{"title":"A New Design of an Ant Colony Optimization (ACO) Algorithm for Optimization of Ad Hoc Network","authors":"Hala Khankhour, O. Abdoun, J. Abouchabaka","doi":"10.1007/978-981-16-3637-0_16","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_16","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui
{"title":"Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN","authors":"Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui","doi":"10.1145/3386723.3387821","DOIUrl":"https://doi.org/10.1145/3386723.3387821","url":null,"abstract":"Wireless sensor networks are a low-power communication technology that is increasingly used in our daily life to realize various monitoring tasks in almost all domains. Therefore, WSN are getting much interest from scientific researches. Simulations and Emulations are used for evaluating new protocols and architectures. Such tools focus on analyzing higher-layer protocols and suppose that the physical layer models, particularly the radio propagation models, do not interfere with the experimentation. Therefore, the adopted radio propagation model has a great impact on the simulation/emulation results. In this paper, we study the consideration of the deployment environment in some popular simulators and emulators.","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of ResNet50 Model and RMSprop Optimizer for Education Platform Using an Intelligent Chatbot System","authors":"Youness Saadna, A. Boudhir, M. Ahmed","doi":"10.1007/978-981-16-3637-0_41","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_41","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127045245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naouel Seghiri, M. Z. Baba-Ahmed, B. Benmammar, Nadhir Houari
{"title":"Optimization of a Multi-criteria Cognitive Radio User Through Autonomous Learning","authors":"Naouel Seghiri, M. Z. Baba-Ahmed, B. Benmammar, Nadhir Houari","doi":"10.1007/978-981-16-3637-0_9","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_9","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127827516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Skin Detection Based on Convolutional Neural Network","authors":"Yamina Bordjiba, Chemesse ennehar Bencheriet, Zahia Mabrek","doi":"10.1007/978-981-16-3637-0_6","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_6","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Processing on Distributed Systems Storage Challenges","authors":"Mohamed Eddoujaji, Hassan Samadi, Mohamed Bohorma","doi":"10.1007/978-981-16-3637-0_56","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_56","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124896582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Distributed Pipeline Architecture for Pedestrians' Trajectories","authors":"Kaoutar Bella, A. Boulmakoul","doi":"10.1007/978-981-16-3637-0_17","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_17","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Boulouird, Jamal Amadid, Abdelhamid Riadi, M. Hassani
{"title":"Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot Contamination","authors":"M. Boulouird, Jamal Amadid, Abdelhamid Riadi, M. Hassani","doi":"10.1007/978-981-16-3637-0_11","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_11","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"102 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Human Activities in Wildlands to Prevent the Occurrence of Wildfires Using Deep Learning and Remote Sensing","authors":"Ayoub Jadouli, Chaker El Amrani","doi":"10.1007/978-981-16-3637-0_1","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_1","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121853351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Smart City Approach: A Comparative Study","authors":"Zineb Korachi, B. Bounabat","doi":"10.1007/978-981-16-3637-0_44","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_44","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}