2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)最新文献

筛选
英文 中文
NISS 2022 Cover Page NISS 2022封面
{"title":"NISS 2022 Cover Page","authors":"","doi":"10.1109/niss55057.2022.10085011","DOIUrl":"https://doi.org/10.1109/niss55057.2022.10085011","url":null,"abstract":"","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117349467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing Application in Medical Imaging: Challenges and Opportunities 云计算在医学成像中的应用:挑战与机遇
Hicham Boudlal, Mohammed Serrhini, A. Tahiri
{"title":"Cloud Computing Application in Medical Imaging: Challenges and Opportunities","authors":"Hicham Boudlal, Mohammed Serrhini, A. Tahiri","doi":"10.1109/NISS55057.2022.10084922","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10084922","url":null,"abstract":"In healthcare, critical systems are used to provide vital information and services 24x7x365. Recent years have brought important advancements in medical imaging and information technology (IT) which have changed significantly the way we operate and interact with each other. The use of cloud computing has centralized the infrastructure of radiology, software imaging, database storage or network configuration, that could then be provisioned as service based on user demand to any Internet computer. The present article provides an overview regarding the basic concept of cloud computing technology and discusses its application for medical imaging.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126833828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards fast ECC signing algorithms for Blockchain 区块链的快速ECC签名算法研究
Youssef Lamriji, K. Makkaoui, A. Beni-Hssane
{"title":"Towards fast ECC signing algorithms for Blockchain","authors":"Youssef Lamriji, K. Makkaoui, A. Beni-Hssane","doi":"10.1109/NISS55057.2022.10085497","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085497","url":null,"abstract":"Blockchain (BC) is a revolutionary technology that has dramatically impacted modern society thanks to its decentralization, transparency, and security properties. The BC is a distributed database that stores a register of assets and digitally signed transactions. Beginning in the financial field, BC was quickly applied to several fields, including the Internet of Things (IoT), supply chain, education, healthcare, and energy. In most BC-based applications, transactions are signed using ECDSA or EdDSA algorithms. However, scalar multiplication (SM) is a complex and central operation in these signing algorithms. This paper presents the most efficient techniques for computing SM to provide fast signature algorithms for BC-enabled applications.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utilizing AR for 3D Geometry Object Visualization 利用AR 3D几何对象可视化
Khasanah Nur Hidayah, A. Siagian, R. Richardo, S. Riyanto
{"title":"Utilizing AR for 3D Geometry Object Visualization","authors":"Khasanah Nur Hidayah, A. Siagian, R. Richardo, S. Riyanto","doi":"10.1109/NISS55057.2022.10085172","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085172","url":null,"abstract":"Employing a learning medium can support learning and teaching activities. This learning medium can be one way to help students in understanding particular lessons, e.g., mathematics, art, and science. Although due to some reasons that understanding such specific lessons might be very difficult, using a learning tool can help students in understanding them easily. Thus, this study aims to develop such a learning medium in helping students to learn mathematics using visualization. In particular, we utilize augmented reality (AR) technology to visualize cube and beam objects. The visualized cube and beam objects are in the form of models and nets. The models and nets visualization is shown as a basic understanding to learn the geometry of three-dimensional (3D) flat-sided shapes. For this purpose, we use Research and Development (R&D) method consisting of define, design, development, and dissemination steps in this study. Our experimental results show that the developed AR application could work well to visualize the models, nets, and volume of cube and beam objects in 3D.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131664989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About NISS 2022
{"title":"About NISS 2022","authors":"","doi":"10.1109/niss55057.2022.10085241","DOIUrl":"https://doi.org/10.1109/niss55057.2022.10085241","url":null,"abstract":"","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Highly-Efficient k-Nearest Neighbor Algorithm for Big Data Classification 面向大数据分类的高效k近邻算法
H. I. Abdalla, A. Amer
{"title":"Towards Highly-Efficient k-Nearest Neighbor Algorithm for Big Data Classification","authors":"H. I. Abdalla, A. Amer","doi":"10.1109/NISS55057.2022.10085013","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085013","url":null,"abstract":"the k-nearest neighbors (kNN) algorithm is naturally used to search for the nearest neighbors of a test point in a feature space. A large number of works have been developed in the literature to accelerate the speed of data classification using kNN. In parallel with these works, we present a novel K-nearest neighbor variation with neighboring calculation property, called NCP-kNN. NCP-kNN comes to solve the search complexity of kNN as well as the issue of high-dimensional classification. In fact, these two problems cause an exponentially increasing level of complexity, particularly with big datasets and multiple k values. In NCP-kNN, every test point’s distance is checked with only a limited number of training points instead of the entire dataset. Experimental results on six small datasets, show that the performance of NCP-kNN is equivalent to that of standard kNN on small and big datasets, with NCP-kNN being highly efficient. Furthermore, surprisingly, results on big datasets demonstrate that NCP-kNN is not just faster than standard kNN but also significantly superior. The findings, on the whole, show that NCP-kNN is a promising technique as a highly-efficient kNN variation for big data classification.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment analysis of students’ Facebook comments toward university announcements 学生在Facebook上对大学公告评论的情感分析
Anoual El Kah, Imad Zeroual
{"title":"Sentiment analysis of students’ Facebook comments toward university announcements","authors":"Anoual El Kah, Imad Zeroual","doi":"10.1109/NISS55057.2022.10084994","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10084994","url":null,"abstract":"Students’ opinions are among the critical indicators to evaluate the university teaching process. However, due to the absence of an official online system in most universities that provides a mechanism for obtaining students’ opinions on several university announcements, most students use various social networks to express their feelings and provide their opinions toward these announcements. We present, through this paper, sentiment analysis of Facebook comments written in the Moroccan Arabic dialect. These comments reflect the opinions of students about university announcements during the COVID-19 pandemic, especially those related to teaching mode and ex-am planning. Then, the comments collected were cleaned, preprocessed, and manually classified into four categories, namely positive, neutral, negative, and bipolar. Further, data dimensionality reduction is applied using TF-IDF and Chi-square test. Finally, we evaluated the performance of three standard classifiers, i.e., Naïve Bayesian (NB), Support Vector Machines (SVM), and Random Forests (RF) using k-fold cross-validation. The results showed that the SVM-based classifier performs as well as the RF-based classifier regarding the classification’s accuracy and F1-score, while the NB-based classifier lags behind them.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129603008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nature-inspired and sampling algorithm towards 3D path planning for autonomous vehicles: a review 面向自动驾驶汽车3D路径规划的自然启发和采样算法:综述
Walid Jebrane, Nabil El Akchioui
{"title":"Nature-inspired and sampling algorithm towards 3D path planning for autonomous vehicles: a review","authors":"Walid Jebrane, Nabil El Akchioui","doi":"10.1109/NISS55057.2022.10085101","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085101","url":null,"abstract":"The biggest challenge to autonomous mobile robot navigation is planning an obstacle-free trajectory from an initial point to the target. All environments are prompt to change which arises obstacles that add more complexity to the autonomous navigation systems, especially for tasks such as parcel delivery, law enforcement, and first aid in urban areas. The most of current algorithms for autonomous system path planning are drawn from pre-existing models and focus mostly on Ground Autonomous Vehicles, employing 2D techniques that must be converted to 3D in the case of Aerial Vehicles. The race to solve those challenging tasks, over the past few decades, has led to a promising range of improved and hybrid robot path planning. The main objective of this article is to provide a comprehensive and conclusive review of two of the most successful three-dimensional robotic path planning algorithms developed in recent years. Each algorithm is investigated and evaluated in terms of time efficiency, executable area, and capacity to deal with both static and dynamic obstacles.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent technology management based on patent topic modeling : *Note: Sub-titles are not captured in Xplore and should not be used 基于专利主题建模的智能技术管理:*注:Xplore中不捕获副标题,请勿使用
Mohamed Maskittou, Anass El Haddadi, Hayat Routaib
{"title":"Intelligent technology management based on patent topic modeling : *Note: Sub-titles are not captured in Xplore and should not be used","authors":"Mohamed Maskittou, Anass El Haddadi, Hayat Routaib","doi":"10.1109/NISS55057.2022.10085417","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085417","url":null,"abstract":"Competitive intelligence and technology insights are the results of using the materials and methods of big data analytics to arrange existing knowledge, integrating big data analytics in the field of patent analysis is an urgent need for any company in the marketplace to gain strong knowledge about the computational environment, this paper is a new paradigm in patent analysis by proposing a full methodology from feature selection to clustering phase based on singular value decomposition (SVD) as a central tool to determine the correlation between the patent’s data, semantic patent topics could emerge more relevant topics helping the senior managers in the companies in claiming new management strategy to fill the gaps with the markets with decreasing the cost of the production and time-consuming of the decision-making in each level of the organization.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public-Key Cryptography behind Blockchain Security 区块链安全背后的公钥加密
Mohamed Fartitchou, Hanaa El Marraki, Lamyae Lafkir, Anissa Azzouz, K. Makkaoui, Z. E. Allali
{"title":"Public-Key Cryptography behind Blockchain Security","authors":"Mohamed Fartitchou, Hanaa El Marraki, Lamyae Lafkir, Anissa Azzouz, K. Makkaoui, Z. E. Allali","doi":"10.1109/NISS55057.2022.10085236","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085236","url":null,"abstract":"Blockchain (BC) technology has infiltrated many areas of our lives, from digital currencies to healthcare and beyond, thanks to its security, decentralization, and transparency properties. BC is a decentralized ledger of assets and digitally signed transactions through a peer-to-peer (P2P) computer network. Indeed, signature and consensus algorithms are behind BC’s security and performance. This paper provides a study on BC-used asymmetric cryptography. We focus on RSA, DSA, and ECDSA digital signature algorithms. We implement the algorithms using python language on a Raspberry Pi. Simulation outcomes show that the ECDSA performs better than the other algorithms and is secure despite using small keys.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信