top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial Intelligence, Data Science and Applications : ICAISE'2023, Volume 2
Artificial Intelligence, Data Science and Applications : ICAISE'2023, Volume 2
Autore Farhaoui Yousef
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (637 pages)
Altri autori (Persone) HussainAmir
SabaTanzila
TaherdoostHamed
VermaAnshul
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-48573-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organisation -- Introduction -- Contents -- Exploring the Impact of Deep Learning Techniques on Evaluating Arabic L1 Readability -- 1 Introduction -- 2 Related Works -- 3 Methodology and Results -- 3.1 Data -- 3.2 Text Representation -- 4 Experiments and Results -- 5 Conclusion and Future Works -- References -- Performance Analysis of Two Serial Concatenations of Decoders Over a Rayleigh Channel -- 1 Introduction -- 2 Rayleigh Fading -- 3 Used Decoding Algorithms and Serial Concatenation -- 3.1 Hartmann Rudolph Decoder -- 3.2 Hard Decision Decoder Based on Hash and Syndrome Decoding (HSDec) Decoder -- 3.3 Syndrome Decoding and Hash Techniques (SDHT) Decoder -- 3.4 Serial Concatenation -- 4 Simulation Results -- 5 Conclusion -- References -- Blockchain and Reputation Based Secure Service Provision in Edge-Cloud Environments -- 1 Introduction -- 2 The Proposed System Architecture -- 2.1 Main Components -- 2.2 Service Model -- 3 The Blockchain Integration -- 3.1 Blockchain Components -- 3.2 Consensus Process -- 3.3 Blockchain Management -- 4 Conclusions and Perspectives -- References -- Exploring the Impact of Convolutions on LSTM Networks for Video Classification -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 Convolutional Neural Networks -- 2.3 Long Short-Term Memory -- 2.4 Convolutional Long Short-Term Memory (ConvLSTM) -- 2.5 Long-Term Recurrent Convolutional Networks (LRCN) -- 3 Results and Discussion -- 4 Conclusion -- References -- Classification Algorithms Implementation for Fire Prevention Data on Multiple Wireless Node Sensors -- 1 Introduction -- 2 Theory of Probability -- 3 Likelihood Algorithm -- 4 Bayesian Inference -- 5 CUSUM Algorithm -- 6 Result of Experiment -- 7 Conclusion -- References -- Implementation of an Intelligent Monitoring System Based on Quality 4.0 of the Induction Hardening Process.
1 Introduction -- 2 Literature Review -- 2.1 Industry 4.0 -- 2.2 Quality 4.0 -- 3 Case Study -- 3.1 Induction Hardening Machine -- 3.2 Smart Supervision System -- 4 Analysis and Discussion -- 5 Conclusion -- References -- Lithium-Ion Battery State of Charge Estimation Using Least Squares Support Vector Machine -- 1 Introduction -- 2 The SOC Estimation Methods -- 2.1 The Ampere Hour Counting Method -- 2.2 Least Squares Support Vector Machine (LSSVM) Method -- 3 Simulation and Results Discussion -- 4 Conclusion -- References -- Intrusion Detection in Software-Defined Networking Using Machine Learning Models -- 1 Introduction -- 2 Challenges of SDN Security -- 2.1 Distributed Denial of Services -- 2.2 Intrusion Detection System -- 3 Methodology -- 3.1 Performance Evaluation -- 3.2 Dataset -- 4 Result and Discussion -- 5 Conclusion -- References -- Neural Network for Link Prediction in Social Network -- 1 Introduction -- 2 Methodology -- 3 Experimental Results -- 3.1 Dataset Description -- 3.2 Results and Discussion -- 4 Conclusion -- References -- Design and Optimization of a Compact Microstrip Bandpass Filter Using on Open Loop Rectangular Resonators for Wireless Communication Systems -- 1 Introduction -- 2 Design of the Proposed Bandpass Filter -- 3 Simulation Results and Discussion -- 4 Conclusion -- References -- YOLO-Based Approach for Intelligent Apple Crop Health Assessment -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Evaluation of Apple Health Using YOLOv5s, YOLOv5m, and YOLOv7 -- 2.2 Models Optimization -- 3 Results and Discussion -- 3.1 Setup Environment -- 3.2 Apple Disease Detection Image Dataset -- 3.3 Data Preprocessing -- 3.4 Performance Results -- 4 Conclusion -- References -- A Comprehensive Review on the Integration of Blockchain Technology with IPFS in IoT Ecosystem -- 1 Introduction -- 2 IoT-Blockchain Architecture.
3 Reviewed Works -- 4 Challenges and Future Research Directions -- 5 Conclusion -- References -- An Integrated Approach for Artifact Elimination in EEG Signals: Combining Variational Mode Decomposition with Blind Source Separation (VMD-BSS) -- 1 Introduction -- 2 Material and Methods -- 2.1 Datasets -- 2.2 The Variational Mode Decomposition -- 2.3 The Blind Source Separation -- 2.4 The Proposed Method -- 3 Results -- 4 Conclusion and Discussion -- References -- E-Health Blockchain: Conception of a New Smart Healthcare Architecture Based on Deep Reinforcement Learning -- 1 Introduction and Notations -- 1.1 Introduction -- 1.2 Notations -- 2 Related Works -- 3 Our Contribution -- 4 Conclusion -- References -- Dynamic Multi-compartment Vehicle Routing Problem: Formulation and Algorithm -- 1 Introduction -- 2 Problem Formulation -- 3 The Dynamic Adaptation to MCVRP Problem -- 4 Hybrid Adaptive Variable Neighborhood Search for DMCVRP -- 5 Computational Experiments -- 6 Conclusion -- References -- Anime Link Prediction Using Improved Graph Convolutional Networks -- 1 Introduction -- 2 Background -- 2.1 Graph Neural Network -- 2.2 Graph Construction -- 2.3 Types of Graph Neural Network (GNN) -- 3 Proposed Work -- 3.1 ImprovedGCN -- 3.2 Proposed Architecture -- 4 Experiments -- 4.1 Dataset for Evaluation -- 4.2 Environment -- 4.3 Experiment Results -- 5 Conclusion -- References -- Assessing the Evolution of Meteorological Seasons and Climate Changes Using Hierarchical Clustering -- 1 Introduction -- 2 Proposed Method -- 2.1 Data Preprocessing -- 2.2 Background and Methodology -- 3 Findings and Discussion -- 4 Conclusion -- References -- Significance and Impact of AI on Pedagogical Learning: A Case Study of Moroccan Students at the Faculty of Legal and Economics -- 1 Introduction -- 2 Methodology -- 2.1 Sample and Data Collection Procedure.
2.2 Students' Personal Information/Demographic Data -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Securing Big Data: Current Challenges and Emerging Security Techniques -- 1 Introduction -- 2 Big Data and Its Characteristics -- 3 Big Data Security Challenges -- 4 Big Data Security Solutions -- 4.1 Classic Security Methods -- 4.2 Artificial Intelligence Security Techniques -- 4.3 Blockchain Security -- 5 Examples of Potential Attacks on BD Systems and Some Solutions -- 5.1 Examples of Potential Attacks -- 5.2 Solutions for Potential Attacks -- 6 Conclusion -- References -- Machine Learning for Early Fire Detection in the Oasis Environment -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Tool Description -- 3.3 Selected ML Algorithms -- 4 Results and Discussion -- 5 Conclusion -- References -- Voice-Based Detection of Parkinson's Disease Using Empirical Mode Decomposition, IMFCC, MFCC, and Deep Learning -- 1 Introduction -- 2 Dataset -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Study Between Fractional Linear Quadratic Regulator (Frac-LQR) and Sliding Mode Controller for the Stabilization the Three-Axis Attitude Control System of LEO Satellite Using Reaction Wheels -- 1 Introduction -- 2 The Dynamic Model of the Satellite Using Reaction Wheels -- 3 Controllability and Observability -- 4 Fractional Linear Quadratic Regulator (Frac-LQR) -- 5 Sliding Mode Controller (SMC) -- 6 Simulations and Results -- 7 Conclusion -- References -- UV-Nets: Semantic Deep Learning Architectures for Brain Tumor Segmentation -- 1 Introduction -- 2 Related Work -- 3 Materiel and Methods -- 3.1 Data -- 3.2 Data Preparation and Preprocessing -- 3.3 Methods -- 3.4 U-Net -- 3.5 V-Net -- 4 Results -- 4.1 Implementation Details -- 4.2 Evaluation Metrics -- 4.3 Results and Discussion.
5 Conclusion -- References -- A Smart Mathematical Approach to Resource Management in Cloud Based on Multi-objective Optimization and Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Our Contribution -- 3.1 Detailed Description of Our Contribution -- 4 Conclusion -- References -- Machine Learning in Cybersecurity: Evaluating Text Encoding Techniques for Optimized SMS Spam Detection -- 1 Introduction -- 2 Methodology -- 2.1 Data Acquisition -- 2.2 Data Preprocessing -- 2.3 Text Encoding Techniques -- 3 Results and Analysis -- 4 Conclusion -- References -- Design of a GaAs-FET Based Low Noise Amplifier for Sub-6 GHz 5G Applications -- 1 Introduction -- 1.1 Fifth Generation Wireless Communication -- 1.2 LNA -- 2 Theoretical Background -- 2.1 Transistor -- 2.2 Stability -- 2.3 Gain of Amplifier -- 2.4 Noise Figure -- 3 Design of Proposed LNA -- 4 Results and Discussion -- 5 Conclusion -- References -- Pyramid Scene Parsing Network for Driver Distraction Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Pyramid Scene Parsing Network (PSPNet) -- 3.2 Proposed Method -- 4 Experiment and Results -- 4.1 Dataset -- 4.2 Implementation Details -- 4.3 Results -- 5 Conclusion -- References -- A Survey on RFID Mutual Authentication Protocols Based ECC for Resource-Constrained in IoT Environment -- 1 Introduction -- 2 Review of ECC-Authentication Protocols for RFID Systems -- 3 Comparative Analysis -- 4 Conclusion -- References -- Advanced Prediction of Solar Radiation Using Machine Learning and Principal Component Analysis -- 1 Introduction -- 2 Related Works -- 3 Our Proposed Approach -- 4 Experimental Study -- 4.1 Environment -- 4.2 Discussion of Results -- 5 Conclusion -- References -- Blockchain and Machine Learning Applications in Overcoming Security Challenges for CPS and IoT Systems -- 1 Introduction -- 2 Background.
2.1 CPS Security.
Record Nr. UNINA-9910806196003321
Farhaoui Yousef  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence, Data Science and Applications : ICAISE'2023, Volume 1
Artificial Intelligence, Data Science and Applications : ICAISE'2023, Volume 1
Autore Farhaoui Yousef
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (590 pages)
Disciplina 006.3
Altri autori (Persone) HussainAmir
SabaTanzila
TaherdoostHamed
VermaAnshul
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-48465-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organisation -- Introduction -- Contents -- Sustainability in Internet of Things: Insights and Scope -- 1 Introduction -- 2 Research Methodology -- 2.1 Assembling -- 2.2 Arranging -- 2.3 Assessing -- 3 Results and Discussion -- 3.1 RO1. To Quantify the Trends of Publication for Sustainability in IoT -- 3.2 RO2. To Identify Most Influential Research Source on Sustainability in IoT -- 4 Scope and Limitation of Study -- 5 Conclusion -- References -- Machine Learning in Finance Case of Credit Scoring -- 1 Introduction -- 2 Objectif -- 3 Methodology -- 4 Credit Scoring -- 4.1 Definition -- 4.2 Principle -- 5 Statistical Method: Logistic Regression -- 6 Machine Learning Methods -- 6.1 Definition: Machine Learning -- 6.2 Support Vector Machine (SVMs) -- 6.3 Decision Trees -- 6.4 AdaBoost Classifier -- 6.5 Random Forest Classifier -- 6.6 XGBoost -- 7 Case Study -- 7.1 Presentation of the Database -- 7.2 Ratios Used -- 7.3 Definition of the Parameters -- 7.4 Discussion -- References -- Prediction of Coefficient of Friction and Wear Rate of Stellite 6 Coatings Manufactured by LMD Using Machine Learning -- 1 Introduction -- 2 State of the Art -- 3 Materials and Methods -- 3.1 Intelligent Algorithms -- 3.2 Metrics -- 4 Results and Discussion -- 4.1 Feature Importance -- 4.2 Training Results -- 5 Conclusions -- References -- Predicting Future Sales: A Machine Learning Algorithm Showdown -- 1 Introduction -- 2 Methodology -- 2.1 Data Description and Visualization -- 2.2 Exploratory Data Analysis -- 2.3 Determination of Stationarity -- 2.4 Lags Observing -- 2.5 Data Set Regressive Modeling -- 3 Model Comparison and Results -- 4 Conclusion and Outlook -- References -- A Detailed Study on the Game of Life -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Detailed Algorithm Analysis.
3.2 Implementation of the Algorithmic Approaches in the PASCAL Programming Language -- 4 Presentation of Data and Outcomes -- 5 Conclusions and Future Work -- References -- A Decision-Making Model for Selecting Solutions and Improvement Actions Using Fuzzy Logic -- 1 Introduction -- 2 Proposed Model -- 2.1 Action Relevance Estimation -- 2.2 Indicators Definition -- 2.3 Modeling of Indicators -- 2.4 Fuzzy Inference -- 2.5 Defuzzification -- 3 Conclusion -- References -- Sensored Brushless DC Motor Control Based on an Artificial Neural Network Controller -- 1 Introduction -- 2 Materials and Methods -- 2.1 BLDC Motor System -- 2.2 Overview and Use of Controllers -- 3 Results and Discussions -- 4 Conclusions -- References -- A Machine Learning Based Approach to Analyze the Relationship Between Process Variables and Process Alarms -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Problem Statement -- 5 Preliminaries -- 5.1 Process Variables and Alarm Tags -- 5.2 Notions of Alarm and Process Variables -- 5.3 Experimental Environment and Dataset -- 5.4 Machine Learning and Algorithms Used -- 6 Methodology -- 6.1 Overall Learning Process -- 6.2 Pre-processing -- 6.3 Merging Process Tag Data and Alarm Data -- 6.4 Train Machine Learning Model -- 6.5 Generate Feature Importance -- 7 Experiments and Results -- 7.1 Analysis of the Process Data and Alarm Data -- 7.2 Deriving the Relationship Between Alarm and Process Tags -- 7.3 Performance Evaluation of the Machine Learning Algorithms -- 8 Summary and Future Work -- References -- Improving the Resolution of Images Using Super-Resolution Generative Adversarial Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Improved Model Structure -- 4 Experimental -- 4.1 Evaluation Metrics -- 5 Result -- 5.1 Qualitative Evaluation -- 5.2 Quantitative Evaluation -- 6 Conclusion and Future Work.
References -- Three Levels of Security Including Scrambling, Encryption and Embedding Data as Row in Cover Image with DNA Reference Sequence -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Discussion and Results -- 5 Conclusion -- References -- Acceptance and Barriers of ICT Integration in Language Learning: In the Context of Teacher Aspirants from a Third World Country -- 1 Introduction -- 2 Methodology -- 2.1 Research Design -- 2.2 Respondents -- 2.3 Instrument -- 2.4 Data Gathering Procedure -- 2.5 Data Analysis Technique -- 3 Results and Discussion -- 4 Conclusion -- References -- Detection of Pesticide Responsible of Intoxication: An Artificial Intelligence Based Method -- 1 Introduction -- 2 Sate of Art -- 3 The Proposed Method -- 3.1 Database Description -- 3.2 Machine Learning Algorithms -- 4 Result and Discussion -- 5 Conclusion -- References -- A Literature Review of Tutoring Systems: Pedagogical Approach and Tools -- 1 Introduction and Background -- 2 Programmed Learning -- 2.1 Definition of Programmed Learning -- 2.2 Principles of Programmed Learning -- 2.3 Branch Programming by Crowder -- 3 Intelligent Tutors -- 3.1 Intelligent Tutoring System: Definition and Architecture -- 3.2 Example of intelligent Tutoring Systems -- 4 Conclusion -- References -- IoT in Agriculture: Security Challenges and Solutions -- 1 Introduction -- 2 Literature Review and Discussion -- 3 IoT-Based Agriculture Threats -- 4 The Proposed Hybrid Metamodel for Smart Agriculture -- 5 Conclusion and Future Works -- References -- Big Data Analytics in Business Process: Insights and Implications -- 1 Introduction -- 2 Research Methodology -- 3 Results and Discussion -- 4 Scope and Limitation of Study -- 5 Conclusion -- References.
Chatbots for Medical Students Exploring Medical Students' Attitudes and Concerns Towards Artificial Intelligence and Medical Chatbots -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Socio-demographic Characteristics -- 3.2 Attitudes of Medical Student Toward Intelligent Chatbots in Medicine -- 3.3 Potential Applications of AI in Medicine Perceived by Medical Student -- 3.4 Medical Students Concerned About the Use of AI in Clinical Practice -- 4 Discussion -- 5 Conclusion -- References -- Design and Analysis of the Rectangular Microstrip Patch for 5G Application -- 1 Introduction -- 2 Design Parameters for Rectangular Patch Antenna -- 3 Results and Discussions -- 3.1 Return Loss -- 3.2 Voltage Standing Wave Ratio (VSWR) -- 3.3 Bandwidth -- 3.4 3D Radiation Pattern for Gain and Directivity -- 4 Conclusion -- References -- Reading in the 21st Century: Digital Reading Habit of Prospective Elementary Language Teachers -- 1 Introduction -- 2 Methodology -- 2.1 Research Design -- 2.2 Respondents -- 2.3 Research Instrument -- 2.4 Data Gathering Procedure -- 2.5 Data Analysis Technique -- 2.6 Ethical Consideration -- 3 Results and Discussion -- 4 Conclusion and Implications -- References -- Understanding and Designing Turing Machines with Applications to Computing -- 1 Introduction -- 2 Computational Steps -- 3 Turing Machines-Background -- 3.1 Conceptualizing Turing Machines -- 3.2 Result After Running a Command -- 4 Basic Concepts of the Theory of Algorithms with the Help of Turing Machines -- 5 Examples of Turing Machines -- 6 Conclusions and Future Work -- References -- How Can Cloud BI Contribute to the Development of the Economy of SMEs? Morocco as Model -- 1 Introduction -- 2 State of the Art -- 2.1 Cloud Computing -- 2.2 Business Intelligence -- 2.3 Cloud BI -- 3 Morocco, SMEs and Cloud BI -- 3.1 Important Stats and Discussions.
3.2 Benefits of Cloud BI in SMEs -- 3.3 SMEs Concerns About Using Cloud BI -- 4 Proposed Framework -- 4.1 Homomorphic Encryption -- 5 Conclusion and Perspectives -- References -- Deep Learning for Dynamic Content Adaptation: Enhancing User Engagement in E-commerce -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection and Preprocessing -- 2.2 Deep Learning Model for Dynamic Content Adaptation -- 2.3 Model Training -- 2.4 Model Evaluation -- 3 Results and Discussion -- 4 Conclusion -- References -- PID Versus Fuzzy Logic Controller Speed Control Comparison of DC Motor Using QUANSER QNET 2.0 -- 1 Introduction -- 2 Materials and Methods -- 2.1 DC Motor Material -- 2.2 PID Controller Method -- 2.3 Fuzzy Logic Controller Method -- 3 Simulation and Experimental Results -- 3.1 Simulation Results -- 3.2 Experimental Results -- 4 Conclusion -- References -- Unleashing Collective Intelligence for Innovation: A Literature Review -- 1 Introduction -- 2 Research Methodology -- 3 Results -- 4 Analysis -- 5 Conclusion -- References -- Which Data Quality Model for Recommender Systems? -- 1 Introduction -- 2 Data Quality -- 3 Data Quality Dimension -- 4 Data Quality Models -- 5 Comparison and Discussion -- 6 Conclusion and Future Works -- References -- Logistics Blockchain: Value-Creating Technology for the Port of Casablanca's Container Terminal -- 1 Introduction -- 1.1 The Study Context -- 1.2 Interest and Challenge of the Study -- 1.3 Approach and Research Methodology -- 2 Findings of the Digitization of the NPA on the Performance of the Port Container Terminals (PCTs) Process -- 3 Blockchain Logistics: An Opportunity to Achieve Desired Goals in PTC -- 4 Conclusion -- References -- Using Artificial Intelligence (AI) Methods on the Internet of Vehicles (IoV): Overview and Future Opportunities -- 1 Introduction -- 2 IoV and AI Methods Overview.
2.1 IoV Architecture.
Record Nr. UNINA-9910842295803321
Farhaoui Yousef  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui