top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Intelligent System and Smart Technologies : Proceedings of I2ST'23
Advances in Intelligent System and Smart Technologies : Proceedings of I2ST'23
Autore Gherabi Noredine
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (417 pages)
Altri autori (Persone) AwadAli Ismail
NayyarAnand
BahajMohamed
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-47672-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Specific Topics -- Committee -- Keynote Speakers -- About This Book -- Contents -- A New Design of 5G Planar Antenna with Enhancement of the Gain Using Array Antenna -- 1 Introduction -- 2 Design Methodologies -- 2.1 A Conventional Square Patch Antenna's Design -- 2.2 Design of a 1 × 4 Antenna Array Containing 4 Radiation Elements -- 2.3 Design of a 4 × 4 Antenna Array Containing 16 Radiation Elements -- 2.4 Design of a 8 × 4 Antenna Array Containing 32 Radiation Elements -- 3 Conclusion and Perspectives -- References -- Temperature Forecast Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Study Area -- 5 Results and Discussion -- 6 Conclusion -- References -- Digital Twin-Based Approach for Electric Vehicles: E-Mule Project -- 1 Introduction -- 2 Digital Twin: Background and Definitions -- 3 Related Works -- 4 E-Mule Digital Twin -- 4.1 Induction Motor -- 4.2 Lithium-Ion Battery -- 5 Technical Solutions -- 5.1 Data Collection -- 5.2 Data Transmission -- 5.3 3D Modeling -- 6 Conclusion -- References -- Vision-Based Fall Detection Systems Using 3D Skeleton Features for Elderly Security: A Survey -- 1 Introduction -- 2 Fall Detection System: Overview -- 3 Fall Detection Skeleton Datasets -- 3.1 Human Body Representation -- 3.2 Available 3D Skeletal Datasets -- 3.3 Limitation and Challenges -- 4 Vision-Based Fall Detection Approaches -- 5 Conclusion -- References -- Capacity Prediction for Lithium-Ion Batteries Using Different Neural Networks Methods -- 1 Introduction -- 2 Proposed Methods -- 3 Capacity Estimation -- 3.1 Nasa Datasets Prediction -- 4 Comparative Results Analysis -- 5 Conclusion -- References -- Deployment of Deep Learning in BlockChain Technology for Credit Card Fraud Prevention -- 1 Introduction -- 2 Background and Motivation -- 2.1 What is Blockchain?.
2.2 How Does the Blockchain Work? -- 2.3 Strengths of Blockchain -- 2.4 BlockChain Weaknesses -- 2.5 Chainlink -- 3 Methodology -- 3.1 Deep Learning Model -- 3.2 Blockchain -- 3.3 External Adapter -- 3.4 Cryptocurrency -- 4 Visualization -- 4.1 Normal User -- 4.2 Contract's Owner -- 5 Conclusion -- References -- A Survey on Cybersecurity Techniques Toward Convolutional Neural Network -- 1 Introduction -- 2 The Fundamentals of CNN -- 3 Security Threats Toward CNN -- 4 Detection Techniques of CNN -- 4.1 Malware Classification -- 4.2 Malware Detection -- 5 Conclusion -- References -- Publications and Messages Exchanged in a Chat Room Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Model and Algorithms -- 3.1 Centers of Interests -- 3.2 Psychological Profile -- 3.3 Relational Profile -- 4 Results and Discussion -- 4.1 Profiling System Result -- 5 Conclusion -- References -- Detection of Common Risk Factors Leading to the Cardiovascular Illness Using Machine Learning -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 BRFSS Heart Disease Dataset -- 3.2 Datasets Preprocessing -- 3.3 Model Training -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Machine Learning Models for Detection COVID-19 -- 1 Introduction -- 2 State of the Art -- 3 Functional Testing Methods -- 3.1 PCR Test -- 3.2 Chest Radiography Images -- 4 COVID19 Detection Models Using Machine Learning Approaches -- 5 Comparison Study Between Methods -- 6 Conclusion and Discussion -- References -- DoS and DDoS Cyberthreats Detection in Drone Networks -- 1 Introduction -- 2 Context of the Study -- 2.1 Fleet of Drones -- 2.2 DoS and DDoS Cyber-Attacks -- 2.3 Network Intrusion Detection Systems (NIDS) -- 3 Related Work -- 3.1 State of the Art -- 3.2 Discussion -- 4 Proposed Approach -- 4.1 Architecture of the Proposed NIDS.
4.2 Operating Principle of the Proposed Model of NIDS -- 5 Experimentation and Tests -- 5.1 CICIDS2017 Dataset -- 5.2 Algorithms Used to Model Benign Network Traffic and DoS/DDoS Attacks -- 6 Summary of Benign Traffic and Attacks Classification Results -- 7 Conclusion -- References -- Artificial Intelligence in Supply Chain 4.0: Using Machine Learning in Demand Forecasting -- 1 Introduction -- 2 Demand Forecasting in Supply Chain -- 3 Machine Learning Model for Demand Forecasting in Supply Chain -- 3.1 Methodology -- 3.2 Data Visualization -- 3.3 Data Segmentation -- 3.4 Data Modeling -- 3.5 Model Evaluation -- 3.6 Comparison of Classifications Models -- 4 Conclusion -- References -- COVID-19 Prediction Applying Machine Learning and Ontological Language -- 1 Introduction -- 2 Literature Review -- 3 Methodology of Research -- 3.1 Data Preprocessing -- 3.2 Machine Learning Decision Tree Algorithm -- 3.3 Ontology Engineering -- 4 Result and Discussion -- 5 Conclusion -- References -- EEG-Based Drivers Drowsiness Prediction Using Personalized Features Extraction and Classification Methods Under Python -- 1 Introduction -- 2 Method -- 2.1 Acquisition and Preprocessing -- 2.2 Main Processing Method -- 2.3 Classification and Predicting -- 3 Results and Discussion -- 4 Conclusion -- References -- A Systematic Review on Blind and Visually Impaired Navigation Systems -- 1 Introduction -- 2 Literature Review -- 2.1 Research Methodology -- 2.2 State-of-the-Art -- 3 Discussion and Recommendations -- 3.1 Discussion -- 3.2 Recommendations -- 4 Conclusion and Future Work -- References -- Comparison of Deep Learning-Based Channel Estimator and Classical Estimators in VANET -- 1 Introduction -- 2 IEEE 802.11p Standard -- 2.1 Environment and Vehicle-To-Vehicle Channel -- 2.2 Channel Vehicle-to-Vehicle Model -- 3 Estimation and Interpolation of Channel.
3.1 LS Channel Estimation Algorithm -- 3.2 MMSE Channel Estimation Algorithm -- 3.3 Linear Interpolation -- 3.4 Spline Cubic Interpolation -- 4 Channel Estimators Based on Neural Networks -- 4.1 Estimator and Structure OFDM -- 4.2 Channel Estimator Structure of Basic Neural Network -- 5 Simulation and Resultats -- 5.1 Simulations Parameters -- 5.2 Channel's Coherence Time Effect -- 6 Conclusion -- References -- Decision Support Systems Based on Artificial Intelligence for Supply Chain Management: A Literature Review -- 1 Introduction and Motivation -- 2 Concepts -- 2.1 Supply Chain Management -- 2.2 Decision Support System -- 3 DSS Based IA for SCM: A Literature Review -- 3.1 Research Methodology -- 3.2 Adopted IA Methods in SCM -- 4 Discussion -- 5 Conclusion -- References -- Minimization of Task Offloading Latency for COVID-19 IoT Devices -- 1 Introduction -- 2 Related Work and Motivation -- 2.1 Latency -- 2.2 Energy Consumption -- 3 System Model -- 4 Problem Formulation -- 5 Results and Discussion -- 6 Conclusion and Perspectives -- References -- Machine Learning, Deep Learning, and Computer Vision for Age and Gender Detection -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Methods and Materials -- 4.1 Computer Vision -- 4.2 Machine Learning -- 4.3 Deep Learning -- 4.4 Model Architecture Overview -- 5 Results and Discussion -- 6 Conclusion -- References -- Grape and Apple Plant Diseases Detection Using Enhance DenseNet121 Based Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Material and Method -- 3.1 Dataset -- 3.2 Image Preprocessing and Data Augmentation -- 3.3 Convolutional-Neural-Network Models -- 3.4 Transfer-Learning Approach -- 3.5 Proposed System -- 4 Experiment Results -- 4.1 Performance Evaluation -- 4.2 Parameters -- 4.3 Results Analysis and Comparison -- 5 Conclusion -- References.
Operational Code Based on the Lattice Boltzmann Method for Coastal Flows: Application to Oualidia Lagoon -- 1 Introduction -- 2 Presentation of the Shallow Water Equations -- 3 Lattice Boltzmann Method (LBM) -- 3.1 Lattice Pattern -- 3.2 Boundary Conditions -- 4 Flowchart of the Operational Code -- 5 Numerical Test -- 6 Application to Oualidia Lagoon -- 7 Conclusion -- References -- The Use of Chatbots as Supportive Agents in Air Transportation Systems -- 1 Introduction -- 2 Literature Review -- 3 Chatbots and Artificial Intelligence -- 3.1 Chatbots -- 3.2 Artificial Intelligence and Chatbots -- 3.3 Chatbot Frameworks -- 4 The Proposed Methodology -- 4.1 Case Study -- 4.2 Conception of Chatbot -- 5 Results and Discussion -- 6 Conclusion -- References -- The Conception of a Controlled Trigonometric Phase Locked Loop Working Under Grid Anomalies Conditions -- 1 Introduction -- 2 Methods -- 2.1 A Conventional PLL in the Synchronous dq Frame -- 2.2 Trigonometric Phase Locked Loop -- 3 Results and Discussion -- 3.1 Time Response of the Controlled PLL and Angle Jump Test -- 3.2 Unbalanced Grid Voltage -- 3.3 Non Sinusoidal Grid Voltage -- 4 Conclusion -- References -- A Deep Learning Model for Intrusion Detection with Imbalanced Dataset -- 1 Introduction -- 2 Related Work -- 3 Background -- 4 Deep Learning -- 4.1 Feature Selection -- 5 Our Approach -- 5.1 NSL-KDD -- 5.2 Shap Value, Boruta and Anova f-test -- 6 Experimental Results and Discussion -- 7 Conclusion -- References -- Towards Complex Systems Behavioral Prediction: A Survey of Artificial Intelligence Applications -- 1 Introduction -- 1.1 Complex Systems -- 1.2 Characteristics of Complex Systems -- 1.3 Complex Adaptive Systems -- 2 Flood Prediction -- 3 Fetal Monitoring -- 4 Electrical Systems and Renewable Energies -- 5 Extreme Events and Critical Transitions -- 6 Forest Fire.
7 Financial Markets.
Record Nr. UNINA-9910841861203321
Gherabi Noredine  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network Systems : Architectures, Security, and Applications / / edited by Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski
Advances in Network Systems : Architectures, Security, and Applications / / edited by Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 352 p. 177 illus., 127 illus. in color.)
Disciplina 004.36
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Telecommunication
Artificial intelligence
Computational Intelligence
Communications Engineering, Networks
Artificial Intelligence
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Network Architectures -- Part II: Network Security -- Part III: Network Applications.
Record Nr. UNINA-9910156336203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Security of Information and Communication Networks : First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings / / edited by Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba
Advances in Security of Information and Communication Networks : First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings / / edited by Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 249 p. 104 illus.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Data mining
Systems and Data Security
Computer Communication Networks
Data Mining and Knowledge Discovery
ISBN 3-642-40597-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Networking security -- Data and information security -- Authentication and privacy -- Security applications.
Record Nr. UNINA-9910437567603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations / / edited by Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations / / edited by Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (593 p.)
Disciplina 005.8
Collana Intelligent Systems Reference Library
Soggetto topico Computational intelligence
Artificial intelligence
Computer security
Computational Intelligence
Artificial Intelligence
Systems and Data Security
ISBN 3-662-43616-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Bio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications.
Record Nr. UNINA-9910299739203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Image Feature Detectors and Descriptors : Foundations and Applications / / edited by Ali Ismail Awad, Mahmoud Hassaballah
Image Feature Detectors and Descriptors : Foundations and Applications / / edited by Ali Ismail Awad, Mahmoud Hassaballah
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (IX, 438 p. 213 illus., 84 illus. in color.)
Disciplina 006.6
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Optical data processing
Signal processing
Image processing
Speech processing systems
Computational Intelligence
Computer Imaging, Vision, Pattern Recognition and Graphics
Signal, Image and Speech Processing
ISBN 3-319-28854-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Image Features Detection, Description and Matching -- A Review of Image Interest Point Detectors: From Algorithms to FPGA Hardware Implementations -- Image Features Extraction, Selection and Fusion for Computer Vision -- Image Feature Extraction Acceleration -- Satellite Image Registration: A Comparative Study Using Invariant Local Features -- Redundancy Elimination in Video Summarization -- A Real Time Dactylology Based Selective Image Encryption Using Speeded Up Robust Features Extraction Technique and Artificial Neural Network -- Spectral Reflectance Images and Applications -- Image Segmentation using an Evolutionary Method based on Allostatic Mechanisms -- Image Analysis and Coding Based on Ordinal Data Representation -- Intelligent Detection of Foveal Zone from Colored Fundus Images of Human Retina through a Robust Combination of Fuzzy-Logic and Active Contour Model -- Registration of Digital Terrain Images using Nondegenerate Singular Points -- Visual Speech Recognition with Selected Boundary Descriptors -- Application of Texture Features for Classification of Primary Benign and Primary Malignant Focal Liver Lesions -- Application of Statistical Texture Features for Breast Tissue Density Classification.
Record Nr. UNINA-9910253964703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and privacy in the Internet of things : architectures, techniques, and applications / / edited by Ali Ismail Awad, Jemal H. Abawajy
Security and privacy in the Internet of things : architectures, techniques, and applications / / edited by Ali Ismail Awad, Jemal H. Abawajy
Pubbl/distr/stampa Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2022]
Descrizione fisica 1 online resource (339 pages)
Disciplina 005.8
Soggetto topico Data protection
ISBN 1-119-60777-9
1-119-60775-2
1-119-60776-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910554882003321
Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and privacy in the Internet of things : architectures, techniques, and applications / / edited by Ali Ismail Awad, Jemal H. Abawajy
Security and privacy in the Internet of things : architectures, techniques, and applications / / edited by Ali Ismail Awad, Jemal H. Abawajy
Pubbl/distr/stampa Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2022]
Descrizione fisica 1 online resource (339 pages)
Disciplina 005.8
Soggetto topico Data protection
ISBN 1-119-60777-9
1-119-60775-2
1-119-60776-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced attacks and protection mechanisms in IoT devices and networks -- Human aspects of IoT security and privacy -- Applying zero trust security principles to defence mechanisms against data exfiltration attacks -- eSIM-based authentication protocol for UAV remote identification -- Collaborative intrusion detection in the era of IoT : recent advances and challenges -- Cyber-securing IoT infrastructure by modeling network traffic -- Integrity of IoT network flow records in encrypted traffic analytics -- Securing contemporary eHealth architectures : techniques and methods -- Security and privacy of smart homes : issues and solutions -- IoT hardware-based security : a generalized review of threats and countermeasures.
Record Nr. UNINA-9910830361603321
Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in cyber-physical systems : foundations and applications / / editors, Ali Ismail Awad [et al.]
Security in cyber-physical systems : foundations and applications / / editors, Ali Ismail Awad [et al.]
Edizione [1st edition 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XV, 315 p. 115 illus., 83 illus. in color.)
Disciplina 621.39
Collana Studies in Systems, Decision and Control
Soggetto topico Computational intelligence
Computer engineering
Cooperating objects (Computer systems)
Embedded computer systems
Internet of things
ISBN 3-030-67361-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Realizing Cyber-Physical Systems Resilience Frameworks and Security Practices -- Machine learning for fostering security in Cyber-Physical systems -- Security of Cyber-Physical Monitoring and Warning Systems for Natural and Technological Threats -- Secure Dynamic Nonlinear Heterogeneous Vehicle Platooning: Denial-of-Service Cyber-Attack Case.
Record Nr. UNINA-9910483556503321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui