top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
12th International Conference on Information Systems and Advanced Technologies "ICISAT 2022" : intelligent information, data science and decision support system / / Mohamed Ridda Laouar [and four others] editors
12th International Conference on Information Systems and Advanced Technologies "ICISAT 2022" : intelligent information, data science and decision support system / / Mohamed Ridda Laouar [and four others] editors
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (586 pages)
Disciplina 006.3
Collana Lecture notes in networks and systems
Soggetto topico Computational intelligence
Computer systems
ISBN 3-031-25344-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Modelling of Propagation Loss for Single Trees Using Simulated Coppice at Microwave Frequencies -- 1 Introduction -- 2 Measurement Details -- 3 Conclusion -- References -- A New Collective Simulated Annealing with Adapted Objective Function for Web Service Selection -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experimentation -- 5 Case Study -- 6 Conclusion -- References -- An Image Encryption-Based Method for Handwritten Digit Recognition -- 1 Introduction -- 2 Related Works -- 3 Image Encryption Systems -- 3.1 RSA Encryption -- 3.2 ECC Encryption -- 3.3 Chaos Encryption -- 3.4 Knight Encryption -- 3.5 Arnold Encryption -- 3.6 Joseph Encryption -- 4 Proposed Method -- 5 Experimentation and Results -- 6 Conclusion and Perspectives -- References -- The Malaysian Higher Education Students' Perceptions and Acceptance Toward Mobile Learning During the COVID-19 Pandemic -- 1 Introduction -- 1.1 Mobile Learning in Malaysia During the COVID-19 Pandemic -- 2 Purpose and Objectives of the Study -- 3 The Conceptual Framework -- 4 Methodology -- 5 Results and Discussion -- 5.1 Respondent Profile -- 5.2 Perceptions of Mobile Technology Adoption -- 5.3 Mobile Learning Perceptions and Acceptance During the COVID-19 Pandemic -- 5.4 Open-Ended Items -- 6 Conclusion -- References -- Face Masks Use and Face Perception: Social Judgments and Emotion Recognition -- 1 Introduction -- 2 Key Parameters -- 2.1 Sex Recognition -- 2.2 Age Estimation -- 2.3 Trustworthiness -- 2.4 Attractiveness -- 2.5 Approachability -- 2.6 Emotion Perception -- 3 The Current Study -- 3.1 Participants -- 3.2 Materials and Stimuli -- 4 Design -- 4.1 Procedure -- 4.2 Data Analysis -- 5 Results -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 6 Discussion -- References.
Bibliometric Analysis of Research Publication Trends on the ICT Use in Government Institutions from 2015-2022 -- 1 Introduction -- 2 Literature Review -- 2.1 Use ICT in Government -- 2.2 Bibliometrics Analysis -- 3 Research Methods -- 4 Finding and Discussion -- 4.1 Analysis of Global Publication -- 4.2 Mapping of Co-occurrences Analysis -- 4.3 Topic Classification and Theme Descriptions -- 5 Conclusion -- References -- A Paring-Free ID-Based Authenticated Key Agreement Protocol for IoT Environment -- 1 Introduction -- 1.1 Motivation -- 1.2 Outline of Paper -- 2 Related Work -- 3 Technical Background -- 3.1 Diffie Hellman Key Agreement Protocol -- 3.2 Elliptic Curve Cryptography -- 3.3 ECDL Hard Problem -- 3.4 Computational Diffie-Hellman Hard (CDHP) Problem -- 3.5 Identity-Based Encryption -- 4 Proposed Scheme -- 4.1 Setup -- 4.2 Private Key Extraction -- 4.3 Session Key Agreement -- 5 Security Analysis -- 5.1 MITM Attack -- 5.2 Known Provisionally Information Attack -- 5.3 Known Key Attack -- 5.4 Perfect Forward Security -- 5.5 PKG Forward Security -- 5.6 No Key Dominant -- 5.7 Replication and Unidentified Key Share Attack -- 6 Conclusion -- References -- Intention to Use Hackathon by Information Technology Programming Students -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Material, Methods, Research Population and Sample -- 3.2 Instrument Development and Research Hypothesis -- 4 Results and Discussion -- 4.1 Reliability Analysis -- 4.2 Factor Analysis -- 4.3 Level of Hackathon Acceptance -- 4.4 Correlation Analysis -- 5 Conclusion, Recommendation, and Future Studies -- References -- Clustering Algorithms for Wireless Sensor Networks: A Review -- 1 Introduction -- 2 Overview on Clustering Mechanism -- 3 Analysis of Relevant Clustering Algorithms in WSNs -- 3.1 Literature Review.
3.2 Classification of Clustering Techniques -- 4 Comparison Between Some Relevant Clustering Algorithms -- 5 Conclusion -- References -- Vision Sensor Surveillance for Online Stationary Object Detection Based on Basic Sequential Clustering -- 1 Introduction -- 2 Method Schema -- 3 Background Model and Foreground Estimation -- 4 Stationary Luggage Detection -- 4.1 Stationary Object Detection -- 4.2 MRF Framework -- 4.3 Stationary Human Event Elimination -- 5 Experimental Results -- 6 Conclusion -- References -- A Fuzzy Navigation Approach Using the Intelligent Lights Algorithm for an Autonomous Mobile Robot -- 1 Introduction -- 2 Related Works -- 2.1 Smarts Light Control System -- 2.2 Fuzzy Logic -- 2.3 Bee Colony Optimization (BCO) -- 2.4 Artificial Bee Colony -- 2.5 Neural Network -- 2.6 Particle Swarm Optimization -- 2.7 Genetic Algorithm -- 3 Methodology -- 3.1 The Smart Lights Control System -- 3.2 Discussion -- 4 Conclusion -- References -- Emotion Analysis of Social Media Content for Mental Health Improvement -- 1 Introduction -- 1.1 Anxiety -- 1.2 Stress -- 1.3 Depression -- 1.4 Loneliness -- 1.5 Eating Disorders -- 2 Overview -- 3 Methodology -- 3.1 Data Preprocessing -- 3.2 Sentiment Analysis of Tweet Content -- 3.3 Emotion Analysis of Tweet Content -- 4 Discussion -- 5 Limitations -- 6 Conclusion and Perspectives -- References -- Named Entity Recognition for Algerian Arabic Dialect in Social Media -- Abstract -- 1 Introduction -- 2 Algerian Dialect: Overview and Specificities -- 3 Related Work -- 4 Methodology -- 5 Arabic Pre-trained Models -- 5.1 AraBERT -- 5.2 MARBERT -- 5.3 ARBERT -- 5.4 DziriBERT -- 5.5 mBERT -- 6 Experiments -- 6.1 Dataset -- 6.2 Experimentation Setup -- 7 Results -- 8 Discussion -- 9 Conclusion -- References -- Protection of Nurse-Sys Platform from Man-In the Middle Attacks -- 1 Introduction.
2 Hardware Design and Testing -- 3 Neuro-Fuzzy Modeling -- 4 Attack Session Hijacking -- 5 Results and Discussion -- 5.1 Temperature Sensor Design -- 5.2 Analyzing Data in Server -- 6 Conclusion -- References -- On the Effectiveness of Dimensionality Reduction Techniques on High Dimensionality Datasets -- 1 Introduction -- 2 Materials and Method -- 2.1 Related Works -- 2.2 Data Normalization -- 2.3 Dimensionality Reduction Methods -- 3 Dataset Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Industries Application of Type-2 Fuzzy Logic -- 1 Introduction -- 2 T2FL is Used in Pattern Classification -- 3 T2FL is Used in the Classification -- 4 T2FL is Used in Intelligent Control -- 5 T2FL is Used in Other Regions of Use -- 5.1 Assembly Plants and Companies are Standard Techniques -- 5.2 Uses in the Manufacturing and Service Sectors -- 5.3 Uses Relating to Communication and Technologies -- 6 A Broad Review of the Industry and Its Prospects -- 7 Discussion -- 8 Conclusion -- References -- New Research Methodology to Analyze Time Series and Correlations' Reliability -- 1 Introduction -- 2 The Framework -- 2.1 CReMIT Module -- 2.2 Analysis Module (AM) -- 2.3 Random Correlations (RC) -- 3 Implementation of the Framework -- 4 Conclusion -- References -- A Comparative Study of Filter Feature Selection Methods on Microarray Data -- 1 Introduction -- 2 Related Works -- 3 Methods and Materials -- 3.1 ReliefF -- 3.2 Chi-Square -- 3.3 Mutual Information -- 3.4 Fisher Score -- 3.5 F-Score -- 3.6 Laplacian Score -- 3.7 Conditional Mutual Information Maximization (CMIM) -- 3.8 Minimum Redundancy Maximum Relevance -- 4 Results and Discussion -- 4.1 Datasets -- 5 Conclusion -- References -- Glaucoma Detection Using Optimal Batch Size for Transfer Learning and Ensemble Model Techniques -- 1 Introduction -- 2 Related Works -- 2.1 Pre-trained CNN.
2.2 Generative Models -- 3 Contribution of the Paper -- 4 Method Overview -- 4.1 Pre-processing -- 4.2 Fine-Tuned Models -- 4.3 Batch Size Optimization -- 4.4 Ensemble Models -- 5 Experimental Results -- 5.1 Datasets Presentation -- 5.2 Method Performance -- 5.3 Training Time and Accuracy Comparison -- 5.4 Comparative Results -- 6 Discussions -- 7 Conclusion -- References -- A Semantic Interoperability Approach for Heterogeneous Meteorology Big IoT Data -- 1 Introduction -- 2 Related Work -- 3 Approach Overview -- 3.1 BID Sensing Module -- 3.2 BID Semantic Module -- 3.3 BID Cloud Module -- 4 Use Case and Implementation -- 4.1 Analysis of Collected Data -- 4.2 Creation and Population of the SWR Ontology -- 4.3 Querying the KB and Viewing Data -- 4.4 Publication of SWR on LOD Cloud -- 4.5 Using SWR on the Web -- 5 Conclusion and Future Work -- References -- Delineation of Raining Cloud Using a WkNN from Multispectral Data of SEVIRI Radiometer -- 1 Introduction -- 2 Region of Study and Data -- 2.1 Region of Study -- 2.2 The Data -- 3 Methodology -- 3.1 Application -- 4 Results and Discussion -- 5 Conclusions -- References -- Water Quality Monitoring Systems for Sub-saharan Africa: Towards an Effectiveness Framework -- 1 Introduction -- 2 Background -- 3 Effectiveness Framework -- 4 Research Design and Methodology -- 5 Findings and Discussion -- 5.1 In Situ Water Quality Monitoring Systems (In Situ) -- 5.2 Wireless Sensor Network Water Quality Monitoring Systems (WSN) -- 5.3 IoT and Cloud Computing Smart Water Quality Monitoring Systems (SWQMS) -- 5.4 Summary of Findings -- 6 Conclusion -- References -- Insect Recognition and Classification Using Optimized Densely Connected Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 2.1 Automated Insect Species Identification Models -- 2.2 Local Feature Based Insect Recognition.
2.3 Combination Model.
Altri titoli varianti Twelfth International Conference on Information Systems and Advanced Technologies "ICISAT 2022"
Record Nr. UNINA-9910647785303321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence and mobile technology research : an information systems engineering perspective / / edited by Mohamed Ridda Laouar and Sean B. Eom
Business intelligence and mobile technology research : an information systems engineering perspective / / edited by Mohamed Ridda Laouar and Sean B. Eom
Pubbl/distr/stampa Newcastle upon Tyne, [United Kingdom] : , : Cambridge Scholars Publishing, , 2014
Descrizione fisica 1 online resource (322 p.)
Disciplina 658.472
Soggetto topico Business intelligence
Strategic planning
Business enterprises - Information technology
Soggetto genere / forma Electronic books.
ISBN 1-4438-5835-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto TABLE OF CONTENTS; PREFACE; PART I; CHAPTER ONE; CHAPTER TWO; CHAPTER THREE; CHAPTER FOUR; CHAPTER FIVE; CHAPTER SIX; CHAPTER SEVEN; CHAPTER EIGHT; CHAPTER NINE; CHAPTER TEN; PART II; CHAPTER ELEVEN; CHAPTER TWELVE; CHAPTER THIRTEEN; CHAPTER FOURTEEN; CHAPTER FIFTEEN; PART III; CHAPTER SIXTEEN; CHAPTER SEVENTEEN; CHAPTER EIGHTEEN; CONTRIBUTORS
Record Nr. UNINA-9910464922803321
Newcastle upon Tyne, [United Kingdom] : , : Cambridge Scholars Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence and mobile technology research : an information systems engineering perspective / / edited by Mohamed Ridda Laouar and Sean B. Eom
Business intelligence and mobile technology research : an information systems engineering perspective / / edited by Mohamed Ridda Laouar and Sean B. Eom
Pubbl/distr/stampa Newcastle upon Tyne, [United Kingdom] : , : Cambridge Scholars Publishing, , 2014
Descrizione fisica 1 online resource (322 p.)
Disciplina 658.472
Soggetto topico Business intelligence
Strategic planning
Business enterprises - Information technology
ISBN 1-4438-5835-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto TABLE OF CONTENTS; PREFACE; PART I; CHAPTER ONE; CHAPTER TWO; CHAPTER THREE; CHAPTER FOUR; CHAPTER FIVE; CHAPTER SIX; CHAPTER SEVEN; CHAPTER EIGHT; CHAPTER NINE; CHAPTER TEN; PART II; CHAPTER ELEVEN; CHAPTER TWELVE; CHAPTER THIRTEEN; CHAPTER FOURTEEN; CHAPTER FIFTEEN; PART III; CHAPTER SIXTEEN; CHAPTER SEVENTEEN; CHAPTER EIGHTEEN; CONTRIBUTORS
Record Nr. UNINA-9910789255003321
Newcastle upon Tyne, [United Kingdom] : , : Cambridge Scholars Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence and mobile technology research : an information systems engineering perspective / / edited by Mohamed Ridda Laouar and Sean B. Eom
Business intelligence and mobile technology research : an information systems engineering perspective / / edited by Mohamed Ridda Laouar and Sean B. Eom
Pubbl/distr/stampa Newcastle upon Tyne, [United Kingdom] : , : Cambridge Scholars Publishing, , 2014
Descrizione fisica 1 online resource (322 p.)
Disciplina 658.472
Soggetto topico Business intelligence
Strategic planning
Business enterprises - Information technology
ISBN 1-4438-5835-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto TABLE OF CONTENTS; PREFACE; PART I; CHAPTER ONE; CHAPTER TWO; CHAPTER THREE; CHAPTER FOUR; CHAPTER FIVE; CHAPTER SIX; CHAPTER SEVEN; CHAPTER EIGHT; CHAPTER NINE; CHAPTER TEN; PART II; CHAPTER ELEVEN; CHAPTER TWELVE; CHAPTER THIRTEEN; CHAPTER FOURTEEN; CHAPTER FIFTEEN; PART III; CHAPTER SIXTEEN; CHAPTER SEVENTEEN; CHAPTER EIGHTEEN; CONTRIBUTORS
Record Nr. UNINA-9910827856503321
Newcastle upon Tyne, [United Kingdom] : , : Cambridge Scholars Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui