Advances in Intelligent System and Smart Technologies : Proceedings of I2ST'23 |
Autore | Gherabi Noredine |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (417 pages) |
Altri autori (Persone) |
AwadAli Ismail
NayyarAnand BahajMohamed |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 3-031-47672-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Specific Topics -- Committee -- Keynote Speakers -- About This Book -- Contents -- A New Design of 5G Planar Antenna with Enhancement of the Gain Using Array Antenna -- 1 Introduction -- 2 Design Methodologies -- 2.1 A Conventional Square Patch Antenna's Design -- 2.2 Design of a 1 × 4 Antenna Array Containing 4 Radiation Elements -- 2.3 Design of a 4 × 4 Antenna Array Containing 16 Radiation Elements -- 2.4 Design of a 8 × 4 Antenna Array Containing 32 Radiation Elements -- 3 Conclusion and Perspectives -- References -- Temperature Forecast Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Study Area -- 5 Results and Discussion -- 6 Conclusion -- References -- Digital Twin-Based Approach for Electric Vehicles: E-Mule Project -- 1 Introduction -- 2 Digital Twin: Background and Definitions -- 3 Related Works -- 4 E-Mule Digital Twin -- 4.1 Induction Motor -- 4.2 Lithium-Ion Battery -- 5 Technical Solutions -- 5.1 Data Collection -- 5.2 Data Transmission -- 5.3 3D Modeling -- 6 Conclusion -- References -- Vision-Based Fall Detection Systems Using 3D Skeleton Features for Elderly Security: A Survey -- 1 Introduction -- 2 Fall Detection System: Overview -- 3 Fall Detection Skeleton Datasets -- 3.1 Human Body Representation -- 3.2 Available 3D Skeletal Datasets -- 3.3 Limitation and Challenges -- 4 Vision-Based Fall Detection Approaches -- 5 Conclusion -- References -- Capacity Prediction for Lithium-Ion Batteries Using Different Neural Networks Methods -- 1 Introduction -- 2 Proposed Methods -- 3 Capacity Estimation -- 3.1 Nasa Datasets Prediction -- 4 Comparative Results Analysis -- 5 Conclusion -- References -- Deployment of Deep Learning in BlockChain Technology for Credit Card Fraud Prevention -- 1 Introduction -- 2 Background and Motivation -- 2.1 What is Blockchain?.
2.2 How Does the Blockchain Work? -- 2.3 Strengths of Blockchain -- 2.4 BlockChain Weaknesses -- 2.5 Chainlink -- 3 Methodology -- 3.1 Deep Learning Model -- 3.2 Blockchain -- 3.3 External Adapter -- 3.4 Cryptocurrency -- 4 Visualization -- 4.1 Normal User -- 4.2 Contract's Owner -- 5 Conclusion -- References -- A Survey on Cybersecurity Techniques Toward Convolutional Neural Network -- 1 Introduction -- 2 The Fundamentals of CNN -- 3 Security Threats Toward CNN -- 4 Detection Techniques of CNN -- 4.1 Malware Classification -- 4.2 Malware Detection -- 5 Conclusion -- References -- Publications and Messages Exchanged in a Chat Room Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Model and Algorithms -- 3.1 Centers of Interests -- 3.2 Psychological Profile -- 3.3 Relational Profile -- 4 Results and Discussion -- 4.1 Profiling System Result -- 5 Conclusion -- References -- Detection of Common Risk Factors Leading to the Cardiovascular Illness Using Machine Learning -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 BRFSS Heart Disease Dataset -- 3.2 Datasets Preprocessing -- 3.3 Model Training -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Machine Learning Models for Detection COVID-19 -- 1 Introduction -- 2 State of the Art -- 3 Functional Testing Methods -- 3.1 PCR Test -- 3.2 Chest Radiography Images -- 4 COVID19 Detection Models Using Machine Learning Approaches -- 5 Comparison Study Between Methods -- 6 Conclusion and Discussion -- References -- DoS and DDoS Cyberthreats Detection in Drone Networks -- 1 Introduction -- 2 Context of the Study -- 2.1 Fleet of Drones -- 2.2 DoS and DDoS Cyber-Attacks -- 2.3 Network Intrusion Detection Systems (NIDS) -- 3 Related Work -- 3.1 State of the Art -- 3.2 Discussion -- 4 Proposed Approach -- 4.1 Architecture of the Proposed NIDS. 4.2 Operating Principle of the Proposed Model of NIDS -- 5 Experimentation and Tests -- 5.1 CICIDS2017 Dataset -- 5.2 Algorithms Used to Model Benign Network Traffic and DoS/DDoS Attacks -- 6 Summary of Benign Traffic and Attacks Classification Results -- 7 Conclusion -- References -- Artificial Intelligence in Supply Chain 4.0: Using Machine Learning in Demand Forecasting -- 1 Introduction -- 2 Demand Forecasting in Supply Chain -- 3 Machine Learning Model for Demand Forecasting in Supply Chain -- 3.1 Methodology -- 3.2 Data Visualization -- 3.3 Data Segmentation -- 3.4 Data Modeling -- 3.5 Model Evaluation -- 3.6 Comparison of Classifications Models -- 4 Conclusion -- References -- COVID-19 Prediction Applying Machine Learning and Ontological Language -- 1 Introduction -- 2 Literature Review -- 3 Methodology of Research -- 3.1 Data Preprocessing -- 3.2 Machine Learning Decision Tree Algorithm -- 3.3 Ontology Engineering -- 4 Result and Discussion -- 5 Conclusion -- References -- EEG-Based Drivers Drowsiness Prediction Using Personalized Features Extraction and Classification Methods Under Python -- 1 Introduction -- 2 Method -- 2.1 Acquisition and Preprocessing -- 2.2 Main Processing Method -- 2.3 Classification and Predicting -- 3 Results and Discussion -- 4 Conclusion -- References -- A Systematic Review on Blind and Visually Impaired Navigation Systems -- 1 Introduction -- 2 Literature Review -- 2.1 Research Methodology -- 2.2 State-of-the-Art -- 3 Discussion and Recommendations -- 3.1 Discussion -- 3.2 Recommendations -- 4 Conclusion and Future Work -- References -- Comparison of Deep Learning-Based Channel Estimator and Classical Estimators in VANET -- 1 Introduction -- 2 IEEE 802.11p Standard -- 2.1 Environment and Vehicle-To-Vehicle Channel -- 2.2 Channel Vehicle-to-Vehicle Model -- 3 Estimation and Interpolation of Channel. 3.1 LS Channel Estimation Algorithm -- 3.2 MMSE Channel Estimation Algorithm -- 3.3 Linear Interpolation -- 3.4 Spline Cubic Interpolation -- 4 Channel Estimators Based on Neural Networks -- 4.1 Estimator and Structure OFDM -- 4.2 Channel Estimator Structure of Basic Neural Network -- 5 Simulation and Resultats -- 5.1 Simulations Parameters -- 5.2 Channel's Coherence Time Effect -- 6 Conclusion -- References -- Decision Support Systems Based on Artificial Intelligence for Supply Chain Management: A Literature Review -- 1 Introduction and Motivation -- 2 Concepts -- 2.1 Supply Chain Management -- 2.2 Decision Support System -- 3 DSS Based IA for SCM: A Literature Review -- 3.1 Research Methodology -- 3.2 Adopted IA Methods in SCM -- 4 Discussion -- 5 Conclusion -- References -- Minimization of Task Offloading Latency for COVID-19 IoT Devices -- 1 Introduction -- 2 Related Work and Motivation -- 2.1 Latency -- 2.2 Energy Consumption -- 3 System Model -- 4 Problem Formulation -- 5 Results and Discussion -- 6 Conclusion and Perspectives -- References -- Machine Learning, Deep Learning, and Computer Vision for Age and Gender Detection -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Methods and Materials -- 4.1 Computer Vision -- 4.2 Machine Learning -- 4.3 Deep Learning -- 4.4 Model Architecture Overview -- 5 Results and Discussion -- 6 Conclusion -- References -- Grape and Apple Plant Diseases Detection Using Enhance DenseNet121 Based Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Material and Method -- 3.1 Dataset -- 3.2 Image Preprocessing and Data Augmentation -- 3.3 Convolutional-Neural-Network Models -- 3.4 Transfer-Learning Approach -- 3.5 Proposed System -- 4 Experiment Results -- 4.1 Performance Evaluation -- 4.2 Parameters -- 4.3 Results Analysis and Comparison -- 5 Conclusion -- References. Operational Code Based on the Lattice Boltzmann Method for Coastal Flows: Application to Oualidia Lagoon -- 1 Introduction -- 2 Presentation of the Shallow Water Equations -- 3 Lattice Boltzmann Method (LBM) -- 3.1 Lattice Pattern -- 3.2 Boundary Conditions -- 4 Flowchart of the Operational Code -- 5 Numerical Test -- 6 Application to Oualidia Lagoon -- 7 Conclusion -- References -- The Use of Chatbots as Supportive Agents in Air Transportation Systems -- 1 Introduction -- 2 Literature Review -- 3 Chatbots and Artificial Intelligence -- 3.1 Chatbots -- 3.2 Artificial Intelligence and Chatbots -- 3.3 Chatbot Frameworks -- 4 The Proposed Methodology -- 4.1 Case Study -- 4.2 Conception of Chatbot -- 5 Results and Discussion -- 6 Conclusion -- References -- The Conception of a Controlled Trigonometric Phase Locked Loop Working Under Grid Anomalies Conditions -- 1 Introduction -- 2 Methods -- 2.1 A Conventional PLL in the Synchronous dq Frame -- 2.2 Trigonometric Phase Locked Loop -- 3 Results and Discussion -- 3.1 Time Response of the Controlled PLL and Angle Jump Test -- 3.2 Unbalanced Grid Voltage -- 3.3 Non Sinusoidal Grid Voltage -- 4 Conclusion -- References -- A Deep Learning Model for Intrusion Detection with Imbalanced Dataset -- 1 Introduction -- 2 Related Work -- 3 Background -- 4 Deep Learning -- 4.1 Feature Selection -- 5 Our Approach -- 5.1 NSL-KDD -- 5.2 Shap Value, Boruta and Anova f-test -- 6 Experimental Results and Discussion -- 7 Conclusion -- References -- Towards Complex Systems Behavioral Prediction: A Survey of Artificial Intelligence Applications -- 1 Introduction -- 1.1 Complex Systems -- 1.2 Characteristics of Complex Systems -- 1.3 Complex Adaptive Systems -- 2 Flood Prediction -- 3 Fetal Monitoring -- 4 Electrical Systems and Renewable Energies -- 5 Extreme Events and Critical Transitions -- 6 Forest Fire. 7 Financial Markets. |
Record Nr. | UNINA-9910841861203321 |
Gherabi Noredine
![]() |
||
Cham : , : Springer International Publishing AG, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Network Systems : Architectures, Security, and Applications / / edited by Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XII, 352 p. 177 illus., 127 illus. in color.) |
Disciplina | 004.36 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Telecommunication Artificial intelligence Computational Intelligence Communications Engineering, Networks Artificial Intelligence |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: Network Architectures -- Part II: Network Security -- Part III: Network Applications. |
Record Nr. | UNINA-9910156336203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Security of Information and Communication Networks : First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings / / edited by Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 249 p. 104 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer communication systems Data mining Systems and Data Security Computer Communication Networks Data Mining and Knowledge Discovery |
ISBN | 3-642-40597-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Networking security -- Data and information security -- Authentication and privacy -- Security applications. |
Record Nr. | UNINA-9910437567603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations / / edited by Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (593 p.) |
Disciplina | 005.8 |
Collana | Intelligent Systems Reference Library |
Soggetto topico |
Computational intelligence
Artificial intelligence Computer security Computational Intelligence Artificial Intelligence Systems and Data Security |
ISBN | 3-662-43616-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Bio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications. |
Record Nr. | UNINA-9910299739203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Image Feature Detectors and Descriptors : Foundations and Applications / / edited by Ali Ismail Awad, Mahmoud Hassaballah |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 438 p. 213 illus., 84 illus. in color.) |
Disciplina | 006.6 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Computational intelligence
Optical data processing Signal processing Image processing Speech processing systems Computational Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Signal, Image and Speech Processing |
ISBN | 3-319-28854-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Image Features Detection, Description and Matching -- A Review of Image Interest Point Detectors: From Algorithms to FPGA Hardware Implementations -- Image Features Extraction, Selection and Fusion for Computer Vision -- Image Feature Extraction Acceleration -- Satellite Image Registration: A Comparative Study Using Invariant Local Features -- Redundancy Elimination in Video Summarization -- A Real Time Dactylology Based Selective Image Encryption Using Speeded Up Robust Features Extraction Technique and Artificial Neural Network -- Spectral Reflectance Images and Applications -- Image Segmentation using an Evolutionary Method based on Allostatic Mechanisms -- Image Analysis and Coding Based on Ordinal Data Representation -- Intelligent Detection of Foveal Zone from Colored Fundus Images of Human Retina through a Robust Combination of Fuzzy-Logic and Active Contour Model -- Registration of Digital Terrain Images using Nondegenerate Singular Points -- Visual Speech Recognition with Selected Boundary Descriptors -- Application of Texture Features for Classification of Primary Benign and Primary Malignant Focal Liver Lesions -- Application of Statistical Texture Features for Breast Tissue Density Classification. |
Record Nr. | UNINA-9910253964703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and privacy in the Internet of things : architectures, techniques, and applications / / edited by Ali Ismail Awad, Jemal H. Abawajy |
Pubbl/distr/stampa | Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2022] |
Descrizione fisica | 1 online resource (339 pages) |
Disciplina | 005.8 |
Soggetto topico | Data protection |
ISBN |
1-119-60777-9
1-119-60775-2 1-119-60776-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910554882003321 |
Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and privacy in the Internet of things : architectures, techniques, and applications / / edited by Ali Ismail Awad, Jemal H. Abawajy |
Pubbl/distr/stampa | Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2022] |
Descrizione fisica | 1 online resource (339 pages) |
Disciplina | 005.8 |
Soggetto topico | Data protection |
ISBN |
1-119-60777-9
1-119-60775-2 1-119-60776-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced attacks and protection mechanisms in IoT devices and networks -- Human aspects of IoT security and privacy -- Applying zero trust security principles to defence mechanisms against data exfiltration attacks -- eSIM-based authentication protocol for UAV remote identification -- Collaborative intrusion detection in the era of IoT : recent advances and challenges -- Cyber-securing IoT infrastructure by modeling network traffic -- Integrity of IoT network flow records in encrypted traffic analytics -- Securing contemporary eHealth architectures : techniques and methods -- Security and privacy of smart homes : issues and solutions -- IoT hardware-based security : a generalized review of threats and countermeasures. |
Record Nr. | UNINA-9910830361603321 |
Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in cyber-physical systems : foundations and applications / / editors, Ali Ismail Awad [et al.] |
Edizione | [1st edition 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XV, 315 p. 115 illus., 83 illus. in color.) |
Disciplina | 621.39 |
Collana | Studies in Systems, Decision and Control |
Soggetto topico |
Computational intelligence
Computer engineering Cooperating objects (Computer systems) Embedded computer systems Internet of things |
ISBN | 3-030-67361-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Realizing Cyber-Physical Systems Resilience Frameworks and Security Practices -- Machine learning for fostering security in Cyber-Physical systems -- Security of Cyber-Physical Monitoring and Warning Systems for Natural and Technological Threats -- Secure Dynamic Nonlinear Heterogeneous Vehicle Platooning: Denial-of-Service Cyber-Attack Case. |
Record Nr. | UNINA-9910483556503321 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|