International Conferences on Networking, Information Systems & Security最新文献

筛选
英文 中文
Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN 考虑无线网络仿真与仿真中的环境特性:以流行的模拟器和无线传感器网络为例
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1145/3386723.3387821
Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui
{"title":"Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN","authors":"Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui","doi":"10.1145/3386723.3387821","DOIUrl":"https://doi.org/10.1145/3386723.3387821","url":null,"abstract":"Wireless sensor networks are a low-power communication technology that is increasingly used in our daily life to realize various monitoring tasks in almost all domains. Therefore, WSN are getting much interest from scientific researches. Simulations and Emulations are used for evaluating new protocols and architectures. Such tools focus on analyzing higher-layer protocols and suppose that the physical layer models, particularly the radio propagation models, do not interfere with the experimentation. Therefore, the adopted radio propagation model has a great impact on the simulation/emulation results. In this paper, we study the consideration of the deployment environment in some popular simulators and emulators.","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analysis of ResNet50 Model and RMSprop Optimizer for Education Platform Using an Intelligent Chatbot System 基于智能聊天机器人的教育平台ResNet50模型及RMSprop优化器分析
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_41
Youness Saadna, A. Boudhir, M. Ahmed
{"title":"An Analysis of ResNet50 Model and RMSprop Optimizer for Education Platform Using an Intelligent Chatbot System","authors":"Youness Saadna, A. Boudhir, M. Ahmed","doi":"10.1007/978-981-16-3637-0_41","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_41","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127045245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Optimization of a Multi-criteria Cognitive Radio User Through Autonomous Learning 基于自主学习的多准则认知无线电用户优化
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_9
Naouel Seghiri, M. Z. Baba-Ahmed, B. Benmammar, Nadhir Houari
{"title":"Optimization of a Multi-criteria Cognitive Radio User Through Autonomous Learning","authors":"Naouel Seghiri, M. Z. Baba-Ahmed, B. Benmammar, Nadhir Houari","doi":"10.1007/978-981-16-3637-0_9","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_9","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127827516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Design of an Ant Colony Optimization (ACO) Algorithm for Optimization of Ad Hoc Network 基于蚁群算法的Ad Hoc网络优化设计
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_16
Hala Khankhour, O. Abdoun, J. Abouchabaka
{"title":"A New Design of an Ant Colony Optimization (ACO) Algorithm for Optimization of Ad Hoc Network","authors":"Hala Khankhour, O. Abdoun, J. Abouchabaka","doi":"10.1007/978-981-16-3637-0_16","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_16","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Skin Detection Based on Convolutional Neural Network 基于卷积神经网络的皮肤检测
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_6
Yamina Bordjiba, Chemesse ennehar Bencheriet, Zahia Mabrek
{"title":"Skin Detection Based on Convolutional Neural Network","authors":"Yamina Bordjiba, Chemesse ennehar Bencheriet, Zahia Mabrek","doi":"10.1007/978-981-16-3637-0_6","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_6","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Processing on Distributed Systems Storage Challenges 分布式系统数据处理的存储挑战
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_56
Mohamed Eddoujaji, Hassan Samadi, Mohamed Bohorma
{"title":"Data Processing on Distributed Systems Storage Challenges","authors":"Mohamed Eddoujaji, Hassan Samadi, Mohamed Bohorma","doi":"10.1007/978-981-16-3637-0_56","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_56","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124896582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-Time Distributed Pipeline Architecture for Pedestrians' Trajectories 行人轨迹的实时分布式管道结构
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_17
Kaoutar Bella, A. Boulmakoul
{"title":"Real-Time Distributed Pipeline Architecture for Pedestrians' Trajectories","authors":"Kaoutar Bella, A. Boulmakoul","doi":"10.1007/978-981-16-3637-0_17","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_17","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Human Activities in Wildlands to Prevent the Occurrence of Wildfires Using Deep Learning and Remote Sensing 利用深度学习和遥感技术检测野外人类活动以防止野火的发生
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_1
Ayoub Jadouli, Chaker El Amrani
{"title":"Detection of Human Activities in Wildlands to Prevent the Occurrence of Wildfires Using Deep Learning and Remote Sensing","authors":"Ayoub Jadouli, Chaker El Amrani","doi":"10.1007/978-981-16-3637-0_1","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_1","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121853351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Smart City Approach: A Comparative Study 走向智慧城市:一个比较研究
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_44
Zineb Korachi, B. Bounabat
{"title":"Towards a Smart City Approach: A Comparative Study","authors":"Zineb Korachi, B. Bounabat","doi":"10.1007/978-981-16-3637-0_44","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_44","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of international trade evolution through the Support Vector Machine: The case of a port complex 基于支持向量机的国际贸易演变预测:以港口综合体为例
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1145/3454127.3456587
O. Imrani
{"title":"Prediction of international trade evolution through the Support Vector Machine: The case of a port complex","authors":"O. Imrani","doi":"10.1145/3454127.3456587","DOIUrl":"https://doi.org/10.1145/3454127.3456587","url":null,"abstract":"In this research work, we will present the main results and interpretations of the analysis of secondary data collected and processed. The analysis of Support Vector Machines, also known as Large Margin Separators (SVM), was used to predict the performance of the Tanger Med port, especially in terms of optimizing the logistics costs of the port, which allows a very strong evolution. level of international trade. The results of the SVM analysis obtained, helped to answer the problematic of our research, thus achieving the objectives of the study. The SVM technique was based on inferential analysis which showed the relevance of the results obtained from the secondary data and answered the research questions.","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信