Conclusion -- References -- YOLO-Based Approach for Intelligent Apple Crop Health Assessment -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Evaluation of Apple Health Using YOLOv5s, YOLOv5m, and YOLOv7 -- 2.2 Models Optimization -- 3 Results and Discussion -- 3.1 Setup Environment -- 3.2 Apple Disease Detection Image Dataset -- 3.3 Data Preprocessing -- 3.4 Performance Results -- 4 Conclusion -- References -- A Comprehensive Review on the Integration of Blockchain Technology with IPFS in IoT Ecosystem -- 1 Introduction -- 2 IoT-Blockchain Architecture.
3 Reviewed Works -- 4 Challenges and Future Research Directions -- 5 Conclusion -- References -- An Integrated Approach for Artifact Elimination in EEG Signals: Combining Variational Mode Decomposition with Blind Source Separation (VMD-BSS) -- 1 Introduction -- 2 Material and Methods -- 2.1 Datasets -- 2.2 The Variational Mode Decomposition -- 2.3 The Blind Source Separation -- 2.4 The Proposed Method -- 3 Results -- 4 Conclusion and Discussion -- References -- E-Health Blockchain: Conception of a New Smart Healthcare Architecture Based on Deep Reinforcement Learning -- 1 Introduction and Notations -- 1.1 Introduction -- 1.2 Notations -- 2 Related Works -- 3 Our Contribution -- 4 Conclusion -- References -- Dynamic Multi-compartment Vehicle Routing Problem: Formulation and Algorithm -- 1 Introduction -- 2 Problem Formulation -- 3 The Dynamic Adaptation to MCVRP Problem -- 4 Hybrid Adaptive Variable Neighborhood Search for DMCVRP -- 5 Computational Experiments -- 6 Conclusion -- References -- Anime Link Prediction Using Improved Graph Convolutional Networks -- 1 Introduction -- 2 Background -- 2.1 Graph Neural Network -- 2.2 Graph Construction -- 2.3 Types of Graph Neural Network (GNN) -- 3 Proposed Work -- 3.1 ImprovedGCN -- 3.2 Proposed Architecture -- 4 Experiments -- 4.1 Dataset for Evaluation -- 4.2 Environment -- 4.3 Experiment Results -- 5 Conclusion -- References -- Assessing the Evolution of Meteorological Seasons and Climate Changes Using Hierarchical Clustering -- 1 Introduction -- 2 Proposed Method -- 2.1 Data Preprocessing -- 2.2 Background and Methodology -- 3 Findings and Discussion -- 4 Conclusion -- References -- Significance and Impact of AI on Pedagogical Learning: A Case Study of Moroccan Students at the Faculty of Legal and Economics -- 1 Introduction -- 2 Methodology -- 2.1 Sample and Data Collection Procedure.
2.2 Students' Personal Information/Demographic Data -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Securing Big Data: Current Challenges and Emerging Security Techniques -- 1 Introduction -- 2 Big Data and Its Characteristics -- 3 Big Data Security Challenges -- 4 Big Data Security Solutions -- 4.1 Classic Security Methods -- 4.2 Artificial Intelligence Security Techniques -- 4.3 Blockchain Security -- 5 Examples of Potential Attacks on BD Systems and Some Solutions -- 5.1 Examples of Potential Attacks -- 5.2 Solutions for Potential Attacks -- 6 Conclusion -- References -- Machine Learning for Early Fire Detection in the Oasis Environment -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Tool Description -- 3.3 Selected ML Algorithms -- 4 Results and Discussion -- 5 Conclusion -- References -- Voice-Based Detection of Parkinson's Disease Using Empirical Mode Decomposition, IMFCC, MFCC, and Deep Learning -- 1 Introduction -- 2 Dataset -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Study Between Fractional Linear Quadratic Regulator (Frac-LQR) and Sliding Mode Controller for the Stabilization the Three-Axis Attitude Control System of LEO Satellite Using Reaction Wheels -- 1 Introduction -- 2 The Dynamic Model of the Satellite Using Reaction Wheels -- 3 Controllability and Observability -- 4 Fractional Linear Quadratic Regulator (Frac-LQR) -- 5 Sliding Mode Controller (SMC) -- 6 Simulations and Results -- 7 Conclusion -- References -- UV-Nets: Semantic Deep Learning Architectures for Brain Tumor Segmentation -- 1 Introduction -- 2 Related Work -- 3 Materiel and Methods -- 3.1 Data -- 3.2 Data Preparation and Preprocessing -- 3.3 Methods -- 3.4 U-Net -- 3.5 V-Net -- 4 Results -- 4.1 Implementation Details -- 4.2 Evaluation Metrics -- 4.3 Results and Discussion.
5 Conclusion -- References -- A Smart Mathematical Approach to Resource Management in Cloud Based on Multi-objective Optimization and Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Our Contribution -- 3.1 Detailed Description of Our Contribution -- 4 Conclusion -- References -- Machine Learning in Cybersecurity: Evaluating Text Encoding Techniques for Optimized SMS Spam Detection -- 1 Introduction -- 2 Methodology -- 2.1 Data Acquisition -- 2.2 Data Preprocessing -- 2.3 Text Encoding Techniques -- 3 Results and Analysis -- 4 Conclusion -- References -- Design of a GaAs-FET Based Low Noise Amplifier for Sub-6 GHz 5G Applications -- 1 Introduction -- 1.1 Fifth Generation Wireless Communication -- 1.2 LNA -- 2 Theoretical Background -- 2.1 Transistor -- 2.2 Stability -- 2.3 Gain of Amplifier -- 2.4 Noise Figure -- 3 Design of Proposed LNA -- 4 Results and Discussion -- 5 Conclusion -- References -- Pyramid Scene Parsing Network for Driver Distraction Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Pyramid Scene Parsing Network (PSPNet) -- 3.2 Proposed Method -- 4 Experiment and Results -- 4.1 Dataset -- 4.2 Implementation Details -- 4.3 Results -- 5 Conclusion -- References -- A Survey on RFID Mutual Authentication Protocols Based ECC for Resource-Constrained in IoT Environment -- 1 Introduction -- 2 Review of ECC-Authentication Protocols for RFID Systems -- 3 Comparative Analysis -- 4 Conclusion -- References -- Advanced Prediction of Solar Radiation Using Machine Learning and Principal Component Analysis -- 1 Introduction -- 2 Related Works -- 3 Our Proposed Approach -- 4 Experimental Study -- 4.1 Environment -- 4.2 Discussion of Results -- 5 Conclusion -- References -- Blockchain and Machine Learning Applications in Overcoming Security Challenges for CPS and IoT Systems -- 1 Introduction -- 2 Background.
2.1 CPS Security.
Titolo autorizzato: Artificial Intelligence, Data Science and Applications  Visualizza cluster
ISBN: 3-031-48573-4
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910806196003321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Series